CN104143056A - Identity authentication method and system - Google Patents
Identity authentication method and system Download PDFInfo
- Publication number
- CN104143056A CN104143056A CN201310754705.8A CN201310754705A CN104143056A CN 104143056 A CN104143056 A CN 104143056A CN 201310754705 A CN201310754705 A CN 201310754705A CN 104143056 A CN104143056 A CN 104143056A
- Authority
- CN
- China
- Prior art keywords
- network account
- binding
- identity code
- inventory
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
An identity authentication method comprises the following steps: an identity identification code of an identity authenticator is received; whether the identity identification code is bound with a corresponding network account is searched; if the bound network account is found, whether the bound network account is in a certification list is determined, and if yes, the authentication succeeds; and if the bound network account is not found or the bound network account is not in the certification list, the authentication fails. According to the identity authentication method, the identity identification code of the authenticator is associated with the network account, and success or failure of the authentication is determined by the certification list including the certificated network account. A user can bind, unbind and change the identity authenticator through the network account conveniently on the internet, so that loss report and post register can be achieved timely after loss of the identity authenticator, the safety is improved, the efficiency for the loss report and post register of the identity authenticator is improved, and time and labor cost are saved. Besides, the invention further provides an identity authentication system.
Description
Technical field
The present invention relates to communication technical field, particularly relate to a kind of auth method and system.
Background technology
Increasing office, building, factory and residence district are provided with gate control system.General gate inhibition can open by brush access card, if access card is lost, holder need to declare to keeper, and keeper cuts off the card of loss on the server of gate control system, then makes up neocaine, very inconvenient.Because holder can not process timely in the time finding that card is lost, make troubles to holder on the one hand, on the other hand postpone during this period of time in, there is serious potential safety hazard.
Summary of the invention
Based on this, being necessary the problem that cannot report the loss in time and make up after losing for the identity verifier thereof such as access card provide a kind of auth method and system.
A kind of auth method, comprising:
Receive the Identity Code of identity verifier thereof;
Search described Identity Code and whether bind corresponding network account;
If find the network account of binding, judge that whether the network account of described binding is authenticating in inventory, if in certification inventory, be proved to be successful;
If do not find the network account of described binding or the network account of described binding not in certification inventory, authentication failed.
A kind of auth method, comprising:
Obtain the Identity Code of identity verifier thereof;
Generate the binding information of described Identity Code and network account binding; Described binding information comprises described Identity Code, described network account and bind request;
Send described binding information to network end server.
A kind of authentication system, comprising:
Receiver module, for receiving the Identity Code of identity verifier thereof;
Search module, whether bind corresponding network account for searching described Identity Code, if do not find the authentication failed of network account of described binding;
Authentication module, if for described in search the network account of module searches to binding, the network account that judges described binding whether in certification inventory, if in certification inventory, be proved to be successful, not authentication failed in certification inventory.
A kind of authentication system, comprising:
Acquisition module, for obtaining the Identity Code of identity verifier thereof;
Binding information generation module, for generating the binding information of described Identity Code and network account binding; Described binding information comprises described Identity Code, described network account and bind request;
Binding information sending module, for sending described binding information to network end server.
Above-mentioned auth method and system, the authentication code of identity verifier thereof is associated with network account, utilization comprises the certification inventory of the network account of certification, judgement is proved to be successful or authentication failed, because user can utilize the network communication terminal logging in network accounts such as mobile phone, binding easily, unbind and change identity verifier thereof, realize after identity verifier thereof is lost and report the loss timely and make up, when having improved security, also improve the efficiency that identity verifier thereof is reported the loss and made up, saved time and human cost.
Brief description of the drawings
Fig. 1 is the process flow diagram of an embodiment auth method;
Fig. 2 is the process flow diagram of another embodiment auth method;
Fig. 3 is the process flow diagram of another embodiment auth method;
Fig. 4 is the process flow diagram of another embodiment auth method;
Fig. 5 is the process flow diagram of another embodiment auth method;
Fig. 6 is the process flow diagram of another embodiment auth method;
Fig. 7 is the surface chart that obtains authentication code in the auth method shown in Fig. 6;
Fig. 8 is the process flow diagram of another embodiment auth method;
Fig. 9 is the surface chart of Identity Code in the auth method shown in Fig. 8 and network account binding;
Figure 10 is the schematic diagram of an embodiment authentication system;
Figure 11 is the schematic diagram of searching module in the authentication system shown in Figure 10;
Figure 12 is the schematic diagram of another embodiment authentication system;
Figure 13 is the schematic diagram of another embodiment authentication system;
Figure 14 is the schematic diagram of another embodiment authentication system;
Figure 15 is the schematic diagram of another embodiment authentication system;
Figure 16 is the schematic diagram of another embodiment authentication system;
Figure 17 is the schematic diagram of another embodiment authentication system.
Embodiment
For the ease of understanding the present invention, below with reference to relevant drawings, auth method and system are described more fully.In accompanying drawing, provide the first-selected embodiment of auth method and system.But auth method and system can realize in many different forms, be not limited to embodiment described herein.On the contrary, providing the object of these embodiment is to make to the disclosure of auth method and system more thoroughly comprehensively.
Unless otherwise defined, all technology that use are herein identical with the implication that belongs to the common understanding of those skilled in the art of the present invention with scientific terminology.The term using in the instructions of auth method and system herein, just in order to describe the object of specific embodiment, is not intended to be restriction the present invention.Term as used herein " and/or " comprise one or more relevant Listed Items arbitrarily with all combinations.
Fig. 1 is the auth method of an embodiment, and the present embodiment specifically can be applicable on gate control system or other authentication systems, for receiving the Identity Code of identity verifier thereof and carrying out authentication.As shown in Figure 1, the concrete steps of the auth method of the present embodiment are as follows:
S120, the Identity Code of reception identity verifier thereof.Identity verifier thereof can be to have bluetooth module, NFC (Near Field Communication, near field communication (NFC)) module, RFID (Radio Frequency Identification, radio frequency identification) equipment of module or other wireless communication modules, identity verifier thereof is preset with Identity Code, this Identity Code can send out by above-mentioned wireless communication module, therefore the mode that receives Identity Code can comprise by bluetooth and receiving, one or more combinations that receive and receive by REID RFID by wireless short-distance communication technology NFC.In an embodiment who is specifically applied in gate control system, preferably receive the mode of Identity Code by bluetooth 4.0.Bluetooth has the function of measuring distance, if the identity verifier thereof with bluetooth module is being carried in other positions in user's bag, in pocket or with it, as long as user goes in the certain limit of gate inhibition's inductor, gate inhibition opens automatically, user can enter without stopping, very convenient.And user do not need to find out identity verifier thereof, remove from and carried the trouble that identity verifier thereof but can not find for the moment.And bluetooth 4.0 moves low in energy consumptionly, there is power saving, be more suitable for being applied in identity verifier thereof.
S140, searches Identity Code and whether binds corresponding network account.Network account refers to the identity account that user uses in internet, can be network service account, social networks account, payment accounts or E-mail address account.Network account can be numeral, letter or symbol in form, can be also the combination of numeral, letter and symbol.Therein in an embodiment, network account can be instant messaging account, user can utilize the instant communication software access of instant communicating account on the network communication terminals such as mobile phone, utilizes its feature that can immediately exchange message, realizes easily and fast, communicates by letter timely.
On home server, storing in advance binding inventory, binding inventory comprises Identity Code and network account corresponding to Identity Code.In an embodiment, Identity Code and network account are one to one therein, a corresponding user of network account, a corresponding identity verifier thereof of Identity Code.Identity Code and network account are that the corresponding user of expression only can hold an identity verifier thereof one by one, if user's identity verifier thereof is lost, making up new identity verifier thereof, while registering new Identity Code, old identity verifier thereof and Identity Code no longer can be used, and can ensure like this security.In other embodiments, multiple authentication code also can a corresponding network account, and the corresponding multiple visitor's authentication code of network account on for example foreground, in concrete application, a foreground staff can provide multiple identity verifier thereofs, to facilitate passing through of multiple visitors.Binding inventory is for searching the network account that Identity Code is corresponding.
In an embodiment, step S140 searches at home server therein, can be also to search in network end server.Therein in an embodiment, step S140 is included in home server and searches Identity Code and whether bind corresponding network account, if do not find the network account of binding, searches Identity Code whether bind corresponding network account in network end server.If do not store this Identity Code in home server,, by network, utilize network end server to verify.The mode of communicating by letter with network end server comprises by the mode of one or more combinations in cable network, WIFI, 3G, 3GPP, 4G and WLAN.User adds, changes Identity Code by network end server, and network end server has up-to-date and comprehensive information, while not finding Identity Code, can utilize network end server to confirm.For example same company is provided with branch office in Guangzhou and two places, Shenzhen, the employee of Shenzhen branch office has authority by the gate inhibition of Guangzhou Branch, but the employee of Shenzhen branch office does not often arrive Guangzhou Branch, so in the certification inventory prestoring in the home server of the gate control system of Guangzhou Branch, only comprise the employee of Guangzhou Branch, and there is no the employee of Shenzhen branch office.In the time that the employee of Shenzhen branch office arrives Guangzhou Branch, gate control system receives Identity Code and searches less than corresponding network account, can verify by network end server.In an embodiment, after network end server is searched information, also comprise the step that is stored in the information finding in network end server therein.Communicate by letter and may have time delay with network end server, find and store time and the Internet resources that can save checking next time after information.
S160, if find the network account of binding, judges that whether the network account of binding is authenticating in inventory, if in certification inventory, be proved to be successful.Certification inventory comprises the network account of certification.In the embodiment being specifically applied in gate control system, be proved to be successful expression opening gate.The network account of certification represents that the user that this network account is corresponding has authority to pass through gate inhibition, and gate inhibition can open.Referring to Fig. 2, therein in an embodiment, before step S120, also comprise the step (step S110a) that receives certification inventory and/or binding inventory, certification inventory comprises the network account of certification, binding inventory comprises Identity Code, the network account that Identity Code is corresponding, and binding inventory is for searching the network account that Identity Code is corresponding.First the auth method of the present embodiment prestores and binds inventory and/or certification inventory in home server, if receiving for the first time each Identity Code searches to be at home server and does not find, look for and surpass in network end server, lose time, also waste Internet resources.By certification inventory and binding, inventory is disposable knows, more convenient, saves Internet resources.Therein in an embodiment, reset or when certification inventory information has larger variation, can perform step at any time as required S110a in gate control system.
S180, if do not find the network account of binding or the network account of binding not in certification inventory, authentication failed.Specifically be applied in the embodiment in gate control system, authentication failed represents to refuse opening gate, if continuous several times authentication failed can stop receiving the Identity Code of identity verifier thereof automatically, or automatically starts alarm mode.Referring to Fig. 3, in an embodiment, also comprise reception modification information therein, modification information comprises Identity Code and network account, upgrades the step (S110b) of the Identity Code that in binding inventory, network account is corresponding according to modification information.If user has lost identity verifier thereof, can report the loss old identity verifier thereof by network end server, make up new identity verifier thereof, change Identity Code.Home server stores modification information, if receive old Identity Code, and authentication failed, refusal uses the identity verifier thereof of having reported the loss to pass through gate inhibition.Certainly, if user can not find identity verifier thereof for the moment, to have found again afterwards, in order economizing on resources, can again to have sent modification information, the Identity Code of this identity verifier thereof and network account had been bound again.
Referring to Fig. 4, therein in an embodiment, the auth method of the present embodiment also comprises the interpolation information that receives, interpolation information comprises Identity Code and network account, by Identity Code and network account corresponding add binding inventory, and network account is added to the step (step S110c) that authenticates inventory.If there is new employee to add, network end server can send interpolation information to home server adds, without sending the binding inventory and the certification inventory that upgrade, compare with certification inventory with binding inventory, the quantity of information of interpolation information is little, can improve interpolation speed, saves Internet resources.Referring to Fig. 5, therein in an embodiment, the auth method of the present embodiment also comprises the deletion information that receives, and deletes packets of information includes network account, the step (step S110d) of network account being deleted from certification inventory or binding inventory according to deletion information.If there is labor turnover, network end server can send order to home server, delete relevant information in certification inventory and binding inventory, without sending the binding inventory and the certification inventory that upgrade, compare with certification inventory with binding inventory, the quantity of information of interpolation information is little, can improve interpolation speed, saves Internet resources.If user reports the loss identity verifier thereof, can only in binding inventory, delete corresponding network account and authentication code.
The auth method of the present embodiment is associated with network account by the authentication code of identity verifier thereof, utilization comprises the certification inventory of the network account of certification, judgement is proved to be successful or authentication failed, because user can utilize the network communication terminal logging in network accounts such as mobile phone, binding easily, unbind and change identity verifier thereof, realize after identity verifier thereof is lost and report the loss timely and make up, when having improved security, also improve the efficiency that identity verifier thereof is reported the loss and made up, saved time and human cost.
Fig. 6 is the auth method of an embodiment, the present embodiment specifically can be applicable on the communication terminal of the accessible internets such as mobile phone, panel computer, personal computer, user can utilize network communication terminal logging in network account, easily binding or unbind identity verifier thereof.As shown in Figure 6, the concrete steps of the auth method of the present embodiment are as follows:
S220, obtains the Identity Code of identity verifier thereof.In an embodiment who is specifically applied on mobile phone, the mode of obtaining Identity Code can be a variety of, if identity verifier thereof has bluetooth module, can obtain by bluetooth, if identity verifier thereof has NFC module, can obtain by NFC.User also can obtain with the Quick Response Code that mobile telephone scanning carries Identity Code, if Identity Code is Word message or numerical information, also can directly on mobile phone, input this Word message or numerical information.The auth method of the present embodiment can be applied on instant communication software, and the interface that obtains authentication code can be referring to Fig. 7.
S240, generates the binding information of Identity Code and network account binding.Binding information comprises Identity Code, network account and bind request.Network account refers to the identity account that user uses in internet, can be network service account, social networks account, payment accounts or E-mail address account.Network account can be numeral, letter or symbol in form, can be also the combination of numeral, letter and symbol.Therein in an embodiment, network account can be instant messaging account, user can utilize the instant communication software access of instant communicating account on the network communication terminals such as mobile phone, utilizes its feature that can immediately exchange message, realizes easily and fast, communicates by letter timely.
S260, sends binding information to network end server.Network end server can be bound according to bind request.Sending binding information to the mode of network end server comprises by one or more array modes transmissions in WIFI, 3G, 3GPP, 4G, WLAN and cable network.In an embodiment, if send first binding information to network end server, can send request simultaneously network account is added to the interpolation solicited message that authenticates inventory therein.
Referring to Fig. 8, in an embodiment, also comprise therein:
S280, generates the unbind information of Identity Code and network account unbind, and unbind information comprises Identity Code, network account and releasing bind request.
S290, sends unbind information to network end server.Network end server can be carried out unbind according to unbind information request, and after unbind, the webserver pushes the order of deleting the network account in binding inventory to home server timely.The surface chart of Identity Code and network account binding and unbind can be referring to Fig. 9, and the authentication code that step S220 obtains is inserted authentication code frame 242 automatically, and the network account of active user's login is inserted network account frame 244 automatically.Information in authentication code frame 242 and network account frame 244, user can change by keyboard.If user triggers binding button 246a, generate binding information according to the authentication code in current authentication code frame 242 and network account frame 244 and network account.If user triggers unbind button 246b, remove binding information according to the authentication code in current authentication code frame 242 and network account frame 244 and network account generating solution.
The auth method of the present embodiment is associated with network account by the authentication code of identity verifier thereof, utilization comprises the certification inventory of the network account of certification, judgement is proved to be successful or authentication failed, because user can utilize the network communication terminal logging in network accounts such as mobile phone, binding easily, unbind and change identity verifier thereof, realize after identity verifier thereof is lost and report the loss timely and make up, when having improved security, also improve the efficiency that identity verifier thereof is reported the loss and made up, saved time and human cost.
Figure 10 is the authentication system of an embodiment, and the present embodiment specifically can be applicable on gate control system or other authentication systems, for receiving the Identity Code of identity verifier thereof and carrying out authentication.As shown in figure 10, the authentication system of the present embodiment comprises receiver module 120, searches module 140 and authentication module 160.
Receiver module 120, for receiving the Identity Code of identity verifier thereof.Identity verifier thereof can be to have bluetooth module, NFC (Near Field Communication, near field communication (NFC)) module, RFID (Radio Frequency Identification, radio frequency identification) equipment of module or other wireless communication modules, identity verifier thereof is preset with Identity Code, this Identity Code can send out by above-mentioned wireless communication module, therefore the mode that receives Identity Code can comprise by bluetooth and receiving, one or more combinations that receive and receive by REID RFID by wireless short-distance communication technology NFC.In an embodiment who is specifically applied in gate control system, preferably receive the mode of Identity Code by bluetooth 4.0.Bluetooth has the function of measuring distance, if the identity verifier thereof with bluetooth module is being carried in other positions in user's bag, in pocket or with it, as long as user goes in the certain limit of gate inhibition's inductor, gate inhibition opens automatically, user can enter without stopping, very convenient.And user do not need to find out identity verifier thereof, remove from and carried the trouble that identity verifier thereof but can not find for the moment.And bluetooth 4.0 moves low in energy consumptionly, there is power saving, be more suitable for being applied in identity verifier thereof.
Search module 140, whether bind corresponding network account for searching Identity Code, if do not find the authentication failed of network account of binding.Network account refers to the identity account that user uses in internet, can be network service account, social networks account, payment accounts or E-mail address account.Network account can be numeral, letter or symbol in form, can be also the combination of numeral, letter and symbol.Therein in an embodiment, network account can be instant messaging account, user can utilize the instant communication software access of instant communicating account on the network communication terminals such as mobile phone, utilizes its feature that can immediately exchange message, realizes easily and fast, communicates by letter timely.
On home server, storing in advance binding inventory, binding inventory comprises Identity Code and network account corresponding to Identity Code.In an embodiment, Identity Code and network account are one to one therein, a corresponding user of network account, a corresponding identity verifier thereof of Identity Code.Identity Code and network account are that the corresponding user of expression only can hold an identity verifier thereof one by one, if user's identity verifier thereof is lost, making up new identity verifier thereof, while registering new Identity Code, old identity verifier thereof and Identity Code no longer can be used, and can ensure like this security.In other embodiments, multiple authentication code also can a corresponding network account, and the corresponding multiple visitor's authentication code of network account on for example foreground, in concrete application, a foreground staff can provide multiple identity verifier thereofs, to facilitate passing through of multiple visitors.Binding inventory is for searching the network account that Identity Code is corresponding.Specifically be applied in the embodiment in gate control system, authentication failed represents to refuse opening gate, if continuous several times authentication failed can stop receiving the Identity Code of identity verifier thereof automatically, or automatically starts alarm mode.
In an embodiment, searching module 140 can be to search at home server, can be also to search in network end server therein.Referring to Figure 11, therein in an embodiment, search module 140 and can comprise that this locality searches module 142 and NetFind module 144.
Module 142 is searched in this locality, whether binds corresponding network account for search Identity Code at home server.
NetFind module 144, if for the local network account of searching module 142 and do not find binding, search Identity Code in network end server and whether bind corresponding network account.If do not store this Identity Code in home server,, by network, utilize network end server to verify.The mode of communicating by letter with network end server comprises by the mode of one or more combinations in cable network, WIFI, 3G, 3GPP, 4G and WLAN.User adds, changes Identity Code by network end server, and network end server has up-to-date and comprehensive information, while not finding Identity Code, can utilize network end server to confirm.For example same company is provided with branch office in Guangzhou and two places, Shenzhen, the employee of Shenzhen branch office has authority by the gate inhibition of Guangzhou Branch, but the employee of Shenzhen branch office does not often arrive Guangzhou Branch, so in the certification inventory prestoring in the home server of the gate control system of Guangzhou Branch, only comprise the employee of Guangzhou Branch, and there is no the employee of Shenzhen branch office.In the time that the employee of Shenzhen branch office arrives Guangzhou Branch, gate control system receives Identity Code and searches less than corresponding network account, can verify by network end server.In an embodiment, after the information that NetFind module 144 finds in network end server, store the information finding therein.Communicate by letter and may have time delay with network end server, find and store time and the Internet resources that can save checking next time after information.
Authentication module 160, if find the network account of binding for searching module 140, the network account that judges binding whether in certification inventory, if in certification inventory, be proved to be successful, not authentication failed in certification inventory.Certification inventory comprises the network account of certification.In the embodiment being specifically applied in gate control system, be proved to be successful expression opening gate.The network account of certification represents that the user that this network account is corresponding has authority to pass through gate inhibition, and gate inhibition can open.Referring to Figure 12, therein in an embodiment, also comprise and receive checklist module 110a, be used for receiving certification inventory and/or binding inventory, certification inventory comprises the network account of certification, binding inventory comprises Identity Code, the network account that Identity Code is corresponding, and binding inventory is for searching the network account that Identity Code is corresponding.First the authentication system of the present embodiment prestores and binds inventory and/or certification inventory in home server, if receiving for the first time each Identity Code searches to be at home server and does not find, look for and surpass in network end server, lose time, also waste Internet resources.By certification inventory and binding, inventory is disposable knows, more convenient, saves Internet resources.Therein in an embodiment, reset or when certification inventory information has larger variations, can receive certification inventory and/or bind inventory by receiving checklist module 110a at any time as required in gate control system.
Referring to Figure 13, in an embodiment, also comprise and change module 110b therein, for receiving modification information, modification information comprises Identity Code and network account, upgrades Identity Code corresponding to network account in binding inventory according to modification information.If user has lost identity verifier thereof, can report the loss old identity verifier thereof by network end server, make up new identity verifier thereof, change Identity Code.Home server stores modification information, if receive old Identity Code, and authentication failed, refusal uses the identity verifier thereof of having reported the loss to pass through gate inhibition.Certainly, if user can not find identity verifier thereof for the moment, to have found again afterwards, in order economizing on resources, can again to have sent modification information, the Identity Code of this identity verifier thereof and network account had been bound again.
Referring to Figure 14, therein in an embodiment, the authentication system of the present embodiment also comprises interpolation module 110c, be used for receiving interpolation information, interpolation information comprises Identity Code and network account, by Identity Code and network account corresponding add binding inventory, and network account is added to certification inventory.If there is new employee to add, network end server can send interpolation information to home server adds, without sending the binding inventory and the certification inventory that upgrade, compare with certification inventory with binding inventory, the quantity of information of interpolation information is little, can improve interpolation speed, saves Internet resources.Referring to Figure 15, in an embodiment, the authentication system of the present embodiment also comprises removing module 110d therein, for receiving deletion information, deletes packets of information includes network account, according to deletion information, network account is deleted from certification inventory or binding inventory.If there is labor turnover, network end server can send order to home server, delete relevant information in certification inventory and binding inventory, without sending the binding inventory and the certification inventory that upgrade, compare with certification inventory with binding inventory, the quantity of information of interpolation information is little, can improve interpolation speed, saves Internet resources.If user reports the loss identity verifier thereof, can only in binding inventory, delete corresponding network account and authentication code.
The authentication system of the present embodiment is associated with network account by the authentication code of identity verifier thereof, utilization comprises the certification inventory of the network account of certification, judgement is proved to be successful or authentication failed, because user can utilize the network communication terminal logging in network accounts such as mobile phone, binding easily, unbind and change identity verifier thereof, realize after identity verifier thereof is lost and report the loss timely and make up, when having improved security, also improve the efficiency that identity verifier thereof is reported the loss and made up, saved time and human cost.
Figure 16 is the authentication system of an embodiment, the present embodiment specifically can be applicable on the communication terminal of the accessible internets such as mobile phone, panel computer, personal computer, and user can utilize network communication terminal logging in network account to bind easily or unbind identity verifier thereof.As shown in figure 16, the authentication system of the present embodiment comprises acquisition module 220, binding information generation module 240 and binding information sending module 260.
Acquisition module 220, for obtaining the Identity Code of identity verifier thereof.In an embodiment who is specifically applied on mobile phone, the mode of obtaining Identity Code can be a variety of, if identity verifier thereof has bluetooth module, can obtain by bluetooth, if identity verifier thereof has NFC module, can obtain by NFC.User also can obtain with the Quick Response Code that mobile telephone scanning carries Identity Code, if Identity Code is Word message or numerical information, also can directly on mobile phone, input this Word message or numerical information.The authentication system of the present embodiment can be applied on instant communication software, and the interface that obtains authentication code can be referring to Fig. 7.
Binding information generation module 240, for generating the binding information of Identity Code and network account binding.Binding information comprises Identity Code, network account and bind request.Network account refers to the identity account that user uses in internet, can be network service account, social networks account, payment accounts or E-mail address account.Network account can be numeral, letter or symbol in form, can be also the combination of numeral, letter and symbol.Therein in an embodiment, network account can be instant messaging account, user can utilize the instant communication software access of instant communicating account on the network communication terminals such as mobile phone, utilizes its feature that can immediately exchange message, realizes easily and fast, communicates by letter timely.
Binding information sending module 260, for sending binding information to network end server.Network end server can be bound according to bind request.Sending binding information to the mode of network end server comprises by one or more array modes transmissions in WIFI, 3G, 3GPP, 4G, WLAN and cable network.In an embodiment, if send first binding information to network end server, binding information sending module 260 can send request simultaneously network account is added to the interpolation solicited message that authenticates inventory therein.
Referring to Figure 17, therein in an embodiment, also comprise that solution ties up information generating module 280 and conciliate and tie up information sending module 290.
Solution is tied up information generating module 280, and for generating the unbind information of Identity Code and network account unbind, unbind information comprises Identity Code, network account and releasing bind request.
Solution is tied up information sending module 290, for sending unbind information to network end server.Network end server can be carried out unbind according to unbind information request, and after unbind, the webserver pushes the order of deleting the network account in binding inventory to home server timely.The surface chart of Identity Code and network account binding and unbind can be referring to Fig. 9, and the authentication code that acquisition module 220 obtains is inserted authentication code frame 242 automatically, and the network account of active user's login is inserted network account frame 244 automatically.Information in authentication code frame 242 and network account frame 244, user can change by keyboard.If user triggers binding button 246a, generate binding information according to the authentication code in current authentication code frame 242 and network account frame 244 and network account.If user triggers unbind button 246b, remove binding information according to the authentication code in current authentication code frame 242 and network account frame 244 and network account generating solution.
The authentication system of the present embodiment is associated with network account by the authentication code of identity verifier thereof, utilization comprises the certification inventory of the network account of certification, judgement is proved to be successful or authentication failed, because user can utilize the network communication terminal logging in network accounts such as mobile phone, binding easily, unbind and change identity verifier thereof, realize after identity verifier thereof is lost and report the loss timely and make up, when having improved security, also improve the efficiency that identity verifier thereof is reported the loss and made up, saved time and human cost.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, to carry out the program that hardware that instruction is relevant completes by computer program, can be stored in a computer read/write memory medium, this program, in the time carrying out, can comprise as the flow process of the embodiment of above-mentioned each side method.Wherein, storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory, RAM) etc.
Above embodiment has only expressed several embodiment of the present invention, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be as the criterion with claims.
Claims (22)
1. an auth method, is characterized in that, comprising:
Receive the Identity Code of identity verifier thereof;
Search described Identity Code and whether bind corresponding network account;
If find the network account of binding, judge that whether the network account of described binding is authenticating in inventory, if in certification inventory, be proved to be successful;
If do not find the network account of described binding or the network account of described binding not in certification inventory, authentication failed.
2. auth method according to claim 1, is characterized in that, described in the step of searching described Identity Code and whether binding corresponding network account, comprising:
Search described Identity Code at home server and whether bind corresponding network account;
If do not find the network account of binding, search described Identity Code in network end server and whether bind corresponding network account.
3. auth method according to claim 1, is characterized in that, also comprises:
Receive described certification inventory and/or binding inventory, described certification inventory comprises the network account of certification, described binding inventory comprises described Identity Code, the described network account that described Identity Code is corresponding, and described binding inventory is for searching the network account that described Identity Code is corresponding.
4. auth method according to claim 3, is characterized in that, also comprises:
Receive modification information, described modification information comprises described Identity Code and described network account, upgrades described Identity Code corresponding to network account described in described binding inventory according to described modification information.
5. auth method according to claim 3, is characterized in that, also comprises:
Receive interpolation information, described interpolation information comprises described Identity Code and described network account, by described Identity Code and described network account corresponding add described binding inventory, and described network account is added to described certification inventory.
6. auth method according to claim 3, is characterized in that, also comprises:
Receive deletion information, described deletion information comprises described network account, according to described deletion information, described network account is deleted from described certification inventory or described binding inventory.
7. auth method according to claim 1, it is characterized in that, in the step of the Identity Code of described reception identity verifier thereof, the mode that receives described Identity Code comprises one or more combinations that received, received and received by REID RFID by wireless short-distance communication technology NFC by bluetooth.
8. an auth method, is characterized in that, comprising:
Obtain the Identity Code of identity verifier thereof;
Generate the binding information of described Identity Code and network account binding; Described binding information comprises described Identity Code, described network account and bind request;
Send described binding information to network end server.
9. auth method according to claim 8, is characterized in that, if send first described binding information to network end server, sends request simultaneously described network account is added to the interpolation solicited message that authenticates inventory.
10. auth method according to claim 8, is characterized in that, also comprises:
Generate the unbind information of described Identity Code and network account unbind, described unbind information comprises described Identity Code, described network account and removes bind request;
Send described unbind information to network end server.
11. auth methods according to claim 8, it is characterized in that, in the step of the described Identity Code that obtains identity verifier thereof, the mode of obtaining described Identity Code comprises one or more combinations of being obtained, being obtained, obtained and obtained by receiving Word message or numerical information by scanning Quick Response Code by wireless short-distance communication technology NFC by bluetooth.
12. 1 kinds of authentication systems, is characterized in that, comprising:
Receiver module, for receiving the Identity Code of identity verifier thereof;
Search module, whether bind corresponding network account for searching described Identity Code, if do not find the authentication failed of network account of described binding;
Authentication module, if for described in search the network account of module searches to binding, the network account that judges described binding whether in certification inventory, if in certification inventory, be proved to be successful, not authentication failed in certification inventory.
13. authentication systems according to claim 12, is characterized in that, described in search module and comprise:
Module is searched in this locality, whether binds corresponding network account for search described Identity Code at home server;
NetFind module, if search module and do not find the network account of binding for described this locality, searches described Identity Code in network end server and whether binds corresponding network account.
14. authentication systems according to claim 12, it is characterized in that, also comprise reception checklist module, be used for receiving described certification inventory and/or binding inventory, described certification inventory comprises the network account of certification, described binding inventory comprises described Identity Code, the described network account that described Identity Code is corresponding, and described binding inventory is for searching the network account that described Identity Code is corresponding.
15. authentication systems according to claim 13, it is characterized in that, also comprise change module, be used for receiving modification information, described modification information comprises described Identity Code and described network account, upgrades described Identity Code corresponding to network account described in described binding inventory according to described modification information.
16. authentication systems according to claim 13, it is characterized in that, also comprise interpolation module, be used for receiving interpolation information, described interpolation information comprises described Identity Code and described network account, by described Identity Code and described network account corresponding add described binding inventory, and described network account is added to described certification inventory.
17. authentication systems according to claim 13, it is characterized in that, also comprise removing module, for receiving deletion information, described deletion information comprises described network account, according to described deletion information, described network account is deleted from described certification inventory or described binding inventory.
18. authentication systems according to claim 12, it is characterized in that, the mode that described receiver module receives described Identity Code comprises one or more combinations that received, received and received by REID RFID by wireless short-distance communication technology NFC by bluetooth.
19. 1 kinds of authentication systems, is characterized in that, comprising:
Acquisition module, for obtaining the Identity Code of identity verifier thereof;
Binding information generation module, for generating the binding information of described Identity Code and network account binding; Described binding information comprises described Identity Code, described network account and bind request;
Binding information sending module, for sending described binding information to network end server.
20. authentication systems according to claim 19, it is characterized in that, if send first described binding information to network end server, described binding information sending module sends request simultaneously described network account is added to the interpolation solicited message that authenticates inventory.
21. authentication systems according to claim 19, is characterized in that, also comprise:
Solution is tied up information generating module, and for generating the unbind information of described Identity Code and network account unbind, described unbind information comprises described Identity Code, described network account and removes bind request;
Solution is tied up information sending module, for sending described unbind information to network end server.
22. authentication systems according to claim 19, it is characterized in that, the mode that described acquisition module obtains described Identity Code comprises one or more combinations of being obtained, being obtained, obtained and obtained by receiving Word message or numerical information by scanning Quick Response Code by wireless short-distance communication technology NFC by bluetooth.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310754705.8A CN104143056A (en) | 2013-12-31 | 2013-12-31 | Identity authentication method and system |
TW103146095A TW201525749A (en) | 2013-12-31 | 2014-12-29 | Method of identity verification and system thereof |
PCT/CN2014/095929 WO2015101331A1 (en) | 2013-12-31 | 2014-12-31 | Identity verification method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310754705.8A CN104143056A (en) | 2013-12-31 | 2013-12-31 | Identity authentication method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104143056A true CN104143056A (en) | 2014-11-12 |
Family
ID=51852226
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310754705.8A Pending CN104143056A (en) | 2013-12-31 | 2013-12-31 | Identity authentication method and system |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN104143056A (en) |
TW (1) | TW201525749A (en) |
WO (1) | WO2015101331A1 (en) |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104468557A (en) * | 2014-12-02 | 2015-03-25 | 华为软件技术有限公司 | Application account safety protecting method and device |
WO2015101331A1 (en) * | 2013-12-31 | 2015-07-09 | 腾讯科技(深圳)有限公司 | Identity verification method and system |
CN104951825A (en) * | 2015-07-11 | 2015-09-30 | 山东信通电子股份有限公司 | Identity information effectiveness identification method and device |
CN106022013A (en) * | 2016-05-03 | 2016-10-12 | 北京小米移动软件有限公司 | Method and device for relieving application program authorization |
CN106487762A (en) * | 2015-08-31 | 2017-03-08 | 腾讯科技(深圳)有限公司 | The recognition methodss of user identity, identification applications client and server |
CN106530458A (en) * | 2016-11-01 | 2017-03-22 | 广东鑫际物联网科技有限公司 | Authority management method and system for access control system |
CN106530460A (en) * | 2016-11-01 | 2017-03-22 | 张涛 | Access control authority distribution method and system |
CN106548546A (en) * | 2016-11-01 | 2017-03-29 | 广东鑫际物联网科技有限公司 | A kind of right management method and system of gate control system |
CN106952371A (en) * | 2017-03-21 | 2017-07-14 | 北京深度未来科技有限公司 | A kind of face roaming authentication method and system |
CN107026816A (en) * | 2016-01-29 | 2017-08-08 | 阿里巴巴集团控股有限公司 | A kind of identity identifying method and device |
CN107566126A (en) * | 2017-09-27 | 2018-01-09 | 深圳市创易联合科技有限公司 | A kind of auth method and system |
CN107735817A (en) * | 2015-06-15 | 2018-02-23 | 亚萨合莱有限公司 | Voucher buffer |
CN108416399A (en) * | 2018-01-24 | 2018-08-17 | 福建师范大学 | A kind of means of communication and terminal based on radio-frequency technique |
CN109600734A (en) * | 2017-09-30 | 2019-04-09 | 阿里巴巴集团控股有限公司 | Method for authenticating, binding method, system and equipment based on APP application |
CN109872421A (en) * | 2019-01-08 | 2019-06-11 | 博拉网络股份有限公司 | A kind of big data access control management method and its management system |
CN109993513A (en) * | 2019-03-22 | 2019-07-09 | 北京三快在线科技有限公司 | The methods, devices and systems of payment account binding bank card |
CN110176091A (en) * | 2019-05-15 | 2019-08-27 | 广东科徕尼智能科技有限公司 | A method of smart lock safety is improved by mobile terminal device code |
CN110570551A (en) * | 2019-08-01 | 2019-12-13 | 重庆远通电子技术开发有限公司 | Intelligent security system and working method |
CN110942308A (en) * | 2019-11-15 | 2020-03-31 | 北京三快在线科技有限公司 | Resource transfer method, device, computer equipment and storage medium |
CN111145377A (en) * | 2019-12-31 | 2020-05-12 | 河南思维信息技术有限公司 | Intelligent and integrated attendance and attendance management method and system |
CN112308995A (en) * | 2019-08-01 | 2021-02-02 | 银河水滴科技(北京)有限公司 | On-duty monitoring method, equipment and computer readable storage medium |
CN112991119A (en) * | 2021-04-12 | 2021-06-18 | 无锡奥特维科技股份有限公司 | Student account management method and device |
CN113807893A (en) * | 2021-09-17 | 2021-12-17 | 上海万向区块链股份公司 | Intelligent commodity evaluation method and system based on block chain technology |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI649668B (en) * | 2016-12-30 | 2019-02-01 | 金財通商務科技服務股份有限公司 | Method of authentication and dialogue robot based on instant messaging program |
CN107682545B (en) * | 2017-09-28 | 2023-04-21 | 山西特信环宇信息技术有限公司 | Person and evidence machine integrated mobile phone terminal system based on biological identification technology |
CN109712300A (en) * | 2019-01-31 | 2019-05-03 | 广州微证互联网有限公司 | A kind of unlocking system based on network identification card certification |
CN112885434B (en) * | 2021-03-23 | 2022-04-15 | 中国人民解放军联勤保障部队第九六〇医院 | System and method for integrating portable information acquisition and psychological test in network-free environment |
CN113915947B (en) * | 2021-09-13 | 2023-04-11 | 海信冰箱有限公司 | Refrigerator and remote control method thereof |
CN115661985B (en) * | 2022-12-12 | 2023-04-07 | 金税信息技术服务股份有限公司 | Deviation rectifying method and device for cabinet entering information |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201331778Y (en) * | 2009-01-13 | 2009-10-21 | 厦门盛华电子科技有限公司 | Electronic gate inhibition device based on RF mobile phone SIM card |
CN202143133U (en) * | 2011-07-19 | 2012-02-08 | 青岛百灵信息科技有限公司 | Handset identity identification induction apparatus |
CN103310509A (en) * | 2012-03-15 | 2013-09-18 | 深圳光启创新技术有限公司 | Communication method of access control system |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1921390B (en) * | 2006-09-08 | 2011-11-02 | 网之易信息技术(北京)有限公司 | User identification identifying method and system |
CN102262793B (en) * | 2010-05-26 | 2013-08-21 | 中兴通讯股份有限公司 | Entrance guard control method and entrance guard control system |
CN104143056A (en) * | 2013-12-31 | 2014-11-12 | 腾讯科技(深圳)有限公司 | Identity authentication method and system |
-
2013
- 2013-12-31 CN CN201310754705.8A patent/CN104143056A/en active Pending
-
2014
- 2014-12-29 TW TW103146095A patent/TW201525749A/en unknown
- 2014-12-31 WO PCT/CN2014/095929 patent/WO2015101331A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201331778Y (en) * | 2009-01-13 | 2009-10-21 | 厦门盛华电子科技有限公司 | Electronic gate inhibition device based on RF mobile phone SIM card |
CN202143133U (en) * | 2011-07-19 | 2012-02-08 | 青岛百灵信息科技有限公司 | Handset identity identification induction apparatus |
CN103310509A (en) * | 2012-03-15 | 2013-09-18 | 深圳光启创新技术有限公司 | Communication method of access control system |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015101331A1 (en) * | 2013-12-31 | 2015-07-09 | 腾讯科技(深圳)有限公司 | Identity verification method and system |
CN104468557A (en) * | 2014-12-02 | 2015-03-25 | 华为软件技术有限公司 | Application account safety protecting method and device |
CN107735817A (en) * | 2015-06-15 | 2018-02-23 | 亚萨合莱有限公司 | Voucher buffer |
CN104951825A (en) * | 2015-07-11 | 2015-09-30 | 山东信通电子股份有限公司 | Identity information effectiveness identification method and device |
CN106487762B (en) * | 2015-08-31 | 2019-12-13 | 腾讯科技(深圳)有限公司 | user identity recognition method, identity recognition application client and server |
CN106487762A (en) * | 2015-08-31 | 2017-03-08 | 腾讯科技(深圳)有限公司 | The recognition methodss of user identity, identification applications client and server |
CN107026816A (en) * | 2016-01-29 | 2017-08-08 | 阿里巴巴集团控股有限公司 | A kind of identity identifying method and device |
CN106022013A (en) * | 2016-05-03 | 2016-10-12 | 北京小米移动软件有限公司 | Method and device for relieving application program authorization |
CN106022013B (en) * | 2016-05-03 | 2019-01-04 | 北京小米移动软件有限公司 | Release the method and device of application program authorization |
CN106548546A (en) * | 2016-11-01 | 2017-03-29 | 广东鑫际物联网科技有限公司 | A kind of right management method and system of gate control system |
CN106530460A (en) * | 2016-11-01 | 2017-03-22 | 张涛 | Access control authority distribution method and system |
CN106530458A (en) * | 2016-11-01 | 2017-03-22 | 广东鑫际物联网科技有限公司 | Authority management method and system for access control system |
CN106952371A (en) * | 2017-03-21 | 2017-07-14 | 北京深度未来科技有限公司 | A kind of face roaming authentication method and system |
CN107566126A (en) * | 2017-09-27 | 2018-01-09 | 深圳市创易联合科技有限公司 | A kind of auth method and system |
CN109600734A (en) * | 2017-09-30 | 2019-04-09 | 阿里巴巴集团控股有限公司 | Method for authenticating, binding method, system and equipment based on APP application |
CN108416399A (en) * | 2018-01-24 | 2018-08-17 | 福建师范大学 | A kind of means of communication and terminal based on radio-frequency technique |
CN109872421A (en) * | 2019-01-08 | 2019-06-11 | 博拉网络股份有限公司 | A kind of big data access control management method and its management system |
CN109993513A (en) * | 2019-03-22 | 2019-07-09 | 北京三快在线科技有限公司 | The methods, devices and systems of payment account binding bank card |
CN110176091A (en) * | 2019-05-15 | 2019-08-27 | 广东科徕尼智能科技有限公司 | A method of smart lock safety is improved by mobile terminal device code |
CN110570551A (en) * | 2019-08-01 | 2019-12-13 | 重庆远通电子技术开发有限公司 | Intelligent security system and working method |
CN112308995A (en) * | 2019-08-01 | 2021-02-02 | 银河水滴科技(北京)有限公司 | On-duty monitoring method, equipment and computer readable storage medium |
CN110942308A (en) * | 2019-11-15 | 2020-03-31 | 北京三快在线科技有限公司 | Resource transfer method, device, computer equipment and storage medium |
CN111145377A (en) * | 2019-12-31 | 2020-05-12 | 河南思维信息技术有限公司 | Intelligent and integrated attendance and attendance management method and system |
CN112991119A (en) * | 2021-04-12 | 2021-06-18 | 无锡奥特维科技股份有限公司 | Student account management method and device |
CN113807893A (en) * | 2021-09-17 | 2021-12-17 | 上海万向区块链股份公司 | Intelligent commodity evaluation method and system based on block chain technology |
CN113807893B (en) * | 2021-09-17 | 2024-02-09 | 上海万向区块链股份公司 | Block chain technology-based commodity intelligent evaluation method and system |
Also Published As
Publication number | Publication date |
---|---|
WO2015101331A1 (en) | 2015-07-09 |
TW201525749A (en) | 2015-07-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104143056A (en) | Identity authentication method and system | |
CN102427472B (en) | The apparatus and method of Long-distance Control mobile communication equipment | |
US7310525B2 (en) | Network service system using temporary user identifier | |
CN103745264A (en) | Intelligent hotel guest room reservation management system | |
CN106340087A (en) | Intelligent switch lock system based on intelligent mobile terminal | |
US20180109511A1 (en) | Private simultaneous authentication of equals | |
CN102855555A (en) | System and method for identifying payment risks based on position transformation | |
CN105307169A (en) | Access method, device and system for guest network | |
CN105306612A (en) | Method for acquiring identifier of terminal in network and management network element | |
CN104158710A (en) | Automatic switchover method of service application channel based on open intelligent gateway platform | |
WO2017201931A1 (en) | Method and device for reducing power consumption of terminal, and smart card | |
CN101959186A (en) | Log-off processing method, system and device for WLAN (Wireless Local Area Network) user | |
CN204376941U (en) | Outer net middleware, inner net middleware and middleware system | |
CN102036240A (en) | Method for synchronizing mobile phone information onto personnel computer (PC), mobile phone, computer and network system | |
CN107182098A (en) | For realizing the method and apparatus that user equipment switches between WAP | |
US20050208940A1 (en) | Network service system using a temporary use identifier | |
CN103780641A (en) | Cloud desktop access method, home gateway and system | |
CN101600166A (en) | Mobile E-mail system method of automatic configuration and network method of automatic configuration | |
CN106302110A (en) | A kind of social network position sharing method based on secret protection | |
CN107317943B (en) | Method and system for setting call forwarding | |
CN108306882A (en) | A kind of method and the network equipment of terminal access business | |
CN103889034A (en) | Mobile terminal mobile communication network information receiving method and mobile terminal | |
CN102572818A (en) | Application key management method and system of MTC group device | |
CN105516054A (en) | User authentication method and user authentication device | |
CN101877848A (en) | Mobile terminal, mobile terminal data protection method and mobile terminal monitoring system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20141112 |