CN104378385B - A kind of auth method and device - Google Patents

A kind of auth method and device Download PDF

Info

Publication number
CN104378385B
CN104378385B CN201410736271.3A CN201410736271A CN104378385B CN 104378385 B CN104378385 B CN 104378385B CN 201410736271 A CN201410736271 A CN 201410736271A CN 104378385 B CN104378385 B CN 104378385B
Authority
CN
China
Prior art keywords
registration
information
log
message
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410736271.3A
Other languages
Chinese (zh)
Other versions
CN104378385A (en
Inventor
欧阳韵雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Software Application Technology Guangzhou GZIS of CAS
Original Assignee
Institute of Software Application Technology Guangzhou GZIS of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Software Application Technology Guangzhou GZIS of CAS filed Critical Institute of Software Application Technology Guangzhou GZIS of CAS
Priority to CN201410736271.3A priority Critical patent/CN104378385B/en
Publication of CN104378385A publication Critical patent/CN104378385A/en
Application granted granted Critical
Publication of CN104378385B publication Critical patent/CN104378385B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

This application discloses a kind of auth method and device, method is:Registered in advance in generalized information management system by user, obtain number of registration, and userspersonal information corresponding with the number of registration is managed in generalized information management system, while the number of registration also needs to be bound with the mobile APP of user side.On this basis, if third party software system detects that user inputs number of registration in enrollment page, then log-on message request is sent to total management system, userspersonal information corresponding with the number of registration is inquired about to trigger generalized information management system, and the personal information is sent to the mobile APP bound with the number of registration, third party software system is fed back to by the latter, completes registration process.The whole process of the application, it is only necessary to which user inputs a number of registration, you can complete whole registration processes, operation is simpler, and will not relate to the problem of login password is cracked.

Description

A kind of auth method and device
Technical field
The application is related to identity validation technology field, more specifically to a kind of auth method and device.
Background technology
At present, the identity information of software systems is generally registered in a manner of enrollment form is filled in, according to different software The needs of system, user need to input different log-on messages, such as the pet name, sex, occupation etc..Generally, registration needs to spend The expense family substantial amounts of time, very big inconvenience is brought to user.Also, in follow-up login process, user needs frequently defeated The information such as access customer name, password, these information are very easy to by hack, cause the information peace such as userspersonal information's leakage Entirely.
The content of the invention
In view of this, this application provides a kind of auth method and device, for solving existing software systems registration And login process is, it is necessary to frequently enter the information such as user name, password, so as to cause complex operation, the problem of security is low.
To achieve these goals, it is proposed that scheme it is as follows:
A kind of auth method, including:
The number of registration of user's input is received, the number of registration is the registration that generalized information management system is registered user's distribution Number, the number of registration and corresponding userspersonal information, and the number of registration and user are stored with generalized information management system The mobile APP bindings of side;
If the number of registration of user's input is the number of registration inputted on enrollment page, to the generalized information management system Log-on message request is sent, userspersonal information corresponding with the number of registration is inquired about to trigger generalized information management system, and The personal information is sent to the number of registration and bound on mobile APP;
The log-on message of the mobile APP feedbacks is received, completes registration process.
Preferably, in addition to:
If the number of registration of user's input is the number of registration inputted on login page, to the generalized information management system Log-on message request is sent, is read with triggering generalized information management system in userspersonal information corresponding with the number of registration The log-on message asks asked log-on message;
The logon information of the generalized information management system feedback is received, completes login process, the generalized information management The logon information that the log-on message of system feedback is asked by the log-on message.
A kind of authentication means, including:
Number of registration receiving unit, for receiving the number of registration of user's input, the number of registration is generalized information management system For the number of registration of registered user's distribution, the number of registration and corresponding individual subscriber letter are stored with generalized information management system Breath, and the number of registration and the mobile APP of user side are bound;
Log-on message request unit, for it is determined that the number of registration of user's input is the number of registration that is inputted on enrollment page When, log-on message request is sent to the generalized information management system, to trigger generalized information management system inquiry and the note Userspersonal information corresponding to volume number, and the personal information is sent to the mobile APP bound with the number of registration;
Log-on message receiving unit, for receiving the log-on message of the mobile APP feedbacks, complete registration process.
Preferably, in addition to:
Log-on message request unit, for it is determined that the number of registration of user's input is the number of registration that is inputted on login page When, to the generalized information management system send log-on message request, with trigger generalized information management system with the registration The log-on message is read in userspersonal information corresponding to number and asks asked log-on message;
Logon information receiving unit, for receiving the logon information of the generalized information management system feedback, complete to log in Process, the logon information that the log-on message that the generalized information management system feeds back is asked by the log-on message.
A kind of auth method, including:
The log-on message request that third party software system is sent is received, the log-on message request includes registration information And the number of registration that user inputs in the enrollment page of third party software system;
Read the registration information in userspersonal information corresponding with the number of registration, and by the registration request Information is issued with the mobile APP of number of registration binding, carrying out secrecy to the registration information with the mobile APP of triggering and testing Card, feeds back to third party software system after being verified by the registration information.
Preferably, the registration information not over it is secure authenticated when, this method also includes:
Prompt the user whether to agree to the registration information feeding back to third party software system by mobile APP, and connecing After the response message for receiving user, corresponding operation is performed, the response message includes agreeing to or disagreeing.
Preferably, in addition to:
The log-on message request that third party software system is sent is received, the log-on message request includes landing request information And the number of registration that user inputs in the login page of third party software system;
The landing request information is read in userspersonal information corresponding with the number of registration;
The third party software system is judged whether in the white list to prestore, if so, then by the landing request information The third party software system is fed back to, if it is not, the mobile APP with number of registration binding is then called, to prompt user to carry out Manual authorisation, and after the manual authorisation information of user is received, feed back the landing request information.
A kind of authentication means, including:
Registration request receiving unit, for receiving the log-on message request of third party software system transmission, the registration letter Breath request includes the number of registration that registration information and user input in the enrollment page of third party software system;
Registration information reading unit, for reading the note in userspersonal information corresponding with the number of registration Volume solicited message, and the registration information is issued on the mobile APP bound with the number of registration, it is mobile APP pairs with triggering The registration information progress is secure authenticated, and the registration information is fed back into third party software system after being verified System.
Preferably, if the registration information is not over secure authenticated, prompt the user whether to agree to by mobile APP The registration information is fed back into third party software system, and after the response message of user is received, performs corresponding grasp Make, the response message includes agreeing to or disagreeing.
Preferably, in addition to:
Logging request receiving unit, it is described to log in letter for receiving the log-on message request of third party software system transmission Breath request includes the number of registration that landing request information and user input in the login page of third party software system;
Landing request information reading unit, for being stepped on described in the reading in userspersonal information corresponding with the number of registration Record solicited message;
White list judging unit, for judging the third party software system whether in the white list to prestore, if so, then The landing request information is fed back into the third party software system, if it is not, then calling the movement with number of registration binding APP, to prompt user to carry out manual authorisation, and after the manual authorisation information of user is received, feed back the logging request letter Breath.
It can be seen from the above technical scheme that the auth method that the embodiment of the present application provides, is existed in advance by user Generalized information management system is registered, and obtains number of registration, and management is corresponding with the number of registration in generalized information management system Userspersonal information, while the number of registration also needs to be bound with the mobile APP of user side, on this basis, third party If software systems detect that user inputs number of registration in enrollment page, log-on message request is sent to total management system, with Trigger generalized information management system and inquire about corresponding with number of registration userspersonal information, and by the personal information send to With on the mobile APP of number of registration binding, being handled by mobile APP the personal information, and it is soft to feed back to third party Part system, complete registration process.The whole process of the application, it is only necessary to which user inputs a number of registration, you can completes whole Registration process, operation is simpler, and will not relate to the problem of login password is cracked.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this The embodiment of application, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 is a kind of auth method flow chart disclosed in the embodiment of the present application;
Fig. 2 is another auth method flow chart disclosed in the embodiment of the present application;
Fig. 3 is a kind of authentication means structural representation disclosed in the embodiment of the present application;
Fig. 4 is another auth method flow chart disclosed in the embodiment of the present application;
Fig. 5 is another authentication means structural representation disclosed in the embodiment of the present application.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present application, the technical scheme in the embodiment of the present application is carried out clear, complete Site preparation describes, it is clear that described embodiment is only some embodiments of the present application, rather than whole embodiments.It is based on Embodiment in the application, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of the application protection.
The embodiment of the present application discloses a kind of auth method, and it is based on generalized information management system and mobile APP (Application, using).User is registered in generalized information management system, and a number of registration can be assigned to after success. User can manage personal information corresponding with the number of registration of oneself in generalized information management system.Such as individual is repaiied Change, increase or delete.
Meanwhile user side also needs to set a mobile APP, and mobile APP is mutually bound with number of registration.
The auth method that any a third party software system can use the application to provide is registered and stepped on The process of record.First, we introduce lower this method from the angle of third party software system, and referring to Fig. 1, Fig. 1 is that the application is real Apply a kind of auth method flow chart disclosed in example.
As shown in figure 1, this method includes:
Step S100, the number of registration of user's input is received;
Specifically, the number of registration be generalized information management system be registered user distribution number of registration, integrated information pipe The number of registration and corresponding userspersonal information are stored with reason system, and the number of registration and the mobile APP of user side are tied up It is fixed.The personal information of user includes the pet name, name, occupation etc..Some projects need not maintain secrecy in personal information, Mou Xiexin Breath is need for confidentiality.For example, name need not maintain secrecy, and the information such as wages, identification card number may need for confidentiality.
If step S110, the number of registration of user's input is the number of registration inputted on enrollment page, to the comprehensive letter Cease management system and send log-on message request;
Specifically, asked by sending log-on message to generalized information management system, generalized information management system can be triggered System inquires about corresponding with number of registration userspersonal information, and the personal information is sent to being bound with the number of registration On mobile APP.
Mobile APP can carry out security information checking after personal information is received to each project in personal information, If the information in personal information is all the information that need not be maintained secrecy, it is soft personal information directly can be fed back into third party Part, and if some projects in personal information are default security informations, need prompt user carry out manual authorisation, in user Personal information is just fed back into third party software in the case of permission.
Step S120, the log-on message of the mobile APP feedbacks is received, completes registration process.
The auth method that the embodiment of the present application provides, is registered in generalized information management system in advance by user, Number of registration is obtained, and userspersonal information corresponding with the number of registration is managed in generalized information management system, while the registration Number also need to be bound with the mobile APP of user side, on this basis, if third party software system detects that user is registering The page input number of registration, then to total management system send log-on message request, with trigger generalized information management system inquiry with Userspersonal information corresponding to the number of registration, and the personal information is sent to the mobile APP bound with the number of registration On, the personal information is handled by mobile APP, and third party software system is fed back to, complete registration process.The application Whole process, it is only necessary to user inputs a number of registration, you can completes whole registration processes, operation is simpler, and not The problem of login password is cracked can be related to.
Further, if the number of registration of user's input is inputted on the enrollment page of third party software system, and It is the number of registration inputted on login page.Then shown in Figure 2, this method can also include:
If step S200, the number of registration of user's input is the number of registration inputted on login page, to the comprehensive letter Cease management system and send log-on message request;
Specifically, asked by sending log-on message to generalized information management system, generalized information management system can be triggered System reads the log-on message in userspersonal information corresponding with the number of registration and asks asked log-on message.
Step S210, the logon information of the generalized information management system feedback is received, completes login process.
Specifically, the log-on message of the generalized information management system feedback is stepped on by what the log-on message was asked Land information.
It is to be understood that above-mentioned steps S200- steps S210 process, an only example.Above-mentioned synthesis Information management system is after reading the log-on message and asking asked log-on message, it can be determined that current third party software Whether system is in default white list, if it is, log-on message can directly be fed back;If it is not, then it can enter The mobile APP of one step, user is prompted to click on login manually by mobile APP, and after the manual click for receiving user logs in, Log-on message is fed back into third party software system.
In the embodiment of the present application, when logging in, user only needs to input number of registration, without inputting login name, password etc. Information, simple to operate and security are higher.
Below to the embodiment of the present application provide authentication means be described, authentication means described below with Above-described auth method can be mutually to should refer to.
Referring to Fig. 3, Fig. 3 is a kind of authentication means structural representation disclosed in the embodiment of the present application.
As shown in figure 3, the device includes:
Number of registration receiving unit 31, for receiving the number of registration of user's input, the number of registration is generalized information management system Unite as the number of registration of registered user's distribution, the number of registration and corresponding individual subscriber letter are stored with generalized information management system Breath, and the number of registration and the mobile APP of user side are bound;
Log-on message request unit 32, for it is determined that the number of registration of user's input is the registration that is inputted on enrollment page Number when, to the generalized information management system send log-on message request, with trigger generalized information management system inquiry with it is described Userspersonal information corresponding to number of registration, and the personal information is sent to the mobile APP bound with the number of registration;
Log-on message receiving unit 33, for receiving the log-on message of the mobile APP feedbacks, complete registration process.
Further alternative, above-mentioned authentication means can also include:
Log-on message request unit, for it is determined that the number of registration of user's input is the number of registration that is inputted on login page When, to the generalized information management system send log-on message request, with trigger generalized information management system with the registration The log-on message is read in userspersonal information corresponding to number and asks asked log-on message;
Logon information receiving unit, for receiving the logon information of the generalized information management system feedback, complete to log in Process, the logon information that the log-on message that the generalized information management system feeds back is asked by the log-on message.
The scheme of the application, either registration process or login process, user is all only needed to input a number of registration i.e. Can.Operate simpler, and will not relate to the problem of login password is cracked.
Next, we are situated between from the angle of generalized information management system side to the auth method of the application Continue, referring to Fig. 4, Fig. 4 is another auth method flow chart disclosed in the embodiment of the present application.
As shown in figure 4, this method includes:
Step S400, the log-on message request that third party software system is sent is received;
Specifically, the log-on message request includes the registration of registration information and user in third party software system The number of registration of page input.
Step S410, the registration information is read in userspersonal information corresponding with the number of registration, and will The registration information is issued on the mobile APP bound with the number of registration, with the mobile APP of triggering to the registration information Carry out secure authenticated, the registration information is fed back into third party software system after being verified.
Specifically, the registration information of reading is issued mobile APP by generalized information management system, by mobile APP to note Volume solicited message carries out secure authenticated.If registration information passed through it is secure authenticated, can be by mobile APP by registration request Feedback of the information gives third party software system.
It is further alternative, if the registration information prompts the user to be not over secure authenticated, by mobile APP The registration information is fed back to third party software system by no agreement, and after the response message of user is received, execution pair The operation answered, the response message include agreeing to or disagreeing.
Further, the above method can also include:
A, the log-on message request that third party software system is sent is received, the log-on message request includes logging request letter The number of registration that breath and user input in the login page of third party software system;
B, the landing request information is read in userspersonal information corresponding with the number of registration;
C, the third party software system is judged whether in the white list to prestore, if so, then believing the logging request Breath feeds back to the third party software system, if it is not, the mobile APP with number of registration binding is then called, to prompt user to enter Row manual authorisation, and after the manual authorisation information of user is received, feed back the landing request information.
Specifically, if some third party software system is in default white list, login can be directly authorized, such as Some third party software system of fruit is then needed by user's manual authorisation not in default white list.
The scheme of the application, generalized information management system are receiving the registration request of third party software system transmission and stepped on After record request, personal information corresponding with number of registration is inquired about, and under the conditions of certain predetermined, the personal information found is fed back Give third party software system.Whole process user need not input third party software system registry information needed one by one and log in institute Information is needed, therefore operation is simpler, and will not relate to the problem of login password is cracked.
Below to the embodiment of the present application provide authentication means be described, authentication means described below with Above-described auth method can be mutually to should refer to.
Referring to Fig. 5, Fig. 5 is another authentication means structural representation disclosed in the embodiment of the present application.
As shown in figure 5, it includes:
Registration request receiving unit 51, for receiving the log-on message request of third party software system transmission, the registration Information request includes the number of registration that registration information and user input in the enrollment page of third party software system;
Registration information reading unit 52, described in being read in userspersonal information corresponding with the number of registration Registration information, and the registration information is issued on the mobile APP bound with the number of registration, to trigger mobile APP It is secure authenticated to registration information progress, the registration information is fed back into third party software after being verified System.
Wherein, if the registration information is not over secure authenticated, prompting the user whether to agree to by mobile APP will The registration information feeds back to third party software system, and after the response message of user is received, performs corresponding operation, The response message includes agreeing to or disagreeing.
Optionally, above-mentioned authentication means can also include:
Logging request receiving unit, it is described to log in letter for receiving the log-on message request of third party software system transmission Breath request includes the number of registration that landing request information and user input in the login page of third party software system;
Landing request information reading unit, for being stepped on described in the reading in userspersonal information corresponding with the number of registration Record solicited message;
White list judging unit, for judging the third party software system whether in the white list to prestore, if so, then The landing request information is fed back into the third party software system, if it is not, then calling the movement with number of registration binding APP, to prompt user to carry out manual authorisation, and after the manual authorisation information of user is received, feed back the logging request letter Breath.
The authentication means provided according to the embodiment of the present application, the mistake registered and logged on third party software Journey, all do not need user to input log-on message and log-on message one by one, and need only to input a number of registration, therefore grasp Make simpler, and will not relate to the problem of login password is cracked.
Finally, it is to be noted that, herein, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between any this actual relation or order be present.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that process, method, article or equipment including a series of elements not only include that A little key elements, but also the other element including being not expressly set out, or also include for this process, method, article or The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged Except other identical element in the process including the key element, method, article or equipment being also present.
Each embodiment is described by the way of progressive in this specification, what each embodiment stressed be and other The difference of embodiment, between each embodiment identical similar portion mutually referring to.
The foregoing description of the disclosed embodiments, professional and technical personnel in the field are enable to realize or using the application. A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein General Principle can be realized in other embodiments in the case where not departing from spirit herein or scope.Therefore, the application The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one The most wide scope caused.

Claims (10)

  1. A kind of 1. auth method, it is characterised in that including:
    The number of registration of user's input is received, the number of registration is the number of registration that generalized information management system is registered user's distribution, It is stored with the number of registration and corresponding userspersonal information in generalized information management system, and the number of registration and user side Mobile APP bindings;
    If the number of registration of user's input is the number of registration inputted on enrollment page, sent to the generalized information management system Log-on message is asked, and corresponding with number of registration userspersonal information is inquired about to trigger generalized information management system, and by institute Userspersonal information is stated to send to the mobile APP bound with the number of registration;
    The log-on message of the mobile APP feedbacks is received, completes registration process.
  2. 2. auth method according to claim 1, it is characterised in that also include:
    If the number of registration of user's input is the number of registration inputted on login page, sent to the generalized information management system Log-on message is asked, read with to trigger generalized information management system in userspersonal information corresponding with the number of registration described in Log-on message asks asked log-on message;
    The logon information of the generalized information management system feedback is received, completes login process, the generalized information management system The logon information that the log-on message of feedback is asked by the log-on message.
  3. A kind of 3. authentication means, it is characterised in that including:
    Number of registration receiving unit, for receiving the number of registration of user's input, the number of registration is that generalized information management system is note The number of registration of volume user's distribution, is stored with the number of registration and corresponding userspersonal information in generalized information management system, and The number of registration and the mobile APP of user side are bound;
    Log-on message request unit, for it is determined that user input number of registration be in the number of registration inputted on enrollment page when, Log-on message request is sent to the generalized information management system, to trigger generalized information management system inquiry and the number of registration Corresponding userspersonal information, and the userspersonal information is sent to the mobile APP bound with the number of registration;
    Log-on message receiving unit, for receiving the log-on message of the mobile APP feedbacks, complete registration process.
  4. 4. authentication means according to claim 3, it is characterised in that also include:
    Log-on message request unit, for it is determined that user input number of registration be in the number of registration inputted on login page when, To the generalized information management system send log-on message request, with trigger generalized information management system with the number of registration pair The log-on message is read in the userspersonal information answered and asks asked log-on message;
    Logon information receiving unit, for receiving the logon information of the generalized information management system feedback, login process is completed, The logon information that the log-on message of the generalized information management system feedback is asked by the log-on message.
  5. A kind of 5. auth method, it is characterised in that including:
    Receive the log-on message request that third party software system is sent, the log-on message request include registration information and The number of registration that user inputs in the enrollment page of third party software system;
    Read the registration information in userspersonal information corresponding with the number of registration, and by the registration information Issue on the mobile APP bound with the number of registration, it is secure authenticated to registration information progress with the mobile APP of triggering, The registration information is fed back into third party software system after being verified.
  6. 6. auth method according to claim 5, it is characterised in that in the registration information not over guarantor During close checking, this method also includes:
    Prompt the user whether to agree to the registration information feeding back to third party software system by mobile APP, and receiving After the response message of user, corresponding operation is performed, the response message includes agreeing to or disagreeing.
  7. 7. auth method according to claim 5, it is characterised in that also include:
    The log-on message request that third party software system is sent is received, the log-on message request includes landing request information and use The number of registration that family inputs in the login page of third party software system;
    The landing request information is read in userspersonal information corresponding with the number of registration;
    The third party software system is judged whether in the white list to prestore, if so, then feeding back the landing request information To the third party software system, if it is not, the mobile APP with number of registration binding is then called, it is manual to prompt user to carry out Authorize, and after the manual authorisation information of user is received, feed back the landing request information.
  8. A kind of 8. authentication means, it is characterised in that including:
    Registration request receiving unit, for receiving the log-on message request of third party software system transmission, the log-on message please Seek the number of registration inputted including registration information and user in the enrollment page of third party software system;
    Registration information reading unit, please for reading the registration in userspersonal information corresponding with the number of registration Information is sought, and the registration information is issued on the mobile APP bound with the number of registration, with the mobile APP of triggering to described Registration information progress is secure authenticated, and the registration information is fed back into third party software system after being verified.
  9. 9. authentication means according to claim 8, it is characterised in that if the registration information is not over guarantor Close checking, then prompt the user whether to agree to the registration information feeding back to third party software system by mobile APP, and connecing After the response message for receiving user, corresponding operation is performed, the response message includes agreeing to or disagreeing.
  10. 10. authentication means according to claim 8, it is characterised in that also include:
    Logging request receiving unit, for receiving the log-on message request of third party software system transmission, the log-on message please Seek the number of registration inputted including landing request information and user in the login page of third party software system;
    Landing request information reading unit, please for reading the login in userspersonal information corresponding with the number of registration Seek information;
    White list judging unit, for judging the third party software system whether in the white list to prestore, if so, then by institute State landing request information and feed back to the third party software system, if it is not, the mobile APP with number of registration binding is then called, To prompt user to carry out manual authorisation, and after the manual authorisation information of user is received, feed back the landing request information.
CN201410736271.3A 2014-12-05 2014-12-05 A kind of auth method and device Active CN104378385B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410736271.3A CN104378385B (en) 2014-12-05 2014-12-05 A kind of auth method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410736271.3A CN104378385B (en) 2014-12-05 2014-12-05 A kind of auth method and device

Publications (2)

Publication Number Publication Date
CN104378385A CN104378385A (en) 2015-02-25
CN104378385B true CN104378385B (en) 2018-02-16

Family

ID=52557041

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410736271.3A Active CN104378385B (en) 2014-12-05 2014-12-05 A kind of auth method and device

Country Status (1)

Country Link
CN (1) CN104378385B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104767620A (en) * 2015-04-13 2015-07-08 苏州阔地网络科技有限公司 Identity information management method and device
CN106251722A (en) * 2016-10-11 2016-12-21 南京萌宝睿贝心理咨询有限公司 The intelligence of a kind of child of promotion intelligence and personality development smokes teaching system and smoked religion method
CN107682359B (en) * 2017-10-31 2020-06-26 维沃移动通信有限公司 Application registration method and mobile terminal
CN110602023A (en) * 2018-06-12 2019-12-20 中国移动通信有限公司研究院 Personal information safety control method, device and computer readable storage medium
CN110891040A (en) * 2018-09-07 2020-03-17 上海金荣翔企业发展有限公司 Information sending and receiving method and system based on Internet and packaging body
CN109981598A (en) * 2019-03-04 2019-07-05 成都小步创想慧联科技有限公司 Convenient processing method, device and the electronic equipment of personal information

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002269272A (en) * 2001-03-13 2002-09-20 Nippon Telegr & Teleph Corp <Ntt> Authentication substitution method and apparatus, authentication substitution program and record medium recording the program
CN1514394A (en) * 2002-12-31 2004-07-21 �Ҵ���˾ Method and system for executing register medium and resetting priority level operation in united environment
JP2004302907A (en) * 2003-03-31 2004-10-28 Fuji Xerox Co Ltd Network device and authentication server
KR20090046407A (en) * 2007-11-06 2009-05-11 한국전자통신연구원 Method and system for serving single sign on
CN101694663A (en) * 2009-10-20 2010-04-14 上海欧菲司健康管理咨询有限公司 System for one-station registering, logging and all-web authentication
CN102624728A (en) * 2012-03-09 2012-08-01 浙江大学城市学院 Method and system for carrying out whole-network login authentication by utilizing registered website user information
CN103595697A (en) * 2012-08-16 2014-02-19 上海凌攀信息科技有限公司 Single sign-on method on mobile equipment
CN103716333A (en) * 2014-01-10 2014-04-09 北京飞流九天科技有限公司 Method, terminal, server and system for managing application accounts
CN104065621A (en) * 2013-03-21 2014-09-24 腾讯科技(深圳)有限公司 Identify verification method for third-party service, client and system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002269272A (en) * 2001-03-13 2002-09-20 Nippon Telegr & Teleph Corp <Ntt> Authentication substitution method and apparatus, authentication substitution program and record medium recording the program
CN1514394A (en) * 2002-12-31 2004-07-21 �Ҵ���˾ Method and system for executing register medium and resetting priority level operation in united environment
JP2004302907A (en) * 2003-03-31 2004-10-28 Fuji Xerox Co Ltd Network device and authentication server
KR20090046407A (en) * 2007-11-06 2009-05-11 한국전자통신연구원 Method and system for serving single sign on
CN101694663A (en) * 2009-10-20 2010-04-14 上海欧菲司健康管理咨询有限公司 System for one-station registering, logging and all-web authentication
CN102624728A (en) * 2012-03-09 2012-08-01 浙江大学城市学院 Method and system for carrying out whole-network login authentication by utilizing registered website user information
CN103595697A (en) * 2012-08-16 2014-02-19 上海凌攀信息科技有限公司 Single sign-on method on mobile equipment
CN104065621A (en) * 2013-03-21 2014-09-24 腾讯科技(深圳)有限公司 Identify verification method for third-party service, client and system
CN103716333A (en) * 2014-01-10 2014-04-09 北京飞流九天科技有限公司 Method, terminal, server and system for managing application accounts

Also Published As

Publication number Publication date
CN104378385A (en) 2015-02-25

Similar Documents

Publication Publication Date Title
CN104378385B (en) A kind of auth method and device
CN108200050B (en) Single sign-on server, method and computer readable storage medium
US8151328B1 (en) Accessing secure network areas by utilizing mobile-device authentication
US9767265B2 (en) Authentication with parental control functionality
US8904494B2 (en) System and method to facilitate compliance with COPPA for website registration
US8898749B2 (en) Method and system for generating one-time passwords
US20180295120A1 (en) Session-limited, manually-entered user authentication information
US20160028735A1 (en) Private analytics with controlled information disclosure
CN103581166A (en) Location aware authentication
CN107645486A (en) Login authentication method and device
CN109101795A (en) A kind of account number safe login method, apparatus and system
US20220078614A1 (en) Customer Communication System
CN105450658B (en) A kind of system login method and device
CN104320392A (en) Unified user authentication method
KR20130032736A (en) Authenticating method using user&#39;s telephone terminal and authenticating system thereof
CN110365684A (en) Access control method, device and the electronic equipment of application cluster
CN106161475A (en) The implementation method of subscription authentication and device
CN105763565A (en) Account login method and apparatus, and game system
CN113326488A (en) Personal information protection system and method
US11323434B1 (en) System and method for secure two factor authentication
WO2015136728A1 (en) Authentication information management system, authentication information management device, program, recording medium, and authentication information management method
CN111200601A (en) Method and system for butting user and application based on universal transit service
CN107645726A (en) A kind of method and system for mobile terminal user identity certification
CN105812314B (en) A kind of user logs in the method and unification authentication platform of internet application
CN105847218B (en) A kind of method, business platform and system controlling user right

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant