CN104143056A - Identity authentication method and system - Google Patents

Identity authentication method and system Download PDF

Info

Publication number
CN104143056A
CN104143056A CN201310754705.8A CN201310754705A CN104143056A CN 104143056 A CN104143056 A CN 104143056A CN 201310754705 A CN201310754705 A CN 201310754705A CN 104143056 A CN104143056 A CN 104143056A
Authority
CN
China
Prior art keywords
network account
binding
identity code
inventory
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310754705.8A
Other languages
Chinese (zh)
Inventor
刘凯
翁乐腾
范亮亮
成世海
朱亚玄
陈慧卉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201310754705.8A priority Critical patent/CN104143056A/en
Publication of CN104143056A publication Critical patent/CN104143056A/en
Priority to TW103146095A priority patent/TW201525749A/en
Priority to PCT/CN2014/095929 priority patent/WO2015101331A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

An identity authentication method comprises the following steps: an identity identification code of an identity authenticator is received; whether the identity identification code is bound with a corresponding network account is searched; if the bound network account is found, whether the bound network account is in a certification list is determined, and if yes, the authentication succeeds; and if the bound network account is not found or the bound network account is not in the certification list, the authentication fails. According to the identity authentication method, the identity identification code of the authenticator is associated with the network account, and success or failure of the authentication is determined by the certification list including the certificated network account. A user can bind, unbind and change the identity authenticator through the network account conveniently on the internet, so that loss report and post register can be achieved timely after loss of the identity authenticator, the safety is improved, the efficiency for the loss report and post register of the identity authenticator is improved, and time and labor cost are saved. Besides, the invention further provides an identity authentication system.

Description

Auth method and system
Technical field
The present invention relates to communication technical field, particularly relate to a kind of auth method and system.
Background technology
Increasing office, building, factory and residence district are provided with gate control system.General gate inhibition can open by brush access card, if access card is lost, holder need to declare to keeper, and keeper cuts off the card of loss on the server of gate control system, then makes up neocaine, very inconvenient.Because holder can not process timely in the time finding that card is lost, make troubles to holder on the one hand, on the other hand postpone during this period of time in, there is serious potential safety hazard.
Summary of the invention
Based on this, being necessary the problem that cannot report the loss in time and make up after losing for the identity verifier thereof such as access card provide a kind of auth method and system.
A kind of auth method, comprising:
Receive the Identity Code of identity verifier thereof;
Search described Identity Code and whether bind corresponding network account;
If find the network account of binding, judge that whether the network account of described binding is authenticating in inventory, if in certification inventory, be proved to be successful;
If do not find the network account of described binding or the network account of described binding not in certification inventory, authentication failed.
A kind of auth method, comprising:
Obtain the Identity Code of identity verifier thereof;
Generate the binding information of described Identity Code and network account binding; Described binding information comprises described Identity Code, described network account and bind request;
Send described binding information to network end server.
A kind of authentication system, comprising:
Receiver module, for receiving the Identity Code of identity verifier thereof;
Search module, whether bind corresponding network account for searching described Identity Code, if do not find the authentication failed of network account of described binding;
Authentication module, if for described in search the network account of module searches to binding, the network account that judges described binding whether in certification inventory, if in certification inventory, be proved to be successful, not authentication failed in certification inventory.
A kind of authentication system, comprising:
Acquisition module, for obtaining the Identity Code of identity verifier thereof;
Binding information generation module, for generating the binding information of described Identity Code and network account binding; Described binding information comprises described Identity Code, described network account and bind request;
Binding information sending module, for sending described binding information to network end server.
Above-mentioned auth method and system, the authentication code of identity verifier thereof is associated with network account, utilization comprises the certification inventory of the network account of certification, judgement is proved to be successful or authentication failed, because user can utilize the network communication terminal logging in network accounts such as mobile phone, binding easily, unbind and change identity verifier thereof, realize after identity verifier thereof is lost and report the loss timely and make up, when having improved security, also improve the efficiency that identity verifier thereof is reported the loss and made up, saved time and human cost.
Brief description of the drawings
Fig. 1 is the process flow diagram of an embodiment auth method;
Fig. 2 is the process flow diagram of another embodiment auth method;
Fig. 3 is the process flow diagram of another embodiment auth method;
Fig. 4 is the process flow diagram of another embodiment auth method;
Fig. 5 is the process flow diagram of another embodiment auth method;
Fig. 6 is the process flow diagram of another embodiment auth method;
Fig. 7 is the surface chart that obtains authentication code in the auth method shown in Fig. 6;
Fig. 8 is the process flow diagram of another embodiment auth method;
Fig. 9 is the surface chart of Identity Code in the auth method shown in Fig. 8 and network account binding;
Figure 10 is the schematic diagram of an embodiment authentication system;
Figure 11 is the schematic diagram of searching module in the authentication system shown in Figure 10;
Figure 12 is the schematic diagram of another embodiment authentication system;
Figure 13 is the schematic diagram of another embodiment authentication system;
Figure 14 is the schematic diagram of another embodiment authentication system;
Figure 15 is the schematic diagram of another embodiment authentication system;
Figure 16 is the schematic diagram of another embodiment authentication system;
Figure 17 is the schematic diagram of another embodiment authentication system.
Embodiment
For the ease of understanding the present invention, below with reference to relevant drawings, auth method and system are described more fully.In accompanying drawing, provide the first-selected embodiment of auth method and system.But auth method and system can realize in many different forms, be not limited to embodiment described herein.On the contrary, providing the object of these embodiment is to make to the disclosure of auth method and system more thoroughly comprehensively.
Unless otherwise defined, all technology that use are herein identical with the implication that belongs to the common understanding of those skilled in the art of the present invention with scientific terminology.The term using in the instructions of auth method and system herein, just in order to describe the object of specific embodiment, is not intended to be restriction the present invention.Term as used herein " and/or " comprise one or more relevant Listed Items arbitrarily with all combinations.
Fig. 1 is the auth method of an embodiment, and the present embodiment specifically can be applicable on gate control system or other authentication systems, for receiving the Identity Code of identity verifier thereof and carrying out authentication.As shown in Figure 1, the concrete steps of the auth method of the present embodiment are as follows:
S120, the Identity Code of reception identity verifier thereof.Identity verifier thereof can be to have bluetooth module, NFC (Near Field Communication, near field communication (NFC)) module, RFID (Radio Frequency Identification, radio frequency identification) equipment of module or other wireless communication modules, identity verifier thereof is preset with Identity Code, this Identity Code can send out by above-mentioned wireless communication module, therefore the mode that receives Identity Code can comprise by bluetooth and receiving, one or more combinations that receive and receive by REID RFID by wireless short-distance communication technology NFC.In an embodiment who is specifically applied in gate control system, preferably receive the mode of Identity Code by bluetooth 4.0.Bluetooth has the function of measuring distance, if the identity verifier thereof with bluetooth module is being carried in other positions in user's bag, in pocket or with it, as long as user goes in the certain limit of gate inhibition's inductor, gate inhibition opens automatically, user can enter without stopping, very convenient.And user do not need to find out identity verifier thereof, remove from and carried the trouble that identity verifier thereof but can not find for the moment.And bluetooth 4.0 moves low in energy consumptionly, there is power saving, be more suitable for being applied in identity verifier thereof.
S140, searches Identity Code and whether binds corresponding network account.Network account refers to the identity account that user uses in internet, can be network service account, social networks account, payment accounts or E-mail address account.Network account can be numeral, letter or symbol in form, can be also the combination of numeral, letter and symbol.Therein in an embodiment, network account can be instant messaging account, user can utilize the instant communication software access of instant communicating account on the network communication terminals such as mobile phone, utilizes its feature that can immediately exchange message, realizes easily and fast, communicates by letter timely.
On home server, storing in advance binding inventory, binding inventory comprises Identity Code and network account corresponding to Identity Code.In an embodiment, Identity Code and network account are one to one therein, a corresponding user of network account, a corresponding identity verifier thereof of Identity Code.Identity Code and network account are that the corresponding user of expression only can hold an identity verifier thereof one by one, if user's identity verifier thereof is lost, making up new identity verifier thereof, while registering new Identity Code, old identity verifier thereof and Identity Code no longer can be used, and can ensure like this security.In other embodiments, multiple authentication code also can a corresponding network account, and the corresponding multiple visitor's authentication code of network account on for example foreground, in concrete application, a foreground staff can provide multiple identity verifier thereofs, to facilitate passing through of multiple visitors.Binding inventory is for searching the network account that Identity Code is corresponding.
In an embodiment, step S140 searches at home server therein, can be also to search in network end server.Therein in an embodiment, step S140 is included in home server and searches Identity Code and whether bind corresponding network account, if do not find the network account of binding, searches Identity Code whether bind corresponding network account in network end server.If do not store this Identity Code in home server,, by network, utilize network end server to verify.The mode of communicating by letter with network end server comprises by the mode of one or more combinations in cable network, WIFI, 3G, 3GPP, 4G and WLAN.User adds, changes Identity Code by network end server, and network end server has up-to-date and comprehensive information, while not finding Identity Code, can utilize network end server to confirm.For example same company is provided with branch office in Guangzhou and two places, Shenzhen, the employee of Shenzhen branch office has authority by the gate inhibition of Guangzhou Branch, but the employee of Shenzhen branch office does not often arrive Guangzhou Branch, so in the certification inventory prestoring in the home server of the gate control system of Guangzhou Branch, only comprise the employee of Guangzhou Branch, and there is no the employee of Shenzhen branch office.In the time that the employee of Shenzhen branch office arrives Guangzhou Branch, gate control system receives Identity Code and searches less than corresponding network account, can verify by network end server.In an embodiment, after network end server is searched information, also comprise the step that is stored in the information finding in network end server therein.Communicate by letter and may have time delay with network end server, find and store time and the Internet resources that can save checking next time after information.
S160, if find the network account of binding, judges that whether the network account of binding is authenticating in inventory, if in certification inventory, be proved to be successful.Certification inventory comprises the network account of certification.In the embodiment being specifically applied in gate control system, be proved to be successful expression opening gate.The network account of certification represents that the user that this network account is corresponding has authority to pass through gate inhibition, and gate inhibition can open.Referring to Fig. 2, therein in an embodiment, before step S120, also comprise the step (step S110a) that receives certification inventory and/or binding inventory, certification inventory comprises the network account of certification, binding inventory comprises Identity Code, the network account that Identity Code is corresponding, and binding inventory is for searching the network account that Identity Code is corresponding.First the auth method of the present embodiment prestores and binds inventory and/or certification inventory in home server, if receiving for the first time each Identity Code searches to be at home server and does not find, look for and surpass in network end server, lose time, also waste Internet resources.By certification inventory and binding, inventory is disposable knows, more convenient, saves Internet resources.Therein in an embodiment, reset or when certification inventory information has larger variation, can perform step at any time as required S110a in gate control system.
S180, if do not find the network account of binding or the network account of binding not in certification inventory, authentication failed.Specifically be applied in the embodiment in gate control system, authentication failed represents to refuse opening gate, if continuous several times authentication failed can stop receiving the Identity Code of identity verifier thereof automatically, or automatically starts alarm mode.Referring to Fig. 3, in an embodiment, also comprise reception modification information therein, modification information comprises Identity Code and network account, upgrades the step (S110b) of the Identity Code that in binding inventory, network account is corresponding according to modification information.If user has lost identity verifier thereof, can report the loss old identity verifier thereof by network end server, make up new identity verifier thereof, change Identity Code.Home server stores modification information, if receive old Identity Code, and authentication failed, refusal uses the identity verifier thereof of having reported the loss to pass through gate inhibition.Certainly, if user can not find identity verifier thereof for the moment, to have found again afterwards, in order economizing on resources, can again to have sent modification information, the Identity Code of this identity verifier thereof and network account had been bound again.
Referring to Fig. 4, therein in an embodiment, the auth method of the present embodiment also comprises the interpolation information that receives, interpolation information comprises Identity Code and network account, by Identity Code and network account corresponding add binding inventory, and network account is added to the step (step S110c) that authenticates inventory.If there is new employee to add, network end server can send interpolation information to home server adds, without sending the binding inventory and the certification inventory that upgrade, compare with certification inventory with binding inventory, the quantity of information of interpolation information is little, can improve interpolation speed, saves Internet resources.Referring to Fig. 5, therein in an embodiment, the auth method of the present embodiment also comprises the deletion information that receives, and deletes packets of information includes network account, the step (step S110d) of network account being deleted from certification inventory or binding inventory according to deletion information.If there is labor turnover, network end server can send order to home server, delete relevant information in certification inventory and binding inventory, without sending the binding inventory and the certification inventory that upgrade, compare with certification inventory with binding inventory, the quantity of information of interpolation information is little, can improve interpolation speed, saves Internet resources.If user reports the loss identity verifier thereof, can only in binding inventory, delete corresponding network account and authentication code.
The auth method of the present embodiment is associated with network account by the authentication code of identity verifier thereof, utilization comprises the certification inventory of the network account of certification, judgement is proved to be successful or authentication failed, because user can utilize the network communication terminal logging in network accounts such as mobile phone, binding easily, unbind and change identity verifier thereof, realize after identity verifier thereof is lost and report the loss timely and make up, when having improved security, also improve the efficiency that identity verifier thereof is reported the loss and made up, saved time and human cost.
Fig. 6 is the auth method of an embodiment, the present embodiment specifically can be applicable on the communication terminal of the accessible internets such as mobile phone, panel computer, personal computer, user can utilize network communication terminal logging in network account, easily binding or unbind identity verifier thereof.As shown in Figure 6, the concrete steps of the auth method of the present embodiment are as follows:
S220, obtains the Identity Code of identity verifier thereof.In an embodiment who is specifically applied on mobile phone, the mode of obtaining Identity Code can be a variety of, if identity verifier thereof has bluetooth module, can obtain by bluetooth, if identity verifier thereof has NFC module, can obtain by NFC.User also can obtain with the Quick Response Code that mobile telephone scanning carries Identity Code, if Identity Code is Word message or numerical information, also can directly on mobile phone, input this Word message or numerical information.The auth method of the present embodiment can be applied on instant communication software, and the interface that obtains authentication code can be referring to Fig. 7.
S240, generates the binding information of Identity Code and network account binding.Binding information comprises Identity Code, network account and bind request.Network account refers to the identity account that user uses in internet, can be network service account, social networks account, payment accounts or E-mail address account.Network account can be numeral, letter or symbol in form, can be also the combination of numeral, letter and symbol.Therein in an embodiment, network account can be instant messaging account, user can utilize the instant communication software access of instant communicating account on the network communication terminals such as mobile phone, utilizes its feature that can immediately exchange message, realizes easily and fast, communicates by letter timely.
S260, sends binding information to network end server.Network end server can be bound according to bind request.Sending binding information to the mode of network end server comprises by one or more array modes transmissions in WIFI, 3G, 3GPP, 4G, WLAN and cable network.In an embodiment, if send first binding information to network end server, can send request simultaneously network account is added to the interpolation solicited message that authenticates inventory therein.
Referring to Fig. 8, in an embodiment, also comprise therein:
S280, generates the unbind information of Identity Code and network account unbind, and unbind information comprises Identity Code, network account and releasing bind request.
S290, sends unbind information to network end server.Network end server can be carried out unbind according to unbind information request, and after unbind, the webserver pushes the order of deleting the network account in binding inventory to home server timely.The surface chart of Identity Code and network account binding and unbind can be referring to Fig. 9, and the authentication code that step S220 obtains is inserted authentication code frame 242 automatically, and the network account of active user's login is inserted network account frame 244 automatically.Information in authentication code frame 242 and network account frame 244, user can change by keyboard.If user triggers binding button 246a, generate binding information according to the authentication code in current authentication code frame 242 and network account frame 244 and network account.If user triggers unbind button 246b, remove binding information according to the authentication code in current authentication code frame 242 and network account frame 244 and network account generating solution.
The auth method of the present embodiment is associated with network account by the authentication code of identity verifier thereof, utilization comprises the certification inventory of the network account of certification, judgement is proved to be successful or authentication failed, because user can utilize the network communication terminal logging in network accounts such as mobile phone, binding easily, unbind and change identity verifier thereof, realize after identity verifier thereof is lost and report the loss timely and make up, when having improved security, also improve the efficiency that identity verifier thereof is reported the loss and made up, saved time and human cost.
Figure 10 is the authentication system of an embodiment, and the present embodiment specifically can be applicable on gate control system or other authentication systems, for receiving the Identity Code of identity verifier thereof and carrying out authentication.As shown in figure 10, the authentication system of the present embodiment comprises receiver module 120, searches module 140 and authentication module 160.
Receiver module 120, for receiving the Identity Code of identity verifier thereof.Identity verifier thereof can be to have bluetooth module, NFC (Near Field Communication, near field communication (NFC)) module, RFID (Radio Frequency Identification, radio frequency identification) equipment of module or other wireless communication modules, identity verifier thereof is preset with Identity Code, this Identity Code can send out by above-mentioned wireless communication module, therefore the mode that receives Identity Code can comprise by bluetooth and receiving, one or more combinations that receive and receive by REID RFID by wireless short-distance communication technology NFC.In an embodiment who is specifically applied in gate control system, preferably receive the mode of Identity Code by bluetooth 4.0.Bluetooth has the function of measuring distance, if the identity verifier thereof with bluetooth module is being carried in other positions in user's bag, in pocket or with it, as long as user goes in the certain limit of gate inhibition's inductor, gate inhibition opens automatically, user can enter without stopping, very convenient.And user do not need to find out identity verifier thereof, remove from and carried the trouble that identity verifier thereof but can not find for the moment.And bluetooth 4.0 moves low in energy consumptionly, there is power saving, be more suitable for being applied in identity verifier thereof.
Search module 140, whether bind corresponding network account for searching Identity Code, if do not find the authentication failed of network account of binding.Network account refers to the identity account that user uses in internet, can be network service account, social networks account, payment accounts or E-mail address account.Network account can be numeral, letter or symbol in form, can be also the combination of numeral, letter and symbol.Therein in an embodiment, network account can be instant messaging account, user can utilize the instant communication software access of instant communicating account on the network communication terminals such as mobile phone, utilizes its feature that can immediately exchange message, realizes easily and fast, communicates by letter timely.
On home server, storing in advance binding inventory, binding inventory comprises Identity Code and network account corresponding to Identity Code.In an embodiment, Identity Code and network account are one to one therein, a corresponding user of network account, a corresponding identity verifier thereof of Identity Code.Identity Code and network account are that the corresponding user of expression only can hold an identity verifier thereof one by one, if user's identity verifier thereof is lost, making up new identity verifier thereof, while registering new Identity Code, old identity verifier thereof and Identity Code no longer can be used, and can ensure like this security.In other embodiments, multiple authentication code also can a corresponding network account, and the corresponding multiple visitor's authentication code of network account on for example foreground, in concrete application, a foreground staff can provide multiple identity verifier thereofs, to facilitate passing through of multiple visitors.Binding inventory is for searching the network account that Identity Code is corresponding.Specifically be applied in the embodiment in gate control system, authentication failed represents to refuse opening gate, if continuous several times authentication failed can stop receiving the Identity Code of identity verifier thereof automatically, or automatically starts alarm mode.
In an embodiment, searching module 140 can be to search at home server, can be also to search in network end server therein.Referring to Figure 11, therein in an embodiment, search module 140 and can comprise that this locality searches module 142 and NetFind module 144.
Module 142 is searched in this locality, whether binds corresponding network account for search Identity Code at home server.
NetFind module 144, if for the local network account of searching module 142 and do not find binding, search Identity Code in network end server and whether bind corresponding network account.If do not store this Identity Code in home server,, by network, utilize network end server to verify.The mode of communicating by letter with network end server comprises by the mode of one or more combinations in cable network, WIFI, 3G, 3GPP, 4G and WLAN.User adds, changes Identity Code by network end server, and network end server has up-to-date and comprehensive information, while not finding Identity Code, can utilize network end server to confirm.For example same company is provided with branch office in Guangzhou and two places, Shenzhen, the employee of Shenzhen branch office has authority by the gate inhibition of Guangzhou Branch, but the employee of Shenzhen branch office does not often arrive Guangzhou Branch, so in the certification inventory prestoring in the home server of the gate control system of Guangzhou Branch, only comprise the employee of Guangzhou Branch, and there is no the employee of Shenzhen branch office.In the time that the employee of Shenzhen branch office arrives Guangzhou Branch, gate control system receives Identity Code and searches less than corresponding network account, can verify by network end server.In an embodiment, after the information that NetFind module 144 finds in network end server, store the information finding therein.Communicate by letter and may have time delay with network end server, find and store time and the Internet resources that can save checking next time after information.
Authentication module 160, if find the network account of binding for searching module 140, the network account that judges binding whether in certification inventory, if in certification inventory, be proved to be successful, not authentication failed in certification inventory.Certification inventory comprises the network account of certification.In the embodiment being specifically applied in gate control system, be proved to be successful expression opening gate.The network account of certification represents that the user that this network account is corresponding has authority to pass through gate inhibition, and gate inhibition can open.Referring to Figure 12, therein in an embodiment, also comprise and receive checklist module 110a, be used for receiving certification inventory and/or binding inventory, certification inventory comprises the network account of certification, binding inventory comprises Identity Code, the network account that Identity Code is corresponding, and binding inventory is for searching the network account that Identity Code is corresponding.First the authentication system of the present embodiment prestores and binds inventory and/or certification inventory in home server, if receiving for the first time each Identity Code searches to be at home server and does not find, look for and surpass in network end server, lose time, also waste Internet resources.By certification inventory and binding, inventory is disposable knows, more convenient, saves Internet resources.Therein in an embodiment, reset or when certification inventory information has larger variations, can receive certification inventory and/or bind inventory by receiving checklist module 110a at any time as required in gate control system.
Referring to Figure 13, in an embodiment, also comprise and change module 110b therein, for receiving modification information, modification information comprises Identity Code and network account, upgrades Identity Code corresponding to network account in binding inventory according to modification information.If user has lost identity verifier thereof, can report the loss old identity verifier thereof by network end server, make up new identity verifier thereof, change Identity Code.Home server stores modification information, if receive old Identity Code, and authentication failed, refusal uses the identity verifier thereof of having reported the loss to pass through gate inhibition.Certainly, if user can not find identity verifier thereof for the moment, to have found again afterwards, in order economizing on resources, can again to have sent modification information, the Identity Code of this identity verifier thereof and network account had been bound again.
Referring to Figure 14, therein in an embodiment, the authentication system of the present embodiment also comprises interpolation module 110c, be used for receiving interpolation information, interpolation information comprises Identity Code and network account, by Identity Code and network account corresponding add binding inventory, and network account is added to certification inventory.If there is new employee to add, network end server can send interpolation information to home server adds, without sending the binding inventory and the certification inventory that upgrade, compare with certification inventory with binding inventory, the quantity of information of interpolation information is little, can improve interpolation speed, saves Internet resources.Referring to Figure 15, in an embodiment, the authentication system of the present embodiment also comprises removing module 110d therein, for receiving deletion information, deletes packets of information includes network account, according to deletion information, network account is deleted from certification inventory or binding inventory.If there is labor turnover, network end server can send order to home server, delete relevant information in certification inventory and binding inventory, without sending the binding inventory and the certification inventory that upgrade, compare with certification inventory with binding inventory, the quantity of information of interpolation information is little, can improve interpolation speed, saves Internet resources.If user reports the loss identity verifier thereof, can only in binding inventory, delete corresponding network account and authentication code.
The authentication system of the present embodiment is associated with network account by the authentication code of identity verifier thereof, utilization comprises the certification inventory of the network account of certification, judgement is proved to be successful or authentication failed, because user can utilize the network communication terminal logging in network accounts such as mobile phone, binding easily, unbind and change identity verifier thereof, realize after identity verifier thereof is lost and report the loss timely and make up, when having improved security, also improve the efficiency that identity verifier thereof is reported the loss and made up, saved time and human cost.
Figure 16 is the authentication system of an embodiment, the present embodiment specifically can be applicable on the communication terminal of the accessible internets such as mobile phone, panel computer, personal computer, and user can utilize network communication terminal logging in network account to bind easily or unbind identity verifier thereof.As shown in figure 16, the authentication system of the present embodiment comprises acquisition module 220, binding information generation module 240 and binding information sending module 260.
Acquisition module 220, for obtaining the Identity Code of identity verifier thereof.In an embodiment who is specifically applied on mobile phone, the mode of obtaining Identity Code can be a variety of, if identity verifier thereof has bluetooth module, can obtain by bluetooth, if identity verifier thereof has NFC module, can obtain by NFC.User also can obtain with the Quick Response Code that mobile telephone scanning carries Identity Code, if Identity Code is Word message or numerical information, also can directly on mobile phone, input this Word message or numerical information.The authentication system of the present embodiment can be applied on instant communication software, and the interface that obtains authentication code can be referring to Fig. 7.
Binding information generation module 240, for generating the binding information of Identity Code and network account binding.Binding information comprises Identity Code, network account and bind request.Network account refers to the identity account that user uses in internet, can be network service account, social networks account, payment accounts or E-mail address account.Network account can be numeral, letter or symbol in form, can be also the combination of numeral, letter and symbol.Therein in an embodiment, network account can be instant messaging account, user can utilize the instant communication software access of instant communicating account on the network communication terminals such as mobile phone, utilizes its feature that can immediately exchange message, realizes easily and fast, communicates by letter timely.
Binding information sending module 260, for sending binding information to network end server.Network end server can be bound according to bind request.Sending binding information to the mode of network end server comprises by one or more array modes transmissions in WIFI, 3G, 3GPP, 4G, WLAN and cable network.In an embodiment, if send first binding information to network end server, binding information sending module 260 can send request simultaneously network account is added to the interpolation solicited message that authenticates inventory therein.
Referring to Figure 17, therein in an embodiment, also comprise that solution ties up information generating module 280 and conciliate and tie up information sending module 290.
Solution is tied up information generating module 280, and for generating the unbind information of Identity Code and network account unbind, unbind information comprises Identity Code, network account and releasing bind request.
Solution is tied up information sending module 290, for sending unbind information to network end server.Network end server can be carried out unbind according to unbind information request, and after unbind, the webserver pushes the order of deleting the network account in binding inventory to home server timely.The surface chart of Identity Code and network account binding and unbind can be referring to Fig. 9, and the authentication code that acquisition module 220 obtains is inserted authentication code frame 242 automatically, and the network account of active user's login is inserted network account frame 244 automatically.Information in authentication code frame 242 and network account frame 244, user can change by keyboard.If user triggers binding button 246a, generate binding information according to the authentication code in current authentication code frame 242 and network account frame 244 and network account.If user triggers unbind button 246b, remove binding information according to the authentication code in current authentication code frame 242 and network account frame 244 and network account generating solution.
The authentication system of the present embodiment is associated with network account by the authentication code of identity verifier thereof, utilization comprises the certification inventory of the network account of certification, judgement is proved to be successful or authentication failed, because user can utilize the network communication terminal logging in network accounts such as mobile phone, binding easily, unbind and change identity verifier thereof, realize after identity verifier thereof is lost and report the loss timely and make up, when having improved security, also improve the efficiency that identity verifier thereof is reported the loss and made up, saved time and human cost.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, to carry out the program that hardware that instruction is relevant completes by computer program, can be stored in a computer read/write memory medium, this program, in the time carrying out, can comprise as the flow process of the embodiment of above-mentioned each side method.Wherein, storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory, RAM) etc.
Above embodiment has only expressed several embodiment of the present invention, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be as the criterion with claims.

Claims (22)

1. an auth method, is characterized in that, comprising:
Receive the Identity Code of identity verifier thereof;
Search described Identity Code and whether bind corresponding network account;
If find the network account of binding, judge that whether the network account of described binding is authenticating in inventory, if in certification inventory, be proved to be successful;
If do not find the network account of described binding or the network account of described binding not in certification inventory, authentication failed.
2. auth method according to claim 1, is characterized in that, described in the step of searching described Identity Code and whether binding corresponding network account, comprising:
Search described Identity Code at home server and whether bind corresponding network account;
If do not find the network account of binding, search described Identity Code in network end server and whether bind corresponding network account.
3. auth method according to claim 1, is characterized in that, also comprises:
Receive described certification inventory and/or binding inventory, described certification inventory comprises the network account of certification, described binding inventory comprises described Identity Code, the described network account that described Identity Code is corresponding, and described binding inventory is for searching the network account that described Identity Code is corresponding.
4. auth method according to claim 3, is characterized in that, also comprises:
Receive modification information, described modification information comprises described Identity Code and described network account, upgrades described Identity Code corresponding to network account described in described binding inventory according to described modification information.
5. auth method according to claim 3, is characterized in that, also comprises:
Receive interpolation information, described interpolation information comprises described Identity Code and described network account, by described Identity Code and described network account corresponding add described binding inventory, and described network account is added to described certification inventory.
6. auth method according to claim 3, is characterized in that, also comprises:
Receive deletion information, described deletion information comprises described network account, according to described deletion information, described network account is deleted from described certification inventory or described binding inventory.
7. auth method according to claim 1, it is characterized in that, in the step of the Identity Code of described reception identity verifier thereof, the mode that receives described Identity Code comprises one or more combinations that received, received and received by REID RFID by wireless short-distance communication technology NFC by bluetooth.
8. an auth method, is characterized in that, comprising:
Obtain the Identity Code of identity verifier thereof;
Generate the binding information of described Identity Code and network account binding; Described binding information comprises described Identity Code, described network account and bind request;
Send described binding information to network end server.
9. auth method according to claim 8, is characterized in that, if send first described binding information to network end server, sends request simultaneously described network account is added to the interpolation solicited message that authenticates inventory.
10. auth method according to claim 8, is characterized in that, also comprises:
Generate the unbind information of described Identity Code and network account unbind, described unbind information comprises described Identity Code, described network account and removes bind request;
Send described unbind information to network end server.
11. auth methods according to claim 8, it is characterized in that, in the step of the described Identity Code that obtains identity verifier thereof, the mode of obtaining described Identity Code comprises one or more combinations of being obtained, being obtained, obtained and obtained by receiving Word message or numerical information by scanning Quick Response Code by wireless short-distance communication technology NFC by bluetooth.
12. 1 kinds of authentication systems, is characterized in that, comprising:
Receiver module, for receiving the Identity Code of identity verifier thereof;
Search module, whether bind corresponding network account for searching described Identity Code, if do not find the authentication failed of network account of described binding;
Authentication module, if for described in search the network account of module searches to binding, the network account that judges described binding whether in certification inventory, if in certification inventory, be proved to be successful, not authentication failed in certification inventory.
13. authentication systems according to claim 12, is characterized in that, described in search module and comprise:
Module is searched in this locality, whether binds corresponding network account for search described Identity Code at home server;
NetFind module, if search module and do not find the network account of binding for described this locality, searches described Identity Code in network end server and whether binds corresponding network account.
14. authentication systems according to claim 12, it is characterized in that, also comprise reception checklist module, be used for receiving described certification inventory and/or binding inventory, described certification inventory comprises the network account of certification, described binding inventory comprises described Identity Code, the described network account that described Identity Code is corresponding, and described binding inventory is for searching the network account that described Identity Code is corresponding.
15. authentication systems according to claim 13, it is characterized in that, also comprise change module, be used for receiving modification information, described modification information comprises described Identity Code and described network account, upgrades described Identity Code corresponding to network account described in described binding inventory according to described modification information.
16. authentication systems according to claim 13, it is characterized in that, also comprise interpolation module, be used for receiving interpolation information, described interpolation information comprises described Identity Code and described network account, by described Identity Code and described network account corresponding add described binding inventory, and described network account is added to described certification inventory.
17. authentication systems according to claim 13, it is characterized in that, also comprise removing module, for receiving deletion information, described deletion information comprises described network account, according to described deletion information, described network account is deleted from described certification inventory or described binding inventory.
18. authentication systems according to claim 12, it is characterized in that, the mode that described receiver module receives described Identity Code comprises one or more combinations that received, received and received by REID RFID by wireless short-distance communication technology NFC by bluetooth.
19. 1 kinds of authentication systems, is characterized in that, comprising:
Acquisition module, for obtaining the Identity Code of identity verifier thereof;
Binding information generation module, for generating the binding information of described Identity Code and network account binding; Described binding information comprises described Identity Code, described network account and bind request;
Binding information sending module, for sending described binding information to network end server.
20. authentication systems according to claim 19, it is characterized in that, if send first described binding information to network end server, described binding information sending module sends request simultaneously described network account is added to the interpolation solicited message that authenticates inventory.
21. authentication systems according to claim 19, is characterized in that, also comprise:
Solution is tied up information generating module, and for generating the unbind information of described Identity Code and network account unbind, described unbind information comprises described Identity Code, described network account and removes bind request;
Solution is tied up information sending module, for sending described unbind information to network end server.
22. authentication systems according to claim 19, it is characterized in that, the mode that described acquisition module obtains described Identity Code comprises one or more combinations of being obtained, being obtained, obtained and obtained by receiving Word message or numerical information by scanning Quick Response Code by wireless short-distance communication technology NFC by bluetooth.
CN201310754705.8A 2013-12-31 2013-12-31 Identity authentication method and system Pending CN104143056A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201310754705.8A CN104143056A (en) 2013-12-31 2013-12-31 Identity authentication method and system
TW103146095A TW201525749A (en) 2013-12-31 2014-12-29 Method of identity verification and system thereof
PCT/CN2014/095929 WO2015101331A1 (en) 2013-12-31 2014-12-31 Identity verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310754705.8A CN104143056A (en) 2013-12-31 2013-12-31 Identity authentication method and system

Publications (1)

Publication Number Publication Date
CN104143056A true CN104143056A (en) 2014-11-12

Family

ID=51852226

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310754705.8A Pending CN104143056A (en) 2013-12-31 2013-12-31 Identity authentication method and system

Country Status (3)

Country Link
CN (1) CN104143056A (en)
TW (1) TW201525749A (en)
WO (1) WO2015101331A1 (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468557A (en) * 2014-12-02 2015-03-25 华为软件技术有限公司 Application account safety protecting method and device
WO2015101331A1 (en) * 2013-12-31 2015-07-09 腾讯科技(深圳)有限公司 Identity verification method and system
CN104951825A (en) * 2015-07-11 2015-09-30 山东信通电子股份有限公司 Identity information effectiveness identification method and device
CN106022013A (en) * 2016-05-03 2016-10-12 北京小米移动软件有限公司 Method and device for relieving application program authorization
CN106487762A (en) * 2015-08-31 2017-03-08 腾讯科技(深圳)有限公司 The recognition methodss of user identity, identification applications client and server
CN106530458A (en) * 2016-11-01 2017-03-22 广东鑫际物联网科技有限公司 Authority management method and system for access control system
CN106530460A (en) * 2016-11-01 2017-03-22 张涛 Access control authority distribution method and system
CN106548546A (en) * 2016-11-01 2017-03-29 广东鑫际物联网科技有限公司 A kind of right management method and system of gate control system
CN106952371A (en) * 2017-03-21 2017-07-14 北京深度未来科技有限公司 A kind of face roaming authentication method and system
CN107026816A (en) * 2016-01-29 2017-08-08 阿里巴巴集团控股有限公司 A kind of identity identifying method and device
CN107566126A (en) * 2017-09-27 2018-01-09 深圳市创易联合科技有限公司 A kind of auth method and system
CN107735817A (en) * 2015-06-15 2018-02-23 亚萨合莱有限公司 Voucher buffer
CN108416399A (en) * 2018-01-24 2018-08-17 福建师范大学 A kind of means of communication and terminal based on radio-frequency technique
CN109600734A (en) * 2017-09-30 2019-04-09 阿里巴巴集团控股有限公司 Method for authenticating, binding method, system and equipment based on APP application
CN109872421A (en) * 2019-01-08 2019-06-11 博拉网络股份有限公司 A kind of big data access control management method and its management system
CN109993513A (en) * 2019-03-22 2019-07-09 北京三快在线科技有限公司 The methods, devices and systems of payment account binding bank card
CN110176091A (en) * 2019-05-15 2019-08-27 广东科徕尼智能科技有限公司 A method of smart lock safety is improved by mobile terminal device code
CN110570551A (en) * 2019-08-01 2019-12-13 重庆远通电子技术开发有限公司 Intelligent security system and working method
CN110942308A (en) * 2019-11-15 2020-03-31 北京三快在线科技有限公司 Resource transfer method, device, computer equipment and storage medium
CN111145377A (en) * 2019-12-31 2020-05-12 河南思维信息技术有限公司 Intelligent and integrated attendance and attendance management method and system
CN112308995A (en) * 2019-08-01 2021-02-02 银河水滴科技(北京)有限公司 On-duty monitoring method, equipment and computer readable storage medium
CN112991119A (en) * 2021-04-12 2021-06-18 无锡奥特维科技股份有限公司 Student account management method and device
CN113807893A (en) * 2021-09-17 2021-12-17 上海万向区块链股份公司 Intelligent commodity evaluation method and system based on block chain technology

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI649668B (en) * 2016-12-30 2019-02-01 金財通商務科技服務股份有限公司 Method of authentication and dialogue robot based on instant messaging program
CN107682545B (en) * 2017-09-28 2023-04-21 山西特信环宇信息技术有限公司 Person and evidence machine integrated mobile phone terminal system based on biological identification technology
CN109712300A (en) * 2019-01-31 2019-05-03 广州微证互联网有限公司 A kind of unlocking system based on network identification card certification
CN112885434B (en) * 2021-03-23 2022-04-15 中国人民解放军联勤保障部队第九六〇医院 System and method for integrating portable information acquisition and psychological test in network-free environment
CN113915947B (en) * 2021-09-13 2023-04-11 海信冰箱有限公司 Refrigerator and remote control method thereof
CN115661985B (en) * 2022-12-12 2023-04-07 金税信息技术服务股份有限公司 Deviation rectifying method and device for cabinet entering information

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201331778Y (en) * 2009-01-13 2009-10-21 厦门盛华电子科技有限公司 Electronic gate inhibition device based on RF mobile phone SIM card
CN202143133U (en) * 2011-07-19 2012-02-08 青岛百灵信息科技有限公司 Handset identity identification induction apparatus
CN103310509A (en) * 2012-03-15 2013-09-18 深圳光启创新技术有限公司 Communication method of access control system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1921390B (en) * 2006-09-08 2011-11-02 网之易信息技术(北京)有限公司 User identification identifying method and system
CN102262793B (en) * 2010-05-26 2013-08-21 中兴通讯股份有限公司 Entrance guard control method and entrance guard control system
CN104143056A (en) * 2013-12-31 2014-11-12 腾讯科技(深圳)有限公司 Identity authentication method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201331778Y (en) * 2009-01-13 2009-10-21 厦门盛华电子科技有限公司 Electronic gate inhibition device based on RF mobile phone SIM card
CN202143133U (en) * 2011-07-19 2012-02-08 青岛百灵信息科技有限公司 Handset identity identification induction apparatus
CN103310509A (en) * 2012-03-15 2013-09-18 深圳光启创新技术有限公司 Communication method of access control system

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015101331A1 (en) * 2013-12-31 2015-07-09 腾讯科技(深圳)有限公司 Identity verification method and system
CN104468557A (en) * 2014-12-02 2015-03-25 华为软件技术有限公司 Application account safety protecting method and device
CN107735817A (en) * 2015-06-15 2018-02-23 亚萨合莱有限公司 Voucher buffer
CN104951825A (en) * 2015-07-11 2015-09-30 山东信通电子股份有限公司 Identity information effectiveness identification method and device
CN106487762B (en) * 2015-08-31 2019-12-13 腾讯科技(深圳)有限公司 user identity recognition method, identity recognition application client and server
CN106487762A (en) * 2015-08-31 2017-03-08 腾讯科技(深圳)有限公司 The recognition methodss of user identity, identification applications client and server
CN107026816A (en) * 2016-01-29 2017-08-08 阿里巴巴集团控股有限公司 A kind of identity identifying method and device
CN106022013A (en) * 2016-05-03 2016-10-12 北京小米移动软件有限公司 Method and device for relieving application program authorization
CN106022013B (en) * 2016-05-03 2019-01-04 北京小米移动软件有限公司 Release the method and device of application program authorization
CN106548546A (en) * 2016-11-01 2017-03-29 广东鑫际物联网科技有限公司 A kind of right management method and system of gate control system
CN106530460A (en) * 2016-11-01 2017-03-22 张涛 Access control authority distribution method and system
CN106530458A (en) * 2016-11-01 2017-03-22 广东鑫际物联网科技有限公司 Authority management method and system for access control system
CN106952371A (en) * 2017-03-21 2017-07-14 北京深度未来科技有限公司 A kind of face roaming authentication method and system
CN107566126A (en) * 2017-09-27 2018-01-09 深圳市创易联合科技有限公司 A kind of auth method and system
CN109600734A (en) * 2017-09-30 2019-04-09 阿里巴巴集团控股有限公司 Method for authenticating, binding method, system and equipment based on APP application
CN108416399A (en) * 2018-01-24 2018-08-17 福建师范大学 A kind of means of communication and terminal based on radio-frequency technique
CN109872421A (en) * 2019-01-08 2019-06-11 博拉网络股份有限公司 A kind of big data access control management method and its management system
CN109993513A (en) * 2019-03-22 2019-07-09 北京三快在线科技有限公司 The methods, devices and systems of payment account binding bank card
CN110176091A (en) * 2019-05-15 2019-08-27 广东科徕尼智能科技有限公司 A method of smart lock safety is improved by mobile terminal device code
CN110570551A (en) * 2019-08-01 2019-12-13 重庆远通电子技术开发有限公司 Intelligent security system and working method
CN112308995A (en) * 2019-08-01 2021-02-02 银河水滴科技(北京)有限公司 On-duty monitoring method, equipment and computer readable storage medium
CN110942308A (en) * 2019-11-15 2020-03-31 北京三快在线科技有限公司 Resource transfer method, device, computer equipment and storage medium
CN111145377A (en) * 2019-12-31 2020-05-12 河南思维信息技术有限公司 Intelligent and integrated attendance and attendance management method and system
CN112991119A (en) * 2021-04-12 2021-06-18 无锡奥特维科技股份有限公司 Student account management method and device
CN113807893A (en) * 2021-09-17 2021-12-17 上海万向区块链股份公司 Intelligent commodity evaluation method and system based on block chain technology
CN113807893B (en) * 2021-09-17 2024-02-09 上海万向区块链股份公司 Block chain technology-based commodity intelligent evaluation method and system

Also Published As

Publication number Publication date
WO2015101331A1 (en) 2015-07-09
TW201525749A (en) 2015-07-01

Similar Documents

Publication Publication Date Title
CN104143056A (en) Identity authentication method and system
CN102427472B (en) The apparatus and method of Long-distance Control mobile communication equipment
US7310525B2 (en) Network service system using temporary user identifier
CN103745264A (en) Intelligent hotel guest room reservation management system
CN106340087A (en) Intelligent switch lock system based on intelligent mobile terminal
US20180109511A1 (en) Private simultaneous authentication of equals
CN102855555A (en) System and method for identifying payment risks based on position transformation
CN105307169A (en) Access method, device and system for guest network
CN105306612A (en) Method for acquiring identifier of terminal in network and management network element
CN104158710A (en) Automatic switchover method of service application channel based on open intelligent gateway platform
WO2017201931A1 (en) Method and device for reducing power consumption of terminal, and smart card
CN101959186A (en) Log-off processing method, system and device for WLAN (Wireless Local Area Network) user
CN204376941U (en) Outer net middleware, inner net middleware and middleware system
CN102036240A (en) Method for synchronizing mobile phone information onto personnel computer (PC), mobile phone, computer and network system
CN107182098A (en) For realizing the method and apparatus that user equipment switches between WAP
US20050208940A1 (en) Network service system using a temporary use identifier
CN103780641A (en) Cloud desktop access method, home gateway and system
CN101600166A (en) Mobile E-mail system method of automatic configuration and network method of automatic configuration
CN106302110A (en) A kind of social network position sharing method based on secret protection
CN107317943B (en) Method and system for setting call forwarding
CN108306882A (en) A kind of method and the network equipment of terminal access business
CN103889034A (en) Mobile terminal mobile communication network information receiving method and mobile terminal
CN102572818A (en) Application key management method and system of MTC group device
CN105516054A (en) User authentication method and user authentication device
CN101877848A (en) Mobile terminal, mobile terminal data protection method and mobile terminal monitoring system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20141112