CN105187368B - A kind of access method and access system of mobile terminal application - Google Patents
A kind of access method and access system of mobile terminal application Download PDFInfo
- Publication number
- CN105187368B CN105187368B CN201510305181.3A CN201510305181A CN105187368B CN 105187368 B CN105187368 B CN 105187368B CN 201510305181 A CN201510305181 A CN 201510305181A CN 105187368 B CN105187368 B CN 105187368B
- Authority
- CN
- China
- Prior art keywords
- verification information
- user
- application
- nfc carrier
- stored
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1073—Registration or de-registration
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Multimedia (AREA)
- General Business, Economics & Management (AREA)
- Business, Economics & Management (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of access method of mobile terminal application and access systems, which comprises mobile terminal receives user and requests to log in the first solicited message of application;It detects around mobile terminal after receiving first solicited message with the presence or absence of NFC carrier;When there are NFC carrier, pre-stored first verification information in the NFC carrier is obtained;First verification information that will acquire is matched with the first verification information pre-stored in application server;If successful match, user's login interface of the application is shown, to apply described in normal use.By the above-mentioned means, the present invention, which can greatly avoid criminal that username and password is only used only, can enter the application of mobile terminal, the personal wealth of user and the safety of information are ensured.
Description
Technical field
The present invention relates to technical field of mobile terminals, more particularly to the access method and access of a kind of application of mobile terminal
System.
Background technique
With the development of mobile terminal and network, the processing capacity of mobile terminal (including smart phone, tablet computer etc.)
Stronger and stronger, more applications for being suitable for running on mobile terminals are developed, such as mobile terminal payment is precious, mobile terminal net
It goes to bank, user can carry out payment transaction with, Web bank by mobile terminal payment Baoying County whenever and wherever possible, extremely facilitate use
Family uses.
For Web bank, at the end computer PC, many banks all use USB key as user and enter bank system of web
Unique media thus cannot be introduced into bank system of web criminal has stolen the username and password of user.
However, when user uses Web bank on mobile terminals, usually need to only input user for the Web bank on mobile terminal
Name and password can log in these applications, once therefore username and password leak, criminal can lead on mobile terminals
It crosses username and password and logins personal Web bank's account of user and steal wealth, certain loss is caused to user.
Summary of the invention
The invention mainly solves the technical problem of providing a kind of access methods of mobile terminal application, can greatly avoid
Username and password, which is only used only, in criminal can enter the application of mobile terminal, ensure the personal wealth and information of user
Safety.
In order to solve the above technical problems, one technical scheme adopted by the invention is that: a kind of application of mobile terminal is provided
Access method, comprising: mobile terminal receives user and requests to log in the first solicited message of application;Receive first solicited message
Detecting afterwards whether there is NFC carrier around mobile terminal;When there are NFC carrier, obtain pre-stored in the NFC carrier
First verification information;Pre-stored first verification information carries out in first verification information and application server that will acquire
Matching;If successful match, user's login interface of the application is shown, to apply described in normal use.
Wherein, if in the successful match, after the step of showing user's login interface of the application, comprising: institute
It states mobile terminal and the user authentication information that user requests login application is received by user's login interface;The institute that will be received
It states user authentication information to be matched with pre-stored second verification information in the NFC carrier, if successful match, log in
The application, pre-stored second verifying in pre-stored first verification information and the NFC carrier in the NFC carrier
Information corresponds.
Wherein, it before the mobile terminal receives the step of user requests the first solicited message of login application, also wraps
It includes: receiving the second solicited message that user requests registration application;Detection mobile terminal is all after receiving second solicited message
It encloses with the presence or absence of NFC carrier;When there are NFC carrier, user's registration interface is shown;User is received at the user's registration interface
The registration information of input;The registration information is stored respectively into the NFC carrier and application server, in the NFC
Second verification information is stored in advance in carrier, and generates and believes with one-to-one first verifying of second verification information
Breath, first verification information of generation is stored respectively into the NFC carrier and application server, to carry in the NFC
The first verification information is stored in advance in body and application server.
Wherein, first verification information is random cipher, and second verification information includes user name and login password.
Wherein, further includes: if pre-stored first verifying in first verification information and application server that obtain
Information matches failure, then output can not normal use application prompt information.
In order to solve the above technical problems, another technical solution used in the present invention is: providing a kind of mobile terminal application
Access system, comprising: mobile terminal, application server and NFC carrier;The mobile terminal include the first receiving module,
First detection module, the first matching module and first processing module;First receiving module is stepped on for receiving user's request
Record the first solicited message of application;The first detection module is used to receive the first request letter in first receiving module
Detecting after breath whether there is NFC carrier around mobile terminal;First matching module is used to examine in the first detection module
First verifying that when measuring NFC carrier, obtains pre-stored first verification information in the NFC carrier, and will acquire
Information is matched with the first verification information pre-stored in the application server;The first processing module be used for
When with success, user's login interface of the application is shown, to apply described in normal use.
Wherein, the mobile terminal further includes the second receiving module, the second matching module and Second processing module;It is described
Second receiving module is used to receive user by user's login interface and requests to log in the user authentication information of application;Described
The user authentication information that two matching modules are used to receive and pre-stored second verification information in the NFC carrier
It is matched, pre-stored first verification information and the second verifying pre-stored in the NFC carrier in the NFC carrier
Information corresponds;The Second processing module is used for pre- in the user authentication information and the NFC carrier received
When the second verification information successful match first stored, the application is logged in.
Wherein, the mobile terminal further includes third receiving module, the second detection module, display module, the 4th reception mould
Block, the first memory module, generation module and the second memory module;The third receiving module requests registration for receiving user
Second solicited message of application;Second detection module is used to receive the second request letter in the third receiving module
Detecting after breath whether there is NFC carrier around mobile terminal;The display module in second detection module for detecting
There are show user's registration interface when NFC carrier;4th receiving module is for receiving user at the user's registration interface
The registration information of input;First memory module is for storing the registration information respectively to the NFC carrier and application
In server, second verification information to be stored in advance in the NFC carrier;The generation module for generate with it is described
One-to-one first verification information of second verification information;The first verifying letter that second memory module is used to generate
Breath is stored respectively into the NFC carrier and application server, the to be stored in advance in the NFC carrier and application server
One verification information.
Wherein, first verification information is random cipher, and second verification information includes user name and login password.
Wherein, the first processing module is also used in first verification information of acquisition and application server in advance
First verification information of storage is when it fails to match, output can not normal use application prompt information.
The beneficial effects of the present invention are: be in contrast to the prior art, the present invention by by the application of mobile terminal and
NFC carrier is combined, when user request log in mobile terminal in application, detecting that there are NFC around mobile terminal
After carrier, further in the first verification information pre-stored in NFC carrier and application server pre-stored first is tested
Card information is matched, and only successful match just opens the user's login interface applied.By the above-mentioned means, using mobile whole
End is stored with the application of the NFC carrier ability normal use of verification information in application, must use, even if thus possessing
User name and login password also can not on mobile terminals using application, therefore avoid criminal be only used only user name and
Login password can enter application, ensure the wealth and information security of user.
Detailed description of the invention
Fig. 1 is the flow chart of one embodiment of access method of mobile terminal application of the present invention;
Fig. 2 is in one embodiment of access method of mobile terminal application of the present invention, and mobile terminal receives user's request and steps on
Flow chart before the step of recording the first solicited message of application;
Fig. 3 is the structural schematic diagram of one embodiment of access system of mobile terminal application of the present invention.
Specific embodiment
Below in conjunction with drawings and embodiments, the present invention is described in detail.
Refering to fig. 1, in an embodiment of the access method of mobile terminal application of the present invention, mobile terminal application be can be
The application such as Alipay, Web bank on mobile terminal, described method includes following steps:
Step S101: mobile terminal receives user and requests to log in the first solicited message of application.
After user opens application on mobile terminals, the startup interface of application can provide a user login application and registration is answered
It is selected with two options for user.User issues the first request letter of request login application by the button that click logs in application
Breath.
Step S102: it detects around mobile terminal after receiving the first solicited message with the presence or absence of NFC carrier.
NFC carrier for example can be NFC label or NFC patch.When using the application, NFC label or NFC can be attached to
On mobile terminal, removed without using in application, NFC can be pasted.
Step S103: when there are NFC carrier, pre-stored first verification information in NFC carrier is obtained.
When not detecting NFC carrier, user is prompted to provide NFC carrier, or prompt user can not in a manner of pop-up
Use application.
Step S104: pre-stored first verification information carries out in the first verification information and application server that will acquire
Matching.
In present embodiment, the first verification information is random cipher.Certainly, the first verification information can also be sound, figure
The information such as piece or text.
After the first verification information of acquisition for mobile terminal, by the first verification information in application server to the first of acquisition
Verification information is verified, and specific verification step includes: the first verification information and application clothes in the NFC carrier that judgement obtains
Whether pre-stored first verification information in device of being engaged in is consistent.
Step S105: if successful match, user's login interface of application is shown, with normal use application.
When the first verification information for judging to store in the first verification information and application server in NFC carrier is consistent
When, then the first verification information successful match in the first verification information and application server in NFC carrier, that is, be verified,
Show user's login interface of application, at this time with normal use application.When judging the first verification information and application in NFC carrier
When the first verification information stored in server is inconsistent, then in the first verification information and application server in NFC carrier
It fails to match for first verification information, that is, verifies and do not pass through, at this time output can not normal use application prompt information, wherein can
To export prompt information in a manner of display or voice broadcast etc..
By the above-mentioned means, will be combined using with NFC carrier, there are NFC carriers only around mobile terminal, and
The first verification information in NFC carrier and the first verification information in application server when matching can normal use answer
With thus being difficult to use on mobile terminals criminal steals the user name and login password of user, can be avoided
User name and login password, which is only used only, can enter application.
Further, after the step of showing user's login interface of application, comprising steps of mobile terminal passes through user
Log-in interface receives user and requests to log in the user's checking message of application;It will be in the user authentication information that received and NFC carrier
Pre-stored second verification information is matched, if successful match, logs in application, if it fails to match, output can not be just
It is often used the prompt information of application.
After the login interface of display application, user logs in application by input user authentication information request.This embodiment party
The user authentication information of formula includes user name and login password.Mobile terminal receives the user authentication information of user's input, passes through
User authentication information is matched with the second verification information pre-stored in NFC carrier, to be carried out to user authentication information
Verifying.
Second verification information includes username and password.When user authentication information and consistent the second verification information, two
Person's successful match, i.e. user authentication information by verifying, at this time log in application, user can normal use application, work as user's checking
When information and inconsistent the second verification information, it fails to match for the two, i.e., user authentication information does not pass through verifying, prompts user at this time
It can not normal use application.User authentication information and the second verification information can also include gender, hobby and the user of user
Custom information.
Wherein, when it fails to match for user authentication information and the second verification information, can show to user normally to make
User is prompted not to be available application with the prompt information of application, or by way of voice broadcast.Certainly, believe in user's checking
Breath with NFC carrier in pre-stored second verification information it fails to match when, can also directly close application.
In addition, pre-stored first verification information and the second verification information in NFC carrier correspond, i.e. NFC is carried
The user name and login password stored in body is corresponding with a random cipher.
By present embodiment, on mobile terminals using in application, when the first verifying letter pre-stored in NFC carrier
After breath is by verifying, the user that the second verification information corresponding with the first verification information inputs user in NFC carrier is recycled
Verification information is verified, thus only using user NFC carrier can normal use application on mobile terminals, thus
Even if criminal has stolen the user name and login password of user, since it does not have the NFC carrier of user, stolen
User name and login password can not on mobile terminals by verifying, also can not just pass through the user of user on mobile terminals
Name and login password enter application, to ensure the personal property and information security of user.In addition, NFC carrier can use
NFC patch or NFC label realize that cost is relatively low, and small in size easy to be hiding, and the NFC carrier for being beneficial to prevent user is stolen, and
NFC carrier can be placed at home when rarely needed, so that criminal is difficult to get the NFC carrier of user, Jin Ernan
Application is logged in pass through user name and the login password of user on mobile terminals.
In the embodiment of the access method of mobile terminal of the present invention application, a user is stored in each NFC carrier
Name and login password, and a random cipher corresponding with the user name and login password.Certainly, in each NFC carrier
Multiple user names and login password and random cipher can be bound.
Referring to Fig.2, receiving user in mobile terminal in the embodiment of the access method of mobile terminal of the present invention application
Before request logs in the step of the first solicited message of application, include the following steps:
Step S201: the second solicited message that user requests registration application is received.
User issues the second solicited message of request registration application by clicking the option button of registration application.
Step S202: it detects around mobile terminal after receiving the second solicited message with the presence or absence of NFC carrier.
In present embodiment, verification information is stored in NFC carrier by the process applied by user's registration, therefore
First detection terminal surrounding whether there is NFC carrier before registration application.
Step S203: when there are NCF carrier, user's registration interface is shown.
Wherein, when NFC carrier is not present, output provides the prompt information of NFC carrier, to remind user in mobile terminal
Surrounding provides NFC carrier.
Step S204: the registration information that user inputs at user's registration interface is received.
Registration information includes user name, login password, gender, hobby, contact number etc..
Step S205: registration information is stored respectively into NFC carrier and application server, in NFC carrier and application
The second verification information, and generation and one-to-one first verification information of the second verification information are stored in advance in server, will give birth to
At the first verification information stored respectively into NFC carrier and application server, in NFC carrier and application server in advance
Store the first verification information.
Wherein it is possible to using in registration information user name and login password as the second verification information, or will registration letter
User name, login password and contact number in breath is as the second verification information, and user inputs in user's login interface and uses at this time
When the verification information of family, accordingly need to input user name, password and contact number.
Registration information is being stored to NFC carrier and application server, is producing a random cipher, i.e., the first verifying letter
Breath, and correspond first verification information and the second verification information.By the above-mentioned means, by the first verification information and second
Verification information is stored in advance into NFC carrier.Certainly, in other embodiments, user can also by the first verification information and
Second verification information is directly stored into NFC carrier.
Refering to Fig. 3, in one embodiment of access system of mobile terminal application of the present invention, access system is above-mentioned for executing
Fig. 1 illustrated embodiment provide application access method, access system include mobile terminal 30, application server 31 and
NFC carrier 32.Mobile terminal 30 includes the first receiving module 301, first detection module 302, the first matching module 303 and the
One processing module 304.
Wherein, the first receiving module 301 is used to receive user and requests to log in the first solicited message of application.User is in movement
After opening application in terminal, application can be logged in by clicking login button request.First detection module 302 is used to receive first
Module 301 detects around mobile terminal 30 after receiving the first solicited message with the presence or absence of NFC carrier 32.NFC carrier for example may be used
To be NFC label or NFC patch.When using the application, NFC label or NFC can be attached on mobile terminal 30, without
It is removed using in application, NFC can be pasted.
First matching module 303 is used for when first detection module 302 detects NFC carrier 32, is obtained in NFC carrier 32
Pre-stored first verification information, and the first verification information that will acquire is tested in application server 31 pre-stored first
Card information is matched.In present embodiment, the first verification information is random cipher.It is of course also possible to be sound, picture or text
The information such as word.
First matching module 303 is after obtaining the first verification information in NFC carrier 32, using in application server 31
First verification information verifies the first verification information of acquisition, and specifically verification step includes the NFC carrier that judgement obtains
Whether the first verification information and the first verification information pre-stored in application server 31 in 32 are consistent.When consistent, NFC
The first verification information successful match in the first verification information and application server 31 in carrier 32, that is, be verified, when not
When consistent, it fails to match for the first verification information in the first verification information and application server 31 in NFC carrier 32, that is, verifies
Do not pass through.
First processing module 304 is for first in the first verification information and application server 31 in NFC carrier 32
When verification information successful match, user's login interface of application is shown, with normal use application, and in NFC carrier 32
The first verification information in first verification information and application server 31 is when it fails to match, output can not normal use application mention
Show information, wherein prompt information can be exported in a manner of display or voice broadcast.
By the above-mentioned means, will be combined using with NFC carrier 32, only there are NFC loads around mobile terminal 30
Body 32, and when the first verification information in the first verification information and application server 31 in NFC carrier 32 matches, can
Thus normal use application is difficult to make on mobile terminal 30 criminal steals the user name and login password of user
With can be avoided only can enter application using only user name and login password.
Further, mobile terminal 30 further includes the second receiving module 305, the second matching module 306 and second processing
Module 307.
Wherein, the second receiving module 305, which is used to receive user by user's login interface, requests the user for logging in application to test
Demonstrate,prove information.User logs in application by input user authentication information request, wherein user authentication information includes user name and login
Password.
Pre-stored second in the user authentication information and NFC carrier 32 that second matching module 306 is used to receive
Verification information is matched, to verify to user authentication information.Wherein, the second verification information includes user name and logs in close
Code.When user authentication information and consistent the second verification information, the two successful match, i.e. user authentication information pass through verifying,
When user authentication information and inconsistent the second verification information, it fails to match for the two, i.e., user authentication information does not pass through verifying.With
Family verification information and the second verification information can also include gender, hobby and the user's custom information of user.
Second processing module 307 is used for when user authentication information is matched with the second verification information, application is logged in, in user
When verification information and the second verification information mismatch, output can not normal use application prompt information, such as can be with display
Mode or the mode of voice broadcast export prompt information.
In addition, further, mobile terminal 30 further includes that third receiving module 308, second detects mould in present embodiment
Block 309, display module 401, the 4th receiving module 402, the first memory module 403, generation module 404 and the second memory module
405。
Wherein, third receiving module 308 is used to receive the second solicited message that user requests registration application.User can pass through
The option button for clicking registration application issues the second solicited message of request registration application.
Second detection module 309 is for detecting mobile terminal after third receiving module 308 receives the second solicited message
It whether there is NFC carrier 32 around 30.
Display module 401 is for showing user's registration circle when the second detection module 309 detects the presence of NFC carrier 32
Face.
4th receiving module 402 is for receiving the registration information that user inputs at user's registration interface.Registration information includes
User name, login password, gender, hobby, contact number etc..
First memory module 403 for being stored registration information respectively into NFC carrier 32 and application server 31, with
The second verification information is stored in advance in NFC carrier 32 and application server 31.Wherein it is possible to by registration information user name and
Login password is as the second verification information, and accordingly, the user authentication information that user inputs in user's login interface is also use
Name in an account book and login password.
Generation module 404 is for generating and one-to-one first verification information of the second verification information.
Second memory module 405 is used to store first verification information generated to NFC carrier 32 and application respectively
In server 31, the first verification information is stored in advance in NFC carrier 32 and application server 31.
In present embodiment, by the registration process of user by the first verification information and the second verification information be stored in advance to
In NFC carrier 32 and application server 31, in other embodiments, user can also be directly by the first verification information and second
Verification information is stored into NFC carrier 32 and application server 31.
By the access system of present embodiment, when being used on mobile terminal 30 in application, in NFC carrier 32 in advance
After first verification information of storage is by verifying, the second verifying letter corresponding with the first verification information in NFC carrier 32 is recycled
It ceases the user authentication information for inputting user to verify, therefore only can be mobile whole using the NFC carrier 32 of user
Normal use application on end 30, even if thus criminal has stolen the user name and login password of user, since it is not used
The NFC carrier at family, therefore its user name for being stolen and login password also can just can on mobile terminal 30 through verifying
Application is entered by the user name of user and login password on mobile terminal 30, to ensure the personal property and letter of user
Breath safety.In addition, NFC carrier 32 can realize that cost is relatively low using NFC patch or NFC label, and small in size easy to be hiding, have
Conducive to preventing the NFC carrier of user stolen, and NFC carrier can be placed at home when rarely needed, so that criminal
It is difficult to get the NFC carrier of user, and then is difficult to answer by the user name of user and login password login on mobile terminals
With.
In several embodiments provided by the present invention, it should be understood that disclosed system, device and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the module or
The division of unit, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units
Or component can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, institute
Display or the mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, device or unit
Indirect coupling or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
It is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) execute the present invention
The all or part of the steps of embodiment the method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory
(ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk
Etc. the various media that can store program code.
Mode the above is only the implementation of the present invention is not intended to limit the scope of the invention, all to utilize this
Equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content, it is relevant to be applied directly or indirectly in other
Technical field is included within the scope of the present invention.
Claims (8)
1. a kind of access method of mobile terminal application characterized by comprising
Mobile terminal receives user and requests to log in the first solicited message of application;
It detects around mobile terminal after receiving first solicited message with the presence or absence of NFC carrier;
When there are NFC carrier, pre-stored first verification information in the NFC carrier is obtained;
First verification information that will acquire is matched with the first verification information pre-stored in application server;
If successful match, user's login interface of the application is shown,
The mobile terminal receives user by user's login interface and requests to log in the user authentication information applied;
The user authentication information received is matched with pre-stored second verification information in the NFC carrier,
If successful match, the application is logged in, in the NFC carrier in pre-stored first verification information and the NFC carrier
Pre-stored second verification information corresponds, to apply described in normal use.
2. requesting to log in application the method according to claim 1, wherein receiving user in the mobile terminal
Before the step of first solicited message, further includes:
Receive the second solicited message that user requests registration application;
It detects around mobile terminal after receiving second solicited message with the presence or absence of NFC carrier;
When there are NFC carrier, user's registration interface is shown;
Receive the registration information that user inputs at the user's registration interface;
The registration information is stored respectively into the NFC carrier and application server, to be deposited in advance in the NFC carrier
Second verification information, and generation and one-to-one first verification information of second verification information are stored up, by the institute of generation
It states the first verification information to be stored respectively into the NFC carrier and application server, in the NFC carrier and application server
In the first verification information is stored in advance.
3. according to the method described in claim 2, it is characterized in that, first verification information be random cipher, described second
Verification information includes user name and login password.
4. the method according to claim 1, wherein further include:
If it fails to match for pre-stored first verification information in first verification information and application server that obtain, defeated
Out can not normal use application prompt information.
5. a kind of access system of mobile terminal application characterized by comprising
Mobile terminal, application server and NFC carrier;
The mobile terminal includes the first receiving module, first detection module, the first matching module and first processing module;
First receiving module is used to receive user and requests to log in the first solicited message of application;
The first detection module is used to detect mobile terminal after first receiving module receives first solicited message
Surrounding whether there is NFC carrier;
First matching module is used for when the first detection module detects NFC carrier, is obtained pre- in the NFC carrier
The first verification information first stored, and pre-stored the in first verification information that will acquire and the application server
One verification information is matched;
The first processing module is used in successful match, shows user's login interface of the application;
The mobile terminal further includes the second receiving module, the second matching module and Second processing module;
Second receiving module, which is used to receive user by user's login interface, requests the user's checking for logging in application to be believed
Breath;
Second matching module is for will be pre-stored the in the user authentication information that receive and the NFC carrier
Two verification informations are matched, and are stored in advance in pre-stored first verification information and the NFC carrier in the NFC carrier
The second verification information correspond;
The Second processing module is used for pre-stored the in the user authentication information that receives and the NFC carrier
When two verification information successful match, the application is logged in, to apply described in normal use.
6. access system according to claim 5, which is characterized in that the mobile terminal further include third receiving module,
Second detection module, display module, the 4th receiving module, the first memory module, generation module and the second memory module;
The third receiving module is used to receive the second solicited message that user requests registration application;
Second detection module is used to detect after the third receiving module receives second solicited message mobile whole
It whether there is NFC carrier around end;
The display module is for showing user's registration interface when second detection module detects the presence of NFC carrier;
4th receiving module is for receiving the registration information that user inputs at the user's registration interface;
First memory module is used to store the registration information into the NFC carrier and application server respectively, with
Second verification information is stored in advance in the NFC carrier;
The generation module is for generating and one-to-one first verification information of second verification information;
Second memory module is used to store first verification information generated to the NFC carrier and application respectively and take
It is engaged in device, the first verification information is stored in advance in the NFC carrier and application server.
7. access system according to claim 6, which is characterized in that first verification information is random cipher, described
Second verification information includes user name and login password.
8. access system according to claim 5, which is characterized in that the first processing module is also used to the institute in acquisition
When stating pre-stored first verification information in the first verification information and application server it fails to match, output can not normal use
The prompt information of application.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510305181.3A CN105187368B (en) | 2015-06-05 | 2015-06-05 | A kind of access method and access system of mobile terminal application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510305181.3A CN105187368B (en) | 2015-06-05 | 2015-06-05 | A kind of access method and access system of mobile terminal application |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105187368A CN105187368A (en) | 2015-12-23 |
CN105187368B true CN105187368B (en) | 2019-09-20 |
Family
ID=54909213
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510305181.3A Active CN105187368B (en) | 2015-06-05 | 2015-06-05 | A kind of access method and access system of mobile terminal application |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105187368B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106921498B (en) * | 2015-12-28 | 2019-09-20 | 腾讯科技(深圳)有限公司 | The security processing of virtual resource, device and system |
CN105824510B (en) * | 2016-04-28 | 2019-06-21 | 努比亚技术有限公司 | The method and apparatus for realizing display |
CN107463810A (en) * | 2017-08-15 | 2017-12-12 | 合肥爱吾宠科技有限公司 | The method that protecting computer software is realized based on network communication |
CN111435944B (en) * | 2019-01-14 | 2022-11-25 | 博泰车联网科技(上海)股份有限公司 | Vehicle control method, vehicle, mobile terminal, and computer-readable storage medium |
CN112393734B (en) * | 2019-08-13 | 2023-05-23 | 上海博泰悦臻网络技术服务有限公司 | Navigation method, server and computer readable storage medium |
CN114640976A (en) * | 2020-11-30 | 2022-06-17 | 华为技术有限公司 | NFC tag verification method and related equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102811228A (en) * | 2012-08-31 | 2012-12-05 | 中国联合网络通信集团有限公司 | Network business login method, equipment and system |
CN104579668A (en) * | 2013-10-28 | 2015-04-29 | 深圳市腾讯计算机系统有限公司 | User identity verification method, password protection device and verification system |
-
2015
- 2015-06-05 CN CN201510305181.3A patent/CN105187368B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102811228A (en) * | 2012-08-31 | 2012-12-05 | 中国联合网络通信集团有限公司 | Network business login method, equipment and system |
CN104579668A (en) * | 2013-10-28 | 2015-04-29 | 深圳市腾讯计算机系统有限公司 | User identity verification method, password protection device and verification system |
Also Published As
Publication number | Publication date |
---|---|
CN105187368A (en) | 2015-12-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105187368B (en) | A kind of access method and access system of mobile terminal application | |
US11068575B2 (en) | Authentication system | |
US10152581B2 (en) | Methods and systems for data entry | |
US9380057B2 (en) | Systems and methods for combined OTP and KBA identity authentication | |
US20150271164A1 (en) | Methods and systems for data entry | |
US20150278805A1 (en) | Authentication system | |
CN104883293B (en) | Method for message interaction and relevant apparatus and communication system | |
CN103684797B (en) | User and the association authentication method and system of subscriber terminal equipment | |
CN102025506A (en) | User authentication method and device | |
CN110135855A (en) | Actual situation authentication system | |
CN103905191A (en) | Verification method applied to mobile terminal, mobile terminal and system | |
CN106709730A (en) | Bio-feature identification-based transaction method and apparatus | |
CN104967553A (en) | Message interaction method, related device and communication system | |
CN104104671B (en) | Establish the unified dynamic authorization code system of business entity's account | |
Yıldırım et al. | Android based mobile application development for web login authentication using fingerprint recognition feature | |
US10521573B1 (en) | Authentication using third-party data | |
CN108600234A (en) | A kind of auth method, device and mobile terminal | |
CN104092653A (en) | Data processing method and system | |
WO2014055279A1 (en) | Authentication system | |
CN107846406A (en) | A kind of account logon method and device | |
CN106161183B (en) | Method for message interaction and social interaction server device and communication system | |
Singhal et al. | Software tokens based two factor authentication scheme | |
CN106851613A (en) | Service request method, the verification method of business handling number and its terminal | |
CN103684796A (en) | SMI (subscriber identity module) card and personal identity authentication method | |
CN107294981B (en) | Authentication method and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |