CN103888265A - Login system and method based on mobile terminal - Google Patents

Login system and method based on mobile terminal Download PDF

Info

Publication number
CN103888265A
CN103888265A CN201410144378.9A CN201410144378A CN103888265A CN 103888265 A CN103888265 A CN 103888265A CN 201410144378 A CN201410144378 A CN 201410144378A CN 103888265 A CN103888265 A CN 103888265A
Authority
CN
China
Prior art keywords
user
authentication
terminal
module
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410144378.9A
Other languages
Chinese (zh)
Other versions
CN103888265B (en
Inventor
顾健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hebei Xiong'an Xiangma Technology Co.,Ltd.
Original Assignee
Shanghai Bolu Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Bolu Information Technology Co Ltd filed Critical Shanghai Bolu Information Technology Co Ltd
Priority to CN201410144378.9A priority Critical patent/CN103888265B/en
Publication of CN103888265A publication Critical patent/CN103888265A/en
Application granted granted Critical
Publication of CN103888265B publication Critical patent/CN103888265B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a login system and method based on a mobile terminal. The login system comprises a computer certification and authentication service module and application, a terminal certification and authentication service module, a system certification and authentication service module and the like. A user computer and the mobile terminal scan and find each other through the short-distance wireless technology and are certificated in a certification mode, the application requests the system to send a login request to the mobile terminal when a user logs into the application, a certification and authentication result of the terminal are waited at the system end after the system receives the request of the user, after the terminal receives the request of the user and the user identity is selectively certificated according to security settings, data capable of certificating the identity of the terminal and login request information are sent to the system, the system conducts terminal certification and authentication on the data sent by the user, and the user is allowed to log in the application of an access device if the data pass certification and authentication. Service experience facilitating automatic login is provided for the user on the basis of mobile terminal certification and authentication through device discovery and certification.

Description

A kind of login system and method based on mobile terminal
Technical field
The present invention relates to the Internet and technical field of mobile terminals, refer to especially a kind of login system and method based on mobile terminal.
Background technology
Along with the development, particularly the Internet of Internet technology and terminal software technology and the development of terminal technology, for a kind of login system and method based on mobile terminal provides feasibility.
When user uses software on apparatus such as computer, often need to login, need user to input user name, the even input such as identifying code of password, complex steps, need user to remember a large amount of log-on messages, it is username and password, and exist user name code data frequently in transmission over networks, in transmitting procedure, there is safe hidden danger, because the data of transmission over networks all may be ravesdropping and analyze on any one node of transmission, or access means as computer on by the possibility of the Malware such as wooden horse theft password, user need to drop into larger energy and safeguard the log-on message of different software, user experiences and need to be improved, needing us to find out one not only guarantees safety but also can improve the method for logining efficiency.
Along with the occupation rate day by day universal and intelligent terminal of mobile terminal improves on a large scale, intelligent terminal becomes articles for use indispensable in people's daily life, the function of intelligent terminal is become stronger day by day, autgmentability is also slowly equally matched and more powerful under many circumstances with traditional apparatus such as computer, as the touch-screen on mobile terminal, can provide gesture, the input of word, or the action induction of fingerprint recognition or terminal, these functions can be integrated on mobile terminal.
Simultaneously, the development of short-distance wireless technology, comprise bluetooth, WIFI-DIRECT, the technology such as NFC all increasingly mature and spread to gradually on mobile terminal and computer equipment on, based on short-distance wireless technology, we can be within a less distance as tens meters to several centimetres in scope, scanning and find near equipment also carry out data alternately.
Therefore, privacy based on mobile terminal and portable, we consider the one mechanism using user's mobile terminal as authentication and authentication user, user is at the key of system in other words conj.or perhaps, user within equipment distance without input log-on message or identify simply on mobile terminal after user's identity, the mobile terminal of system identification and authentication of users the confidence level based on mobile terminal give user in access means as the corresponding access rights on computer.
In view of this, the object of the invention is to propose one simple, in conjunction with a kind of login system and method based on mobile terminal of short-distance wireless technology and software engineering.
Summary of the invention
As can be seen from above, system comprises as lower module and step:
Whole system comprises background system, mobile terminal and three parts of access end equipment, and method comprises following steps:
1) user is in system registry, and user bound identity and terminal also arrange access means and the proof rule of terminal and system;
2) user computer and user terminal are carried out mutual scanning discovery and according to the selected certification mode of user, are carried out the unidirectional or two-way authentication between equipment by short-distance wireless technology;
3) when user logins application on apparatus such as computer, select terminal Validation Mode, when application request system is logined, initiate logging request to the terminal of finding and verified;
4) system receives after user's logging request, calculates at system end authentication and the authorization data that authentication data and inquiry and comparison terminal are uploaded;
5) terminal receives user's checking request, terminal equipment according to safety arrange after identifying user identity according to authentication and the authentication arithmetic of system agreement, can authenticate the data of terminal identity and landing request information and issue that system authenticates and authentication;
6) data that system sends mobile phone are carried out authentication and the authentication to terminal, as pass through, and allow the application login of user in access means.
Further, pass through provided a kind of login system based on mobile terminal and method for a kind of development of the application registering service based on terminal provides powerful guarantee, meet the requirement of user each side, promote user friendly experience.
For achieving the above object, one aspect of the present invention provides a kind of login system and method based on mobile terminal, and this system comprises:
Background system mainly comprises:
Registration and binding module, authentication and authentication module, data module, update module, wherein, registration and binding module are responsible for user's registration and the binding of user terminal and user identity;
System authentication and authentication module are responsible for authentication and the authentication of user identity and terminal;
Data module is responsible for preserving user data and business datum;
Update module is responsible for system, software upgrading and upgrading that terminal and access means end are corresponding;
Terminal mainly comprises:
Registration and binding module, scanning and discovery module, authentication module, authentication and authentication module, logical
News module, update module, wherein:
Registration and binding module are responsible for registration terminal and user profile to system, and system is bound;
Scanning and find that module is responsible for according to short-distance wireless agreement, comprise bluetooth, WIFI-DIRECT,
The short-distance wireless technology such as NFC, scanning and find user logging device, authentication module is responsible for the equipment room proof rule set according to user and verification algorithm near other equipment, verifies whether be the equipment of specifying as main frame;
The equipment that authentication module is responsible for the periphery of finding according to verification algorithm checking be whether user register and
The equipment of specifying;
Authentication module is responsible for according to authentication and the authorization data of user's visit information and terminal calculating
To user with equipment authenticates and authentication;
Communication module is responsible for carrying out with the equipment of verifying the transmitted in both directions of communication and data;
Update module is responsible for carrying out alternately with system, the software of upgrading and renewal end side;
Access means comprises: application login module, scanning and discovery module, authentication module, communication module, update module;
Wherein, login module is responsible for initiating logging request to system and the login authentication request of terminal,
Scanning and discovery module are responsible for scanning access means if the mobile device of main frame periphery is as mobile phone, whether the mobile terminal that authentication module is responsible for the periphery that checking is found according to verification algorithm is the terminal equipment that user registers and binds, communication module is responsible for and the transmitted in both directions of carrying out communication and carry out data through the terminal of checking, update module is responsible for carrying out alternately with system, the software of upgrading and renewal access means side.
In an embodiment of a kind of login system based on mobile terminal provided by the invention and method, the method also comprises:
The user identity of user's acquisition system after system is registered and corresponding access rights, and user's accesses identity information login system in terminal of use acquisition, client terminals acquisition terminal characteristic, be synchronized to system, required various data are calculated in the checking that obtains system assignment, system binding user and mobile terminal, after binding success, user arranges the proof rule between access means and the equipment of mobile terminal.
Equipment carries out scanning each other by short-distance wireless, discovering device, and according to the proof rule between user's set device, comprise equipment room Validation Mode, comprise unidirectional or bi-directional device signature verification, password authentication, verification algorithm by agreement verifies that whether the equipment of discovery is credible, and verification algorithm module is present in system, terminal and access means as upgradeable software module.
User opens application request login system, in the situation that user selects to verify login by mobile terminal, when sending logging request to system, application sends login authentication request to the mobile terminal device that is present in periphery that has been found that and verified, the mobile terminal application login authentication that requests verification is crossed, has comprised user's landing request information in request message.
System receives the logging request of application, according to the information of user's logging request, in system-computed authentication and authentication calculations, and terminal authentication and the authentication calculations object information of binding corresponding to the logging request session of inquiring about current request user, compare with the result of calculation of system end, determine whether effective request that effective terminal is sent, the request that terminal sends as unanimously thought for effective terminal and authentication result of calculation is effective, allow user in access end device logs, as wait timeout judges that this user's logging request lost efficacy and access end equipment is arrived in loopback error message.
Terminal receives user's login authentication solicited message, terminal equipment passes through the input of terminal itself alternatively according to user's terminal local security setting, comprise fingerprint recognition, gesture, the mode identifying user identity that the terminals such as password are supported, or get involved the solicited message of the terminal of direct this checking of approval without user, according to authenticate and the calculating of authentication with the authentication of system agreement and the calculating parameter of authentication arithmetic and system assignment, the data that the authentication of mobile phone terminal and authentication calculations algorithm are calculated and login sessions information issue that system authenticates and authentication, the data that system sends mobile phone are carried out authentication and authentication, as pass through, allow user in application login, otherwise refuse this login.
The authentication that each part comprises and authentication module, to user with terminal equipment authenticates and authentication, as a upgradeable module existence for agreement mutually of each part of system, its specific algorithm can carry out by the update module of system, terminal and each part of access means upgrading and the replacement of algorithm and function, and is not limited to specific algorithm.
 
Have the following advantages specifically:
Without inputting password:
Register and binding terminal after, user is in needs whens application login, even also can login without inputting user name without inputting password in access means on as computer, without user's memory cipher, convenient for users.
Fail safe is improved:
By authentication and authentication arithmetic, end side and system side calculate respectively and submit to can identification terminal identity data, system compare terminal and system data and judge, username and password no longer need to transmit on network, improved the fail safe using.
For the safety problem that prevents that the situation of lost terminal from existing, end side can also be further by self input capability and demo plant of mobile terminal, comprise gesture, fingerprint recognition, the mode of Password Input is carried out the user of verification terminal, further guarantees user's safety.
Meanwhile, authentication and the authentication module of being responsible for Authentication devices and user identity are upgradeable software module, can use and arrange different security algorithms by software upgrading, further guarantee safety.
Fail safe is improved in autonomous channel:
The login of traditional mode and the passage of transfer of data are same passage, all may there is risk in the safety of computer and transmission channel, be access means end if the data channel of computer and mobile terminal are as the data channel of mobile phone terminal by logging request and verification msg channel separation, be difficult to eavesdrop two kinds of passages simultaneously, further improved fail safe.
Automatically login, improves experience:
Automatic scan by equipment room and find registration and the access end equipment of binding if computer and mobile terminal are as mobile phone, PAD etc., after the equipment of the registration of permitting for user through checking coupling, can automatically login, improved user's business experience.
 
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, forms the application's a part, and schematic description and description of the present invention is used for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is system module structural representation of the present invention.
Fig. 2 is that system user information of the present invention shines upon associated schematic diagram.
Fig. 3 is user's registration of the present invention and binding schematic flow sheet.
Fig. 4 is present device checking schematic flow sheet.
Fig. 5 is that the present invention publishes operation flow schematic diagram.
Fig. 6 is registering service schematic flow sheet of the present invention.
 
Embodiment
With reference to the accompanying drawings the present invention is described more fully, exemplary embodiment of the present invention is wherein described.
For achieving the above object, a kind of login system and method based on mobile terminal proposed.
Below in conjunction with the drawings, embodiments of the present invention are described.
The key point that realizes a kind of login system based on mobile terminal and method is as follows:
User's registration and apparatus bound:
User registers in system, system assignment user profile and authority, after user registration success, access means as computer and mobile terminal on by client mode access system, mobile terminal side gathers the characteristic information of user terminal, comprise hardware characteristics data, software features data, hardware characteristics data take to obtain the data that possess uniqueness characteristic on equipment, comprise access host equipment as the CPU sequence number on computer, SIM card id information on the hardware characteristics information such as MAC Address and mobile terminal, fuselage code, the data such as termination number, or the characteristic of the uniqueness such as MAC Address, and software features data, as software type and edition data, and the calculating parameter of system assignment, if the Key of the specific participation calculating of system assignment is to user, system is bound user profile and mobile terminal, whether limit access means according to user alternatively and bind access host equipment, as the computer of user's use, Authentication devices is logined to license and apparatus characteristic information and calculating parameter in the time of device request access system, these data are verified according to being delivered to system after mobile terminal authentication and the calculating of authentication function, as by thinking that this equipment is user's credible equipment, admit this equipment and be this user.
Meanwhile, access means end also can be preserved mutually the other side's characteristic information as computer and mobile terminal, carries out automatic Verification in scanning with while finding method, apparatus, to reduce the time of equipment connection and verification step, realizes from being dynamically connected and accelerating the speed of exchanges data.
Device scan and checking:
The access end equipment that user uses is if computer and mobile terminal are by short-distance wireless technology, comprise bluetooth, WIFI-DIRECT, the technology such as NFC or DLNA is scanning and discovery mutually, after discovery, carry out unidirectional or two-way device authentication according to setting, if whether computer checking mobile phone is the mobile phone of binding, or whether the computer equipment that mobile phone checking is found is the host equipment of specifying, the equipment being verified just allows to carry out the mutual of data.
The mode of checking comprises calculates Hash apparatus characteristic value or in the time of computer request access mobile terminal, user inputs access code in terminal, comprise fingerprint recognition, gesture password, word password is strengthened the fail safe of access, by after again the mode of cryptographic Hash separately of checking permit connection.
Or take automatically to calculate and the mode of checking, the mobile terminal data of preserving in the time of binding, from be dynamically connected does not need user to get involved after verifying mobile terminal by access means.
The mode of acquiescence takes access means as the unidirectional authentication mode of computer checking mobile terminal, to facilitate user can change different access computer equipments and access system.
Lift a simple verification algorithm function, for example: HASH (needing the parameter such as KEY+ timestamp+random number of the MAC Address+system assignment of Authentication devices).
The result and the partial parameters that need the equipment of checking that algorithm is calculated, as the MAC Address of inquiry session message or send to the other side with message, the other side can carry out verification according to same algorithm.
The module of checking is software module scalable and that upgrade, and system is when needed by the specific algorithm of upgrading and the renewable checking of update module.
User's login:
User's login has comprised user in the login of host accesses equipment and the checking to mobile terminal.
User is at host accesses equipment, login as started application on computer, the mobile terminal device that logging request sends to system simultaneously and has been found that and verified, the characteristic value that login request message comprises the access host equipment after calculating, optional user name, the application message of login, the data such as timestamp, system is receiving after user's logging request, whether checking is legal login, as user name exists and is validated user in this system, or the access host equipment whether user has specified, as waited for the result to mobile terminal for legal logging request, as the login authentication solicited message to mobile terminal allows the login of access means end by authentication and the words of authentication.
Mobile terminal receives after user's login request message, alternatively, verify this user's logging request, comprise and pass through fingerprint recognition, gesture, access pin mode, judges that this request is legal access request, or sets according to user, as user sets without fingerprint, gesture or password, verify and process this login request message after terminal access, and according to the identifying algorithm of system agreement, logging request data to user are calculated, and by data and part initial parameter after calculating, as timestamp, random number is submitted to system with request message.
System is verified as user after sending the logging request of system to mobile terminal, wait for authentication and the authenticating result of the mobile terminal to user's binding at system end, if the logging request data that the terminal of success identity user binding is submitted within the time limit of system regulation allow user's login of access means end.
Authentication and authentication:
Authentication and authentication are responsible for the equipment to user, comprise host accesses equipment, subscriber terminal equipment authenticates and authentication, and concrete identifying algorithm exists with the form of scalable module, system, as long as by upgrading mode, can be upgraded the authentication of each part and authentication module and replace.
After authentication is passed through, when system can be registered by the user of inquiry corresponding device, distribute authority to carry out authentication, and allow the logging request sent of user in access means to login.
For a simple example, the specific authentication algorithm A algorithm of terminal and system agreement, input parameter comprises user name, terminal feature information, the Client Key of system assignment, the parameters such as timestamp, random number, calculate an algorithm values, and this calculated value and timestamp, end eigenvale are submitted to system, and system takes same identifying algorithm calculate and compare, and as unanimously thought, this terminal is by authentication.
For a simple example, can in message, submit arithmetic result and partial parameters to:
HASH (user name+end eigenvale+Client Key+ random number), system end takes same method to calculate and comparison, wherein partial parameters, as Client Key or end eigenvale are not transmitted in parameter, system has just been kept at system end in the time of registration and binding, system can inquire by user name or user ID, with this tightening security property.
End eigenvale is a characteristic of the unique GC group connector of energy, its mapping object can comprise MAC, MSISDN, the value of unique GC group connector such as fuselage code, by by these data mode alone or in combination by mapping function as data Hash mapping to uniqueness and cannot be reverse.
Identifying algorithm can constantly upgrade by upgrading update module, and not necessarily takes above-mentioned hash function to calculate, for example, also can take the mode of public and private key digital signature to guarantee the fail safe of message.
User publishes:
Traditional pattern of publishing is for manually exiting or overtimely automatically exiting, in the present invention, user still can select manually to exit, it is user's state of initiatively logging off, also can exit by auto-timeout, in addition, system reaches time limit backed off after random also supporting the mobile terminal of initiating from access means end to go beyond the scope, be that access means end or mobile terminal are found to exceed the regular hour after equipment that periphery verified is not within scope, can automatically initiate to publish flow process, realizing user leaves after access means, as user left after the computer regular hour, automatically publish.
 
Upgrade and upgrading:
Each part of system comprises renewal and upgrading module, in the time that system need to be upgraded, the upgrading of notifying each part to carry out module, the software module of upgrading and replacing each part, comprise authentication and authentication module, upgrade and fail safe to guarantee software continuous.
 
Main functional modules
As shown in Figure 1, a kind of login system based on mobile terminal and the modular structure of method comprise access means end, three parts of mobile terminal and system:
Access means end refers to apparatus such as computer, and user uses access means access system, comprises as lower module:
Data module 100: data module is responsible for preserving access means end and is applied the various data that relate to, and can exist in the mode of database or file.
Upgrading update module 101: upgrading update module is responsible for query software version and is conducted interviews and hold the software upgrade and update of application according to the upgrade command of system end.
Scan module 102: scan module is responsible for, by short-distance wireless technology, comprising bluetooth, WIFI-DIRECT, WIFI, the wireless technologys such as NFC, scanning access means end, as the mobile terminal of computer equipment periphery, comprise mobile phone, PAD etc., equipment list and request access.
Device authentication module 103: device authentication module is responsible for the equipment of request access to verify, is permitted meeting the equipment access of proof rule and carry out data interaction.
Registration binding module 104: registration binding module is responsible for the user registration of user in the initiation of access means end, and the access means of Request System user bound and user's corresponding relation.
Login module 105: access means end is as computer, and user initiates the request module of application login.
Communication module 106: access means end and system and peripheral equipment carry out communication, carries out the functional module of data interaction.
 
Mobile terminal side comprises:
Device authentication module 107: device authentication module is responsible for the equipment of request access to verify, is permitted meeting the equipment access of proof rule and carry out data interaction.
Upgrading update module 108: the software upgrading of mobile terminal side and upgrading module, the software upgrade and update of being responsible for query software version and carrying out mobile terminal side application according to the upgrade command of system end.
Scan module 109: scan module is responsible for, by short-distance wireless technology, comprising bluetooth, WIFI-DIRECT, WIFI, the wireless technologys such as NFC, the equipment of scanning periphery, equipment list and request access.
Authentication and authentication module 110: responsible mobile terminal side is thought the request of system initiation authentication and authentication.
Registration binding module 111: registration binding module is responsible for the user registration of user in the initiation of mobile terminal side, and request is at system binding user's mobile terminal device.
Data module 112: data module is responsible for preserving mobile terminal side and is applied the various data that relate to, and can exist in the mode of database or file.
Communication module 113: mobile terminal side and system and peripheral equipment carry out communication, carries out the functional module of data interaction.
 
The Mobile data transmission channel 115 that the data transmission channel 114 that data transmission channel comprises access means use and mobile terminal use, comprise fixed data network and WIFI access, access the mode of fixed broadband net or the data transmission channel of use mobile communications network as fixed broadband net and by WIFI, as the data channel of 3G net.
 
System end comprises following functional module:
Service access interface 116:
System end provides data access interface to access means end and mobile terminal or third party's application, is undertaken alternately by interface and system.
Database 117:
System database, storage miscellaneous service data, provide various data access function.
Business logic modules 118:
The logic of business functions module of system end, carries out alternately, completing each service logic flow process with each functional module.
Registration and binding module 119:
For the function services that user provides user to register, be user assignment account and authority, the mapping relations of user bound and user terminal or access means, leading subscriber.
Authentication and authentication module 120:
Client-initiated logging request is authenticated and authentication, comprise authentication and authentication to user and terminal, and according to authentication and authenticating result allowance or refusal user access system.
Management configuration module 121:
The administration configuration functional module of system end, configuration-system parameter, manages system.
Upgrading module 122:
Be responsible for upgrading and the renewal of the application of access means end and mobile terminal side, according to system, the upgrading renewal of access means end and mobile terminal is initiated in indication.
OAUTH service 123:
System provides the functional module of the external service of authentication and authentication alternatively for third party.
System door 124:
System provides access and uses the approach of system for user, and user enters into system by door, use business and business is managed.
 
Fig. 2 is shown system user information of the present invention and shines upon associated schematic diagram.
As shown in the figure, the system user information user profile of having shone upon associated schematic view illustrating and access means information and information of mobile terminal is associated.
Wherein, custom system accounts information comprises user and logins necessary information, has comprised user ID or user name in figure, other some necessary information that the password of processing through Hash mapping and logon account comprise, as last login time, the information such as account status.
User account information is by unidirectional mapping, be that user account information and mobile device are man-to-man relation, be associated with the information of mobile terminal and access means, in figure, the characteristic information that has comprised the access means that unidirectional mapping processed as hash algorithm, mobile terminal features information, the indication information of the authentication algorithm that system is taked, the algorithm parameter of system assignment is as the specific Key distributing, the ID of the application of the current logging request of user, and some other extendible map information.
By the mode of unidirectional mapping, system can be calculated and be judged that the device map information of mapping judges that whether terminal equipment or the access means of request be credible by authentication algorithm, thereby determines whether to allow a user to log into application.
 
Fig. 3 is shown user's registration of the present invention and binding schematic flow sheet.
As shown in the figure, user's registration and binding flow process comprise following steps:
Step 1: user registers in access means, the accounts information of acquisition system assignment;
Step 2: whether select to bind access means according to user, as user selects to bind access means, the characteristic information that gathers access means end is also submitted to system after processing, system is bound and is distributed the required key parameter of identifying algorithm to access means, as the algorithm parameter Key of system assignment;
Step 3: as user do not select to bind access means information the flow process of access means end finish;
Step 4: user, after succeeding in registration, uses identical accounts information to sign in to system on mobile terminal;
Step 5: be submitted to system after the feature information processing of collection mobile terminal, system is bound and distributed the required key parameter of identifying algorithm to access means, as the algorithm parameter Key of system assignment;
In addition, explicable, user can register after obtaining user account information and bind at mobile terminal side equally, and flow process is consistent with this flow process, just initiates the equipment of registration and changes into mobile terminal, and follow-up flow process is the same, and process is not repeated.
 
Fig. 4 is shown present device checking schematic flow sheet.
As shown in the figure, device authentication process description be the unidirectional or two-way checking of equipment room, i.e. access means checking mobile terminal or mobile terminal simultaneous verification access means, determines whether the flow process of binding and believable equipment to comprise following steps:
Step 1: user opens application, near equipment application scanning;
Step 2: as discovering device not, continue scanning, as found user's mobile device, user selects to initiate to connect after this equipment, access means end can be preserved the link information of the mobile device that this user selects, as the first-selection connecting next time;
Step 3: mobile device receives the connection request that access means is initiated, and arranges safely according to user's connection on mobile terminal in advance, judges whether to need user to get involved connection procedure;
Step 4: user gets involved connection procedure as needs, user is on the interface of the connection request of mobile terminal, by fingerprint recognition, gesture operation, or Password Input license this time connects, as correctly, this successful connection, does not allow as incorrect to connect, prompting error message, as got involved without user, be automatically connected to this mobile terminal;
Step 5: as successful connection, according to device authentication setting, exchange and verification data are carried out unidirectional or two-way and crossed verification algorithm and verify whether to method, apparatus be credible equipment;
Step 6: as be proved to be successful, approve that to method, apparatus be credible equipment, allow further the operations such as transmission data, otherwise this flow process finishes, otherwise reporting errors information.
 
Fig. 5 is shown the present invention and publishes schematic flow sheet.
As shown in the figure, application publish process description be user's application of logining in access means automatically publish flow process, comprise following steps:
Step 1: the application in access means detects the condition of publishing, comprise user in application inactive time and terminal equipment whether also within valid analysing range;
Step 2: access means end detects subscriber terminal equipment whether within the detection range of access means, as detected, mobile terminal does not reach the regular hour and applies and automatically publish and carry out manually explicitly publishing operation without user within access, as still proceeded the detection operation within the scope of mobile terminal in detection range;
Step 3: what access means detected user does not reach the regular hour in the time of application activity, as reaches, automatically publishes and carries out manual explicitly without user and publish operation, continues to detect the movable time of user as do not reached;
Step 4: the application of access means end is published operation requests as received the manual demonstration of user, publishes, and publishes condition otherwise continue to detect user;
Wherein, step 3,4,5 can parallel detection, but also can not affect for serial execution the technique effect of whole flow process.
 
Give one example to illustrate a kind of login system based on mobile terminal of user of the present invention and the use flow process of method below, as shown in Figure 6, in this embodiment, operation flow comprises the following steps:
As shown in the figure, registering service flow process is that user of the present invention uses mobile terminal to assist the operation flow of logining, the mobile terminal that user only need carry registration in advance and bind, host equipment near login can be realized quick login, wherein, by short-distance wireless technology, preferably bluetooth, also can take the short-distance wireless such as WIFI-DIRECT or NFC technology to find and identify peripheral equipment.
As shown in the figure, registering service flow process of the present invention comprises following steps:
Step 1: user starts application at access means end, the terminal that access end device scan and checking are found be whether user's mobile terminal of registering and binding or mobile terminal also authentication-access end equipment carry out bi-directional verification, as find the mobile terminal of registration and binding to continue step 2, otherwise reporting errors information;
Step 2: user asks to sign in to system in the mode of mobile terminal checking in the application of access means end;
Step 3: logging request is sent to system and the mobile device end equipment through checking by the application of access means end;
Step 4: system receives the logging request that user sends from access means end, waits for the result state of corresponding mobile terminal;
Step 5: mobile terminal receives the logging request that user sends from application apparatus end, is calculated verify data and can be sent to system at data and the request message of system end authentication oneself by identifying algorithm;
Step 6: the result that system wait mobile terminal is submitted to, within the term of validity waiting for, determine whether by authentication algorithm the correct request message that legal terminal is submitted to, the request message of submitting to as the terminal for legal allows the user of access means end to login, as do not allowed to login for illegal terminal, as overtime, the user of denied access equipment end login;
Description of the invention provides for the purpose of example and explanation, and is not exhaustively or limit the invention to disclosed form.Many modifications and variations are obvious for the ordinary skill in the art.Selecting and describing embodiment is for better explanation principle of the present invention and practical application, thereby and makes those of ordinary skill in the art can understand the present invention's design to be suitable for the various embodiment with various modifications of special-purpose.

Claims (8)

1. the login system based on mobile terminal and a method, is characterized in that, system comprises as lower module and step:
Whole system comprises background system, mobile terminal and three parts of access end equipment;
Method comprises following steps:
1) user is in system registry, and user bound identity and terminal also arrange access means and the proof rule of terminal and system;
2) user computer and user terminal are carried out mutual scanning discovery and according to the selected certification mode of user, are carried out the unidirectional or two-way authentication between equipment by short-distance wireless technology;
3) when user logins application on apparatus such as computer, select terminal Validation Mode, when application request system is logined, initiate logging request to the terminal of finding and verified;
4) system receives after user's logging request, calculates at system end authentication and the authorization data that authentication data and inquiry and comparison terminal are uploaded;
5) terminal receives user's checking request, terminal equipment according to safety arrange after identifying user identity according to authentication and the authentication arithmetic of system agreement, can authenticate the data of terminal identity and landing request information and issue that system authenticates and authentication;
6) data that system sends mobile phone are carried out authentication and the authentication to terminal, as pass through, and allow the application login of user in access means.
2. as claimed in claim 1, whole system has comprised background system, mobile terminal and three parts of access means, it is characterized in that, background system mainly comprises:
Registration and binding module, authentication and authentication module, data module, update module, wherein, registration and binding module are responsible for user's registration and the binding of user terminal and user identity;
System authentication and authentication module are responsible for authentication and the authentication of user identity and terminal;
Data module is responsible for preserving user data and business datum;
Update module is responsible for system, software upgrading and upgrading that terminal and access means end are corresponding;
Terminal mainly comprises:
Registration and binding module, scanning and discovery module, authentication module, authentication and authentication module, communication module, update module, wherein:
Registration and binding module are responsible for registration terminal and user profile to system, and system is bound;
Scanning and discovery module are responsible for according to short-distance wireless agreement, comprise the short-distance wireless technology such as bluetooth, WIFI-DIRECT, NFC, scanning and discovery user logging device, authentication module is responsible for the equipment room proof rule set according to user and verification algorithm near other equipment, verifies to be whether the equipment of specifying as main frame;
Whether the equipment that authentication module is responsible for the periphery that checking is found according to verification algorithm is the equipment that user registers and specifies;
Authentication module is responsible for the authentication of calculating according to user's visit information and terminal and authorization data to user and equipment authenticates and authentication;
Communication module is responsible for carrying out with the equipment of verifying the transmitted in both directions of communication and data;
Update module is responsible for carrying out alternately with system, the software of upgrading and renewal end side;
Access means comprises: application login module, scanning and discovery module, authentication module, communication module, update module;
Wherein, login module is responsible for initiating logging request to system and the login authentication request of terminal,
Scanning and discovery module are responsible for scanning access means if the mobile device of main frame periphery is as mobile phone, whether the mobile terminal that authentication module is responsible for the periphery that checking is found according to verification algorithm is the terminal equipment that user registers and binds, communication module is responsible for and the transmitted in both directions of carrying out communication and carry out data through the terminal of checking, update module is responsible for carrying out alternately with system, the software of upgrading and renewal access means side.
3. as claimed in claim 1, user is in system registry, user bound identity and terminal also arrange access means and the proof rule of terminal and system, it is characterized in that, the user identity of user's acquisition system after system is registered and corresponding access rights, and user's accesses identity information login system in terminal of use acquisition, client terminals acquisition terminal characteristic, be synchronized to system, required various data are calculated in the checking that obtains system assignment, system binding user and mobile terminal, after binding success, user arranges the proof rule between access means and the equipment of mobile terminal.
4. as claimed in claim 1, the proof rule that user computer and user terminal are carried out mutual scanning discovery and set according to user by short-distance wireless technology, carry out the unidirectional or two-way authentication between equipment, it is characterized in that, equipment carries out scanning each other by short-distance wireless, discovering device, and according to the proof rule between user's set device, comprise equipment room Validation Mode, comprise unidirectional or bi-directional device signature verification, password authentication, verification algorithm by agreement verifies that whether the equipment of discovery is credible, verification algorithm module is present in system as upgradeable software module, in terminal and access means.
5. as claimed in claim 1, user selects terminal Validation Mode login application on apparatus such as computer time, when logining, application request system initiates logging request to the terminal of finding and verified, it is characterized in that, user opens application request login system, in the situation that user selects to verify login by mobile terminal, when sending logging request to system, application sends login authentication request to the mobile terminal device that is present in periphery that has been found that and verified, the mobile terminal application login authentication that requests verification is crossed, in request message, comprise user's landing request information.
6. as claimed in claim 1, system receives after user's logging request, calculate at system end the authentication data that authentication data and inquiry and comparison terminal are uploaded, it is characterized in that, system receives the logging request of application, according to the information of user's logging request, in system-computed authentication and authentication calculations, and terminal authentication and the authentication calculations object information of binding corresponding to the logging request session of inquiring about active user, compare with the result of calculation of system end, determine whether effective request that effective terminal is sent, the request that terminal sends as unanimously thought for effective terminal and authentication result of calculation is effective, allow user in access end device logs, as wait timeout judges that this user's logging request lost efficacy and access end equipment is arrived in loopback error message.
7. as claimed in claim 1, terminal receives user's checking request, terminal equipment according to safety arrange after identifying user identity according to authentication and the authentication arithmetic of system agreement, can authenticate the data of terminal identity and landing request information issues system and carries out authentication and authentication, it is characterized in that, terminal receives user's login authentication solicited message, terminal equipment passes through the input of terminal itself alternatively according to user's local security setting, comprise fingerprint recognition, gesture, the mode identifying user identity that the terminals such as password are supported, or get involved the solicited message of the terminal of direct this checking of approval without user, according to authenticate and the calculating of authentication with the authentication of system agreement and the calculating parameter of authentication arithmetic and system assignment, the data that the authentication of mobile phone terminal and authentication calculations algorithm are calculated and login sessions information issue that system authenticates and authentication, the data that system sends mobile phone are carried out authentication and authentication, as pass through, allow user in application login, otherwise refuse this login.
8. the authentication of system as claimed in claim 2, terminal and authentication module, it is characterized in that, the authentication that each part comprises and authentication module, to user with terminal equipment authenticates and authentication, confirm identity and the authority of user and terminal, as a upgradeable module existence for agreement mutually of each part of system, its specific algorithm can carry out by the update module of system, terminal and each part of access means upgrading and the replacement of algorithm and function, and is not limited to specific algorithm.
CN201410144378.9A 2014-04-11 2014-04-11 A kind of application login system and method based on mobile terminal Active CN103888265B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410144378.9A CN103888265B (en) 2014-04-11 2014-04-11 A kind of application login system and method based on mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410144378.9A CN103888265B (en) 2014-04-11 2014-04-11 A kind of application login system and method based on mobile terminal

Publications (2)

Publication Number Publication Date
CN103888265A true CN103888265A (en) 2014-06-25
CN103888265B CN103888265B (en) 2017-07-25

Family

ID=50956993

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410144378.9A Active CN103888265B (en) 2014-04-11 2014-04-11 A kind of application login system and method based on mobile terminal

Country Status (1)

Country Link
CN (1) CN103888265B (en)

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104185304A (en) * 2014-07-28 2014-12-03 小米科技有限责任公司 Method and device for accessing WI-FI network
CN104349194A (en) * 2014-10-24 2015-02-11 深圳市嘉乐派科技有限公司 System and method for carrying out identity identification in Internet television box
CN104468582A (en) * 2014-12-11 2015-03-25 苏州海博智能系统有限公司 User information certification authorization method and system
CN104618401A (en) * 2015-03-10 2015-05-13 四川省宁潮科技有限公司 Real-name system-based wifi one-key logging method
CN104836794A (en) * 2015-04-01 2015-08-12 惠州Tcl移动通信有限公司 Method and system for achieving private protection of electronic devices based on WIFI hotspot
CN104834867A (en) * 2015-04-01 2015-08-12 惠州Tcl移动通信有限公司 Method and system for realizing electronic device privacy protection based on Bluetooth
CN105099704A (en) * 2015-08-13 2015-11-25 上海博路信息技术有限公司 Biometric identification-based OAuth service
CN105337997A (en) * 2015-11-30 2016-02-17 广州华多网络科技有限公司 Log-in method of application client and relevant device
CN105447364A (en) * 2015-04-30 2016-03-30 北京天诚盛业科技有限公司 Remote biological recognition registering method, device and system
CN105471891A (en) * 2015-12-28 2016-04-06 湖南蚁坊软件有限公司 Login method based on confidential order of trusted equipment
CN105530224A (en) * 2014-09-30 2016-04-27 中国电信股份有限公司 Method and device for terminal authentication
CN105530636A (en) * 2014-10-17 2016-04-27 朗姆研究公司 Method, apparatus, and system for establishing a virtual tether
CN105681261A (en) * 2014-11-19 2016-06-15 小米科技有限责任公司 Security authentication method and apparatus
CN106326728A (en) * 2015-07-02 2017-01-11 三星电子株式会社 User device, and method for setting and verifying password thereof
US9674768B2 (en) 2014-07-28 2017-06-06 Xiaomi Inc. Method and device for accessing wireless network
WO2017124523A1 (en) * 2016-01-24 2017-07-27 何兰 Information pushing method when file is accessed, and fingerprint system
CN107786326A (en) * 2016-08-25 2018-03-09 大连楼兰科技股份有限公司 Apply the sharing method in the verification of car networking dynamic password
CN107786338A (en) * 2016-08-25 2018-03-09 大连楼兰科技股份有限公司 Shared platform in dynamic password verification
CN107911364A (en) * 2017-11-16 2018-04-13 国网山东省电力公司 A kind of Verification System based on fingerprint recognition caching
CN108024249A (en) * 2017-11-30 2018-05-11 郑州云海信息技术有限公司 A kind of method and system for preventing wifi Brute Forces
CN108564688A (en) * 2018-03-21 2018-09-21 阿里巴巴集团控股有限公司 The method and device and electronic equipment of authentication
CN109167766A (en) * 2018-08-17 2019-01-08 苏州诚满信息技术有限公司 A kind of network platform login validation method and its system based on mobile terminal verifying
CN109522695A (en) * 2018-11-30 2019-03-26 努比亚技术有限公司 Application program login method, computer end, mobile terminal, system and storage medium
CN109558718A (en) * 2018-11-30 2019-04-02 努比亚技术有限公司 Application program login method, computer end, mobile terminal, system and storage medium
CN109583160A (en) * 2018-11-21 2019-04-05 安徽云融信息技术有限公司 Computer opening identity authentication system and its authentication method
CN109997136A (en) * 2016-11-22 2019-07-09 微软技术许可有限责任公司 Use the dual factor anthentication of location data
CN110245499A (en) * 2019-05-08 2019-09-17 深圳丝路天地电子商务有限公司 Web application rights management method and system
CN111683092A (en) * 2020-06-09 2020-09-18 上海泛微网络科技股份有限公司 Workflow submitting method, device, equipment and storage medium
CN112685702A (en) * 2020-02-28 2021-04-20 乐清市川嘉电气科技有限公司 Intelligent dynamic authorization system for external visitors
CN116800544A (en) * 2023-08-21 2023-09-22 成都数智创新精益科技有限公司 User authentication method, system and device and medium
CN117596237A (en) * 2024-01-19 2024-02-23 安擎计算机信息股份有限公司 Mobile terminal-based server remote control system and method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107770150B (en) * 2017-08-25 2020-09-22 北京元心科技有限公司 Terminal protection method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064535A (en) * 2007-04-12 2007-10-31 复旦大学 Intelligent authentication method and system based on close range wireless communication handset
CN101677442A (en) * 2008-09-17 2010-03-24 艾威梯科技(北京)有限公司 Method and equipment for automatically logging in application programs
CN103327487A (en) * 2012-03-19 2013-09-25 上海博路信息技术有限公司 Remote certification authentication service system
US20130268687A1 (en) * 2012-04-09 2013-10-10 Mcafee, Inc. Wireless token device
CN103378876A (en) * 2012-04-16 2013-10-30 上海博路信息技术有限公司 Bluetooth-based terminal unlocking method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064535A (en) * 2007-04-12 2007-10-31 复旦大学 Intelligent authentication method and system based on close range wireless communication handset
CN101677442A (en) * 2008-09-17 2010-03-24 艾威梯科技(北京)有限公司 Method and equipment for automatically logging in application programs
CN103327487A (en) * 2012-03-19 2013-09-25 上海博路信息技术有限公司 Remote certification authentication service system
US20130268687A1 (en) * 2012-04-09 2013-10-10 Mcafee, Inc. Wireless token device
CN103378876A (en) * 2012-04-16 2013-10-30 上海博路信息技术有限公司 Bluetooth-based terminal unlocking method

Cited By (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104185304A (en) * 2014-07-28 2014-12-03 小米科技有限责任公司 Method and device for accessing WI-FI network
CN104185304B (en) * 2014-07-28 2015-12-30 小米科技有限责任公司 A kind of method and device accessing WI-FI network
US9674768B2 (en) 2014-07-28 2017-06-06 Xiaomi Inc. Method and device for accessing wireless network
CN105530224A (en) * 2014-09-30 2016-04-27 中国电信股份有限公司 Method and device for terminal authentication
CN105530224B (en) * 2014-09-30 2019-01-25 中国电信股份有限公司 The method and apparatus of terminal authentication
CN105530636B (en) * 2014-10-17 2021-02-05 朗姆研究公司 Method, device and system for establishing virtual tether
CN105530636A (en) * 2014-10-17 2016-04-27 朗姆研究公司 Method, apparatus, and system for establishing a virtual tether
CN104349194A (en) * 2014-10-24 2015-02-11 深圳市嘉乐派科技有限公司 System and method for carrying out identity identification in Internet television box
CN105681261A (en) * 2014-11-19 2016-06-15 小米科技有限责任公司 Security authentication method and apparatus
CN104468582A (en) * 2014-12-11 2015-03-25 苏州海博智能系统有限公司 User information certification authorization method and system
CN104618401A (en) * 2015-03-10 2015-05-13 四川省宁潮科技有限公司 Real-name system-based wifi one-key logging method
WO2016155283A1 (en) * 2015-04-01 2016-10-06 惠州Tcl移动通信有限公司 Method and system for electronic device privacy protection based on wifi hotspot
CN104836794A (en) * 2015-04-01 2015-08-12 惠州Tcl移动通信有限公司 Method and system for achieving private protection of electronic devices based on WIFI hotspot
CN104836794B (en) * 2015-04-01 2019-01-04 Tcl通讯科技(成都)有限公司 The method and system of electronic equipment privacy protection are realized based on WIFI hot spot
CN104834867A (en) * 2015-04-01 2015-08-12 惠州Tcl移动通信有限公司 Method and system for realizing electronic device privacy protection based on Bluetooth
CN105447364A (en) * 2015-04-30 2016-03-30 北京天诚盛业科技有限公司 Remote biological recognition registering method, device and system
CN105447364B (en) * 2015-04-30 2019-01-25 上海眼神信息服务有限公司 The method, apparatus and system that remote biometric identification logs in
CN106326728A (en) * 2015-07-02 2017-01-11 三星电子株式会社 User device, and method for setting and verifying password thereof
CN105099704A (en) * 2015-08-13 2015-11-25 上海博路信息技术有限公司 Biometric identification-based OAuth service
CN105099704B (en) * 2015-08-13 2018-12-28 上海博路信息技术有限公司 A kind of OAuth service based on bio-identification
CN105337997A (en) * 2015-11-30 2016-02-17 广州华多网络科技有限公司 Log-in method of application client and relevant device
CN105337997B (en) * 2015-11-30 2020-10-23 广州华多网络科技有限公司 Login method of application client and related equipment
CN105471891A (en) * 2015-12-28 2016-04-06 湖南蚁坊软件有限公司 Login method based on confidential order of trusted equipment
WO2017124523A1 (en) * 2016-01-24 2017-07-27 何兰 Information pushing method when file is accessed, and fingerprint system
CN107786338B (en) * 2016-08-25 2021-04-27 大连楼兰科技股份有限公司 Shared platform in dynamic password verification
CN107786338A (en) * 2016-08-25 2018-03-09 大连楼兰科技股份有限公司 Shared platform in dynamic password verification
CN107786326A (en) * 2016-08-25 2018-03-09 大连楼兰科技股份有限公司 Apply the sharing method in the verification of car networking dynamic password
CN109997136B (en) * 2016-11-22 2023-06-30 微软技术许可有限责任公司 Multi-factor authentication method using positioning data
CN109997136A (en) * 2016-11-22 2019-07-09 微软技术许可有限责任公司 Use the dual factor anthentication of location data
CN107911364B (en) * 2017-11-16 2018-09-11 国网山东省电力公司 A kind of Verification System based on fingerprint recognition caching
CN107911364A (en) * 2017-11-16 2018-04-13 国网山东省电力公司 A kind of Verification System based on fingerprint recognition caching
CN108024249A (en) * 2017-11-30 2018-05-11 郑州云海信息技术有限公司 A kind of method and system for preventing wifi Brute Forces
CN108024249B (en) * 2017-11-30 2021-08-06 郑州云海信息技术有限公司 Method and system for preventing wifi brute force from being cracked
CN108564688A (en) * 2018-03-21 2018-09-21 阿里巴巴集团控股有限公司 The method and device and electronic equipment of authentication
US11323430B2 (en) 2018-03-21 2022-05-03 Advanced New Technologies Co., Ltd. Identity verification method and device and electronic device
CN109167766A (en) * 2018-08-17 2019-01-08 苏州诚满信息技术有限公司 A kind of network platform login validation method and its system based on mobile terminal verifying
CN109583160A (en) * 2018-11-21 2019-04-05 安徽云融信息技术有限公司 Computer opening identity authentication system and its authentication method
CN109522695A (en) * 2018-11-30 2019-03-26 努比亚技术有限公司 Application program login method, computer end, mobile terminal, system and storage medium
CN109558718A (en) * 2018-11-30 2019-04-02 努比亚技术有限公司 Application program login method, computer end, mobile terminal, system and storage medium
CN110245499A (en) * 2019-05-08 2019-09-17 深圳丝路天地电子商务有限公司 Web application rights management method and system
CN112685702A (en) * 2020-02-28 2021-04-20 乐清市川嘉电气科技有限公司 Intelligent dynamic authorization system for external visitors
CN111683092A (en) * 2020-06-09 2020-09-18 上海泛微网络科技股份有限公司 Workflow submitting method, device, equipment and storage medium
CN116800544A (en) * 2023-08-21 2023-09-22 成都数智创新精益科技有限公司 User authentication method, system and device and medium
CN116800544B (en) * 2023-08-21 2023-11-24 成都数智创新精益科技有限公司 User authentication method, system and device and medium
CN117596237A (en) * 2024-01-19 2024-02-23 安擎计算机信息股份有限公司 Mobile terminal-based server remote control system and method
CN117596237B (en) * 2024-01-19 2024-04-19 安擎计算机信息股份有限公司 Mobile terminal-based server remote control system and method

Also Published As

Publication number Publication date
CN103888265B (en) 2017-07-25

Similar Documents

Publication Publication Date Title
CN103888265A (en) Login system and method based on mobile terminal
US10116448B2 (en) Transaction authorization method and system
EP2888855B1 (en) Systems and methods for lock access management using wireless signals
CN103929748B (en) A kind of Internet of Things wireless terminal and its collocation method and wireless network access point
CN104917727B (en) A kind of method, system and device of account's authentication
CN111783068B (en) Device authentication method, system, electronic device and storage medium
CN103401880B (en) The system and method that a kind of industrial control network logs in automatically
CN106921663B (en) Identity continuous authentication system and method based on intelligent terminal software/intelligent terminal
KR102065138B1 (en) Method and system for providing security for establishing initial contact between mobile device and device
EP3335142B1 (en) System of device authentication
US20140019757A1 (en) Authentication method and system
CN101986598B (en) Authentication method, server and system
CN103327487A (en) Remote certification authentication service system
CN104796894A (en) Configuration information transmission method and equipment
US20140259124A1 (en) Secure wireless network connection method
CN103200150A (en) Identity authentication method and system
CN103546419A (en) Login method
CN105357224A (en) Intelligent household gateway register, remove method and system
KR101197213B1 (en) Authentication system and method based by positioning information
CN107786978B (en) NFC authentication system based on quantum encryption
US9622075B2 (en) System and method for adaptive multifactor authentication
CN109361659B (en) Authentication method and device
KR101133167B1 (en) Method and apparatus for user verifing process with enhanced security
KR20150135171A (en) Login processing system based on inputting telephone number and control method thereof
KR20180039037A (en) Cross authentication method and system between online service server and client

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240515

Address after: 071799, No. 5-316, North Side 279 Wenchang Street, Xiongxian County, Xiong'an New Area, Hebei Province

Patentee after: Hebei Xiong'an Xiangma Technology Co.,Ltd.

Country or region after: China

Address before: Room 601, 77 Lane 2688, Hunan Road, Pudong New Area, Shanghai, 201315

Patentee before: SHANGHAI BOLU INFORMATION TECHNOLOGY Co.,Ltd.

Country or region before: China