CN104579649B - Personal identification method and system - Google Patents

Personal identification method and system Download PDF

Info

Publication number
CN104579649B
CN104579649B CN201310516818.4A CN201310516818A CN104579649B CN 104579649 B CN104579649 B CN 104579649B CN 201310516818 A CN201310516818 A CN 201310516818A CN 104579649 B CN104579649 B CN 104579649B
Authority
CN
China
Prior art keywords
code
dynamic
identification code
terminal
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310516818.4A
Other languages
Chinese (zh)
Other versions
CN104579649A (en
Inventor
张育淼
宋智刚
陈明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201310516818.4A priority Critical patent/CN104579649B/en
Priority to PCT/CN2014/089627 priority patent/WO2015062461A1/en
Publication of CN104579649A publication Critical patent/CN104579649A/en
Application granted granted Critical
Publication of CN104579649B publication Critical patent/CN104579649B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Abstract

The present invention provides a kind of personal identification methods, which comprises terminal obtains the first identification code corresponding with user identifier prestored;The terminal generates the first dynamic password according to first identification code, and the user identifier and the first dynamic password are sent to server;The server obtains the second identification code corresponding with the user identifier prestored;The server generates the second dynamic password according to second identification code, judges whether the first dynamic password matches with the second dynamic password, if being then verified.Using this method, security risk can be reduced in identification process at one's side, improve safety.In addition, additionally providing a kind of identification system.

Description

Personal identification method and system
Technical field
The present invention relates to fields of communication technology, more particularly to a kind of personal identification method and system.
Background technique
It requires to identify user identity under many application scenarios in internet.Traditional personal identification method Usually by way of inputting password, specifically, being verified according to the password received to user identity, if Password Input Correctly, then it is verified.However, password is once known by other people in traditional this personal identification method, then safety can be brought Hidden danger, therefore safety is not high.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of higher personal identification method of safety and system.
A kind of personal identification method, which comprises
Terminal obtains the first identification code corresponding with user identifier prestored;
The terminal generates the first dynamic password according to first identification code, by the user identifier and the first dynamic mouth Order is sent to server;
The server obtains the second identification code corresponding with the user identifier prestored;
The server generates the second dynamic password according to second identification code, judges that the first dynamic password and second moves Whether state password matches, if being then verified.
A kind of identification system, the system comprises terminal and server, the terminal includes:
First identification code obtains module, for obtaining the first identification code corresponding with user identifier prestored;
First dynamic password generation module, for generating the first dynamic password according to first identification code, by the use Family mark and the first dynamic password are sent to the server;
The server includes:
Second identification code obtains module, for obtaining the second identification code corresponding with the user identifier prestored;
Second dynamic password generation module, for generating the second dynamic password according to second identification code;
First authentication module, for judging whether the first dynamic password matches with the second dynamic password, if then verifying is logical It crosses.
In above-mentioned personal identification method and system, terminal is getting pre-stored first knowledge corresponding with user identifier After other code, the first dynamic password is generated according to the first identification code, server the second identification code according to the pre-stored data generates second Dynamic password, and then judge whether the first dynamic password matches with the second dynamic password, if being then verified, therefore, as long as There is the identification code got in advance from server in terminal, just can be carried out authentication, relative to traditional technology, is not necessarily to user Any input reduces the possibility that data are tampered, to improve safety.
Detailed description of the invention
Fig. 1 is the flow diagram of personal identification method in one embodiment;
Fig. 2 is the flow diagram verified in one embodiment to user identity;
Fig. 3 is the flow diagram verified in another embodiment to user identity;
Fig. 4 is the flow diagram verified in further embodiment to user identity;
Fig. 5 is the flow diagram verified in another embodiment to user identity;
Fig. 6 is the flow diagram of personal identification method in another embodiment;
Fig. 7 is the structural block diagram of identification system in one embodiment;
Fig. 8 is the structural block diagram of server in one embodiment;
Fig. 9 is the structural block diagram of identification system in another embodiment;
Figure 10 is the structural block diagram of terminal in one embodiment;
Figure 11 is the structural block diagram of server in another embodiment.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
The description of specific distinct unless the context otherwise, the present invention in element and component, the shape that quantity both can be single Formula exists, and form that can also be multiple exists, and the present invention is defined not to this.Although step in the present invention with label into It has gone arrangement, but is not used to limit the precedence of step, unless expressly stated the order of step or holding for certain step Based on row needs other steps, otherwise the relative rank of step is adjustable.It is appreciated that used herein Term "and/or" one of is related to and covers associated listed item or one or more of any and all possible groups It closes.
As shown in Figure 1, in one embodiment, a kind of personal identification method is provided, this method comprises:
Step 102, terminal obtains the first identification code corresponding with user identifier prestored.
Terminal in the present invention is that can run the terminal devices of various applications, including but not limited to various desktop computers, Pocket computer on knee, personal digital assistant, tablet computer, smart phone, E-book reader, MP3(Moving Picture Experts Group Audio Layer III, dynamic image expert's compression standard audio level 3) or MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard audio level 4) is broadcast Put device, POS terminal and vehicle-mounted computer etc..Using terminal requires to identify the identity of user under many application scenarios. In the present invention, it is illustrated with the payment of terminal to server requests transaction, it is to be understood that, the invention is not limited to This, can also identify user identity under the relatively high application scenarios of other pairs of security requirements, for example, needing to visit It asks under the application scenarios of the private information of user, is inferior in the application scenarios to confirm an order.
The first identification code corresponding with user identifier is previously stored in the present embodiment, in terminal.User identifier is for only One identity user can be account number or identification number etc. for logging in application.First identification code is that terminal is used to generate first The identification code of dynamic password, for example, be the first dynamic password to one group of character string is obtained after the progress operation of the first identification code, or It is second that first identification code is combined and obtains one group of character string after operation together with terminal or the relevant multidate information of user by person Dynamic password, or operation obtains the second dynamic password together to obtained one group of character string and combination device data to be processed, Etc..Identification code can be generated by server, and terminal obtains identification code from server and is stored in local, then store the knowledge of terminal Other code is the first identification code.First identification code can be generated according to user identifier, specifically, terminal hair can be got by server Then the user identifier sent generates one group of character string according to user identifier, this group of character string is the first identification code, in addition, When generating the first identification code, also character can be generated together with terminal or the relevant information of user in conjunction with other according to user identifier String.
Step 104, terminal generates the first dynamic password according to the first identification code, and user identifier and the first dynamic password are sent out It send to server.
First dynamic password is the character string for realizing authentication, and so-called dynamic password is according to special algorithm A uncertain random digit combination is generated, dynamic password is used only once every time.
Step 106, server obtains the second identification code corresponding with user identifier prestored.
In the present embodiment, the first identification code refers to the identification code of storage in the terminal, and the second identification code, which refers to, is stored in clothes The identification code being engaged in device.First identification code herein and the second identification code are different according to the position of identification code storage and area Point, the content possibility of the first identification code and the second identification code is identical may also be different.Second identification code be server previously according to User identifier that terminal is sent and the identification code that generates, the identification code can be transmitted to after terminal and terminal local is stored in, then claim For the first identification code stored in terminal, if identification code is not tampered in transmission process and storing process, the first identification The content of code and the second identification code is answered identical.
Step 108, server generates the second dynamic password according to the second identification code, and judges the first dynamic password and second Whether dynamic password matches, if being then verified.
First dynamic password and the second dynamic password herein is that the position that is generated according to dynamic password is different and distinguish, The content of first dynamic password and the second dynamic password possibility is identical may also be different.Specifically, in the present embodiment, server with Terminal can arrange to generate the algorithm of dynamic password, be generated with the scheduled algorithm of terminal according to the second identification code so that server is used Second dynamic password further judges whether the first dynamic password and the second dynamic password match, if it does, then authentication Pass through, otherwise verifies and do not pass through.In a preferred embodiment, the mode that character string detection can be used detects the first dynamic mouth It enables and whether the second dynamic password is identical, if they are the same, then authentication passes through, and otherwise verifies and does not pass through.Due to server and end End is respectively generated according to local identification code according to the algorithm of agreement, if the first identification code is identical with the second identification code, Then the first dynamic password and the second dynamic password are also answered identical.
In the present embodiment, since the first dynamic password is generated according to the first identification code of storage in the terminal, second Dynamic password is to be generated according to the second identification code of storage in the server, and the first identification code is that terminal is obtained from server The identification code arrived, as long as the identification code that server is generated according to user identifier is in the process for being sent to terminal and in terminal storage It is not tampered in the process, then terminal can carry out authentication according to the identification code being locally stored.Entire verification process is not necessarily to Any input operation of user, reduces the possibility that data are tampered, to improve safety.
Below with different embodiments come be set forth under the application scenarios that need to identify user identity how to user identity into Row verifying.
As shown in Fig. 2, in one embodiment, the method that a kind of pair of user identity is verified, comprising:
Step 202, terminal obtains the first identification code corresponding with user identifier prestored.
Step 204, terminal generates the time according to dynamic code and the first identification code generates the first dynamic code.
In the present embodiment, before step 202, terminal can obtain dynamic code from server and generate the time, and dynamic code generates Time can be server server current time in the data processing request for receiving pending data, wherein to be processed Data can be terminal data to be treated under various application scenarios, for example, order data, payment data and user it is privately owned Information etc..Due to dynamic code generate the time be it is variable, terminal the first dynamic code generated is uncertain so that Dynamic code is not easy to be trapped or distort, to further improve safety.
Step 206, user identifier and the first dynamic code are sent to server by terminal.
Step 208, server obtains the second identification code corresponding with user identifier prestored.
The identification code of second identification code generation when being terminal to server request identification code, the identification code are gone back after generating Terminal is returned to be stored.Therefore, if the first identification code stored in terminal is not tampered with, the first identification code and second Identification code is answered identical.
Step 210, server generates the time according to dynamic code and the second identification code generates the second dynamic code.
It is appreciated that the first dynamic code is the first dynamic password in the present embodiment, the second dynamic code is the second dynamic Password.Since server generates time and the second identification code the second dynamic code of generation according to dynamic code, if the first identification Code is identical with the second identification code, then the first dynamic code and the second dynamic code are also identical.
Step 212, server judges whether the first dynamic code and the second dynamic code match, if so, being verified, otherwise Verifying does not pass through.
Specifically, whether server to detect the first dynamic code in such a way that character string detects identical as the second dynamic code, such as Fruit is identical, then authentication passes through, and otherwise verifies and does not pass through.
In the present embodiment, subscriber authentication is can be completed according to the identification code prestored in terminal, and entire verification process is not necessarily to Any input of user, and dynamic password can generate time dynamically changeable according to dynamic code, therefore reduce security risk, improve peace Quan Xing, and can bring great advantage to the user, improve the efficiency of identification.
In another embodiment, as shown in figure 3, the method that a kind of pair of user identity is verified, comprising:
Step 302, terminal obtains the first identification code corresponding with user identifier prestored.
Step 304, terminal generates the time according to dynamic code and the first identification code generates the first dynamic code, according to number to be processed According to the first signed data for generating pending data with the first dynamic code.
Pending data can be terminal data to be treated under various application scenarios, such as order data, payment number According to the private information etc. with user.In one embodiment, terminal obtains pending data, using digest algorithm to number to be processed Abstract operation is carried out according to the first dynamic code, so that the first signed data (or being summary data) of pending data is generated, The signed data is using the first dynamic code as the data after the abstract of pending data.
It should be noted that terminal carries out digest algorithm used by abstract operation to pending data and the first dynamic code, packet Include but be not limited to various CRC(Cyclic Redundancy Check, cyclic redundancy check) algorithm, MD algorithm (Message- Digest Algorithm, Message Digest 5) (such as MD4 algorithm, MD5 algorithm) and SHA(Secure Hash Algorithm, It is the algorithm specified by standards body-USA National Institute of Standard and Technology of U.S.'s tailor cryptographic algorithm) etc., the present invention It is defined not to this.
Step 306, user identifier, pending data and the first signed data are sent to server by terminal.
Step 308, server obtains the second identification code corresponding with user identifier prestored.
Step 310, server generates time and the second identification code according to dynamic code and generates the second dynamic code, according to receiving Pending data and the second dynamic code generate pending data the second signed data.
First signed data and the second signed data herein is distinguished according to the position that signed data generates, The content of first signed data and the second signed data possibility is identical may also be different.It is understood that in the present embodiment, the One signed data is the first dynamic password, and the second signed data is the second dynamic password.Server can arrange with server The algorithm of signed data is generated, server is after generating the second dynamic code, then the use algorithm arranged with terminal is to receiving Pending data and the second dynamic code carry out abstract operation, to generate the second signed data of pending data.Due to service Device and terminal are respectively to generate dynamic code according to local identification code according to the algorithm of agreement, and then generate and sign according to dynamic code Data, if the first identification code is identical with the second identification code, the first signed data and the second signed data are also answered identical.
Step 312, server judges whether the first signed data and the second signed data match, if so, be verified, Otherwise it verifies and does not pass through.
Specifically, server detected in such a way that character string detects the first signed data and the second signed data whether phase Together, if it is identical, it is verified, otherwise verifies and do not pass through.In the present embodiment, server is when carrying out authentication, not It is simply to judge whether the first dynamic code and the second dynamic code are identical, but terminal is further according to pending data and first Dynamic code generates the first signed data of pending data, and server is when carrying out authentication, can basis receive to Handle data and generate the second dynamic code generate pending data the first signed data, thus judge the first signed data with Whether the second signed data is identical, since the signed data of pending data is obtained by a series of operation, and is Dynamically changeable at any time, therefore a possibility that being tampered, is very low, so as to further increasing safety.Also, it is entire Authentication process itself is not necessarily to any input of user, can reduce security risk but also improve the efficiency of identification.
In one embodiment, as shown in figure 4, the method that a kind of pair of user identity is verified, comprising:
Step 402, terminal obtains the first identification code corresponding with user identifier prestored.
Step 404, terminal obtains terminal iidentification corresponding with user identifier and facility information, according to user identifier, terminal At least one of mark and facility information, dynamic code generate the time and the first identification code generates the first dynamic code.
Terminal iidentification is used to one terminal of unique identification, and terminal iidentification can be for by device id and device mac address The character string that generates together of at least one and privately owned keyword.In one embodiment, terminal device id and can will be set Standby MAC Address is sent to server, at least one of server by utilizing device id and device mac address, in conjunction with privately owned Keyword generates character string together, for example, can be the character string of 32 bytes, which is terminal iidentification, end generated End mark can correspond to user identifier storage in the server and be sent to terminal and correspond to user identifier and be stored.Therefore, eventually End can obtain terminal iidentification corresponding with user identifier from local or server.
Facility information includes but is not limited to device id, device mac address, equipment platform, device model, operating system At least one of facility information may be selected when generating the first dynamic code to participate in operation in type and root authority information etc.. Facility information and user identifier can be sent to together server by terminal, correspond to user identifier storage equipment letter on the server Breath.Therefore, terminal can obtain facility information corresponding with user identifier from local or server.
Step 406, user identifier and the first dynamic code are sent to server by terminal.
Step 408, server obtains the second identification code corresponding with user identifier prestored.
Step 410, server obtains terminal iidentification corresponding with user identifier and facility information, according to user identifier, end At least one of end mark and facility information, dynamic code generate the time and the second identification code generates the second dynamic code.
It is appreciated that server generates in user identifier, terminal iidentification and the facility information that the second dynamic code is utilized At least one at least one of user identifier, terminal iidentification and facility information utilized with terminal the first dynamic code of generation is answered It is identical.For example, terminal generates the time according to user identifier, terminal iidentification and device model, dynamic code and the first identification code generates First dynamic code, then correspondingly, server generate time and the according to user identifier, terminal iidentification and device model, dynamic code Two identification codes generate the second dynamic code.Server and terminal have arranged to generate the algorithm of dynamic code, thus server can be used with The algorithm of terminal agreement generates the second dynamic code.
Step 412, server judges whether the first dynamic code matches with the second dynamic code, if being then verified, otherwise Verifying does not pass through.
Specifically, whether server to detect the first dynamic code in such a way that character string detects identical as the second dynamic code, such as Fruit is identical, then authentication passes through, and otherwise verifies and does not pass through.In the present embodiment, terminal according to user identifier, terminal iidentification, set At least one of standby information, dynamic code generate the time and the first identification code generates the first dynamic code, and these information are all usurped A possibility that changing is lower, therefore, can further increase safety.Also, whole process is not necessarily to any input of user, can drop Lower security hidden danger can improve the efficiency of identification again, bring great convenience to user.
In another embodiment, as shown in figure 5, the method that a kind of pair of user identity is verified, comprising:
Step 502, terminal obtains the first identification code corresponding with user identifier prestored.
Step 504, terminal obtains terminal iidentification corresponding with user identifier and facility information, according to user identifier, terminal At least one of mark and facility information, dynamic code generate the time and the first identification code generates the first dynamic code, according to wait locate It manages data and the first dynamic code generates the first signed data of pending data.
In the present embodiment, terminal can be used a variety of digest algorithms as described above to the first dynamic code and pending data into Row abstract operation, to obtain the first signed data of pending data.
Step 506, user identifier, pending data and the first signed data are sent to server by terminal.
Step 508, server obtains the second identification code corresponding with user identifier prestored.
Step 510, server obtains terminal iidentification corresponding with user identifier and facility information, according to user identifier, end End mark and at least one of facility information, dynamic code generate the time and the second identification code generates the second dynamic code, according to the Two dynamic codes and the pending data received generate the second signed data of pending data.
In the present embodiment, server and terminal can engagement arithmetic, after server generates the second dynamic code, then use and terminal The algorithm of agreement carries out abstract operation to the pending data received and the second dynamic code, to generate the of pending data Two signed datas.
Step 512, server judges whether the first signed data and the second signed data match, if so, be verified, Otherwise it verifies and does not pass through.
Specifically, server detected in such a way that character string detects the first signed data and the second signed data whether phase Together, if it is identical, it is verified, otherwise verifies and do not pass through.In the present embodiment, server is when carrying out authentication, not It is simply to judge whether the first dynamic code and the second dynamic code are identical, but terminal is further according to pending data and first Dynamic code generates the first signed data of pending data, and server is when carrying out authentication, can basis receive to Handle data and generate the second dynamic code generate pending data the first signed data, thus judge the first signed data with Whether the second signed data is identical, since the signed data of pending data is obtained by a series of operation, and is Dynamically changeable at any time, therefore a possibility that being tampered, is very low.In addition, terminal is according to user identifier, terminal iidentification, equipment At least one of information, dynamic code generate the time and the first identification code generates the first dynamic code, and these information are all tampered A possibility that it is lower, so as to further increase safety.Also, entire identification procedure is without any input behaviour of user Make, security risk can be reduced but also improve the efficiency of identification, therefore safety can be improved but also improve convenience.
In one embodiment, before the step of server generates the second dynamic password according to the second identification code, identity Recognition methods may also include that the dynamic code that server receiving terminal is sent generates the time, and generating time judgement according to dynamic code is No time-out executes the step of generating the second dynamic password according to the second identification code if be not timed-out;Wherein, terminal is sent Dynamic code generate the time be to be obtained from server.
In the present embodiment, terminal sends the data processing request of pending data to server, and server receives at data The dynamic code generation time is returned into terminal after reason request.The dynamic code generation time can receive data processing request for server When the server current time.Dynamic code, which generates the dynamic password (the first dynamic password) that the time generates terminal, has timeliness Property.
It further, also together will dynamic while user identifier and the first dynamic password are sent to server by terminal The code generation time is sent to server, and server receives dynamic code and generates the time, obtains the time of server at this time and receives Dynamic code generate the time difference between the time, judge whether the time difference exceeds preset overtime number of seconds, if it was exceeded, saying Bright to have timed out, server shows the calcellation of the second dynamic password without subsequent processing.In this way, sending data for terminal It is more than that the first dynamic password submitted to server certain time carries out calcellation processing after processing request, terminal can be effectively prevent The situation for not submitting the first dynamic password after transmission data processing request for a long time, further improves safety.
In one embodiment, as shown in fig. 6, providing another personal identification method, comprising:
Step 602, terminal detects whether there is the first identification code corresponding with user identifier, if can't detect, into Enter step 604, otherwise enters step 608.
Specifically, terminal need to first obtain store in terminal and user identifier when needing to carry out identification to user Corresponding first identification code, before obtaining the first identification code, terminal need to be detected whether there are the first identification code, if detection is not It arrives, shows that terminal is not applied to identification code, then enter step the process of the subsequent application identification code of 604 execution.
In one embodiment, if terminal generates the first dynamic code and terminal iidentification is utilized, terminal is needed in step 602 Further detect whether that terminal iidentification corresponding with user identifier can be got, specifically, on terminal detection service device whether Terminal iidentification corresponding with user identifier is stored, if so, obtaining terminal iidentification corresponding with user identifier and carrying out subsequent Otherwise process enters step 604.
Step 604, terminal to server sends checking request, carries user identifier in the checking request.
Step 606, server carries out authentication according to checking request, raw according to user identifier after authentication passes through At identification code.
In one embodiment, terminal can prompt user to input password, and the password of input and user identifier are sent together Authentication is carried out to server.In another embodiment, terminal can also prompt user to input mobile communication number progress short Short message verification code and user identifier are sent to service specifically, terminal receives the short message verification code of user's input by letter verifying Device, server receive short message verification code, verify whether previous existence therewith at short message verification code it is identical, if they are the same, then by testing Card.
Further, server generates identification code according to user identifier after authentication passes through.Since user identifier has There is uniqueness, therefore the identification code generated also has uniqueness.Identification code can be corresponded to user identifier and stored by server.? In one embodiment, server is generated according to user identifier after identification code, further includes: and terminal obtains identification code from server, And corresponding user identifier is stored.In this way, convenient for subsequent terminal obtain storage identification code corresponding with user identifier to Realize identification, which is the first identification code.
In one embodiment, the step of server generates identification code according to user identifier, comprising: server obtains application Mark generates identification code according to application identities and user identifier.In the present embodiment, application can be to be used to generate in terminal operating The application of pending data, application identities can be the title of application or be identification number etc. using predistribution.Server root Identification code is generated according to user identifier and application identities, the complexity of identification code is increased, reduces the possibility that identification code is tampered Property, further improve safety.
In one embodiment, after authentication, further includes: the facility information that server receiving terminal is sent, root Terminal iidentification is generated according to facility information, by terminal iidentification and the corresponding storage of user identifier.
In the present embodiment, terminal obtains facility information, and facility information is sent to server.Facility information includes but not It is limited to device id, device mac address, equipment platform, device model, OS Type and root authority information etc..Clothes Business device receives the facility information of terminal transmission, generates terminal iidentification according to facility information.Specifically, server can selected equipment At least one of information generates terminal iidentification in conjunction with privately owned keyword jointly.For example, server can be according in facility information Device id and device mac address cooperatively generate terminal iidentification in conjunction with privately owned keyword, which can be 32 words The character string of section, therefore terminal iidentification generated has uniqueness, can be used for one terminal device of unique identification.Further , server can store the terminal iidentification of generation and user identifier correspondence.In this way, terminal is generating the first dynamic code When, terminal iidentification corresponding with user identifier can be obtained from server.
Further, in one embodiment, the step of server generates identification code according to user identifier, comprising: service Device obtains application identities, generates identification code according to application identities, user identifier and terminal iidentification;Or server is marked according to user Know and terminal iidentification generates identification code.In the present embodiment, server can be generated according to application identities, user identifier and terminal iidentification Identification code, or identification code is generated according to user identifier and terminal iidentification, the complexity of identification code is increased, identification code is reduced A possibility that being tampered further improves safety.
Further, in one embodiment, it after the step of server generates identification code according to user identifier, also wraps Include: server as key, carries out at least one of user identifier, terminal iidentification and facility information at encryption to identification code Reason.
In the present embodiment, at least one of server by utilizing user identifier, terminal iidentification and facility information come to identification Code is encrypted, and then server corresponds to user identifier and stores encrypted identification code.And the identification that terminal is obtained from server Code is also encrypted identification code, and encrypted identification code is corresponded to user identifier and is stored.When terminal needs to utilize knowledge When other code generates dynamic password, then to the identification code for obtaining storage, and believe accordingly with user identifier, terminal iidentification and equipment At least one of breath is decrypted encrypted identification code.Due to having carried out encryption to identification code, and it is utilized At least one of user identifier, terminal iidentification and facility information are used as key, further reduce what identification code was tampered May, therefore safety can be further increased.
Step 608, terminal obtains the first identification code corresponding with user identifier prestored, carries out body according to the first identification code Part verifying.
If a terminal detects that identification code corresponding with user identifier has been locally stored, then terminal obtains the identification code, and Subsequent subscriber authentication process is carried out, specific subscriber authentication process is as described in the various embodiments described above, herein It repeats no more.After subscriber authentication passes through, then server process pending data, for example, completing transaction payment etc..
In the present embodiment, when terminal can't detect the identification code of storage, then to server application identification code, convenient for subsequent Identity code can be carried out using the identification code of storage.It is subsequent need to generate dynamic password when, terminal and server respectively obtains It is derived from the identification code of body storage to generate dynamic password, and then whether the dynamic password by judging each self-generating is identical carries out Authentication, a possibility that being tampered due to identification code and dynamic password, are all minimum, reduce security risk, and terminal is logical The identification code for crossing storage realizes identification automatically, is not necessarily to any input of user, therefore can improve safety but also improve body The efficiency of part identification.
As shown in fig. 7, in one embodiment, additionally providing a kind of identification system, which includes client 720 With server 740, wherein client 720 includes:
First identification code obtains module 722, for obtaining the first identification code corresponding with user identifier prestored.
First dynamic password generation module 724, for generating the first dynamic password according to the first identification code, by user identifier Server 740 is sent to the first dynamic password.
Server 740 includes:
Second identification code obtains module 742, for obtaining the second identification code corresponding with user identifier prestored.
Second dynamic password generation module 744, for generating the second dynamic password according to the second identification code.
First authentication module 746, for judging whether the first dynamic password and the second dynamic password match, if then verifying Pass through.
Specifically, the first authentication module 746 is used for judging whether the first dynamic password and the second dynamic password are identical, if It is identical, then it is verified, otherwise verifies and do not pass through.
In one embodiment, the first dynamic password generation module 724 is used to generate time and the first knowledge according to dynamic code Other code generates the first dynamic code;Second dynamic password generation module 744 is used to generate time and the second identification code according to dynamic code Generate the second dynamic code;First authentication module 746 is for judging whether the first dynamic code and the second dynamic code match, if then testing Card passes through.
In another embodiment, the first dynamic password generation module 724 is used to generate the time and first according to dynamic code Identification code generates the first dynamic code, and the first signed data of pending data is generated according to pending data and the first dynamic code; Second dynamic password generation module 744 is used to receive the pending data and the first signed data of the transmission of terminal 720, according to dynamic Code generates time and the second identification code and generates the second dynamic code, according to the pending data received and the second dynamic code generate to Handle the second signed data of data;First authentication module 746 is for judging whether are the first signed data and the second signed data Matching, if being then verified.
In one embodiment, the first dynamic password generation module 724 is for obtaining terminal mark corresponding with user identifier Knowledge and facility information generate the time and first according at least one of user identifier, terminal iidentification and facility information, dynamic code Identification code generates the first dynamic code;Second dynamic password generation module 744 is for obtaining terminal iidentification corresponding with user identifier And facility information, time and the second knowledge are generated according at least one of user identifier, terminal iidentification and facility information, dynamic code Other code generates the second dynamic code;First authentication module 746 for judging whether the first dynamic code and the second dynamic code match, if Then it is verified.
In another embodiment, the first dynamic password generation module 724 is for obtaining terminal corresponding with user identifier Mark and facility information generate time and the according at least one of user identifier, terminal iidentification and facility information, dynamic code One identification code generates the first dynamic code, and the first number of signature of pending data is generated according to pending data and the first dynamic code According to;Second dynamic password generation module 744 is used to receive the pending data and the first signed data of the transmission of terminal 720, obtains Terminal iidentification corresponding with user identifier and facility information, according at least one in user identifier, terminal iidentification and facility information Kind, dynamic code generate the time and the second identification code generates the second dynamic code;According to the second dynamic code and the number to be processed received According to the second signed data for generating pending data;First authentication module 746 is for judging the first signed data and the second signature Whether data match, if being then verified.
In one embodiment, as shown in figure 8, server 740 further include: overtime judgment module 741, for receiving terminal 720 dynamic codes sent generate the time, judge whether time-out according to the dynamic code generation time, if it times out, notifying that second is dynamic State command generation module 744 generates the second dynamic password;Wherein, the dynamic code generation time that terminal 720 is sent is from server 740 acquisitions.
In one embodiment, as shown in figure 9, terminal 720 further include: Detecting of Data Identification Code module 721, for detecting terminal 720 whether there is the first identification code corresponding with user identifier, if can't detect, send checking request to server 740, The checking request carries user identifier.In the present embodiment, server 740 further include: the second authentication module 745 is tested for basis Card request carries out authentication;Identification code generation module 747 is identified for being generated after authentication passes through according to user identifier Code.
Further, in one embodiment, identification code generation module 747 is marked for obtaining application identities according to application Know and user identifier generates identification code.
Further, in one embodiment, as shown in Figure 10, terminal 720 further include: identification code memory module 726 is used In the identification code for obtaining generation from server, and corresponding user identifier is stored.
In one embodiment, as shown in figure 11, server 740 further include:
Terminal iidentification generation module 748 generates eventually for receiving the facility information of the transmission of terminal 720 according to facility information End mark, by terminal iidentification and the corresponding storage of user identifier.
Further, identification code generation module 747 is for obtaining application identities, according to application identities, user identifier and end End mark generates identification code;Or identification code generation module 747 is also used to generate identification code according to user identifier and terminal iidentification.
Further, server 740 further include: encrypting module 749, for user identifier, terminal iidentification and equipment to be believed At least one of breath is used as key, and the identification code of generation is encrypted.In the present embodiment, encrypted identification code hair It send to terminal 720 and is stored.When terminal 720 needs to obtain the identification code that is locally stored to carry out identification, then to obtaining The identification code got is decrypted first at least one of user identifier, terminal iidentification and facility information, then further according to Identification code after decryption generates dynamic password.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, described program can be stored in computer-readable storage medium, Such as the program can be stored in the storage medium of computer system, and be held by least one processor in the computer system Row includes the process such as the embodiment of above-mentioned each method with realization.Wherein, the storage medium can for magnetic disk, CD, read-only deposit Store up memory body (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously Limitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention Protect range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.

Claims (18)

1. a kind of personal identification method, which comprises
Terminal detects whether there is the first identification code corresponding with user identifier, if can't detect, tests to server transmission Card request, the checking request carry the user identifier;The server carries out authentication according to the checking request, Authentication pass through after according to the user identifier generate identification code;The terminal obtains the identification code from the server, And the identification code is stored, form the first identification code;
Terminal obtains the first identification code corresponding with user identifier prestored;
The terminal generates time and first identification code according to dynamic code and generates the first dynamic code, by the user identifier and First dynamic code is sent to server;
The server obtains the second identification code corresponding with the user identifier prestored, and second identification code is the clothes The identification code that business device is generated previously according to the user identifier that terminal is sent;
The server, which is used, generates time and second identification code generation according to the dynamic code with the scheduled algorithm of terminal Second dynamic code;The server judges whether first dynamic code and the second dynamic code match, if being then verified, In, the dynamic code generate the time be server server in the data processing request for receiving pending data it is current when Between, the pending data is terminal data to be treated under various application scenarios.
2. the method according to claim 1, wherein the terminal generates the time and described first according to dynamic code Identification code generates the step of the first dynamic code, further includes: the terminal generates time and first identification code according to dynamic code The first dynamic code is generated, the first number of signature of the pending data is generated according to pending data and first dynamic code According to;
The server, which is used, generates time and second identification code generation according to the dynamic code with the scheduled algorithm of terminal Second dynamic code;The server judges whether first dynamic code and the second dynamic code match, if be then verified Step, further includes:
The pending data and the first signed data that the server receiving terminal is sent, according to the dynamic code generate the time and Second identification code generates the second dynamic code, is generated according to the pending data received and second dynamic code to be processed Second signed data of data;
The server judges whether first signed data and the second signed data match, if being then verified.
3. the method according to claim 1, wherein the terminal generates the time and described first according to dynamic code Identification code generates the step of the first dynamic code, further includes:
The terminal obtains terminal iidentification corresponding with user identifier and facility information, according to the user identifier, terminal iidentification The time is generated at least one of facility information, dynamic code and first identification code generates the first dynamic code;
The server, which is used, generates time and second identification code generation according to the dynamic code with the scheduled algorithm of terminal Second dynamic code;The server judges whether first dynamic code and the second dynamic code match, if be then verified Step, further includes:
The server obtains terminal iidentification corresponding with the user identifier and facility information, according to the user identifier, end At least one of end mark and facility information, the dynamic code generate the time and second identification code generates the second dynamic Code;
The server judges whether first dynamic code matches with the second dynamic code, if being then verified.
4. the method according to claim 1, wherein the terminal generates the time and described first according to dynamic code Identification code generates the step of the first dynamic code, further includes: the terminal obtains terminal iidentification corresponding with user identifier and equipment Information generates the time and described first according at least one of the user identifier, terminal iidentification and facility information, dynamic code Identification code generates the first dynamic code, and the first label of the pending data are generated according to pending data and first dynamic code Name data;
The server, which is used, generates time and second identification code generation according to the dynamic code with the scheduled algorithm of terminal Second dynamic code;The server judges whether first dynamic code and the second dynamic code match, if be then verified Step, further includes:
The pending data and the first signed data that the server receiving terminal is sent;
The server obtains terminal iidentification corresponding with the user identifier and facility information, according to the user identifier, end At least one of end mark and facility information, the dynamic code generate the time and second identification code generates the second dynamic Code;
The second signed data of the pending data is generated according to second dynamic code and the pending data received;
The server judges whether first signed data and the second signed data match, if so, being verified.
5. method according to any one of claims 1 to 4, which is characterized in that used in the server predetermined with terminal Algorithm the step of time and second identification code generate the second dynamic code is generated according to the dynamic code before, further includes:
The server receives the dynamic code that the terminal is sent and generates the time, is judged whether according to the dynamic code generation time Time-out executes described dynamic according to dynamic code generation time and second identification code generation second if be not timed-out The step of state code;
Wherein, the dynamic code generation time that the terminal is sent is obtained from the server.
6. the method according to claim 1, wherein described the step of generating identification code according to user identifier, packet It includes:
The server obtains application identities, generates the identification code according to the application identities and user identifier.
7. the method according to claim 1, wherein after the authentication passes through further include:
The server receives the facility information that the terminal is sent, and generates terminal iidentification according to the facility information, will be described Terminal iidentification and the corresponding storage of the user identifier.
8. the method according to the description of claim 7 is characterized in that the step for generating the identification code according to user identifier Suddenly, comprising:
The server obtains application identities, generates the identification code according to the application identities, user identifier and terminal iidentification; Or
The server generates the identification code according to user identifier and terminal iidentification.
9. method according to claim 7 or 8, which is characterized in that generate the identification code according to user identifier described The step of after, further includes:
The server regard at least one of the user identifier, terminal iidentification and facility information as key, to the knowledge Other code is encrypted.
10. a kind of identification system, which is characterized in that the system comprises terminal and server, the terminal includes:
Detecting of Data Identification Code module, for detecting terminal with the presence or absence of the first identification code corresponding with user identifier, if detection is not It arrives, then sends checking request to the server, the checking request carries the user identifier;
Identification code memory module for obtaining the identification code from the server, and stores the identification code, is formed First identification code;
First identification code obtains module, for obtaining the first identification code corresponding with user identifier prestored;
First dynamic password generation module, for generating the first dynamic of time and first identification code generation according to dynamic code Code, is sent to the server for the user identifier and first dynamic code;
The server includes:
Second authentication module, for carrying out authentication according to the checking request;
Identification code generation module, for generating identification code according to the user identifier after the authentication passes through;
Second identification code obtains module, for obtaining the second knowledge described in the second identification code corresponding with the user identifier prestored Other code is the identification code that the server is generated previously according to the user identifier that terminal is sent;
Second dynamic password generation module, for generating time and described according to the dynamic code using with the scheduled algorithm of terminal Second identification code generates the second dynamic code, wherein the dynamic code generation time is that server is receiving pending data Server current time when data processing request, the pending data are that terminal is to be treated under various application scenarios Data;
First authentication module, for judging whether first dynamic code and the second dynamic code match, if being then verified.
11. system according to claim 10, which is characterized in that the first dynamic password generation module is also used to basis Dynamic code generates the time and first identification code generates the first dynamic code, raw according to pending data and first dynamic code At the first signed data of the pending data;
The second dynamic password generation module is also used to receive the pending data and the first signed data of terminal transmission, according to The dynamic code generates the time and second identification code generates the second dynamic code, according to the pending data that receives and described Second signed data of the second dynamic code generation pending data;
First authentication module is also used to judge whether first signed data and the second signed data match, if then testing Card passes through.
12. system according to claim 10, which is characterized in that the first dynamic password generation module is also used to obtain Terminal iidentification corresponding with user identifier and facility information, according in the user identifier, terminal iidentification and facility information extremely A kind of few, dynamic code generates the time and first identification code generates the first dynamic code;
The second dynamic password generation module is also used to obtain terminal iidentification corresponding with the user identifier and facility information, The time and described second is generated according at least one of the user identifier, terminal iidentification and facility information, the dynamic code Identification code generates the second dynamic code;
First authentication module is also used to judge whether first dynamic code matches with the second dynamic code, if then verifying is logical It crosses.
13. system according to claim 10, which is characterized in that the first dynamic password generation module is also used to obtain Terminal iidentification corresponding with user identifier and facility information, according in the user identifier, terminal iidentification and facility information extremely A kind of few, dynamic code generates the time and first identification code generates the first dynamic code, according to pending data and described first Dynamic code generates the first signed data of the pending data;
The second dynamic password generation module is also used to receive the pending data and the first signed data of terminal transmission, obtains Terminal iidentification corresponding with the user identifier and facility information, according in the user identifier, terminal iidentification and facility information At least one, described dynamic code generate time and second identification code and generate the second dynamic code;According to second dynamic Code and the pending data received generate the second signed data of the pending data;
First authentication module is also used to judge whether first signed data and the second signed data match, if so, It is verified.
14. system according to any one of claims 10 to 13, which is characterized in that the server further include:
Overtime judgment module generates the time for receiving the dynamic code that the terminal is sent, generates the time according to the dynamic code Judge whether time-out, if be not timed-out, when the second dynamic password generation module being notified to generate according to the dynamic code Between and second identification code generate the second dynamic code;
Wherein, the dynamic code generation time that the terminal is sent obtains from the server.
15. system according to claim 10, which is characterized in that the identification code generation module is also used to obtain using mark Know, generates the identification code according to the application identities and user identifier.
16. system according to claim 10, which is characterized in that the server further include:
Terminal iidentification generation module, the facility information sent for receiving the terminal generate terminal according to the facility information Mark, by the terminal iidentification and the corresponding storage of the user identifier.
17. system according to claim 10, which is characterized in that the identification code generation module is also used to obtain using mark Know, the identification code is generated according to the application identities, user identifier and terminal iidentification;Or the identification code generation module is also For generating the identification code according to user identifier and terminal iidentification.
18. system according to claim 16 or 17, which is characterized in that the server further include:
Encrypting module, for regarding at least one of the user identifier, terminal iidentification and facility information as key, to described Identification code is encrypted.
CN201310516818.4A 2013-10-28 2013-10-28 Personal identification method and system Active CN104579649B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310516818.4A CN104579649B (en) 2013-10-28 2013-10-28 Personal identification method and system
PCT/CN2014/089627 WO2015062461A1 (en) 2013-10-28 2014-10-28 Method and system for verifying user identity of an online application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310516818.4A CN104579649B (en) 2013-10-28 2013-10-28 Personal identification method and system

Publications (2)

Publication Number Publication Date
CN104579649A CN104579649A (en) 2015-04-29
CN104579649B true CN104579649B (en) 2019-01-11

Family

ID=53003335

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310516818.4A Active CN104579649B (en) 2013-10-28 2013-10-28 Personal identification method and system

Country Status (2)

Country Link
CN (1) CN104579649B (en)
WO (1) WO2015062461A1 (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049209B (en) * 2015-06-16 2018-10-23 中国银行股份有限公司 Dynamic password formation method and device
CN105072080B (en) * 2015-07-01 2018-04-13 广州密码科技有限公司 A kind of Information Authentication method, apparatus and system
CN105631667A (en) * 2015-08-05 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Authentication method, device and system
CN105916143A (en) * 2015-12-15 2016-08-31 乐视致新电子科技(天津)有限公司 Vehicle remote authentication method based on dynamic password and vehicle remote authentication system thereof
CN105515781B (en) * 2016-01-19 2018-09-14 上海众人网络安全技术有限公司 A kind of application platform login system and its login method
CN107181714B (en) * 2016-03-09 2021-01-26 创新先进技术有限公司 Verification method and device based on service code and generation method and device of service code
CN105827620B (en) * 2016-04-25 2019-04-02 上海众人网络安全技术有限公司 A kind of data transmission system and its method
CN105827621A (en) * 2016-04-25 2016-08-03 上海众人网络安全技术有限公司 Internet-based reservation platform login system and login method thereof
CN106330458B (en) * 2016-08-23 2019-05-14 宇龙计算机通信科技(深圳)有限公司 A kind of processing method and processing device of identifying code
CN108156195B (en) * 2016-12-02 2021-08-20 中科星图股份有限公司 Service data checking method and system
CN108933765B (en) * 2017-05-26 2021-11-09 武汉斗鱼网络科技有限公司 Method, client and server for improving equipment ID security
CN108933766B (en) * 2017-05-26 2021-11-09 武汉斗鱼网络科技有限公司 Method and client for improving equipment ID security
CN109218009B (en) * 2017-06-30 2021-11-09 武汉斗鱼网络科技有限公司 Method, client and server for improving equipment ID security
CN107948973B (en) * 2017-11-01 2020-10-13 中国移动通信集团江苏有限公司 Equipment fingerprint generation method applied to IOS (input/output system) for security risk control
CN108566279A (en) * 2018-03-19 2018-09-21 深圳市敢为特种设备物联网技术有限公司 Synchronous dynamic two dimension code generation method, equipment and system, storage medium
CN109547217B (en) * 2019-01-11 2021-10-22 北京中实信达科技有限公司 One-to-many identity authentication system and method based on dynamic password
CN109951293B (en) * 2019-02-20 2023-12-05 深圳市朗石科学仪器有限公司 Water quality monitoring terminal user verification method and system and water quality monitoring Internet of things terminal system
CN113037682A (en) * 2019-12-09 2021-06-25 西安诺瓦星云科技股份有限公司 Encrypted communication method, encrypted communication device, and encrypted communication system
CN113516812A (en) * 2021-06-01 2021-10-19 深圳市巨鼎医疗股份有限公司 Remote control method, device, equipment and storage medium for medical self-service terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101060403A (en) * 2006-04-18 2007-10-24 钟曦辰 Wireless communication terminal-based interactive dynamic password safety service system
CN101163014A (en) * 2007-11-30 2008-04-16 中国电信股份有限公司 Dynamic password identification authenticating system and method
CN102457491A (en) * 2010-10-20 2012-05-16 北京大学 Dynamic identity authenticating method and system
US8256664B1 (en) * 2010-04-09 2012-09-04 Google Inc. Out-of band authentication of browser sessions
CN103124266A (en) * 2013-02-07 2013-05-29 百度在线网络技术(北京)有限公司 Mobile terminal, method and system for logging in through mobile terminal and cloud server
CN103368918A (en) * 2012-04-01 2013-10-23 西门子公司 Method, device and system for dynamic password authentication

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101060403A (en) * 2006-04-18 2007-10-24 钟曦辰 Wireless communication terminal-based interactive dynamic password safety service system
CN101163014A (en) * 2007-11-30 2008-04-16 中国电信股份有限公司 Dynamic password identification authenticating system and method
US8256664B1 (en) * 2010-04-09 2012-09-04 Google Inc. Out-of band authentication of browser sessions
CN102457491A (en) * 2010-10-20 2012-05-16 北京大学 Dynamic identity authenticating method and system
CN103368918A (en) * 2012-04-01 2013-10-23 西门子公司 Method, device and system for dynamic password authentication
CN103124266A (en) * 2013-02-07 2013-05-29 百度在线网络技术(北京)有限公司 Mobile terminal, method and system for logging in through mobile terminal and cloud server

Also Published As

Publication number Publication date
WO2015062461A1 (en) 2015-05-07
CN104579649A (en) 2015-04-29

Similar Documents

Publication Publication Date Title
CN104579649B (en) Personal identification method and system
CN109951489B (en) Digital identity authentication method, equipment, device, system and storage medium
JP6882254B2 (en) Safety verification methods based on biological characteristics, client terminals, and servers
CN102271042B (en) Certificate authorization method, system, universal serial bus (USB) Key equipment and server
US20190165947A1 (en) Signatures for near field communications
CN109327457A (en) A kind of internet of things equipment identity identifying method and system based on block chain
CN107294900A (en) Identity registration method and apparatus based on biological characteristic
CN107209821A (en) For the method and authentication method being digitally signed to e-file
CN101577917A (en) Safe dynamic password authentication method based on mobile phone
CN108965222A (en) Identity identifying method, system and computer readable storage medium
CN108989346A (en) The effective identity trustship agility of third party based on account concealment authenticates access module
CN107231331A (en) Obtain, issue the implementation method and device of electronic certificate
EP3206329B1 (en) Security check method, device, terminal and server
CN101964789A (en) Method and system for safely accessing protected resources
JP2015088080A (en) Authentication system, authentication method, and program
CN106209793A (en) A kind of auth method and checking system
CN104935548B (en) Auth method, apparatus and system based on intelligent equipment of tatooing
CN101222334B (en) Cipher token safety authentication method adopting picture interference
CN111445231A (en) Method and device for realizing MOTOpay and electronic equipment
CN102571341B (en) A kind of Verification System based on dynamic image and authentication method
Wong et al. An enhanced user authentication solution for mobile payment systems using wearables
CN109145543B (en) Identity authentication method
CN106533685B (en) Identity authentication method, device and system
CN108667767A (en) A kind of account password storage protection method
Gu et al. Toauth: Towards automatic near field authentication for smartphones

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant