CN104994115B - A kind of login authentication method and system - Google Patents

A kind of login authentication method and system Download PDF

Info

Publication number
CN104994115B
CN104994115B CN201510477097.XA CN201510477097A CN104994115B CN 104994115 B CN104994115 B CN 104994115B CN 201510477097 A CN201510477097 A CN 201510477097A CN 104994115 B CN104994115 B CN 104994115B
Authority
CN
China
Prior art keywords
client
pass cipher
mobile terminal
cipher
pass
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510477097.XA
Other languages
Chinese (zh)
Other versions
CN104994115A (en
Inventor
徐至强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DMS Corp.
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201510477097.XA priority Critical patent/CN104994115B/en
Publication of CN104994115A publication Critical patent/CN104994115A/en
Application granted granted Critical
Publication of CN104994115B publication Critical patent/CN104994115B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a kind of login authentication method and system.The login authentication method includes:When client, which inputs, logs in main password, the relevant information of client described in an acquisition for mobile terminal near the client is placed on;The mobile terminal produces two-pass cipher according to the relevant information, and the two-pass cipher is sent into server;Server receives the main password and two-pass cipher, verifies the validity of the two-pass cipher;When the two-pass cipher is effective, it is allowed to log in.Technical scheme can be automatically performed the authentication operations of two step certifications by specified mobile terminal.Make user no longer need to obtain and be manually entered cumbersome two-pass cipher, reduce mistake lifting Consumer's Experience, and accordingly lift certain security.

Description

A kind of login authentication method and system
Technical field
The present invention relates to a kind of computer networking technology, more particularly to a kind of login authentication method and system.
Background technology
With the continuous development of network technology, internet, which logs in safety problem, becomes extremely important.Recognize to improve network Card safety, does not turn off and sends security-related technological means, including SSL encryption, security certification, puts down safely with third party Platform cooperation etc..And the re-authentication logged in one of those safe practice for arriving very much, re-authentication refer to using user name, close On the basis of code logs in, one layer protection is additionally provided user account, accordingly even when the user name of some internet product and close Code is stolen, and is also possible to prevent disabled user and steals subscriber data into system.But two current step authentication methods usually require Encryption device is obtained by SMS or corresponding software calculates a temporary password (two-pass cipher) by algorithm, and by User, which manually enters checking system, could complete register.This conventional method is for security, used two-pass cipher All typically there is time limit regular hour, failed typically behind 30 seconds or 60 seconds.This requires user to need at this Obtained in the shorter time and correctly enter this password, if one-time authentication fails, must just reacquired again secondary close Code, and reattempt to login authentication.Whole process is cumbersome and easy failure.
Just urgently solved into those skilled in the art in consideration of it, how to find a kind of technical scheme of preferably re-authentication Certainly the problem of.
The content of the invention
In view of the above the shortcomings that prior art, it is an object of the invention to provide a kind of login authentication method and it is System, for solving the problems, such as to need to manually enter two-pass cipher in limiting time in the prior art using re-authentication.
In order to achieve the above objects and other related objects, the present invention provides a kind of login authentication method, the login authentication Method includes:When client, which inputs, logs in main password, one near the client mobile end by pre-authentication is placed on End obtains the relevant information of the client;The mobile terminal produces two-pass cipher according to the relevant information, and by described in Two-pass cipher is sent to server;Server receives the main password and two-pass cipher, verifies the effective of the two-pass cipher Property;When the two-pass cipher is effective, it is allowed to log in.
Alternatively, the validity of two-pass cipher described in server authentication includes:The two-pass cipher is by using the shifting The UID of dynamic terminal carries out signature generation to the relevant information of the client, when the two-pass cipher signing messages with it is described When the UID checkings of mobile terminal are consistent, the two-pass cipher is effective.
Alternatively, the mobile terminal includes gravity sensor, and the relevant information of the client inputs including client During main password, vibration signal that the gravity sensor receives.
Alternatively, the mobile terminal includes microphone, and the relevant information of the client is close including client input master During code, voice signal that the microphone receives.
Alternatively, the mobile terminal includes GPS, and the relevant information of the client includes client and inputs main password When, timestamp information and/or positional information that the GPS is determined;The validity of two-pass cipher described in server authentication also includes: When the two-pass cipher includes timestamp information, the timestamp information that is parsed according to two-pass cipher is described with receiving The temporal information of main password compares, and determines the validity of the two-pass cipher;And/or when the two-pass cipher includes position When confidence ceases, the positional information that is parsed according to two-pass cipher compared with receiving the positional information of the client, determines institute State the validity of two-pass cipher.
The present invention provides a kind of accession authorization system, and the accession authorization system includes mobile terminal, client and service Device, the mobile terminal are being included by pre-authentication equipment, the mobile terminal for the client:Client-side information obtains mould Block, for when client input log in main password when, the relevant information of client described in the acquisition for mobile terminal;Two-pass cipher Sending module is produced, it is secondary to carry out signature generation to the relevant information of the client for the UID by using mobile terminal Password, and the two-pass cipher is sent to server.
Alternatively, the mobile terminal includes gravity sensor, and the relevant information of the client inputs including client During main password, vibration signal that the gravity sensor receives.
Alternatively, the mobile terminal includes microphone, and the relevant information of the client is close including client input master During code, voice signal that the microphone receives.
Alternatively, the mobile terminal includes GPS, and the relevant information of the client includes client and inputs main password When, timestamp information and/or positional information that the GPS is determined.
The present invention provides a kind of accession authorization system, and the accession authorization system includes mobile terminal, client and service Device, the server include:Password acceptance module, for receiving main password and two-pass cipher;Two-pass cipher authentication module, with institute Password acceptance module is stated to be connected, for determining the validity of the two-pass cipher, signing messages and institute when the two-pass cipher State mobile terminal UID checking it is consistent when, the two-pass cipher is effective.
Alternatively, the two-pass cipher authentication module is additionally operable to:When the two-pass cipher includes timestamp information, root The timestamp information parsed according to two-pass cipher, compared with receiving the temporal information of the main password, determine described secondary close The validity of code.
Alternatively, the two-pass cipher authentication module is additionally operable to:When the two-pass cipher includes positional information, according to The positional information that two-pass cipher parses, compared with receiving the positional information of the client, determine the two-pass cipher Validity.
As described above, a kind of login authentication method and system of the present invention, have the advantages that:With reference to smart mobile phone Either intelligent watch etc. carries gravity sensor or microphone and GPS equipment, and by designated equipment within a specified time The percussion data collected by gravity sensor or microphone are used as two-pass cipher, make user only need to be by designated equipment Side is placed on (as authentication device), and as input password login usually, it is only necessary to input main password, designated equipment (intelligence Energy equipment) authentication operations of two step certifications can be automatically performed.Make user no longer need to obtain and be manually entered it is cumbersome secondary close Code, mistake lifting Consumer's Experience is reduced, and accordingly lift certain security.
Brief description of the drawings
Fig. 1 is shown as the schematic flow sheet of an embodiment of the login authentication method of the present invention.
Fig. 2 is shown as the module diagram of an embodiment of the accession authorization system of the present invention.
Component label instructions
1 accession authorization system
11 clients
12 mobile terminals
121 client-side information acquisition modules
122 two-pass ciphers produce sending module
13 servers
131 password acceptance modules
132 two-pass cipher authentication modules
S1~S3 steps
Embodiment
Illustrate embodiments of the present invention below by way of specific instantiation, those skilled in the art can be by this specification Disclosed content understands other advantages and effect of the present invention easily.The present invention can also pass through specific realities different in addition The mode of applying is embodied or practiced, the various details in this specification can also be based on different viewpoints with application, without departing from Various modifications or alterations are carried out under the spirit of the present invention.
It should be noted that the diagram provided in the present embodiment only illustrates the basic conception of the present invention in a schematic way, Then the component relevant with the present invention is only shown in schema rather than is painted according to component count, shape and the size during actual implement System, kenel, quantity and the ratio of each component can be a kind of random change during its actual implementation, and its assembly layout kenel also may be used Can be increasingly complex.
The present invention provides a kind of login authentication method.The login authentication method can be used for the user for improving re-authentication Experience and security.In one embodiment, as shown in figure 1, the login authentication method includes:
Step S1, when client, which inputs, logs in main password, it is placed near the client mobile terminal and obtains Take the relevant information of the client.Specifically, it is described to be referred to opening corresponding network service by the mobile terminal of pre-authentication Specially appointed equipment (mobile terminal) when two steps are demonstrate,proved, when client specifies the mobile terminal by pre-authentication, in phase The webserver answered will bind the re-authentication of the mobile terminal and the client, i.e., by the mobile terminal come Complete the re-authentication to the client.In one embodiment, the mobile terminal is with gravity sensor or wheat Gram wind and GPS (Global Positioning System, global positioning system) smart mobile phone or intelligent watch etc. are set It is standby.In one embodiment, the mobile terminal includes gravity sensor, and the relevant information of the client is defeated including client When becoming owner of password, vibration signal that the gravity sensor receives.Specifically, the mobile terminal can be placed on and visitor On the same desktop in family end, the behavior of stroking when inputting main password is received by gravity sensor, the behavior of stroking is produced Vibration change into corresponding pulse signal.In one embodiment, the mobile terminal includes gravity sensor microphone, institute When stating the relevant information of client includes client and inputs main password, voice signal that the gravity sensor receives.Specifically The mobile terminal, can be placed on the additional of client by ground, and the sound of stroking when inputting main password is received by microphone Sound, sound caused by described stroke is changed into corresponding pulse signal.The pulse either obtained by gravity sensor is believed Number or the obtained pulse signal of microphone can serve as the relevant information of client.In one embodiment, the movement Terminal also includes GPS, and when client inputs main password, mobile terminal obtains current geographical location information by GPS in real time And timestamp information, and the information acquired in GPS is also served as to the relevant information of client.
Step S2, the mobile terminal produces two-pass cipher according to the relevant information, and the two-pass cipher is sent To server.Specifically, the mobile terminal is according to passing through gravity sensor or microphone and GPS (Global Positioning System, global positioning system) the relevant information generation two-pass cipher of client that obtains, and by described two Secondary password is sent to server.
Step S3, server receive the main password and two-pass cipher, verify the validity of the two-pass cipher;Work as institute State two-pass cipher it is effective when, it is allowed to log in.Server receives the main password of client transmission, while also receives described The two-pass cipher that mobile terminal is sent.The validity of two-pass cipher described in server authentication includes:The two-pass cipher is by making Signature generation is carried out to the relevant information of the client with the UID of the mobile terminal, when the A.L.S. of the two-pass cipher When breath is consistent with the UID checkings of the mobile terminal, the two-pass cipher is effective.The relevant information of the main password can be passed through Come the UID of mobile terminal corresponding to determining, the validity of the two-pass cipher is verified according to the UID of the mobile terminal.Work as institute When stating two-pass cipher and being verified as effective, illustrate that the two-pass cipher is recognized, server will allow the client to log in.One In individual embodiment, whole client-related information is encrypted by device-dependent unique identifier UID for the mobile terminal Packing signature, generation two-pass cipher are sent to server.User set the mobile terminal in server end, server according to The password authentification strategy corresponding to the determination of householder's password relevant information, enters according to password authentification strategy to the two-pass cipher Row decryption and validation verification.In one embodiment, the mobile terminal includes GPS, the relevant information bag of the client When including the client main password of input, timestamp information and/or positional information that the GPS is determined;It is secondary described in server authentication The validity of password also includes:When the two-pass cipher includes timestamp information, time for being parsed according to two-pass cipher Information is stabbed, compared with receiving the temporal information of the main password, determines the validity of the two-pass cipher;And/or work as When the two-pass cipher includes positional information, the positional information that is parsed according to two-pass cipher, with receiving the client Positional information compare, determine the validity of the two-pass cipher.
In one embodiment, near user needs mobile terminal being placed on (as specified authentication device).If It is that reception button operation is carried out by gravity sensor, then needs to place a device on desktop;If received by microphone Button operation, then only need to simply it be placed on nearby.At the same time can choose whether to need the GPS functions of opening equipment, such as Fruit opens GPS functions, then can prompt the login place of user after login page inputs password, and need user to confirm;If GPS functions are not turned on, then ignores and logs in place verification step.When user, which strokes, inputs main password, caught by microphone Keypad sounds or the weak vibration that desktop is received by gravity sensor, the phase percussion behavior of user being converted into time domain Answer pulse signal.Obtain current geographical position and atomic time stamp in real time by GPS simultaneously, and by these information superpositions Onto the pulse signal of each button received.Serial data now is just provided with space-time uniqueness.Finally by equipment phase The unique identifier UID of pass whole serial data is encrypted packing signature, and (as two-pass cipher), the term of validity is 30 seconds to signature. For server while user's input password is received, smart machine also actively sends what is obtained by two steps above to server Encrypted signature bag.Due to setting authentication device in server end before user, server can be automatically using corresponding secret key pair Encrypted packet is decrypted and validation verification.Simultaneously examine key-press event time point whether with user input keying sequence when one Cause.If consistent, illustrate authentication device nearby, complete two steps card immediately, it is allowed to which user logs into system.
The present invention provides a kind of accession authorization system.The accession authorization system can use login authentication as described above Method carries out login authentication.In one embodiment, as shown in Fig. 2 the accession authorization system 1 includes mobile terminal 12, visitor Family end 11 and server 13.The mobile terminal 12 is the client 11 by pre-authentication equipment, the shifting by pre-authentication Dynamic terminal 12 refers to when opening corresponding network and servicing two steps card and specially appointed equipment (mobile terminal), works as client When specifying the mobile terminal by pre-authentication, in the corresponding webserver by the two of the mobile terminal and the client Secondary certification binding, i.e., complete the re-authentication to the client by the mobile terminal.The mobile terminal 12 includes Client-side information acquisition module 121 and two-pass cipher produce sending module 122.Wherein:
Client-side information acquisition module 121 is used for when client inputs and logs in main password, the acquisition for mobile terminal institute State the relevant information of client.In one embodiment, the mobile terminal be with gravity sensor or microphone and The equipment such as GPS (Global Positioning System, global positioning system) smart mobile phone or intelligent watch.One In individual embodiment, the mobile terminal 12 includes gravity sensor, and the relevant information of the client inputs including client 11 During main password, vibration signal that the gravity sensor receives.Specifically, the mobile terminal 12 can be placed on and visitor On 11 same desktop of family end, the behavior of stroking when inputting main password is received by gravity sensor, by the behavior production of stroking Raw vibration changes into corresponding pulse signal.In one embodiment, the mobile terminal 12 includes gravity sensor Mike Wind, when the relevant information of the client inputs main password including client 11, the sound that the gravity sensor receives is believed Number.Specifically, the mobile terminal 12 can be placed on to the additional of client 11, the main password of input is received by microphone When sound of stroking, by it is described stroke caused by sound change into corresponding pulse signal.Either obtained by gravity sensor To the obtained pulse signal of pulse signal or microphone can serve as the relevant information of client.In one embodiment In, the mobile terminal 12 also includes GPS, and in 11 main password of client, mobile terminal 12 is obtained current in real time by GPS Geographical location information and timestamp information, and the information acquired in GPS is also served as to the relevant information of client.
Two-pass cipher produces sending module 122 and is connected with client-side information acquisition module 121, for by using mobile whole The UID at end carries out signature to the relevant information of the client and produces two-pass cipher, and the two-pass cipher is sent into service Device.Specifically, the mobile terminal is according to passing through gravity sensor or microphone and GPS (Global Positioning System, global positioning system) the relevant information generation two-pass cipher of client that obtains, and the two-pass cipher is sent to Server 13.In one embodiment, two-pass cipher produces sending module 122 and is additionally operable to encrypt the two-pass cipher to be formed and adds The server 13 is sent to after Mi Bao.
The present invention provides a kind of accession authorization system.In one embodiment, as shown in Fig. 2 the accession authorization system 1 Include password acceptance module 131 and two-pass cipher including mobile terminal 12, client 11 and server 13, the server 13 Authentication module 132.Wherein:
Password acceptance module 131 is used to receive main password and two-pass cipher.Specifically, password acceptance module 131 is used to connect Receive the two-pass cipher that the main password and mobile terminal 12 that client 11 is sent are sent.
Two-pass cipher authentication module 132 is connected with password acceptance module 131, for true according to the main password relevant information Password authentification strategy, the validity of two-pass cipher described in the password authentification policy validation corresponding to fixed.In one embodiment, The two-pass cipher authentication module 132 is used for:Relevant information to the UID by using the mobile terminal to the client Two-pass cipher is verified caused by being signed, when the UID of the signing messages and the mobile terminal of the two-pass cipher is tested When demonstrate,proving consistent, the two-pass cipher is effective.Mobile terminal corresponding to being determined by the relevant information of the main password UID, the validity of the two-pass cipher is verified according to the UID of the mobile terminal.When the two-pass cipher is verified as effectively When, illustrate that the two-pass cipher is recognized, server will allow the client to log in.In one embodiment, it is described secondary close Code authentication module 132 is additionally operable to:When the two-pass cipher includes timestamp information, time for being parsed according to two-pass cipher Information is stabbed, compared with receiving the temporal information of the main password, determines the validity of the two-pass cipher.In one embodiment In, the two-pass cipher authentication module 132 is additionally operable to:When the two-pass cipher includes positional information, according to two-pass cipher The positional information parsed, compared with receiving the positional information of the client 11, determine the validity of the two-pass cipher.
In summary, a kind of login authentication method of the invention and system, have the advantages that:With reference to smart mobile phone Either intelligent watch etc. carries gravity sensor or microphone and GPS equipment, and by designated equipment within a specified time The percussion data collected by gravity sensor or microphone are used as two-pass cipher, make user only need to be by designated equipment Side is placed on (as authentication device), and as input password login usually, it is only necessary to input main password, designated equipment (intelligence Energy equipment) authentication operations of two step certifications can be automatically performed.Make user no longer need to obtain and be manually entered it is cumbersome secondary close Code, mistake lifting Consumer's Experience is reduced, and accordingly lift certain security.So the present invention effectively overcomes prior art In various shortcoming and have high industrial utilization.
The above-described embodiments merely illustrate the principles and effects of the present invention, not for the limitation present invention.It is any ripe Know the personage of this technology all can carry out modifications and changes under the spirit and scope without prejudice to the present invention to above-described embodiment.Cause This, those of ordinary skill in the art is complete without departing from disclosed spirit and institute under technological thought such as Into all equivalent modifications or change, should by the present invention claim be covered.

Claims (8)

1. a kind of login authentication method, it is characterised in that the login authentication method includes:
When client, which inputs, logs in main password, an acquisition for mobile terminal by pre-authentication being placed near the client The relevant information of the client;
The mobile terminal produces two-pass cipher according to the relevant information, and the two-pass cipher is sent into server;
Server receives the main password and two-pass cipher, verifies the validity of the two-pass cipher;When the two-pass cipher When effective, it is allowed to log in;
The mobile terminal includes gravity sensor, when the relevant information of the client includes client input main password, institute State the vibration signal that gravity sensor receives.
2. login authentication method according to claim 1, it is characterised in that:The two-pass cipher is by using the movement The UID of terminal carries out signature generation to the relevant information of the client, when signing messages and the shifting of the two-pass cipher When the UID checkings of dynamic terminal are consistent, the two-pass cipher is effective.
3. login authentication method according to claim 1, it is characterised in that:The mobile terminal includes GPS, the client When the relevant information at end includes client input main password, timestamp information and/or positional information that the GPS is determined;Service Device verifies that the validity of the two-pass cipher also includes:When the two-pass cipher includes timestamp information, according to secondary close The timestamp information that code parses, compared with receiving the temporal information of the main password, determines the effective of the two-pass cipher Property;And/or when the two-pass cipher includes positional information, the positional information that is parsed according to two-pass cipher, with connecing The positional information for receiving the client compares, and determines the validity of the two-pass cipher.
A kind of 4. accession authorization system, it is characterised in that:The accession authorization system includes mobile terminal, client and service Device, the mobile terminal include:
Client-side information acquisition module, for when client input log in main password when, client described in the acquisition for mobile terminal The relevant information at end;
Two-pass cipher produces sending module, and the relevant information of the client is carried out for the UID by using mobile terminal Signature produces two-pass cipher, and the two-pass cipher is sent into server;
The relevant information of client is described in the acquisition for mobile terminal:
The mobile terminal includes gravity sensor, when the relevant information of the client includes client input main password, institute State the vibration signal that gravity sensor receives;Or the mobile terminal includes microphone, the relevant information bag of the client When including client and inputting main password, voice signal that the microphone receives.
5. accession authorization system according to claim 4, it is characterised in that:The mobile terminal includes GPS, the client When the relevant information at end includes client input main password, timestamp information and/or positional information that the GPS is determined.
A kind of 6. accession authorization system, it is characterised in that:The accession authorization system includes mobile terminal, client and service Device, the server include:
Password acceptance module, for receiving main password and two-pass cipher;
Two-pass cipher authentication module, it is connected with the password acceptance module, for according to the main password relevant information determination pair The password authentification strategy answered, the validity of two-pass cipher described in the password authentification policy validation;
The two-pass cipher is the mobile terminal according to caused by relevant information;It is defeated that the relevant information includes the client When becoming owner of password, vibration signal that the gravity sensor of the mobile terminal receives.
7. accession authorization system according to claim 6, it is characterised in that:The two-pass cipher authentication module is additionally operable to: When the two-pass cipher includes timestamp information, the timestamp information that is parsed according to two-pass cipher is described with receiving The temporal information of main password compares, and determines the validity of the two-pass cipher.
8. accession authorization system according to claim 6, it is characterised in that:The two-pass cipher authentication module is additionally operable to: When the two-pass cipher includes positional information, the positional information that is parsed according to two-pass cipher, with receiving the client The positional information at end compares, and determines the validity of the two-pass cipher.
CN201510477097.XA 2015-08-06 2015-08-06 A kind of login authentication method and system Active CN104994115B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510477097.XA CN104994115B (en) 2015-08-06 2015-08-06 A kind of login authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510477097.XA CN104994115B (en) 2015-08-06 2015-08-06 A kind of login authentication method and system

Publications (2)

Publication Number Publication Date
CN104994115A CN104994115A (en) 2015-10-21
CN104994115B true CN104994115B (en) 2018-02-13

Family

ID=54305866

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510477097.XA Active CN104994115B (en) 2015-08-06 2015-08-06 A kind of login authentication method and system

Country Status (1)

Country Link
CN (1) CN104994115B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105227583B (en) * 2015-11-05 2019-08-02 上海斐讯数据通信技术有限公司 A kind of key encryption method and system, electronic equipment
CN105897780A (en) * 2016-06-29 2016-08-24 北京小米移动软件有限公司 Password protection method and device and terminal
CN106100889A (en) * 2016-07-01 2016-11-09 浪潮(北京)电子信息产业有限公司 The Enhancement Method of a kind of snmp protocol safety and device
CN108021803A (en) * 2016-10-31 2018-05-11 黄策 The management method of protection account logon information is divided by space-time
CN107734277B (en) * 2017-09-15 2020-12-15 西北工业大学 Tracing system and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103812659A (en) * 2014-02-10 2014-05-21 上海众人网络安全技术有限公司 Tonality format information based double-factor identity authentication method
CN104065653A (en) * 2014-06-09 2014-09-24 韩晟 Interactive authentication method, device, system and related equipment
CN104767616A (en) * 2015-03-06 2015-07-08 北京石盾科技有限公司 Message processing method, system and related device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030204724A1 (en) * 2002-04-30 2003-10-30 Microsoft Corporation Methods for remotely changing a communications password

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103812659A (en) * 2014-02-10 2014-05-21 上海众人网络安全技术有限公司 Tonality format information based double-factor identity authentication method
CN104065653A (en) * 2014-06-09 2014-09-24 韩晟 Interactive authentication method, device, system and related equipment
CN104767616A (en) * 2015-03-06 2015-07-08 北京石盾科技有限公司 Message processing method, system and related device

Also Published As

Publication number Publication date
CN104994115A (en) 2015-10-21

Similar Documents

Publication Publication Date Title
CN104994115B (en) A kind of login authentication method and system
US8646063B2 (en) Methods, apparatus, and computer program products for subscriber authentication and temporary code generation
CN105554098B (en) A kind of equipment configuration method, server and system
CN109729523B (en) Terminal networking authentication method and device
CN101873331B (en) Safety authentication method and system
CN106921663B (en) Identity continuous authentication system and method based on intelligent terminal software/intelligent terminal
US20110320802A1 (en) Authentication method, key distribution method and authentication and key distribution method
CN104917727A (en) Account authentication method, system and apparatus
CN103297403A (en) Method and system for achieving dynamic password authentication
US10291588B2 (en) Secure registration to a service provided by a web server
CN105227537A (en) Method for authenticating user identity, terminal and service end
CN104660605A (en) Multi-factor identity authentication method and system
CN104717224B (en) A kind of login method and device
CN107040513A (en) A kind of credible access registrar processing method, user terminal and service end
CN107612949B (en) Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint
CN103945374A (en) Method of mobile terminal equipment and user authentication based on PKI technology
CN103906052A (en) Mobile terminal authentication method, service access method and equipment
CN105719131A (en) Server, client and paying-for-another method of e-payment
CN106790080A (en) Secure communication of network method and apparatus between operation system and electronic certificate system
CN104717063A (en) Software security protection method of mobile terminal
CN107026823A (en) Applied to the access authentication method and terminal in WLAN WLAN
CN105407102B (en) Http request data reliability verifying method
CN104796262B (en) Data ciphering method and terminal system
CN107070918B (en) A kind of network application login method and system
CN102811369A (en) Security authentication method during video sharing and handheld equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201202

Address after: Room 10242, No. 260, Jiangshu Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou Jiji Intellectual Property Operation Co., Ltd

Address before: 201616 Shanghai city Songjiang District Sixian Road No. 3666

Patentee before: Phicomm (Shanghai) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201222

Address after: 8319 Yanshan Road, Bengbu City, Anhui Province

Patentee after: Bengbu Lichao Information Technology Co.,Ltd.

Address before: Room 10242, No. 260, Jiangshu Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee before: Hangzhou Jiji Intellectual Property Operation Co., Ltd

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210311

Address after: 313000 room 1019, Xintiandi commercial office, Yishan street, Wuxing District, Huzhou, Zhejiang, China

Patentee after: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

Address before: 8319 Yanshan Road, Bengbu City, Anhui Province

Patentee before: Bengbu Lichao Information Technology Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210831

Address after: 321, floor 3, building 8, Zhongguancun Software Park, No. 8, Dongbeiwang West Road, Haidian District, Beijing 100089

Patentee after: DMS Corp.

Address before: 313000 room 1019, Xintiandi commercial office, Yishan street, Wuxing District, Huzhou, Zhejiang, China

Patentee before: Huzhou YingLie Intellectual Property Operation Co.,Ltd.