CN105187368A - Method and system for accessing to applications of mobile terminal - Google Patents

Method and system for accessing to applications of mobile terminal Download PDF

Info

Publication number
CN105187368A
CN105187368A CN201510305181.3A CN201510305181A CN105187368A CN 105187368 A CN105187368 A CN 105187368A CN 201510305181 A CN201510305181 A CN 201510305181A CN 105187368 A CN105187368 A CN 105187368A
Authority
CN
China
Prior art keywords
authorization information
user
application
nfc carrier
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510305181.3A
Other languages
Chinese (zh)
Other versions
CN105187368B (en
Inventor
陈喜玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou TCL Mobile Communication Co Ltd
Original Assignee
Huizhou TCL Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou TCL Mobile Communication Co Ltd filed Critical Huizhou TCL Mobile Communication Co Ltd
Priority to CN201510305181.3A priority Critical patent/CN105187368B/en
Publication of CN105187368A publication Critical patent/CN105187368A/en
Application granted granted Critical
Publication of CN105187368B publication Critical patent/CN105187368B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration

Abstract

The invention discloses a method and a system for accessing to applications of a mobile terminal. The method comprises the steps that the mobile terminal receives first request information sent by a user for requesting to log in an application; the first request information is received, and then whether an NFC (near field communication) carrier exists or not around the mobile terminal is detected; first verification information prestored in the NFC carrier is acquired when the NFC carrier exists; the acquired first verification information is matched with first verification information prestored in an application server; and a user login interface of the application is displayed if the matching is successful so as to use the application normally. Through the mode disclosed by the invention, a circumstance that lawbreakers can get into the application of the mobile phone by only using a user name and a password is greatly avoided, thereby guaranteeing the safety of personal money and information of the user.

Description

A kind of access method of mobile terminal application and access system
Technical field
The present invention relates to technical field of mobile terminals, particularly relate to access method and the access system of the application of a kind of mobile terminal.
Background technology
Along with the development of mobile terminal and network, the disposal ability of mobile terminal (comprising smart mobile phone, panel computer etc.) from strength to strength, the application being suitable for running on mobile terminals is developed more, such as mobile terminal payment treasured, mobile terminal Web bank etc., user can carry out payment transaction whenever and wherever possible by mobile terminal payment Baoying County with, Web bank, and pole is user-friendly to.
For Web bank, hold at computer PC, a lot of bank all uses USBkey to enter the unique media of bank system of web as user, even if the username and password that lawless person has stolen user thus also cannot enter bank system of web.But, for the Web bank on mobile terminal, when user uses Web bank on mobile terminals, usually only need input username and password and can log in these application, therefore once username and password leaks, the individual Web bank account that lawless person can login user by username and password on mobile terminals steals wealth, causes certain loss to user.
Summary of the invention
The technical problem that the present invention mainly solves is to provide the access method of a kind of mobile terminal application, can greatly avoid lawless person only to use username and password can enter the application of mobile terminal, ensures the individual wealth of user and the safety of information.
For solving the problems of the technologies described above, the technical scheme that the present invention adopts is: the access method providing a kind of mobile terminal to apply, comprising: mobile terminal receives the first solicited message that user asks to log in application; Detect after receiving described first solicited message around mobile terminal and whether there is NFC carrier; When there is NFC carrier, obtain the first authorization information prestored in described NFC carrier; Described first authorization information obtained is mated with the first authorization information prestored in application server; If the match is successful, then show user's login interface of described application, normally to use described application.
Wherein, if the match is successful described, then, after showing the step of user's login interface of described application, comprising: described mobile terminal receives by described user's login interface the user authentication information that user asks to log in application; The described user authentication information received is mated with the second authorization information prestored in described NFC carrier, if the match is successful, then log in described application, the second authorization information one_to_one corresponding prestored in the first authorization information prestored in described NFC carrier and described NFC carrier.
Wherein, receive the step of the first solicited message that user asks login to be applied at described mobile terminal before, also comprise: the second solicited message receiving the application of user's request registration; Detect after receiving described second solicited message around mobile terminal and whether there is NFC carrier; When there is NFC carrier, display user register interface; Receive the log-on message that user inputs in described user's register interface; Described log-on message is stored to respectively in described NFC carrier and application server, to prestore described second authorization information in described NFC carrier, and generate and described second authorization information the first authorization information one to one, described first authorization information generated is stored in described NFC carrier and application server, to prestore the first authorization information in described NFC carrier and application server respectively.
Wherein, described first authorization information is random cipher, and described second authorization information comprises user name and login password.
Wherein, also comprise: if it fails to match for the first authorization information prestored in described first authorization information and the application server that obtain, then output normally cannot use the information of application.
For solving the problems of the technologies described above, another technical solution used in the present invention is: the access system providing a kind of mobile terminal to apply, comprising: mobile terminal, application server and NFC carrier; Described mobile terminal comprises the first receiver module, first detection module, the first matching module and the first processing module; Described first receiver module asks to log in the first solicited message of application for receiving user; Described first detection module is used for detecting around mobile terminal whether there is NFC carrier after described first receiver module receives described first solicited message; Described first matching module is used for when described first detection module detects NFC carrier, obtain the first authorization information prestored in described NFC carrier, and described first authorization information obtained is mated with the first authorization information prestored in described application server; Described first processing module is used for when the match is successful, shows user's login interface of described application, normally to use described application.
Wherein, described mobile terminal also comprises the second receiver module, the second matching module and the second processing module; Described second receiver module is used for receiving by described user's login interface the user authentication information that user asks to log in application; Described second matching module is used for the described user authentication information received to mate with the second authorization information prestored in described NFC carrier, the second authorization information one_to_one corresponding prestored in the first authorization information prestored in described NFC carrier and described NFC carrier; When described second processing module is used for the second authorization information of prestoring in the described user authentication information received and described NFC carrier the match is successful, log in described application.
Wherein, described mobile terminal also comprises the 3rd receiver module, the second detection module, display module, the 4th receiver module, the first memory module, generation module and the second memory module; Described 3rd receiver module is for receiving the second solicited message of user's request registration application; Described second detection module is used for detecting around mobile terminal whether there is NFC carrier after described 3rd receiver module receives described second solicited message; Described display module is used for showing user's register interface when described second detection module detects and there is NFC carrier; The log-on message that described 4th receiver module inputs in described user's register interface for receiving user; Described first memory module is used for being stored in described NFC carrier and application server respectively by described log-on message, to prestore described second authorization information in described NFC carrier; Described generation module is used for generating and described second authorization information the first authorization information one to one; Described second memory module is used for described first authorization information generated to be stored in described NFC carrier and application server respectively, to prestore the first authorization information in described NFC carrier and application server.
Wherein, described first authorization information is random cipher, and described second authorization information comprises user name and login password.
Wherein, described first processing module is when also for the first authorization information of prestoring in described first authorization information and the application server that obtain, it fails to match, and output normally cannot use the information of application.
The invention has the beneficial effects as follows: the situation being different from prior art, the present invention is by combining the application of mobile terminal and NFC carrier, when user asks to log in the application on mobile terminal, after detecting and there is NFC carrier around mobile terminal, further the first authorization information prestored in the first authorization information prestored in NFC carrier and application server is mated, only have that the match is successful and just open user's login interface of application.By the way, when using the application of mobile terminal, the NFC carrier storing authorization information must be used normally could to use this application, even if having user name thus and login password also cannot use application on mobile terminals, therefore avoiding lawless person only uses user name and login password to enter application, has ensured wealth and the information security of user.
Accompanying drawing explanation
Fig. 1 is the flow chart of access method one execution mode of mobile terminal of the present invention application;
Fig. 2 is in access method one execution mode of mobile terminal of the present invention application, and mobile terminal receives the flow chart that user asks to log in before the step of the first solicited message applied;
Fig. 3 is the structural representation of access system one execution mode of mobile terminal of the present invention application.
Embodiment
Below in conjunction with drawings and embodiments, the present invention is described in detail.
Consult Fig. 1, in an execution mode of the access method of mobile terminal application of the present invention, mobile terminal application can be the application such as Alipay, Web bank on mobile terminal, and described method comprises the steps:
Step S101: mobile terminal receives the first solicited message that user asks to log in application.
After user opens application on mobile terminals, the startup interface of application can provide to user and log in application and registered application two options for user selections.User sends by clicking the button logging in application the first solicited message that request logs in application.
Step S102: detect around mobile terminal whether there is NFC carrier after receiving the first solicited message.
NFC carrier can be such as that NFC label or NFC paste.When using application, NFC label or NFC can be pasted on mobile terminals, and when not needing to use application, NFC can be pasted and take off.
Step S103: when there is NFC carrier, obtains the first authorization information prestored in NFC carrier.
When NFC carrier not detected, prompting user provides NFC carrier, or points out user to use application to play window mode.
Step S104: the first authorization information obtained is mated with the first authorization information prestored in application server.
In present embodiment, the first authorization information is random cipher.Certainly, the first authorization information can also be the information such as sound, picture or word.
After acquisition for mobile terminal first authorization information, verified the first authorization information obtained by the first authorization information in application server, concrete verification step comprises: judge that whether the first authorization information in the NFC carrier obtained is consistent with the first authorization information prestored in application server.
Step S105: if the match is successful, then user's login interface of display application, normally to use application.
When the first authorization information stored in the first authorization information judged in NFC carrier and application server is consistent, then the match is successful for the first authorization information in NFC carrier and the first authorization information in application server, namely be verified, now user's login interface of display application, normally to use application.When the first authorization information stored in the first authorization information judged in NFC carrier and application server is inconsistent, then it fails to match for the first authorization information in NFC carrier and the first authorization information in application server, namely verify and do not pass through, now export the information that normally cannot use application, wherein, information can be exported in modes such as display or voice broadcasts.
By the way, application and NFC carrier are combined, only around mobile terminal, there is NFC carrier, and the first authorization information in NFC carrier and the first authorization information in application server normally can use application when matching, even if lawless person steals the user name of user and login password is also difficult to use on mobile terminals thus, can avoid only using user name and login password to enter application.
Further, after the step of user's login interface of display application, comprise step: mobile terminal receives by user's log-in interface the user rs authentication message that user asks to log in application; The user authentication information received is mated with the second authorization information prestored in NFC carrier, if the match is successful, then logs in application, if it fails to match, then export the information that normally cannot use application.
After the login interface of display application, user logs in application by the request of input user authentication information.The user authentication information of present embodiment comprises user name and login password.Mobile terminal receives the user authentication information of user's input, by mating, user authentication information to verify user authentication information with the second authorization information prestored in NFC carrier.
Second authorization information comprises username and password.When user authentication information and the second authorization information consistent time, the match is successful for both, namely user authentication information is by checking, now log in application, user normally can use application, when user authentication information and the second authorization information inconsistent time, it fails to match for both, namely user authentication information is not by checking, now points out user normally cannot use application.User authentication information and the second authorization information can also comprise the sex of user, hobby and user-defined information.
Wherein, when it fails to match for user authentication information and the second authorization information, normally can cannot use the information of application to user's display, or point out user to use application by the mode of voice broadcast.Certainly, the second authorization information prestored in user authentication information and NFC carrier when it fails to match, also directly can close application.
In addition, the first authorization information prestored in NFC carrier and the second authorization information one_to_one corresponding, the user name namely stored in NFC carrier is corresponding with a random cipher with login password.
Pass through present embodiment, when using application on mobile terminals, after the first authorization information prestored in NFC carrier is by checking, in recycling NFC carrier, second authorization information corresponding with the first authorization information is verified the user authentication information that user inputs, therefore only have and use the NFC carrier of user normally can use application on mobile terminals, even if lawless person has stolen user name and the login password of user thus, because it does not have the NFC carrier of user, therefore its user name of stealing and login password cannot on mobile terminals by checkings, also just application cannot be entered by the user name of user and login password on mobile terminals, thus ensured personal property and the information security of user.In addition, NFC carrier can adopt NFC to paste or NFC label realizes, cost is lower, and volume is little easily hiding, be conducive to preventing the NFC carrier of user stolen, and NFC carrier can be placed on family when seldom using, make lawless person be difficult to get the NFC carrier of user, and then be difficult on mobile terminals by user name and the login password login application of user.
In the execution mode of the access method of mobile terminal application of the present invention, in each NFC carrier, store a user name and login password, and a random cipher corresponding with this user name and login password.Certainly, also multiple user name and login password can be bound in each NFC carrier, and random cipher.
Consult Fig. 2, in the execution mode of the access method of mobile terminal application of the present invention, receive the step of the first solicited message that user asks login to be applied at mobile terminal before, comprise the steps:
Step S201: the second solicited message receiving the application of user's request registration.
User sends the second solicited message of request registration application by the OptionButton clicking registered application.
Step S202: detect around mobile terminal whether there is NFC carrier after receiving the second solicited message.
In present embodiment, by the process of user's registered application, authorization information is stored in NFC carrier, therefore before registered application, whether there is NFC carrier around first sense terminals.
Step S203: when there is NCF carrier, display user register interface.
Wherein, when there is not NFC carrier, exporting the information that NFC carrier is provided, around mobile terminal, providing NFC carrier with reminding user.
Step S204: receive the log-on message that user inputs in user's register interface.
Log-on message comprises user name, login password, sex, hobby, contact number etc.
Step S205: log-on message is stored to respectively in NFC carrier and application server, to prestore the second authorization information in NFC carrier and application server, and generate and the second authorization information the first authorization information one to one, the first authorization information generated is stored in NFC carrier and application server, to prestore the first authorization information in NFC carrier and application server respectively.
Wherein, can using the user name in log-on message and login password as the second authorization information, or using the user name in log-on message, login password and contact number as the second authorization information, now user is when user's login interface input user authentication information, needs accordingly to input user name, password and contact number.
After log-on message is stored to NFC carrier and application server, produce a random cipher, i.e. the first authorization information, and make this first authorization information and the second authorization information one_to_one corresponding.By the way, the first authorization information and the second authorization information are prestored in NFC carrier.Certainly, in other embodiments, the first authorization information and the second authorization information also can directly be stored in NFC carrier by user.
Consult Fig. 3, in access system one execution mode of mobile terminal of the present invention application, the access method of application of access system for performing above-mentioned Fig. 1 illustrated embodiment and providing, access system comprises mobile terminal 30, application server 31 and NFC carrier 32.Mobile terminal 30 comprises the first receiver module 301, first detection module 302, first matching module 303 and the first processing module 304.
Wherein, the first receiver module 301 asks to log in the first solicited message of application for receiving user.After user opens application on mobile terminals, log in application by clicking login button request.First detection module 302 for detecting around mobile terminal 30 whether there is NFC carrier 32 after the first receiver module 301 receives the first solicited message.NFC carrier can be such as that NFC label or NFC paste.When using application, NFC label or NFC can be attached on mobile terminal 30, and when not needing to use application, NFC can be pasted and take off.
First matching module 303 is for when first detection module 302 detects NFC carrier 32, obtain the first authorization information prestored in NFC carrier 32, and the first authorization information obtained is mated with the first authorization information prestored in application server 31.In present embodiment, the first authorization information is random cipher.Certainly, also can be the information such as sound, picture or word.
First matching module 303 is after obtaining the first authorization information in NFC carrier 32, utilize the first authorization information in application server 31 to obtain the first authorization information verify, particularly verification step comprise judge acquisition NFC carrier 32 in the first authorization information whether consistent with the first authorization information prestored in application server 31.When consistent, the match is successful for the first authorization information in NFC carrier 32 and the first authorization information in application server 31, is namely verified, when inconsistent, it fails to match for the first authorization information in NFC carrier 32 and the first authorization information in application server 31, namely verifies and do not pass through.
First processing module 304 is when for the first authorization information in NFC carrier 32 and the first authorization information in application server 31, the match is successful, user's login interface of display application, normally to use application, and the first authorization information in NFC carrier 32 and the first authorization information in application server 31 are when it fails to match, output normally cannot use the information of application, wherein, information can be exported in the mode of display or voice broadcast.
By the way, application and NFC carrier 32 are combined, only around mobile terminal 30, there is NFC carrier 32, and the first authorization information in NFC carrier 32 and the first authorization information in application server 31 normally can use application when matching, even if lawless person steals the user name of user and login password is also difficult to use on mobile terminal 30 thus, can avoid only using user name and login password to enter application.
Further, mobile terminal 30 also comprises the second receiver module 305, second matching module 306 and the second processing module 307.
Wherein, the second receiver module 305 is for receiving the user authentication information that user asks to log in application by user's login interface.User logs in application by the request of input user authentication information, and wherein, user authentication information comprises user name and login password.
Second matching module 306 is for mating the user authentication information received with the second authorization information prestored in NFC carrier 32, to verify user authentication information.Wherein, the second authorization information comprises user name and login password.When user authentication information and the second authorization information consistent time, the match is successful for both, namely user authentication information by checking, when user authentication information and the second authorization information inconsistent time, it fails to match for both, namely user authentication information by checking.User authentication information and the second authorization information can also comprise the sex of user, hobby and user-defined information.
Second processing module 307 is for when user authentication information is mated with the second authorization information, log in application, when user authentication information is not mated with the second authorization information, output normally cannot use the information of application, such as, can export information in the mode of the mode of display or voice broadcast.
In addition, in present embodiment, further, mobile terminal 30 also comprises the 3rd receiver module 308, second detection module 309, display module 401, the 4th receiver module 402, first memory module 403, generation module 404 and the second memory module 405.
Wherein, the 3rd receiver module 308 is for receiving the second solicited message of user's request registration application.User sends the second solicited message of request registration application by the OptionButton clicking registered application.
Second detection module 309 for detecting around mobile terminal 30 whether there is NFC carrier 32 after the 3rd receiver module 308 receives the second solicited message.
Display module 401 is for showing user's register interface when the second detection module 309 detects and there is NFC carrier 32.
The log-on message that 4th receiver module 402 inputs in user's register interface for receiving user.Log-on message comprises user name, login password, sex, hobby, contact number etc.
First memory module 403 for log-on message being stored to respectively in NFC carrier 32 and application server 31, to prestore the second authorization information in NFC carrier 32 and application server 31.Wherein, can using the user name in log-on message and login password as the second authorization information, accordingly, the user authentication information that user inputs in user's login interface is also user name and login password.
Generation module 404 is for generating and the second authorization information the first authorization information one to one.
Second memory module 405 is for being stored in NFC carrier 32 and application server 31 respectively, to prestore the first authorization information in NFC carrier 32 and application server 31 by described first authorization information generated.
In present embodiment, by the registration process of user, the first authorization information and the second authorization information are prestored in NFC carrier 32 and application server 31, in other embodiments, the first authorization information and the second authorization information also can directly be stored in NFC carrier 32 and application server 31 by user.
By the access system of present embodiment, when using application on mobile terminal 30, the first authorization information prestored in NFC carrier 32 is by after checking, in recycling NFC carrier 32, second authorization information corresponding with the first authorization information is verified the user authentication information that user inputs, therefore only have and use the NFC carrier 32 of user on mobile terminal 30, normally can use application, even if lawless person has stolen user name and the login password of user thus, because it does not have the NFC carrier of user, therefore its user name of stealing and login password cannot by checkings on mobile terminal 30, also just on mobile terminal 30, application cannot be entered by the user name of user and login password, thus ensured personal property and the information security of user.In addition, NFC carrier 32 can adopt NFC to paste or NFC label realizes, cost is lower, and volume is little easily hiding, be conducive to preventing the NFC carrier of user stolen, and NFC carrier can be placed on family when seldom using, make lawless person be difficult to get the NFC carrier of user, and then be difficult on mobile terminals by user name and the login password login application of user.
In several embodiment provided by the present invention, should be understood that, disclosed system, apparatus and method, can realize by another way.Such as, device embodiment described above is only schematic, such as, the division of described module or unit, be only a kind of logic function to divide, actual can have other dividing mode when realizing, such as multiple unit or assembly can in conjunction with or another system can be integrated into, or some features can be ignored, or do not perform.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, and the indirect coupling of device or unit or communication connection can be electrical, machinery or other form.
The described unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, also can be that the independent physics of unit exists, also can two or more unit in a unit integrated.Above-mentioned integrated unit both can adopt the form of hardware to realize, and the form of SFU software functional unit also can be adopted to realize.
If described integrated unit using the form of SFU software functional unit realize and as independently production marketing or use time, can be stored in a computer read/write memory medium.Based on such understanding, the part that technical scheme of the present invention contributes to prior art in essence in other words or all or part of of this technical scheme can embody with the form of software product, this computer software product is stored in a storage medium, comprising some instructions in order to make a computer equipment (can be personal computer, server, or the network equipment etc.) or processor (processor) perform all or part of step of method described in each embodiment of the present invention.And aforesaid storage medium comprises: USB flash disk, portable hard drive, read-only memory (ROM, Read-OnlyMemory), random access memory (RAM, RandomAccessMemory), magnetic disc or CD etc. various can be program code stored medium.
The foregoing is only embodiments of the present invention; not thereby the scope of the claims of the present invention is limited; every utilize specification of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (10)

1. an access method for mobile terminal application, is characterized in that, comprising:
Mobile terminal receives the first solicited message that user asks to log in application;
Detect after receiving described first solicited message around mobile terminal and whether there is NFC carrier;
When there is NFC carrier, obtain the first authorization information prestored in described NFC carrier;
Described first authorization information obtained is mated with the first authorization information prestored in application server;
If the match is successful, then show user's login interface of described application, normally to use described application.
2. method according to claim 1, is characterized in that, if the match is successful described, then, after showing the step of user's login interface of described application, comprising:
Described mobile terminal receives by described user's login interface the user authentication information that user asks to log in application;
The described user authentication information received is mated with the second authorization information prestored in described NFC carrier, if the match is successful, then log in described application, the second authorization information one_to_one corresponding prestored in the first authorization information prestored in described NFC carrier and described NFC carrier.
3. method according to claim 2, is characterized in that, before receiving the step of the first solicited message that user asks login to be applied, also comprises at described mobile terminal:
Receive the second solicited message of user's request registration application;
Detect after receiving described second solicited message around mobile terminal and whether there is NFC carrier;
When there is NFC carrier, display user register interface;
Receive the log-on message that user inputs in described user's register interface;
Described log-on message is stored to respectively in described NFC carrier and application server, to prestore described second authorization information in described NFC carrier, and generate and described second authorization information the first authorization information one to one, described first authorization information generated is stored in described NFC carrier and application server, to prestore the first authorization information in described NFC carrier and application server respectively.
4. method according to claim 3, is characterized in that, described first authorization information is random cipher, and described second authorization information comprises user name and login password.
5. method according to claim 1, is characterized in that, also comprises:
If it fails to match for the first authorization information prestored in described first authorization information and the application server that obtain, then output normally cannot use the information of application.
6. an access system for mobile terminal application, is characterized in that, comprising: mobile terminal, application server and NFC carrier;
Described mobile terminal comprises the first receiver module, first detection module, the first matching module and the first processing module;
Described first receiver module asks to log in the first solicited message of application for receiving user;
Described first detection module is used for detecting around mobile terminal whether there is NFC carrier after described first receiver module receives described first solicited message;
Described first matching module is used for when described first detection module detects NFC carrier, obtain the first authorization information prestored in described NFC carrier, and described first authorization information obtained is mated with the first authorization information prestored in described application server;
Described first processing module is used for when the match is successful, shows user's login interface of described application, normally to use described application.
7. access system according to claim 6, is characterized in that, described mobile terminal also comprises the second receiver module, the second matching module and the second processing module;
Described second receiver module is used for receiving by described user's login interface the user authentication information that user asks to log in application;
Described second matching module is used for the described user authentication information received to mate with the second authorization information prestored in described NFC carrier, the second authorization information one_to_one corresponding prestored in the first authorization information prestored in described NFC carrier and described NFC carrier;
When described second processing module is used for the second authorization information of prestoring in the described user authentication information received and described NFC carrier the match is successful, log in described application.
8. access system according to claim 7, is characterized in that, described mobile terminal also comprises the 3rd receiver module, the second detection module, display module, the 4th receiver module, the first memory module, generation module and the second memory module;
Described 3rd receiver module is for receiving the second solicited message of user's request registration application;
Described second detection module is used for detecting around mobile terminal whether there is NFC carrier after described 3rd receiver module receives described second solicited message;
Described display module is used for showing user's register interface when described second detection module detects and there is NFC carrier;
The log-on message that described 4th receiver module inputs in described user's register interface for receiving user;
Described first memory module is used for being stored in described NFC carrier and application server respectively by described log-on message, to prestore described second authorization information in described NFC carrier;
Described generation module is used for generating and described second authorization information the first authorization information one to one;
Described second memory module is used for described first authorization information generated to be stored in described NFC carrier and application server respectively, to prestore the first authorization information in described NFC carrier and application server.
9. access system according to claim 8, is characterized in that, described first authorization information is random cipher, and described second authorization information comprises user name and login password.
10. access system according to claim 6, it is characterized in that, described first processing module is when also for the first authorization information of prestoring in described first authorization information and the application server that obtain, it fails to match, and output normally cannot use the information of application.
CN201510305181.3A 2015-06-05 2015-06-05 A kind of access method and access system of mobile terminal application Active CN105187368B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510305181.3A CN105187368B (en) 2015-06-05 2015-06-05 A kind of access method and access system of mobile terminal application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510305181.3A CN105187368B (en) 2015-06-05 2015-06-05 A kind of access method and access system of mobile terminal application

Publications (2)

Publication Number Publication Date
CN105187368A true CN105187368A (en) 2015-12-23
CN105187368B CN105187368B (en) 2019-09-20

Family

ID=54909213

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510305181.3A Active CN105187368B (en) 2015-06-05 2015-06-05 A kind of access method and access system of mobile terminal application

Country Status (1)

Country Link
CN (1) CN105187368B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105824510A (en) * 2016-04-28 2016-08-03 努比亚技术有限公司 Display method and device
CN106921498A (en) * 2015-12-28 2017-07-04 腾讯科技(深圳)有限公司 The security processing of virtual resource, device and system
CN107463810A (en) * 2017-08-15 2017-12-12 合肥爱吾宠科技有限公司 The method that protecting computer software is realized based on network communication
CN111435944A (en) * 2019-01-14 2020-07-21 上海博泰悦臻电子设备制造有限公司 Vehicle control method, vehicle, mobile terminal, and computer-readable storage medium
CN112393734A (en) * 2019-08-13 2021-02-23 上海博泰悦臻网络技术服务有限公司 Navigation method, server and computer readable storage medium
WO2022111691A1 (en) * 2020-11-30 2022-06-02 华为技术有限公司 Nfc tag verification method and related device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102811228A (en) * 2012-08-31 2012-12-05 中国联合网络通信集团有限公司 Network business login method, equipment and system
CN104579668A (en) * 2013-10-28 2015-04-29 深圳市腾讯计算机系统有限公司 User identity verification method, password protection device and verification system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102811228A (en) * 2012-08-31 2012-12-05 中国联合网络通信集团有限公司 Network business login method, equipment and system
CN104579668A (en) * 2013-10-28 2015-04-29 深圳市腾讯计算机系统有限公司 User identity verification method, password protection device and verification system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106921498A (en) * 2015-12-28 2017-07-04 腾讯科技(深圳)有限公司 The security processing of virtual resource, device and system
CN106921498B (en) * 2015-12-28 2019-09-20 腾讯科技(深圳)有限公司 The security processing of virtual resource, device and system
CN105824510A (en) * 2016-04-28 2016-08-03 努比亚技术有限公司 Display method and device
CN107463810A (en) * 2017-08-15 2017-12-12 合肥爱吾宠科技有限公司 The method that protecting computer software is realized based on network communication
CN111435944A (en) * 2019-01-14 2020-07-21 上海博泰悦臻电子设备制造有限公司 Vehicle control method, vehicle, mobile terminal, and computer-readable storage medium
CN112393734A (en) * 2019-08-13 2021-02-23 上海博泰悦臻网络技术服务有限公司 Navigation method, server and computer readable storage medium
WO2022111691A1 (en) * 2020-11-30 2022-06-02 华为技术有限公司 Nfc tag verification method and related device
EP4239518A4 (en) * 2020-11-30 2024-04-03 Huawei Tech Co Ltd Nfc tag verification method and related device

Also Published As

Publication number Publication date
CN105187368B (en) 2019-09-20

Similar Documents

Publication Publication Date Title
CN105187368A (en) Method and system for accessing to applications of mobile terminal
US10523708B1 (en) System and method for second factor authentication of customer support calls
US10152581B2 (en) Methods and systems for data entry
US10079826B2 (en) Methods and systems for data entry
CN101106455B (en) Identity authentication method and intelligent secret key device
US8639619B1 (en) Secure payment method and system
WO2017162112A1 (en) Identity registration method and device
US9071422B2 (en) Access authentication method for multiple devices and platforms
AU2020316972A1 (en) First factor contactless card authentication system and method
CN104348612A (en) Third-party website login method based on mobile terminal and mobile terminal
US10171456B2 (en) Wireless authentication system and wireless authentication method for one time password of mobile communication terminal having near field communication function
US9705875B2 (en) Data storage system and method for security information interaction
CN105554146A (en) Remote access method and device
CN103701977A (en) Portable electronic device, communication system and information authentication method
CN103905191A (en) Verification method applied to mobile terminal, mobile terminal and system
CN105656627A (en) Identity verification method, device and system
CN104580112A (en) Service authentication method and system, and server
US20230281594A1 (en) Authentication for third party digital wallet provisioning
CN103684796A (en) SMI (subscriber identity module) card and personal identity authentication method
CN103544598A (en) Financial transaction safety certification system
CN105635103A (en) Network authentication method using card device
CN104113417A (en) Dynamic password identity authentication method and system based on near field communication (NFC)
CN110971410A (en) User information verification method, intelligent terminal and computer readable storage medium
CN103457730B (en) Safety information interaction device and method and for the mutual IC-card of safety information
CN104156859A (en) Network transaction system and method based on dynamic passwords

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant