CN104579649B - Personal identification method and system - Google Patents
Personal identification method and system Download PDFInfo
- Publication number
- CN104579649B CN104579649B CN201310516818.4A CN201310516818A CN104579649B CN 104579649 B CN104579649 B CN 104579649B CN 201310516818 A CN201310516818 A CN 201310516818A CN 104579649 B CN104579649 B CN 104579649B
- Authority
- CN
- China
- Prior art keywords
- code
- dynamic
- identification code
- terminal
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Abstract
The present invention provides a kind of personal identification methods, which comprises terminal obtains the first identification code corresponding with user identifier prestored;The terminal generates the first dynamic password according to first identification code, and the user identifier and the first dynamic password are sent to server;The server obtains the second identification code corresponding with the user identifier prestored;The server generates the second dynamic password according to second identification code, judges whether the first dynamic password matches with the second dynamic password, if being then verified.Using this method, security risk can be reduced in identification process at one's side, improve safety.In addition, additionally providing a kind of identification system.
Description
Technical field
The present invention relates to fields of communication technology, more particularly to a kind of personal identification method and system.
Background technique
It requires to identify user identity under many application scenarios in internet.Traditional personal identification method
Usually by way of inputting password, specifically, being verified according to the password received to user identity, if Password Input
Correctly, then it is verified.However, password is once known by other people in traditional this personal identification method, then safety can be brought
Hidden danger, therefore safety is not high.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of higher personal identification method of safety and system.
A kind of personal identification method, which comprises
Terminal obtains the first identification code corresponding with user identifier prestored;
The terminal generates the first dynamic password according to first identification code, by the user identifier and the first dynamic mouth
Order is sent to server;
The server obtains the second identification code corresponding with the user identifier prestored;
The server generates the second dynamic password according to second identification code, judges that the first dynamic password and second moves
Whether state password matches, if being then verified.
A kind of identification system, the system comprises terminal and server, the terminal includes:
First identification code obtains module, for obtaining the first identification code corresponding with user identifier prestored;
First dynamic password generation module, for generating the first dynamic password according to first identification code, by the use
Family mark and the first dynamic password are sent to the server;
The server includes:
Second identification code obtains module, for obtaining the second identification code corresponding with the user identifier prestored;
Second dynamic password generation module, for generating the second dynamic password according to second identification code;
First authentication module, for judging whether the first dynamic password matches with the second dynamic password, if then verifying is logical
It crosses.
In above-mentioned personal identification method and system, terminal is getting pre-stored first knowledge corresponding with user identifier
After other code, the first dynamic password is generated according to the first identification code, server the second identification code according to the pre-stored data generates second
Dynamic password, and then judge whether the first dynamic password matches with the second dynamic password, if being then verified, therefore, as long as
There is the identification code got in advance from server in terminal, just can be carried out authentication, relative to traditional technology, is not necessarily to user
Any input reduces the possibility that data are tampered, to improve safety.
Detailed description of the invention
Fig. 1 is the flow diagram of personal identification method in one embodiment;
Fig. 2 is the flow diagram verified in one embodiment to user identity;
Fig. 3 is the flow diagram verified in another embodiment to user identity;
Fig. 4 is the flow diagram verified in further embodiment to user identity;
Fig. 5 is the flow diagram verified in another embodiment to user identity;
Fig. 6 is the flow diagram of personal identification method in another embodiment;
Fig. 7 is the structural block diagram of identification system in one embodiment;
Fig. 8 is the structural block diagram of server in one embodiment;
Fig. 9 is the structural block diagram of identification system in another embodiment;
Figure 10 is the structural block diagram of terminal in one embodiment;
Figure 11 is the structural block diagram of server in another embodiment.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
The description of specific distinct unless the context otherwise, the present invention in element and component, the shape that quantity both can be single
Formula exists, and form that can also be multiple exists, and the present invention is defined not to this.Although step in the present invention with label into
It has gone arrangement, but is not used to limit the precedence of step, unless expressly stated the order of step or holding for certain step
Based on row needs other steps, otherwise the relative rank of step is adjustable.It is appreciated that used herein
Term "and/or" one of is related to and covers associated listed item or one or more of any and all possible groups
It closes.
As shown in Figure 1, in one embodiment, a kind of personal identification method is provided, this method comprises:
Step 102, terminal obtains the first identification code corresponding with user identifier prestored.
Terminal in the present invention is that can run the terminal devices of various applications, including but not limited to various desktop computers,
Pocket computer on knee, personal digital assistant, tablet computer, smart phone, E-book reader, MP3(Moving
Picture Experts Group Audio Layer III, dynamic image expert's compression standard audio level 3) or MP4
(Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard audio level 4) is broadcast
Put device, POS terminal and vehicle-mounted computer etc..Using terminal requires to identify the identity of user under many application scenarios.
In the present invention, it is illustrated with the payment of terminal to server requests transaction, it is to be understood that, the invention is not limited to
This, can also identify user identity under the relatively high application scenarios of other pairs of security requirements, for example, needing to visit
It asks under the application scenarios of the private information of user, is inferior in the application scenarios to confirm an order.
The first identification code corresponding with user identifier is previously stored in the present embodiment, in terminal.User identifier is for only
One identity user can be account number or identification number etc. for logging in application.First identification code is that terminal is used to generate first
The identification code of dynamic password, for example, be the first dynamic password to one group of character string is obtained after the progress operation of the first identification code, or
It is second that first identification code is combined and obtains one group of character string after operation together with terminal or the relevant multidate information of user by person
Dynamic password, or operation obtains the second dynamic password together to obtained one group of character string and combination device data to be processed,
Etc..Identification code can be generated by server, and terminal obtains identification code from server and is stored in local, then store the knowledge of terminal
Other code is the first identification code.First identification code can be generated according to user identifier, specifically, terminal hair can be got by server
Then the user identifier sent generates one group of character string according to user identifier, this group of character string is the first identification code, in addition,
When generating the first identification code, also character can be generated together with terminal or the relevant information of user in conjunction with other according to user identifier
String.
Step 104, terminal generates the first dynamic password according to the first identification code, and user identifier and the first dynamic password are sent out
It send to server.
First dynamic password is the character string for realizing authentication, and so-called dynamic password is according to special algorithm
A uncertain random digit combination is generated, dynamic password is used only once every time.
Step 106, server obtains the second identification code corresponding with user identifier prestored.
In the present embodiment, the first identification code refers to the identification code of storage in the terminal, and the second identification code, which refers to, is stored in clothes
The identification code being engaged in device.First identification code herein and the second identification code are different according to the position of identification code storage and area
Point, the content possibility of the first identification code and the second identification code is identical may also be different.Second identification code be server previously according to
User identifier that terminal is sent and the identification code that generates, the identification code can be transmitted to after terminal and terminal local is stored in, then claim
For the first identification code stored in terminal, if identification code is not tampered in transmission process and storing process, the first identification
The content of code and the second identification code is answered identical.
Step 108, server generates the second dynamic password according to the second identification code, and judges the first dynamic password and second
Whether dynamic password matches, if being then verified.
First dynamic password and the second dynamic password herein is that the position that is generated according to dynamic password is different and distinguish,
The content of first dynamic password and the second dynamic password possibility is identical may also be different.Specifically, in the present embodiment, server with
Terminal can arrange to generate the algorithm of dynamic password, be generated with the scheduled algorithm of terminal according to the second identification code so that server is used
Second dynamic password further judges whether the first dynamic password and the second dynamic password match, if it does, then authentication
Pass through, otherwise verifies and do not pass through.In a preferred embodiment, the mode that character string detection can be used detects the first dynamic mouth
It enables and whether the second dynamic password is identical, if they are the same, then authentication passes through, and otherwise verifies and does not pass through.Due to server and end
End is respectively generated according to local identification code according to the algorithm of agreement, if the first identification code is identical with the second identification code,
Then the first dynamic password and the second dynamic password are also answered identical.
In the present embodiment, since the first dynamic password is generated according to the first identification code of storage in the terminal, second
Dynamic password is to be generated according to the second identification code of storage in the server, and the first identification code is that terminal is obtained from server
The identification code arrived, as long as the identification code that server is generated according to user identifier is in the process for being sent to terminal and in terminal storage
It is not tampered in the process, then terminal can carry out authentication according to the identification code being locally stored.Entire verification process is not necessarily to
Any input operation of user, reduces the possibility that data are tampered, to improve safety.
Below with different embodiments come be set forth under the application scenarios that need to identify user identity how to user identity into
Row verifying.
As shown in Fig. 2, in one embodiment, the method that a kind of pair of user identity is verified, comprising:
Step 202, terminal obtains the first identification code corresponding with user identifier prestored.
Step 204, terminal generates the time according to dynamic code and the first identification code generates the first dynamic code.
In the present embodiment, before step 202, terminal can obtain dynamic code from server and generate the time, and dynamic code generates
Time can be server server current time in the data processing request for receiving pending data, wherein to be processed
Data can be terminal data to be treated under various application scenarios, for example, order data, payment data and user it is privately owned
Information etc..Due to dynamic code generate the time be it is variable, terminal the first dynamic code generated is uncertain so that
Dynamic code is not easy to be trapped or distort, to further improve safety.
Step 206, user identifier and the first dynamic code are sent to server by terminal.
Step 208, server obtains the second identification code corresponding with user identifier prestored.
The identification code of second identification code generation when being terminal to server request identification code, the identification code are gone back after generating
Terminal is returned to be stored.Therefore, if the first identification code stored in terminal is not tampered with, the first identification code and second
Identification code is answered identical.
Step 210, server generates the time according to dynamic code and the second identification code generates the second dynamic code.
It is appreciated that the first dynamic code is the first dynamic password in the present embodiment, the second dynamic code is the second dynamic
Password.Since server generates time and the second identification code the second dynamic code of generation according to dynamic code, if the first identification
Code is identical with the second identification code, then the first dynamic code and the second dynamic code are also identical.
Step 212, server judges whether the first dynamic code and the second dynamic code match, if so, being verified, otherwise
Verifying does not pass through.
Specifically, whether server to detect the first dynamic code in such a way that character string detects identical as the second dynamic code, such as
Fruit is identical, then authentication passes through, and otherwise verifies and does not pass through.
In the present embodiment, subscriber authentication is can be completed according to the identification code prestored in terminal, and entire verification process is not necessarily to
Any input of user, and dynamic password can generate time dynamically changeable according to dynamic code, therefore reduce security risk, improve peace
Quan Xing, and can bring great advantage to the user, improve the efficiency of identification.
In another embodiment, as shown in figure 3, the method that a kind of pair of user identity is verified, comprising:
Step 302, terminal obtains the first identification code corresponding with user identifier prestored.
Step 304, terminal generates the time according to dynamic code and the first identification code generates the first dynamic code, according to number to be processed
According to the first signed data for generating pending data with the first dynamic code.
Pending data can be terminal data to be treated under various application scenarios, such as order data, payment number
According to the private information etc. with user.In one embodiment, terminal obtains pending data, using digest algorithm to number to be processed
Abstract operation is carried out according to the first dynamic code, so that the first signed data (or being summary data) of pending data is generated,
The signed data is using the first dynamic code as the data after the abstract of pending data.
It should be noted that terminal carries out digest algorithm used by abstract operation to pending data and the first dynamic code, packet
Include but be not limited to various CRC(Cyclic Redundancy Check, cyclic redundancy check) algorithm, MD algorithm (Message-
Digest Algorithm, Message Digest 5) (such as MD4 algorithm, MD5 algorithm) and SHA(Secure Hash Algorithm,
It is the algorithm specified by standards body-USA National Institute of Standard and Technology of U.S.'s tailor cryptographic algorithm) etc., the present invention
It is defined not to this.
Step 306, user identifier, pending data and the first signed data are sent to server by terminal.
Step 308, server obtains the second identification code corresponding with user identifier prestored.
Step 310, server generates time and the second identification code according to dynamic code and generates the second dynamic code, according to receiving
Pending data and the second dynamic code generate pending data the second signed data.
First signed data and the second signed data herein is distinguished according to the position that signed data generates,
The content of first signed data and the second signed data possibility is identical may also be different.It is understood that in the present embodiment, the
One signed data is the first dynamic password, and the second signed data is the second dynamic password.Server can arrange with server
The algorithm of signed data is generated, server is after generating the second dynamic code, then the use algorithm arranged with terminal is to receiving
Pending data and the second dynamic code carry out abstract operation, to generate the second signed data of pending data.Due to service
Device and terminal are respectively to generate dynamic code according to local identification code according to the algorithm of agreement, and then generate and sign according to dynamic code
Data, if the first identification code is identical with the second identification code, the first signed data and the second signed data are also answered identical.
Step 312, server judges whether the first signed data and the second signed data match, if so, be verified,
Otherwise it verifies and does not pass through.
Specifically, server detected in such a way that character string detects the first signed data and the second signed data whether phase
Together, if it is identical, it is verified, otherwise verifies and do not pass through.In the present embodiment, server is when carrying out authentication, not
It is simply to judge whether the first dynamic code and the second dynamic code are identical, but terminal is further according to pending data and first
Dynamic code generates the first signed data of pending data, and server is when carrying out authentication, can basis receive to
Handle data and generate the second dynamic code generate pending data the first signed data, thus judge the first signed data with
Whether the second signed data is identical, since the signed data of pending data is obtained by a series of operation, and is
Dynamically changeable at any time, therefore a possibility that being tampered, is very low, so as to further increasing safety.Also, it is entire
Authentication process itself is not necessarily to any input of user, can reduce security risk but also improve the efficiency of identification.
In one embodiment, as shown in figure 4, the method that a kind of pair of user identity is verified, comprising:
Step 402, terminal obtains the first identification code corresponding with user identifier prestored.
Step 404, terminal obtains terminal iidentification corresponding with user identifier and facility information, according to user identifier, terminal
At least one of mark and facility information, dynamic code generate the time and the first identification code generates the first dynamic code.
Terminal iidentification is used to one terminal of unique identification, and terminal iidentification can be for by device id and device mac address
The character string that generates together of at least one and privately owned keyword.In one embodiment, terminal device id and can will be set
Standby MAC Address is sent to server, at least one of server by utilizing device id and device mac address, in conjunction with privately owned
Keyword generates character string together, for example, can be the character string of 32 bytes, which is terminal iidentification, end generated
End mark can correspond to user identifier storage in the server and be sent to terminal and correspond to user identifier and be stored.Therefore, eventually
End can obtain terminal iidentification corresponding with user identifier from local or server.
Facility information includes but is not limited to device id, device mac address, equipment platform, device model, operating system
At least one of facility information may be selected when generating the first dynamic code to participate in operation in type and root authority information etc..
Facility information and user identifier can be sent to together server by terminal, correspond to user identifier storage equipment letter on the server
Breath.Therefore, terminal can obtain facility information corresponding with user identifier from local or server.
Step 406, user identifier and the first dynamic code are sent to server by terminal.
Step 408, server obtains the second identification code corresponding with user identifier prestored.
Step 410, server obtains terminal iidentification corresponding with user identifier and facility information, according to user identifier, end
At least one of end mark and facility information, dynamic code generate the time and the second identification code generates the second dynamic code.
It is appreciated that server generates in user identifier, terminal iidentification and the facility information that the second dynamic code is utilized
At least one at least one of user identifier, terminal iidentification and facility information utilized with terminal the first dynamic code of generation is answered
It is identical.For example, terminal generates the time according to user identifier, terminal iidentification and device model, dynamic code and the first identification code generates
First dynamic code, then correspondingly, server generate time and the according to user identifier, terminal iidentification and device model, dynamic code
Two identification codes generate the second dynamic code.Server and terminal have arranged to generate the algorithm of dynamic code, thus server can be used with
The algorithm of terminal agreement generates the second dynamic code.
Step 412, server judges whether the first dynamic code matches with the second dynamic code, if being then verified, otherwise
Verifying does not pass through.
Specifically, whether server to detect the first dynamic code in such a way that character string detects identical as the second dynamic code, such as
Fruit is identical, then authentication passes through, and otherwise verifies and does not pass through.In the present embodiment, terminal according to user identifier, terminal iidentification, set
At least one of standby information, dynamic code generate the time and the first identification code generates the first dynamic code, and these information are all usurped
A possibility that changing is lower, therefore, can further increase safety.Also, whole process is not necessarily to any input of user, can drop
Lower security hidden danger can improve the efficiency of identification again, bring great convenience to user.
In another embodiment, as shown in figure 5, the method that a kind of pair of user identity is verified, comprising:
Step 502, terminal obtains the first identification code corresponding with user identifier prestored.
Step 504, terminal obtains terminal iidentification corresponding with user identifier and facility information, according to user identifier, terminal
At least one of mark and facility information, dynamic code generate the time and the first identification code generates the first dynamic code, according to wait locate
It manages data and the first dynamic code generates the first signed data of pending data.
In the present embodiment, terminal can be used a variety of digest algorithms as described above to the first dynamic code and pending data into
Row abstract operation, to obtain the first signed data of pending data.
Step 506, user identifier, pending data and the first signed data are sent to server by terminal.
Step 508, server obtains the second identification code corresponding with user identifier prestored.
Step 510, server obtains terminal iidentification corresponding with user identifier and facility information, according to user identifier, end
End mark and at least one of facility information, dynamic code generate the time and the second identification code generates the second dynamic code, according to the
Two dynamic codes and the pending data received generate the second signed data of pending data.
In the present embodiment, server and terminal can engagement arithmetic, after server generates the second dynamic code, then use and terminal
The algorithm of agreement carries out abstract operation to the pending data received and the second dynamic code, to generate the of pending data
Two signed datas.
Step 512, server judges whether the first signed data and the second signed data match, if so, be verified,
Otherwise it verifies and does not pass through.
Specifically, server detected in such a way that character string detects the first signed data and the second signed data whether phase
Together, if it is identical, it is verified, otherwise verifies and do not pass through.In the present embodiment, server is when carrying out authentication, not
It is simply to judge whether the first dynamic code and the second dynamic code are identical, but terminal is further according to pending data and first
Dynamic code generates the first signed data of pending data, and server is when carrying out authentication, can basis receive to
Handle data and generate the second dynamic code generate pending data the first signed data, thus judge the first signed data with
Whether the second signed data is identical, since the signed data of pending data is obtained by a series of operation, and is
Dynamically changeable at any time, therefore a possibility that being tampered, is very low.In addition, terminal is according to user identifier, terminal iidentification, equipment
At least one of information, dynamic code generate the time and the first identification code generates the first dynamic code, and these information are all tampered
A possibility that it is lower, so as to further increase safety.Also, entire identification procedure is without any input behaviour of user
Make, security risk can be reduced but also improve the efficiency of identification, therefore safety can be improved but also improve convenience.
In one embodiment, before the step of server generates the second dynamic password according to the second identification code, identity
Recognition methods may also include that the dynamic code that server receiving terminal is sent generates the time, and generating time judgement according to dynamic code is
No time-out executes the step of generating the second dynamic password according to the second identification code if be not timed-out;Wherein, terminal is sent
Dynamic code generate the time be to be obtained from server.
In the present embodiment, terminal sends the data processing request of pending data to server, and server receives at data
The dynamic code generation time is returned into terminal after reason request.The dynamic code generation time can receive data processing request for server
When the server current time.Dynamic code, which generates the dynamic password (the first dynamic password) that the time generates terminal, has timeliness
Property.
It further, also together will dynamic while user identifier and the first dynamic password are sent to server by terminal
The code generation time is sent to server, and server receives dynamic code and generates the time, obtains the time of server at this time and receives
Dynamic code generate the time difference between the time, judge whether the time difference exceeds preset overtime number of seconds, if it was exceeded, saying
Bright to have timed out, server shows the calcellation of the second dynamic password without subsequent processing.In this way, sending data for terminal
It is more than that the first dynamic password submitted to server certain time carries out calcellation processing after processing request, terminal can be effectively prevent
The situation for not submitting the first dynamic password after transmission data processing request for a long time, further improves safety.
In one embodiment, as shown in fig. 6, providing another personal identification method, comprising:
Step 602, terminal detects whether there is the first identification code corresponding with user identifier, if can't detect, into
Enter step 604, otherwise enters step 608.
Specifically, terminal need to first obtain store in terminal and user identifier when needing to carry out identification to user
Corresponding first identification code, before obtaining the first identification code, terminal need to be detected whether there are the first identification code, if detection is not
It arrives, shows that terminal is not applied to identification code, then enter step the process of the subsequent application identification code of 604 execution.
In one embodiment, if terminal generates the first dynamic code and terminal iidentification is utilized, terminal is needed in step 602
Further detect whether that terminal iidentification corresponding with user identifier can be got, specifically, on terminal detection service device whether
Terminal iidentification corresponding with user identifier is stored, if so, obtaining terminal iidentification corresponding with user identifier and carrying out subsequent
Otherwise process enters step 604.
Step 604, terminal to server sends checking request, carries user identifier in the checking request.
Step 606, server carries out authentication according to checking request, raw according to user identifier after authentication passes through
At identification code.
In one embodiment, terminal can prompt user to input password, and the password of input and user identifier are sent together
Authentication is carried out to server.In another embodiment, terminal can also prompt user to input mobile communication number progress short
Short message verification code and user identifier are sent to service specifically, terminal receives the short message verification code of user's input by letter verifying
Device, server receive short message verification code, verify whether previous existence therewith at short message verification code it is identical, if they are the same, then by testing
Card.
Further, server generates identification code according to user identifier after authentication passes through.Since user identifier has
There is uniqueness, therefore the identification code generated also has uniqueness.Identification code can be corresponded to user identifier and stored by server.?
In one embodiment, server is generated according to user identifier after identification code, further includes: and terminal obtains identification code from server,
And corresponding user identifier is stored.In this way, convenient for subsequent terminal obtain storage identification code corresponding with user identifier to
Realize identification, which is the first identification code.
In one embodiment, the step of server generates identification code according to user identifier, comprising: server obtains application
Mark generates identification code according to application identities and user identifier.In the present embodiment, application can be to be used to generate in terminal operating
The application of pending data, application identities can be the title of application or be identification number etc. using predistribution.Server root
Identification code is generated according to user identifier and application identities, the complexity of identification code is increased, reduces the possibility that identification code is tampered
Property, further improve safety.
In one embodiment, after authentication, further includes: the facility information that server receiving terminal is sent, root
Terminal iidentification is generated according to facility information, by terminal iidentification and the corresponding storage of user identifier.
In the present embodiment, terminal obtains facility information, and facility information is sent to server.Facility information includes but not
It is limited to device id, device mac address, equipment platform, device model, OS Type and root authority information etc..Clothes
Business device receives the facility information of terminal transmission, generates terminal iidentification according to facility information.Specifically, server can selected equipment
At least one of information generates terminal iidentification in conjunction with privately owned keyword jointly.For example, server can be according in facility information
Device id and device mac address cooperatively generate terminal iidentification in conjunction with privately owned keyword, which can be 32 words
The character string of section, therefore terminal iidentification generated has uniqueness, can be used for one terminal device of unique identification.Further
, server can store the terminal iidentification of generation and user identifier correspondence.In this way, terminal is generating the first dynamic code
When, terminal iidentification corresponding with user identifier can be obtained from server.
Further, in one embodiment, the step of server generates identification code according to user identifier, comprising: service
Device obtains application identities, generates identification code according to application identities, user identifier and terminal iidentification;Or server is marked according to user
Know and terminal iidentification generates identification code.In the present embodiment, server can be generated according to application identities, user identifier and terminal iidentification
Identification code, or identification code is generated according to user identifier and terminal iidentification, the complexity of identification code is increased, identification code is reduced
A possibility that being tampered further improves safety.
Further, in one embodiment, it after the step of server generates identification code according to user identifier, also wraps
Include: server as key, carries out at least one of user identifier, terminal iidentification and facility information at encryption to identification code
Reason.
In the present embodiment, at least one of server by utilizing user identifier, terminal iidentification and facility information come to identification
Code is encrypted, and then server corresponds to user identifier and stores encrypted identification code.And the identification that terminal is obtained from server
Code is also encrypted identification code, and encrypted identification code is corresponded to user identifier and is stored.When terminal needs to utilize knowledge
When other code generates dynamic password, then to the identification code for obtaining storage, and believe accordingly with user identifier, terminal iidentification and equipment
At least one of breath is decrypted encrypted identification code.Due to having carried out encryption to identification code, and it is utilized
At least one of user identifier, terminal iidentification and facility information are used as key, further reduce what identification code was tampered
May, therefore safety can be further increased.
Step 608, terminal obtains the first identification code corresponding with user identifier prestored, carries out body according to the first identification code
Part verifying.
If a terminal detects that identification code corresponding with user identifier has been locally stored, then terminal obtains the identification code, and
Subsequent subscriber authentication process is carried out, specific subscriber authentication process is as described in the various embodiments described above, herein
It repeats no more.After subscriber authentication passes through, then server process pending data, for example, completing transaction payment etc..
In the present embodiment, when terminal can't detect the identification code of storage, then to server application identification code, convenient for subsequent
Identity code can be carried out using the identification code of storage.It is subsequent need to generate dynamic password when, terminal and server respectively obtains
It is derived from the identification code of body storage to generate dynamic password, and then whether the dynamic password by judging each self-generating is identical carries out
Authentication, a possibility that being tampered due to identification code and dynamic password, are all minimum, reduce security risk, and terminal is logical
The identification code for crossing storage realizes identification automatically, is not necessarily to any input of user, therefore can improve safety but also improve body
The efficiency of part identification.
As shown in fig. 7, in one embodiment, additionally providing a kind of identification system, which includes client 720
With server 740, wherein client 720 includes:
First identification code obtains module 722, for obtaining the first identification code corresponding with user identifier prestored.
First dynamic password generation module 724, for generating the first dynamic password according to the first identification code, by user identifier
Server 740 is sent to the first dynamic password.
Server 740 includes:
Second identification code obtains module 742, for obtaining the second identification code corresponding with user identifier prestored.
Second dynamic password generation module 744, for generating the second dynamic password according to the second identification code.
First authentication module 746, for judging whether the first dynamic password and the second dynamic password match, if then verifying
Pass through.
Specifically, the first authentication module 746 is used for judging whether the first dynamic password and the second dynamic password are identical, if
It is identical, then it is verified, otherwise verifies and do not pass through.
In one embodiment, the first dynamic password generation module 724 is used to generate time and the first knowledge according to dynamic code
Other code generates the first dynamic code;Second dynamic password generation module 744 is used to generate time and the second identification code according to dynamic code
Generate the second dynamic code;First authentication module 746 is for judging whether the first dynamic code and the second dynamic code match, if then testing
Card passes through.
In another embodiment, the first dynamic password generation module 724 is used to generate the time and first according to dynamic code
Identification code generates the first dynamic code, and the first signed data of pending data is generated according to pending data and the first dynamic code;
Second dynamic password generation module 744 is used to receive the pending data and the first signed data of the transmission of terminal 720, according to dynamic
Code generates time and the second identification code and generates the second dynamic code, according to the pending data received and the second dynamic code generate to
Handle the second signed data of data;First authentication module 746 is for judging whether are the first signed data and the second signed data
Matching, if being then verified.
In one embodiment, the first dynamic password generation module 724 is for obtaining terminal mark corresponding with user identifier
Knowledge and facility information generate the time and first according at least one of user identifier, terminal iidentification and facility information, dynamic code
Identification code generates the first dynamic code;Second dynamic password generation module 744 is for obtaining terminal iidentification corresponding with user identifier
And facility information, time and the second knowledge are generated according at least one of user identifier, terminal iidentification and facility information, dynamic code
Other code generates the second dynamic code;First authentication module 746 for judging whether the first dynamic code and the second dynamic code match, if
Then it is verified.
In another embodiment, the first dynamic password generation module 724 is for obtaining terminal corresponding with user identifier
Mark and facility information generate time and the according at least one of user identifier, terminal iidentification and facility information, dynamic code
One identification code generates the first dynamic code, and the first number of signature of pending data is generated according to pending data and the first dynamic code
According to;Second dynamic password generation module 744 is used to receive the pending data and the first signed data of the transmission of terminal 720, obtains
Terminal iidentification corresponding with user identifier and facility information, according at least one in user identifier, terminal iidentification and facility information
Kind, dynamic code generate the time and the second identification code generates the second dynamic code;According to the second dynamic code and the number to be processed received
According to the second signed data for generating pending data;First authentication module 746 is for judging the first signed data and the second signature
Whether data match, if being then verified.
In one embodiment, as shown in figure 8, server 740 further include: overtime judgment module 741, for receiving terminal
720 dynamic codes sent generate the time, judge whether time-out according to the dynamic code generation time, if it times out, notifying that second is dynamic
State command generation module 744 generates the second dynamic password;Wherein, the dynamic code generation time that terminal 720 is sent is from server
740 acquisitions.
In one embodiment, as shown in figure 9, terminal 720 further include: Detecting of Data Identification Code module 721, for detecting terminal
720 whether there is the first identification code corresponding with user identifier, if can't detect, send checking request to server 740,
The checking request carries user identifier.In the present embodiment, server 740 further include: the second authentication module 745 is tested for basis
Card request carries out authentication;Identification code generation module 747 is identified for being generated after authentication passes through according to user identifier
Code.
Further, in one embodiment, identification code generation module 747 is marked for obtaining application identities according to application
Know and user identifier generates identification code.
Further, in one embodiment, as shown in Figure 10, terminal 720 further include: identification code memory module 726 is used
In the identification code for obtaining generation from server, and corresponding user identifier is stored.
In one embodiment, as shown in figure 11, server 740 further include:
Terminal iidentification generation module 748 generates eventually for receiving the facility information of the transmission of terminal 720 according to facility information
End mark, by terminal iidentification and the corresponding storage of user identifier.
Further, identification code generation module 747 is for obtaining application identities, according to application identities, user identifier and end
End mark generates identification code;Or identification code generation module 747 is also used to generate identification code according to user identifier and terminal iidentification.
Further, server 740 further include: encrypting module 749, for user identifier, terminal iidentification and equipment to be believed
At least one of breath is used as key, and the identification code of generation is encrypted.In the present embodiment, encrypted identification code hair
It send to terminal 720 and is stored.When terminal 720 needs to obtain the identification code that is locally stored to carry out identification, then to obtaining
The identification code got is decrypted first at least one of user identifier, terminal iidentification and facility information, then further according to
Identification code after decryption generates dynamic password.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, described program can be stored in computer-readable storage medium,
Such as the program can be stored in the storage medium of computer system, and be held by least one processor in the computer system
Row includes the process such as the embodiment of above-mentioned each method with realization.Wherein, the storage medium can for magnetic disk, CD, read-only deposit
Store up memory body (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously
Limitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art
For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention
Protect range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.
Claims (18)
1. a kind of personal identification method, which comprises
Terminal detects whether there is the first identification code corresponding with user identifier, if can't detect, tests to server transmission
Card request, the checking request carry the user identifier;The server carries out authentication according to the checking request,
Authentication pass through after according to the user identifier generate identification code;The terminal obtains the identification code from the server,
And the identification code is stored, form the first identification code;
Terminal obtains the first identification code corresponding with user identifier prestored;
The terminal generates time and first identification code according to dynamic code and generates the first dynamic code, by the user identifier and
First dynamic code is sent to server;
The server obtains the second identification code corresponding with the user identifier prestored, and second identification code is the clothes
The identification code that business device is generated previously according to the user identifier that terminal is sent;
The server, which is used, generates time and second identification code generation according to the dynamic code with the scheduled algorithm of terminal
Second dynamic code;The server judges whether first dynamic code and the second dynamic code match, if being then verified,
In, the dynamic code generate the time be server server in the data processing request for receiving pending data it is current when
Between, the pending data is terminal data to be treated under various application scenarios.
2. the method according to claim 1, wherein the terminal generates the time and described first according to dynamic code
Identification code generates the step of the first dynamic code, further includes: the terminal generates time and first identification code according to dynamic code
The first dynamic code is generated, the first number of signature of the pending data is generated according to pending data and first dynamic code
According to;
The server, which is used, generates time and second identification code generation according to the dynamic code with the scheduled algorithm of terminal
Second dynamic code;The server judges whether first dynamic code and the second dynamic code match, if be then verified
Step, further includes:
The pending data and the first signed data that the server receiving terminal is sent, according to the dynamic code generate the time and
Second identification code generates the second dynamic code, is generated according to the pending data received and second dynamic code to be processed
Second signed data of data;
The server judges whether first signed data and the second signed data match, if being then verified.
3. the method according to claim 1, wherein the terminal generates the time and described first according to dynamic code
Identification code generates the step of the first dynamic code, further includes:
The terminal obtains terminal iidentification corresponding with user identifier and facility information, according to the user identifier, terminal iidentification
The time is generated at least one of facility information, dynamic code and first identification code generates the first dynamic code;
The server, which is used, generates time and second identification code generation according to the dynamic code with the scheduled algorithm of terminal
Second dynamic code;The server judges whether first dynamic code and the second dynamic code match, if be then verified
Step, further includes:
The server obtains terminal iidentification corresponding with the user identifier and facility information, according to the user identifier, end
At least one of end mark and facility information, the dynamic code generate the time and second identification code generates the second dynamic
Code;
The server judges whether first dynamic code matches with the second dynamic code, if being then verified.
4. the method according to claim 1, wherein the terminal generates the time and described first according to dynamic code
Identification code generates the step of the first dynamic code, further includes: the terminal obtains terminal iidentification corresponding with user identifier and equipment
Information generates the time and described first according at least one of the user identifier, terminal iidentification and facility information, dynamic code
Identification code generates the first dynamic code, and the first label of the pending data are generated according to pending data and first dynamic code
Name data;
The server, which is used, generates time and second identification code generation according to the dynamic code with the scheduled algorithm of terminal
Second dynamic code;The server judges whether first dynamic code and the second dynamic code match, if be then verified
Step, further includes:
The pending data and the first signed data that the server receiving terminal is sent;
The server obtains terminal iidentification corresponding with the user identifier and facility information, according to the user identifier, end
At least one of end mark and facility information, the dynamic code generate the time and second identification code generates the second dynamic
Code;
The second signed data of the pending data is generated according to second dynamic code and the pending data received;
The server judges whether first signed data and the second signed data match, if so, being verified.
5. method according to any one of claims 1 to 4, which is characterized in that used in the server predetermined with terminal
Algorithm the step of time and second identification code generate the second dynamic code is generated according to the dynamic code before, further includes:
The server receives the dynamic code that the terminal is sent and generates the time, is judged whether according to the dynamic code generation time
Time-out executes described dynamic according to dynamic code generation time and second identification code generation second if be not timed-out
The step of state code;
Wherein, the dynamic code generation time that the terminal is sent is obtained from the server.
6. the method according to claim 1, wherein described the step of generating identification code according to user identifier, packet
It includes:
The server obtains application identities, generates the identification code according to the application identities and user identifier.
7. the method according to claim 1, wherein after the authentication passes through further include:
The server receives the facility information that the terminal is sent, and generates terminal iidentification according to the facility information, will be described
Terminal iidentification and the corresponding storage of the user identifier.
8. the method according to the description of claim 7 is characterized in that the step for generating the identification code according to user identifier
Suddenly, comprising:
The server obtains application identities, generates the identification code according to the application identities, user identifier and terminal iidentification;
Or
The server generates the identification code according to user identifier and terminal iidentification.
9. method according to claim 7 or 8, which is characterized in that generate the identification code according to user identifier described
The step of after, further includes:
The server regard at least one of the user identifier, terminal iidentification and facility information as key, to the knowledge
Other code is encrypted.
10. a kind of identification system, which is characterized in that the system comprises terminal and server, the terminal includes:
Detecting of Data Identification Code module, for detecting terminal with the presence or absence of the first identification code corresponding with user identifier, if detection is not
It arrives, then sends checking request to the server, the checking request carries the user identifier;
Identification code memory module for obtaining the identification code from the server, and stores the identification code, is formed
First identification code;
First identification code obtains module, for obtaining the first identification code corresponding with user identifier prestored;
First dynamic password generation module, for generating the first dynamic of time and first identification code generation according to dynamic code
Code, is sent to the server for the user identifier and first dynamic code;
The server includes:
Second authentication module, for carrying out authentication according to the checking request;
Identification code generation module, for generating identification code according to the user identifier after the authentication passes through;
Second identification code obtains module, for obtaining the second knowledge described in the second identification code corresponding with the user identifier prestored
Other code is the identification code that the server is generated previously according to the user identifier that terminal is sent;
Second dynamic password generation module, for generating time and described according to the dynamic code using with the scheduled algorithm of terminal
Second identification code generates the second dynamic code, wherein the dynamic code generation time is that server is receiving pending data
Server current time when data processing request, the pending data are that terminal is to be treated under various application scenarios
Data;
First authentication module, for judging whether first dynamic code and the second dynamic code match, if being then verified.
11. system according to claim 10, which is characterized in that the first dynamic password generation module is also used to basis
Dynamic code generates the time and first identification code generates the first dynamic code, raw according to pending data and first dynamic code
At the first signed data of the pending data;
The second dynamic password generation module is also used to receive the pending data and the first signed data of terminal transmission, according to
The dynamic code generates the time and second identification code generates the second dynamic code, according to the pending data that receives and described
Second signed data of the second dynamic code generation pending data;
First authentication module is also used to judge whether first signed data and the second signed data match, if then testing
Card passes through.
12. system according to claim 10, which is characterized in that the first dynamic password generation module is also used to obtain
Terminal iidentification corresponding with user identifier and facility information, according in the user identifier, terminal iidentification and facility information extremely
A kind of few, dynamic code generates the time and first identification code generates the first dynamic code;
The second dynamic password generation module is also used to obtain terminal iidentification corresponding with the user identifier and facility information,
The time and described second is generated according at least one of the user identifier, terminal iidentification and facility information, the dynamic code
Identification code generates the second dynamic code;
First authentication module is also used to judge whether first dynamic code matches with the second dynamic code, if then verifying is logical
It crosses.
13. system according to claim 10, which is characterized in that the first dynamic password generation module is also used to obtain
Terminal iidentification corresponding with user identifier and facility information, according in the user identifier, terminal iidentification and facility information extremely
A kind of few, dynamic code generates the time and first identification code generates the first dynamic code, according to pending data and described first
Dynamic code generates the first signed data of the pending data;
The second dynamic password generation module is also used to receive the pending data and the first signed data of terminal transmission, obtains
Terminal iidentification corresponding with the user identifier and facility information, according in the user identifier, terminal iidentification and facility information
At least one, described dynamic code generate time and second identification code and generate the second dynamic code;According to second dynamic
Code and the pending data received generate the second signed data of the pending data;
First authentication module is also used to judge whether first signed data and the second signed data match, if so,
It is verified.
14. system according to any one of claims 10 to 13, which is characterized in that the server further include:
Overtime judgment module generates the time for receiving the dynamic code that the terminal is sent, generates the time according to the dynamic code
Judge whether time-out, if be not timed-out, when the second dynamic password generation module being notified to generate according to the dynamic code
Between and second identification code generate the second dynamic code;
Wherein, the dynamic code generation time that the terminal is sent obtains from the server.
15. system according to claim 10, which is characterized in that the identification code generation module is also used to obtain using mark
Know, generates the identification code according to the application identities and user identifier.
16. system according to claim 10, which is characterized in that the server further include:
Terminal iidentification generation module, the facility information sent for receiving the terminal generate terminal according to the facility information
Mark, by the terminal iidentification and the corresponding storage of the user identifier.
17. system according to claim 10, which is characterized in that the identification code generation module is also used to obtain using mark
Know, the identification code is generated according to the application identities, user identifier and terminal iidentification;Or the identification code generation module is also
For generating the identification code according to user identifier and terminal iidentification.
18. system according to claim 16 or 17, which is characterized in that the server further include:
Encrypting module, for regarding at least one of the user identifier, terminal iidentification and facility information as key, to described
Identification code is encrypted.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310516818.4A CN104579649B (en) | 2013-10-28 | 2013-10-28 | Personal identification method and system |
PCT/CN2014/089627 WO2015062461A1 (en) | 2013-10-28 | 2014-10-28 | Method and system for verifying user identity of an online application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310516818.4A CN104579649B (en) | 2013-10-28 | 2013-10-28 | Personal identification method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104579649A CN104579649A (en) | 2015-04-29 |
CN104579649B true CN104579649B (en) | 2019-01-11 |
Family
ID=53003335
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310516818.4A Active CN104579649B (en) | 2013-10-28 | 2013-10-28 | Personal identification method and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104579649B (en) |
WO (1) | WO2015062461A1 (en) |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105049209B (en) * | 2015-06-16 | 2018-10-23 | 中国银行股份有限公司 | Dynamic password formation method and device |
CN105072080B (en) * | 2015-07-01 | 2018-04-13 | 广州密码科技有限公司 | A kind of Information Authentication method, apparatus and system |
CN105631667A (en) * | 2015-08-05 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Authentication method, device and system |
CN105916143A (en) * | 2015-12-15 | 2016-08-31 | 乐视致新电子科技(天津)有限公司 | Vehicle remote authentication method based on dynamic password and vehicle remote authentication system thereof |
CN105515781B (en) * | 2016-01-19 | 2018-09-14 | 上海众人网络安全技术有限公司 | A kind of application platform login system and its login method |
CN107181714B (en) * | 2016-03-09 | 2021-01-26 | 创新先进技术有限公司 | Verification method and device based on service code and generation method and device of service code |
CN105827620B (en) * | 2016-04-25 | 2019-04-02 | 上海众人网络安全技术有限公司 | A kind of data transmission system and its method |
CN105827621A (en) * | 2016-04-25 | 2016-08-03 | 上海众人网络安全技术有限公司 | Internet-based reservation platform login system and login method thereof |
CN106330458B (en) * | 2016-08-23 | 2019-05-14 | 宇龙计算机通信科技(深圳)有限公司 | A kind of processing method and processing device of identifying code |
CN108156195B (en) * | 2016-12-02 | 2021-08-20 | 中科星图股份有限公司 | Service data checking method and system |
CN108933765B (en) * | 2017-05-26 | 2021-11-09 | 武汉斗鱼网络科技有限公司 | Method, client and server for improving equipment ID security |
CN108933766B (en) * | 2017-05-26 | 2021-11-09 | 武汉斗鱼网络科技有限公司 | Method and client for improving equipment ID security |
CN109218009B (en) * | 2017-06-30 | 2021-11-09 | 武汉斗鱼网络科技有限公司 | Method, client and server for improving equipment ID security |
CN107948973B (en) * | 2017-11-01 | 2020-10-13 | 中国移动通信集团江苏有限公司 | Equipment fingerprint generation method applied to IOS (input/output system) for security risk control |
CN108566279A (en) * | 2018-03-19 | 2018-09-21 | 深圳市敢为特种设备物联网技术有限公司 | Synchronous dynamic two dimension code generation method, equipment and system, storage medium |
CN109547217B (en) * | 2019-01-11 | 2021-10-22 | 北京中实信达科技有限公司 | One-to-many identity authentication system and method based on dynamic password |
CN109951293B (en) * | 2019-02-20 | 2023-12-05 | 深圳市朗石科学仪器有限公司 | Water quality monitoring terminal user verification method and system and water quality monitoring Internet of things terminal system |
CN113037682A (en) * | 2019-12-09 | 2021-06-25 | 西安诺瓦星云科技股份有限公司 | Encrypted communication method, encrypted communication device, and encrypted communication system |
CN113516812A (en) * | 2021-06-01 | 2021-10-19 | 深圳市巨鼎医疗股份有限公司 | Remote control method, device, equipment and storage medium for medical self-service terminal |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101060403A (en) * | 2006-04-18 | 2007-10-24 | 钟曦辰 | Wireless communication terminal-based interactive dynamic password safety service system |
CN101163014A (en) * | 2007-11-30 | 2008-04-16 | 中国电信股份有限公司 | Dynamic password identification authenticating system and method |
CN102457491A (en) * | 2010-10-20 | 2012-05-16 | 北京大学 | Dynamic identity authenticating method and system |
US8256664B1 (en) * | 2010-04-09 | 2012-09-04 | Google Inc. | Out-of band authentication of browser sessions |
CN103124266A (en) * | 2013-02-07 | 2013-05-29 | 百度在线网络技术(北京)有限公司 | Mobile terminal, method and system for logging in through mobile terminal and cloud server |
CN103368918A (en) * | 2012-04-01 | 2013-10-23 | 西门子公司 | Method, device and system for dynamic password authentication |
-
2013
- 2013-10-28 CN CN201310516818.4A patent/CN104579649B/en active Active
-
2014
- 2014-10-28 WO PCT/CN2014/089627 patent/WO2015062461A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101060403A (en) * | 2006-04-18 | 2007-10-24 | 钟曦辰 | Wireless communication terminal-based interactive dynamic password safety service system |
CN101163014A (en) * | 2007-11-30 | 2008-04-16 | 中国电信股份有限公司 | Dynamic password identification authenticating system and method |
US8256664B1 (en) * | 2010-04-09 | 2012-09-04 | Google Inc. | Out-of band authentication of browser sessions |
CN102457491A (en) * | 2010-10-20 | 2012-05-16 | 北京大学 | Dynamic identity authenticating method and system |
CN103368918A (en) * | 2012-04-01 | 2013-10-23 | 西门子公司 | Method, device and system for dynamic password authentication |
CN103124266A (en) * | 2013-02-07 | 2013-05-29 | 百度在线网络技术(北京)有限公司 | Mobile terminal, method and system for logging in through mobile terminal and cloud server |
Also Published As
Publication number | Publication date |
---|---|
WO2015062461A1 (en) | 2015-05-07 |
CN104579649A (en) | 2015-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104579649B (en) | Personal identification method and system | |
CN109951489B (en) | Digital identity authentication method, equipment, device, system and storage medium | |
JP6882254B2 (en) | Safety verification methods based on biological characteristics, client terminals, and servers | |
CN102271042B (en) | Certificate authorization method, system, universal serial bus (USB) Key equipment and server | |
US20190165947A1 (en) | Signatures for near field communications | |
CN109327457A (en) | A kind of internet of things equipment identity identifying method and system based on block chain | |
CN107294900A (en) | Identity registration method and apparatus based on biological characteristic | |
CN107209821A (en) | For the method and authentication method being digitally signed to e-file | |
CN101577917A (en) | Safe dynamic password authentication method based on mobile phone | |
CN108965222A (en) | Identity identifying method, system and computer readable storage medium | |
CN108989346A (en) | The effective identity trustship agility of third party based on account concealment authenticates access module | |
CN107231331A (en) | Obtain, issue the implementation method and device of electronic certificate | |
EP3206329B1 (en) | Security check method, device, terminal and server | |
CN101964789A (en) | Method and system for safely accessing protected resources | |
JP2015088080A (en) | Authentication system, authentication method, and program | |
CN106209793A (en) | A kind of auth method and checking system | |
CN104935548B (en) | Auth method, apparatus and system based on intelligent equipment of tatooing | |
CN101222334B (en) | Cipher token safety authentication method adopting picture interference | |
CN111445231A (en) | Method and device for realizing MOTOpay and electronic equipment | |
CN102571341B (en) | A kind of Verification System based on dynamic image and authentication method | |
Wong et al. | An enhanced user authentication solution for mobile payment systems using wearables | |
CN109145543B (en) | Identity authentication method | |
CN106533685B (en) | Identity authentication method, device and system | |
CN108667767A (en) | A kind of account password storage protection method | |
Gu et al. | Toauth: Towards automatic near field authentication for smartphones |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |