CN105187368B - A kind of access method and access system of mobile terminal application - Google Patents

A kind of access method and access system of mobile terminal application Download PDF

Info

Publication number
CN105187368B
CN105187368B CN201510305181.3A CN201510305181A CN105187368B CN 105187368 B CN105187368 B CN 105187368B CN 201510305181 A CN201510305181 A CN 201510305181A CN 105187368 B CN105187368 B CN 105187368B
Authority
CN
China
Prior art keywords
verification information
user
application
nfc carrier
stored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510305181.3A
Other languages
Chinese (zh)
Other versions
CN105187368A (en
Inventor
陈喜玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou TCL Mobile Communication Co Ltd
Original Assignee
Huizhou TCL Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou TCL Mobile Communication Co Ltd filed Critical Huizhou TCL Mobile Communication Co Ltd
Priority to CN201510305181.3A priority Critical patent/CN105187368B/en
Publication of CN105187368A publication Critical patent/CN105187368A/en
Application granted granted Critical
Publication of CN105187368B publication Critical patent/CN105187368B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Multimedia (AREA)
  • General Business, Economics & Management (AREA)
  • Business, Economics & Management (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of access method of mobile terminal application and access systems, which comprises mobile terminal receives user and requests to log in the first solicited message of application;It detects around mobile terminal after receiving first solicited message with the presence or absence of NFC carrier;When there are NFC carrier, pre-stored first verification information in the NFC carrier is obtained;First verification information that will acquire is matched with the first verification information pre-stored in application server;If successful match, user's login interface of the application is shown, to apply described in normal use.By the above-mentioned means, the present invention, which can greatly avoid criminal that username and password is only used only, can enter the application of mobile terminal, the personal wealth of user and the safety of information are ensured.

Description

A kind of access method and access system of mobile terminal application
Technical field
The present invention relates to technical field of mobile terminals, more particularly to the access method and access of a kind of application of mobile terminal System.
Background technique
With the development of mobile terminal and network, the processing capacity of mobile terminal (including smart phone, tablet computer etc.) Stronger and stronger, more applications for being suitable for running on mobile terminals are developed, such as mobile terminal payment is precious, mobile terminal net It goes to bank, user can carry out payment transaction with, Web bank by mobile terminal payment Baoying County whenever and wherever possible, extremely facilitate use Family uses.
For Web bank, at the end computer PC, many banks all use USB key as user and enter bank system of web Unique media thus cannot be introduced into bank system of web criminal has stolen the username and password of user. However, when user uses Web bank on mobile terminals, usually need to only input user for the Web bank on mobile terminal Name and password can log in these applications, once therefore username and password leak, criminal can lead on mobile terminals It crosses username and password and logins personal Web bank's account of user and steal wealth, certain loss is caused to user.
Summary of the invention
The invention mainly solves the technical problem of providing a kind of access methods of mobile terminal application, can greatly avoid Username and password, which is only used only, in criminal can enter the application of mobile terminal, ensure the personal wealth and information of user Safety.
In order to solve the above technical problems, one technical scheme adopted by the invention is that: a kind of application of mobile terminal is provided Access method, comprising: mobile terminal receives user and requests to log in the first solicited message of application;Receive first solicited message Detecting afterwards whether there is NFC carrier around mobile terminal;When there are NFC carrier, obtain pre-stored in the NFC carrier First verification information;Pre-stored first verification information carries out in first verification information and application server that will acquire Matching;If successful match, user's login interface of the application is shown, to apply described in normal use.
Wherein, if in the successful match, after the step of showing user's login interface of the application, comprising: institute It states mobile terminal and the user authentication information that user requests login application is received by user's login interface;The institute that will be received It states user authentication information to be matched with pre-stored second verification information in the NFC carrier, if successful match, log in The application, pre-stored second verifying in pre-stored first verification information and the NFC carrier in the NFC carrier Information corresponds.
Wherein, it before the mobile terminal receives the step of user requests the first solicited message of login application, also wraps It includes: receiving the second solicited message that user requests registration application;Detection mobile terminal is all after receiving second solicited message It encloses with the presence or absence of NFC carrier;When there are NFC carrier, user's registration interface is shown;User is received at the user's registration interface The registration information of input;The registration information is stored respectively into the NFC carrier and application server, in the NFC Second verification information is stored in advance in carrier, and generates and believes with one-to-one first verifying of second verification information Breath, first verification information of generation is stored respectively into the NFC carrier and application server, to carry in the NFC The first verification information is stored in advance in body and application server.
Wherein, first verification information is random cipher, and second verification information includes user name and login password.
Wherein, further includes: if pre-stored first verifying in first verification information and application server that obtain Information matches failure, then output can not normal use application prompt information.
In order to solve the above technical problems, another technical solution used in the present invention is: providing a kind of mobile terminal application Access system, comprising: mobile terminal, application server and NFC carrier;The mobile terminal include the first receiving module, First detection module, the first matching module and first processing module;First receiving module is stepped on for receiving user's request Record the first solicited message of application;The first detection module is used to receive the first request letter in first receiving module Detecting after breath whether there is NFC carrier around mobile terminal;First matching module is used to examine in the first detection module First verifying that when measuring NFC carrier, obtains pre-stored first verification information in the NFC carrier, and will acquire Information is matched with the first verification information pre-stored in the application server;The first processing module be used for When with success, user's login interface of the application is shown, to apply described in normal use.
Wherein, the mobile terminal further includes the second receiving module, the second matching module and Second processing module;It is described Second receiving module is used to receive user by user's login interface and requests to log in the user authentication information of application;Described The user authentication information that two matching modules are used to receive and pre-stored second verification information in the NFC carrier It is matched, pre-stored first verification information and the second verifying pre-stored in the NFC carrier in the NFC carrier Information corresponds;The Second processing module is used for pre- in the user authentication information and the NFC carrier received When the second verification information successful match first stored, the application is logged in.
Wherein, the mobile terminal further includes third receiving module, the second detection module, display module, the 4th reception mould Block, the first memory module, generation module and the second memory module;The third receiving module requests registration for receiving user Second solicited message of application;Second detection module is used to receive the second request letter in the third receiving module Detecting after breath whether there is NFC carrier around mobile terminal;The display module in second detection module for detecting There are show user's registration interface when NFC carrier;4th receiving module is for receiving user at the user's registration interface The registration information of input;First memory module is for storing the registration information respectively to the NFC carrier and application In server, second verification information to be stored in advance in the NFC carrier;The generation module for generate with it is described One-to-one first verification information of second verification information;The first verifying letter that second memory module is used to generate Breath is stored respectively into the NFC carrier and application server, the to be stored in advance in the NFC carrier and application server One verification information.
Wherein, first verification information is random cipher, and second verification information includes user name and login password.
Wherein, the first processing module is also used in first verification information of acquisition and application server in advance First verification information of storage is when it fails to match, output can not normal use application prompt information.
The beneficial effects of the present invention are: be in contrast to the prior art, the present invention by by the application of mobile terminal and NFC carrier is combined, when user request log in mobile terminal in application, detecting that there are NFC around mobile terminal After carrier, further in the first verification information pre-stored in NFC carrier and application server pre-stored first is tested Card information is matched, and only successful match just opens the user's login interface applied.By the above-mentioned means, using mobile whole End is stored with the application of the NFC carrier ability normal use of verification information in application, must use, even if thus possessing User name and login password also can not on mobile terminals using application, therefore avoid criminal be only used only user name and Login password can enter application, ensure the wealth and information security of user.
Detailed description of the invention
Fig. 1 is the flow chart of one embodiment of access method of mobile terminal application of the present invention;
Fig. 2 is in one embodiment of access method of mobile terminal application of the present invention, and mobile terminal receives user's request and steps on Flow chart before the step of recording the first solicited message of application;
Fig. 3 is the structural schematic diagram of one embodiment of access system of mobile terminal application of the present invention.
Specific embodiment
Below in conjunction with drawings and embodiments, the present invention is described in detail.
Refering to fig. 1, in an embodiment of the access method of mobile terminal application of the present invention, mobile terminal application be can be The application such as Alipay, Web bank on mobile terminal, described method includes following steps:
Step S101: mobile terminal receives user and requests to log in the first solicited message of application.
After user opens application on mobile terminals, the startup interface of application can provide a user login application and registration is answered It is selected with two options for user.User issues the first request letter of request login application by the button that click logs in application Breath.
Step S102: it detects around mobile terminal after receiving the first solicited message with the presence or absence of NFC carrier.
NFC carrier for example can be NFC label or NFC patch.When using the application, NFC label or NFC can be attached to On mobile terminal, removed without using in application, NFC can be pasted.
Step S103: when there are NFC carrier, pre-stored first verification information in NFC carrier is obtained.
When not detecting NFC carrier, user is prompted to provide NFC carrier, or prompt user can not in a manner of pop-up Use application.
Step S104: pre-stored first verification information carries out in the first verification information and application server that will acquire Matching.
In present embodiment, the first verification information is random cipher.Certainly, the first verification information can also be sound, figure The information such as piece or text.
After the first verification information of acquisition for mobile terminal, by the first verification information in application server to the first of acquisition Verification information is verified, and specific verification step includes: the first verification information and application clothes in the NFC carrier that judgement obtains Whether pre-stored first verification information in device of being engaged in is consistent.
Step S105: if successful match, user's login interface of application is shown, with normal use application.
When the first verification information for judging to store in the first verification information and application server in NFC carrier is consistent When, then the first verification information successful match in the first verification information and application server in NFC carrier, that is, be verified, Show user's login interface of application, at this time with normal use application.When judging the first verification information and application in NFC carrier When the first verification information stored in server is inconsistent, then in the first verification information and application server in NFC carrier It fails to match for first verification information, that is, verifies and do not pass through, at this time output can not normal use application prompt information, wherein can To export prompt information in a manner of display or voice broadcast etc..
By the above-mentioned means, will be combined using with NFC carrier, there are NFC carriers only around mobile terminal, and The first verification information in NFC carrier and the first verification information in application server when matching can normal use answer With thus being difficult to use on mobile terminals criminal steals the user name and login password of user, can be avoided User name and login password, which is only used only, can enter application.
Further, after the step of showing user's login interface of application, comprising steps of mobile terminal passes through user Log-in interface receives user and requests to log in the user's checking message of application;It will be in the user authentication information that received and NFC carrier Pre-stored second verification information is matched, if successful match, logs in application, if it fails to match, output can not be just It is often used the prompt information of application.
After the login interface of display application, user logs in application by input user authentication information request.This embodiment party The user authentication information of formula includes user name and login password.Mobile terminal receives the user authentication information of user's input, passes through User authentication information is matched with the second verification information pre-stored in NFC carrier, to be carried out to user authentication information Verifying.
Second verification information includes username and password.When user authentication information and consistent the second verification information, two Person's successful match, i.e. user authentication information by verifying, at this time log in application, user can normal use application, work as user's checking When information and inconsistent the second verification information, it fails to match for the two, i.e., user authentication information does not pass through verifying, prompts user at this time It can not normal use application.User authentication information and the second verification information can also include gender, hobby and the user of user Custom information.
Wherein, when it fails to match for user authentication information and the second verification information, can show to user normally to make User is prompted not to be available application with the prompt information of application, or by way of voice broadcast.Certainly, believe in user's checking Breath with NFC carrier in pre-stored second verification information it fails to match when, can also directly close application.
In addition, pre-stored first verification information and the second verification information in NFC carrier correspond, i.e. NFC is carried The user name and login password stored in body is corresponding with a random cipher.
By present embodiment, on mobile terminals using in application, when the first verifying letter pre-stored in NFC carrier After breath is by verifying, the user that the second verification information corresponding with the first verification information inputs user in NFC carrier is recycled Verification information is verified, thus only using user NFC carrier can normal use application on mobile terminals, thus Even if criminal has stolen the user name and login password of user, since it does not have the NFC carrier of user, stolen User name and login password can not on mobile terminals by verifying, also can not just pass through the user of user on mobile terminals Name and login password enter application, to ensure the personal property and information security of user.In addition, NFC carrier can use NFC patch or NFC label realize that cost is relatively low, and small in size easy to be hiding, and the NFC carrier for being beneficial to prevent user is stolen, and NFC carrier can be placed at home when rarely needed, so that criminal is difficult to get the NFC carrier of user, Jin Ernan Application is logged in pass through user name and the login password of user on mobile terminals.
In the embodiment of the access method of mobile terminal of the present invention application, a user is stored in each NFC carrier Name and login password, and a random cipher corresponding with the user name and login password.Certainly, in each NFC carrier Multiple user names and login password and random cipher can be bound.
Referring to Fig.2, receiving user in mobile terminal in the embodiment of the access method of mobile terminal of the present invention application Before request logs in the step of the first solicited message of application, include the following steps:
Step S201: the second solicited message that user requests registration application is received.
User issues the second solicited message of request registration application by clicking the option button of registration application.
Step S202: it detects around mobile terminal after receiving the second solicited message with the presence or absence of NFC carrier.
In present embodiment, verification information is stored in NFC carrier by the process applied by user's registration, therefore First detection terminal surrounding whether there is NFC carrier before registration application.
Step S203: when there are NCF carrier, user's registration interface is shown.
Wherein, when NFC carrier is not present, output provides the prompt information of NFC carrier, to remind user in mobile terminal Surrounding provides NFC carrier.
Step S204: the registration information that user inputs at user's registration interface is received.
Registration information includes user name, login password, gender, hobby, contact number etc..
Step S205: registration information is stored respectively into NFC carrier and application server, in NFC carrier and application The second verification information, and generation and one-to-one first verification information of the second verification information are stored in advance in server, will give birth to At the first verification information stored respectively into NFC carrier and application server, in NFC carrier and application server in advance Store the first verification information.
Wherein it is possible to using in registration information user name and login password as the second verification information, or will registration letter User name, login password and contact number in breath is as the second verification information, and user inputs in user's login interface and uses at this time When the verification information of family, accordingly need to input user name, password and contact number.
Registration information is being stored to NFC carrier and application server, is producing a random cipher, i.e., the first verifying letter Breath, and correspond first verification information and the second verification information.By the above-mentioned means, by the first verification information and second Verification information is stored in advance into NFC carrier.Certainly, in other embodiments, user can also by the first verification information and Second verification information is directly stored into NFC carrier.
Refering to Fig. 3, in one embodiment of access system of mobile terminal application of the present invention, access system is above-mentioned for executing Fig. 1 illustrated embodiment provide application access method, access system include mobile terminal 30, application server 31 and NFC carrier 32.Mobile terminal 30 includes the first receiving module 301, first detection module 302, the first matching module 303 and the One processing module 304.
Wherein, the first receiving module 301 is used to receive user and requests to log in the first solicited message of application.User is in movement After opening application in terminal, application can be logged in by clicking login button request.First detection module 302 is used to receive first Module 301 detects around mobile terminal 30 after receiving the first solicited message with the presence or absence of NFC carrier 32.NFC carrier for example may be used To be NFC label or NFC patch.When using the application, NFC label or NFC can be attached on mobile terminal 30, without It is removed using in application, NFC can be pasted.
First matching module 303 is used for when first detection module 302 detects NFC carrier 32, is obtained in NFC carrier 32 Pre-stored first verification information, and the first verification information that will acquire is tested in application server 31 pre-stored first Card information is matched.In present embodiment, the first verification information is random cipher.It is of course also possible to be sound, picture or text The information such as word.
First matching module 303 is after obtaining the first verification information in NFC carrier 32, using in application server 31 First verification information verifies the first verification information of acquisition, and specifically verification step includes the NFC carrier that judgement obtains Whether the first verification information and the first verification information pre-stored in application server 31 in 32 are consistent.When consistent, NFC The first verification information successful match in the first verification information and application server 31 in carrier 32, that is, be verified, when not When consistent, it fails to match for the first verification information in the first verification information and application server 31 in NFC carrier 32, that is, verifies Do not pass through.
First processing module 304 is for first in the first verification information and application server 31 in NFC carrier 32 When verification information successful match, user's login interface of application is shown, with normal use application, and in NFC carrier 32 The first verification information in first verification information and application server 31 is when it fails to match, output can not normal use application mention Show information, wherein prompt information can be exported in a manner of display or voice broadcast.
By the above-mentioned means, will be combined using with NFC carrier 32, only there are NFC loads around mobile terminal 30 Body 32, and when the first verification information in the first verification information and application server 31 in NFC carrier 32 matches, can Thus normal use application is difficult to make on mobile terminal 30 criminal steals the user name and login password of user With can be avoided only can enter application using only user name and login password.
Further, mobile terminal 30 further includes the second receiving module 305, the second matching module 306 and second processing Module 307.
Wherein, the second receiving module 305, which is used to receive user by user's login interface, requests the user for logging in application to test Demonstrate,prove information.User logs in application by input user authentication information request, wherein user authentication information includes user name and login Password.
Pre-stored second in the user authentication information and NFC carrier 32 that second matching module 306 is used to receive Verification information is matched, to verify to user authentication information.Wherein, the second verification information includes user name and logs in close Code.When user authentication information and consistent the second verification information, the two successful match, i.e. user authentication information pass through verifying, When user authentication information and inconsistent the second verification information, it fails to match for the two, i.e., user authentication information does not pass through verifying.With Family verification information and the second verification information can also include gender, hobby and the user's custom information of user.
Second processing module 307 is used for when user authentication information is matched with the second verification information, application is logged in, in user When verification information and the second verification information mismatch, output can not normal use application prompt information, such as can be with display Mode or the mode of voice broadcast export prompt information.
In addition, further, mobile terminal 30 further includes that third receiving module 308, second detects mould in present embodiment Block 309, display module 401, the 4th receiving module 402, the first memory module 403, generation module 404 and the second memory module 405。
Wherein, third receiving module 308 is used to receive the second solicited message that user requests registration application.User can pass through The option button for clicking registration application issues the second solicited message of request registration application.
Second detection module 309 is for detecting mobile terminal after third receiving module 308 receives the second solicited message It whether there is NFC carrier 32 around 30.
Display module 401 is for showing user's registration circle when the second detection module 309 detects the presence of NFC carrier 32 Face.
4th receiving module 402 is for receiving the registration information that user inputs at user's registration interface.Registration information includes User name, login password, gender, hobby, contact number etc..
First memory module 403 for being stored registration information respectively into NFC carrier 32 and application server 31, with The second verification information is stored in advance in NFC carrier 32 and application server 31.Wherein it is possible to by registration information user name and Login password is as the second verification information, and accordingly, the user authentication information that user inputs in user's login interface is also use Name in an account book and login password.
Generation module 404 is for generating and one-to-one first verification information of the second verification information.
Second memory module 405 is used to store first verification information generated to NFC carrier 32 and application respectively In server 31, the first verification information is stored in advance in NFC carrier 32 and application server 31.
In present embodiment, by the registration process of user by the first verification information and the second verification information be stored in advance to In NFC carrier 32 and application server 31, in other embodiments, user can also be directly by the first verification information and second Verification information is stored into NFC carrier 32 and application server 31.
By the access system of present embodiment, when being used on mobile terminal 30 in application, in NFC carrier 32 in advance After first verification information of storage is by verifying, the second verifying letter corresponding with the first verification information in NFC carrier 32 is recycled It ceases the user authentication information for inputting user to verify, therefore only can be mobile whole using the NFC carrier 32 of user Normal use application on end 30, even if thus criminal has stolen the user name and login password of user, since it is not used The NFC carrier at family, therefore its user name for being stolen and login password also can just can on mobile terminal 30 through verifying Application is entered by the user name of user and login password on mobile terminal 30, to ensure the personal property and letter of user Breath safety.In addition, NFC carrier 32 can realize that cost is relatively low using NFC patch or NFC label, and small in size easy to be hiding, have Conducive to preventing the NFC carrier of user stolen, and NFC carrier can be placed at home when rarely needed, so that criminal It is difficult to get the NFC carrier of user, and then is difficult to answer by the user name of user and login password login on mobile terminals With.
In several embodiments provided by the present invention, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the module or The division of unit, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units Or component can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, institute Display or the mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, device or unit Indirect coupling or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer It is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) execute the present invention The all or part of the steps of embodiment the method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk Etc. the various media that can store program code.
Mode the above is only the implementation of the present invention is not intended to limit the scope of the invention, all to utilize this Equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content, it is relevant to be applied directly or indirectly in other Technical field is included within the scope of the present invention.

Claims (8)

1. a kind of access method of mobile terminal application characterized by comprising
Mobile terminal receives user and requests to log in the first solicited message of application;
It detects around mobile terminal after receiving first solicited message with the presence or absence of NFC carrier;
When there are NFC carrier, pre-stored first verification information in the NFC carrier is obtained;
First verification information that will acquire is matched with the first verification information pre-stored in application server;
If successful match, user's login interface of the application is shown,
The mobile terminal receives user by user's login interface and requests to log in the user authentication information applied;
The user authentication information received is matched with pre-stored second verification information in the NFC carrier, If successful match, the application is logged in, in the NFC carrier in pre-stored first verification information and the NFC carrier Pre-stored second verification information corresponds, to apply described in normal use.
2. requesting to log in application the method according to claim 1, wherein receiving user in the mobile terminal Before the step of first solicited message, further includes:
Receive the second solicited message that user requests registration application;
It detects around mobile terminal after receiving second solicited message with the presence or absence of NFC carrier;
When there are NFC carrier, user's registration interface is shown;
Receive the registration information that user inputs at the user's registration interface;
The registration information is stored respectively into the NFC carrier and application server, to be deposited in advance in the NFC carrier Second verification information, and generation and one-to-one first verification information of second verification information are stored up, by the institute of generation It states the first verification information to be stored respectively into the NFC carrier and application server, in the NFC carrier and application server In the first verification information is stored in advance.
3. according to the method described in claim 2, it is characterized in that, first verification information be random cipher, described second Verification information includes user name and login password.
4. the method according to claim 1, wherein further include:
If it fails to match for pre-stored first verification information in first verification information and application server that obtain, defeated Out can not normal use application prompt information.
5. a kind of access system of mobile terminal application characterized by comprising
Mobile terminal, application server and NFC carrier;
The mobile terminal includes the first receiving module, first detection module, the first matching module and first processing module;
First receiving module is used to receive user and requests to log in the first solicited message of application;
The first detection module is used to detect mobile terminal after first receiving module receives first solicited message Surrounding whether there is NFC carrier;
First matching module is used for when the first detection module detects NFC carrier, is obtained pre- in the NFC carrier The first verification information first stored, and pre-stored the in first verification information that will acquire and the application server One verification information is matched;
The first processing module is used in successful match, shows user's login interface of the application;
The mobile terminal further includes the second receiving module, the second matching module and Second processing module;
Second receiving module, which is used to receive user by user's login interface, requests the user's checking for logging in application to be believed Breath;
Second matching module is for will be pre-stored the in the user authentication information that receive and the NFC carrier Two verification informations are matched, and are stored in advance in pre-stored first verification information and the NFC carrier in the NFC carrier The second verification information correspond;
The Second processing module is used for pre-stored the in the user authentication information that receives and the NFC carrier When two verification information successful match, the application is logged in, to apply described in normal use.
6. access system according to claim 5, which is characterized in that the mobile terminal further include third receiving module, Second detection module, display module, the 4th receiving module, the first memory module, generation module and the second memory module;
The third receiving module is used to receive the second solicited message that user requests registration application;
Second detection module is used to detect after the third receiving module receives second solicited message mobile whole It whether there is NFC carrier around end;
The display module is for showing user's registration interface when second detection module detects the presence of NFC carrier;
4th receiving module is for receiving the registration information that user inputs at the user's registration interface;
First memory module is used to store the registration information into the NFC carrier and application server respectively, with Second verification information is stored in advance in the NFC carrier;
The generation module is for generating and one-to-one first verification information of second verification information;
Second memory module is used to store first verification information generated to the NFC carrier and application respectively and take It is engaged in device, the first verification information is stored in advance in the NFC carrier and application server.
7. access system according to claim 6, which is characterized in that first verification information is random cipher, described Second verification information includes user name and login password.
8. access system according to claim 5, which is characterized in that the first processing module is also used to the institute in acquisition When stating pre-stored first verification information in the first verification information and application server it fails to match, output can not normal use The prompt information of application.
CN201510305181.3A 2015-06-05 2015-06-05 A kind of access method and access system of mobile terminal application Active CN105187368B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510305181.3A CN105187368B (en) 2015-06-05 2015-06-05 A kind of access method and access system of mobile terminal application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510305181.3A CN105187368B (en) 2015-06-05 2015-06-05 A kind of access method and access system of mobile terminal application

Publications (2)

Publication Number Publication Date
CN105187368A CN105187368A (en) 2015-12-23
CN105187368B true CN105187368B (en) 2019-09-20

Family

ID=54909213

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510305181.3A Active CN105187368B (en) 2015-06-05 2015-06-05 A kind of access method and access system of mobile terminal application

Country Status (1)

Country Link
CN (1) CN105187368B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106921498B (en) * 2015-12-28 2019-09-20 腾讯科技(深圳)有限公司 The security processing of virtual resource, device and system
CN105824510B (en) * 2016-04-28 2019-06-21 努比亚技术有限公司 The method and apparatus for realizing display
CN107463810A (en) * 2017-08-15 2017-12-12 合肥爱吾宠科技有限公司 The method that protecting computer software is realized based on network communication
CN111435944B (en) * 2019-01-14 2022-11-25 博泰车联网科技(上海)股份有限公司 Vehicle control method, vehicle, mobile terminal, and computer-readable storage medium
CN112393734B (en) * 2019-08-13 2023-05-23 上海博泰悦臻网络技术服务有限公司 Navigation method, server and computer readable storage medium
CN114640976A (en) * 2020-11-30 2022-06-17 华为技术有限公司 NFC tag verification method and related equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102811228A (en) * 2012-08-31 2012-12-05 中国联合网络通信集团有限公司 Network business login method, equipment and system
CN104579668A (en) * 2013-10-28 2015-04-29 深圳市腾讯计算机系统有限公司 User identity verification method, password protection device and verification system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102811228A (en) * 2012-08-31 2012-12-05 中国联合网络通信集团有限公司 Network business login method, equipment and system
CN104579668A (en) * 2013-10-28 2015-04-29 深圳市腾讯计算机系统有限公司 User identity verification method, password protection device and verification system

Also Published As

Publication number Publication date
CN105187368A (en) 2015-12-23

Similar Documents

Publication Publication Date Title
CN105187368B (en) A kind of access method and access system of mobile terminal application
US11068575B2 (en) Authentication system
US10152581B2 (en) Methods and systems for data entry
US9380057B2 (en) Systems and methods for combined OTP and KBA identity authentication
US20150271164A1 (en) Methods and systems for data entry
US20150278805A1 (en) Authentication system
CN104883293B (en) Method for message interaction and relevant apparatus and communication system
CN103684797B (en) User and the association authentication method and system of subscriber terminal equipment
CN102025506A (en) User authentication method and device
CN110135855A (en) Actual situation authentication system
CN103905191A (en) Verification method applied to mobile terminal, mobile terminal and system
CN106709730A (en) Bio-feature identification-based transaction method and apparatus
CN104967553A (en) Message interaction method, related device and communication system
CN104104671B (en) Establish the unified dynamic authorization code system of business entity's account
Yıldırım et al. Android based mobile application development for web login authentication using fingerprint recognition feature
US10521573B1 (en) Authentication using third-party data
CN108600234A (en) A kind of auth method, device and mobile terminal
CN104092653A (en) Data processing method and system
WO2014055279A1 (en) Authentication system
CN107846406A (en) A kind of account logon method and device
CN106161183B (en) Method for message interaction and social interaction server device and communication system
Singhal et al. Software tokens based two factor authentication scheme
CN106851613A (en) Service request method, the verification method of business handling number and its terminal
CN103684796A (en) SMI (subscriber identity module) card and personal identity authentication method
CN107294981B (en) Authentication method and equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant