CN105281902B - A kind of Web system safe login method based on mobile terminal - Google Patents

A kind of Web system safe login method based on mobile terminal Download PDF

Info

Publication number
CN105281902B
CN105281902B CN201510887444.6A CN201510887444A CN105281902B CN 105281902 B CN105281902 B CN 105281902B CN 201510887444 A CN201510887444 A CN 201510887444A CN 105281902 B CN105281902 B CN 105281902B
Authority
CN
China
Prior art keywords
user
web system
session identification
identification data
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510887444.6A
Other languages
Chinese (zh)
Other versions
CN105281902A (en
Inventor
龙毅宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University of Technology WUT
Original Assignee
Wuhan University of Technology WUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University of Technology WUT filed Critical Wuhan University of Technology WUT
Priority to CN201510887444.6A priority Critical patent/CN105281902B/en
Publication of CN105281902A publication Critical patent/CN105281902A/en
Application granted granted Critical
Publication of CN105281902B publication Critical patent/CN105281902B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention relates to a kind of Web system safe login method based on mobile terminal, the method is:When user logs in Web system using browser, inputted by browser and submit account name or identity;Web system will be shown using the session identification data between user account names or the corresponding encryption keys Web system of identity and browser and back to browser and in the form of bar code;User is with mobile scanning terminal bar code;The session identification data that the mobile login assistant of operation in the terminal is obtained by decrypting the data in bar code;Mobile terminal is logged in using user identity voucher in Web system, the session identification data that bar code obtains for ratification in the way of browser submits session identification data during login;For mobile login assistant after Web system login, the session between user browser and Web system is in login status.The existing risk being stolen when invention avoids session identification data transfer.

Description

A kind of Web system safe login method based on mobile terminal
Technical field
The invention belongs to field of information security technology, particularly a kind of Web system secure log side based on mobile terminal Method.
Background technology
We can be potentially encountered problems with when accessing the network information or application system.
First, when we log in information or the application system that we to be accessed using public computer in public environment such as Internet bars During system, QQ, Alipay, since public computer may be placed wooden horse, account name, the password of our login systems are such as logged in In the presence of the risk for being monitored, stealing (even dynamic password, can not avoid this security risk).
Second, we have account name, password to remember in different information or application system, account name, password are more It is easy to forget that, obscure.
Third, in the high occasion of some security requirements, it would be desirable to use the USB Key for having digital certificate and private key Etc. cryptographic hardware, but if multiple USB Key cryptographic hardwares need to carry, can make troubles to user.
For these problems, in its patent application, " a kind of Web system based on mobile terminal is convenient to step on present invention applicant Recording method " (number of patent application:201510472645.X) in for Web system propose a kind of solution party based on mobile terminal Case, specifically:When user logs in Web system using browser, Web system is by the session mark between browser and Web system Know data show in the form of bar code on a web browser, user scans bar code using the camera of mobile terminal, in mobile terminal Mobile login agent session identification data are obtained from bar code, then move login agent and logged in using user identity voucher Web system, submits what scanning obtained when mobile login agent logs in Web system in the way of browser submits session identification data Session identification data, are achieved in login of the user browser in Web system.201510472645.X maximum feature be implement Simply, and Web system carries out login discriminating by original mode to user, and still, the scheme in 201510472645.X is also deposited In a problem, show back to browser and that by browser page this makes here it is session identification data with clear-text way Obtain session identification data and there is the risk that the shell script maliciously injected is stolen (from the page).
The content of the invention
The purpose of the present invention is to propose to a kind of Web system safe login method based on mobile terminal, to overcome existing side The deficiency of case.
To achieve these goals, technical solution proposed by the present invention is:
A kind of Web system safe login method based on mobile terminal, the method are as follows:
First step:When the Web system that user is not yet logged in using browser access one on computers, Web systems System starts user login operation (i.e. user identity differentiate), user by browser input user in the account name of Web system or The identity of user, and it is submitted to Web system;
Second step:After Web system receives account name or the identity of user's submission, user account names or body are used Part identifies session identification data or meeting of the corresponding encryption key to session between Web system and user browser (Session) The temporary identifier of words mark data is encrypted, then by the temporary mark of encrypted session identification data or session identification data Know symbol to be transmitted to user browser and be shown on user browser in the form of bar code;What if Web system returned is encrypted The temporary identifier of session identification data, then Web system the session identification data of unencryption are temporarily stored in memory or data at the same time In storehouse, temporary session identification data are identified with the temporary identifier of session identification data;
Third step:User has the bar code shown on the mobile scanning terminal browser of mobile login assistant using operation; Mobile login assistant obtains the temporary identifier of encrypted session identification data or session identification data from the bar code of scanning, so Afterwards using user account names or the corresponding decruption key of identity to encrypted session identification data or session identification data Temporary identifier is decrypted;If what decryption obtained is the temporary identifier of session identification data, login assistant is moved into one The temporary identifier for the session identification data that step is obtained using decryption from Web system inquiry obtain it is temporary, with same session The session identification data of the temporary identifier mark of mark data;Then, user passes through (under the guiding of mobile login assistant) Mobile login assistant completes register using user identity voucher in Web system;Used in user by mobile login assistant During Web system carries out register, mobile login assistant is carried user identity voucher by the browser that Web system is arranged (after decryption or obtained from Web system) session identification data are included in by the mode of intersection words mark data is submitted to Web In the HTTP request of system;Register is completed in Web system using user identity voucher by mobile login assistant in user Afterwards, user's session between used browser and Web system on computers be in login status (by Web system mark It is denoted as login status);
The Web system is an information system or application system based on Web technological development;
The session identification data are to include the Session ID of session between Web system and user browser The data of (Session ID) and other session related informations;Other session related informations are the letters for limiting session Breath;The temporary identifier of the session identification data is the meeting being used for being temporarily stored in memory or database of Web system generation The word string that words mark data is identified;
The identity of the user is character string (such as E-mail address, movement of a unique mark user Communicating number etc.);
The user account names or the corresponding encryption key of identity are that Web system passes through user account names or identity mark Know the obtained key for data encryption, the user account names or the corresponding decruption key of identity are and user account Name or the corresponding key for encryption data to be decrypted of the corresponding encryption key of identity;
The mobile terminal, which is one, to be had data network networked capabilities and carries the portable computing of camera (such as Mobile communications device, tablet computer, intelligent wearable device etc.);
The mobile login assistant is that one for installing and running in the mobile terminal of user is used to help user's use Browser carries out the program of Web system register on computers;The mobile login assistant passes through http protocol and Web systems System interacts;
User's identity documents used when Web system logs in are made of subscriber identity data and private data;Institute It is account name of the user in Web system to state subscriber identity data, or with user Web system account name it is corresponding, use In the data (such as digital certificate) of mark user identity;The private data is for proving that user is exactly possessing for identity documents The data of person.
If what is inputted and submit by browser in the first step user is account name, Web system is receiving After account name, first accounts database check user submit account name whether be an effective account account name, if so, then Using user account names or the corresponding encryption key of identity to session between Web system and user browser (Session) Session identification data or the temporary identifiers of session identification data be encrypted, otherwise, mistake is returned to browser.
If what Web system returned is the temporary identifier of encrypted session identification data,:
When mobile login assistant obtains session identification data using the temporary identifier of session identification data from Web system Afterwards, Web system deletes the session identification data being acquired from memory or database;Alternatively, when a session identification number It is not acquired yet after exceeding predetermined time limit according to the temporary time, then the session identification that time-out is not acquired by Web system Data are deleted from memory or database.
If user account names or the corresponding encryption key of identity and decruption key are same keys, to session mark The temporary identifier of knowledge data or session identification data cryptographic algorithm used when being encrypted and decrypted is symmetric key cipher Algorithm;
If user account names or the corresponding encryption key of identity and decruption key are not same keys, to session The temporary identifier of mark data or session identification data cryptographic algorithm used when being encrypted and decrypted is that public-key cryptography is close Code algorithm, user account names or the corresponding encryption key of identity are public keys, and user account names or identity are corresponding Decruption key is private key.
It can be seen that, based on the present invention, session mark data is transferred to by Web system in the form of ciphertext from the above description User browser simultaneously shows that the mobile login assistant in mobile terminal by bar code scan program scanning bar code and is decrypted with bar code Obtain session identification data;Alternatively, the temporary identifier of session mark data is transferred to user by Web system in the form of ciphertext Browser simultaneously shows that the mobile login assistant in mobile terminal is by bar code scan program scanning bar code and decrypts acquisition with bar code The temporary identifier of session identification data, is then temporarily stored in using the temporary identifier of session identification data from Web system Session identification data in system.The method of the present invention both maintained a kind of " the convenient login side of Web system based on mobile terminal Method " (number of patent application:Scheme implements the advantages of simple in 201510472645.X), and is avoided that session identification data are injected into The risk stolen of shell script.
Brief description of the drawings
Fig. 1 be Web system return be session identification data when the present invention schematic diagram.
Fig. 2 be Web system return be the temporary identifier of session identification data when the present invention schematic diagram.
Embodiment
The invention will be further described with reference to the accompanying drawings and examples.
When logging in Web system using browser except user, what Web system returned is probably the temporary of session identification data Identifier, will be encrypted and decrypted the session identification data of return or the temporary identifier of session identification data, Yi Jiruo Return be session identification data temporary identifier then move login assistant need from Web system obtain session identification data this Some is outer, specific implementation and the invention " a kind of convenient login method of Web system based on mobile terminal " of remainder of the present invention (number of patent application:201510472645.X) specific implementation it is identical (pay attention to:The middle mobile login assistant of the present invention corresponds to Mobile login agent in 201510472645.X).
If what Web system returned is the temporary identifier of session identification data, Web system generation session identification data The method of temporary identifier includes but is not limited to:Word string by the use of a word string generated at random or comprising random word string as The temporary identifier of session identification data, or with unidirectionally can not inverse function (such as hash function) session identification data are transported Calculate, the temporary identifier of session identification data is then used as by the use of the result after computing;And Web system keeps in session mark data In memory or database and mobile login assistant is understood using the temporary identifier of session identification data from Web system The specific implementation of words mark data is very simple for those skilled in the relevant art, herein without making further It is bright.
Reconciliation is encrypted below by temporary identifier of the embodiment for session identification data or session identification data Close embodiment is described.
Embodiment one
Web system carries out login discriminating using account name, password mode, has user in the accounts database of Web system Account name, password or password hash value;User is inputted by browser when logging in Web system using browser and submits account Name;After account name one effective account of correspondence that Web system receives the account name of user's submission and confirmation receives, from correspondence The password or password hash value of user is obtained in account, and a symmetric key is exported by password or password hash value and (is such as taken Their hashed value), and symmetric key cipher algorithm is used to the session identification number back to browser with this derived key According to or the temporary identifiers of session identification data be encrypted;And move login assistant and encrypted session is obtained by bar code scan After the temporary identifier of mark data or session identification data, same method is used using the password or password hash value of user The temporary identifier of encrypted session identification data or session identification data is decrypted in export symmetric key.
Embodiment two
Web system carries out login discriminating using public key (such as digital certificate) mode, has in the accounts database of Web system The public key (such as digital certificate) of user;User is inputted by browser when logging in Web system using browser and submits account name; After account name one effective account of correspondence that Web system receives the account name of user's submission and confirmation receives, from corresponding account Client public key is obtained in family, with client public key using public key cryptography algorithm to the session identification data back to browser or The temporary identifier of session identification data is encrypted;And move login assistant and encrypted session identification is obtained by bar code scan After the temporary identifier of data or session identification data, using the corresponding private key pair encryption of client public key session identification data or The temporary identifier of session identification data is decrypted.
Embodiment three
There is the identity of user in the accounts database of Web system;User logs in Web system using browser When inputted by browser and submit account name;The account that Web system receives the account name of user's submission and confirmation receives After the corresponding effective account of name, the identity of user is obtained from corresponding account, with this identity it is corresponding one it is right Claim key using symmetric key cipher algorithm to the session identification data or the temporary mark of session identification data back to browser Know symbol to be encrypted;And move login assistant and encrypted session identification data or session identification data are obtained by bar code scan After temporary identifier, the temporary identifier using same symmetric key to encrypted session identification data or session identification data It is decrypted.
Example IV
There is the identity of user in the accounts database of Web system;User logs in Web system using browser When inputted by browser and submit account name;The account that Web system receives the account name of user's submission and confirmation receives After the corresponding effective account of name, the identity of user is obtained from corresponding account, IBC is used as using this identity (Identity Based Cryptography) public key is using IBC cryptographic algorithms to the session identification data back to browser Or the temporary identifier of session identification data is encrypted;And move login assistant and encrypted session mark is obtained by bar code scan After the temporary identifier for knowing data or session identification data, the session of the corresponding IBC private key pair encryptions of User Identity is utilized The temporary identifier of mark data or session identification data is decrypted.
Embodiment five
User is inputted by browser when logging in Web system using browser and submits the identity of user;Web After system receives the identity of user's submission, symmetric key cipher is used with the corresponding symmetric key of this identity Algorithm back to the session identification data of browser or the temporary identifier of session identification data to being encrypted;And move login After assistant obtains the temporary identifier of encrypted session identification data or session identification data by bar code scan, using same The temporary identifier of encrypted session identification data or session identification data is decrypted in symmetric key.
Embodiment six
User is inputted by browser when logging in Web system using browser and submits the identity of user;Web System receive user submission identity after, using this identity as IBC public keys use IBC cryptographic algorithms to back to The session identification data of browser or the temporary identifier of session identification data are encrypted;And move login assistant and pass through bar code It is corresponding using User Identity after scanning obtains the temporary identifier of encrypted session identification data or session identification data The session identification data of IBC private key pair encryptions or the temporary identifier of session identification data are decrypted.
The identity of user is corresponded to the implementation of a symmetric key for embodiment three, five, such as lower section can be used Case.
Implement a key generation system, which has a seed key, for the identity mark of user Know, key generation system generates a symmetric key as follows:
HASH (identity | | effective time | | seed key),
Wherein, HASH represents hash operations, " | | " representing that byte serial merges, effective time represents one and includes current time Time interval, this effective time since at the time of some is predetermined by set time length change (such as one month, half a year or one Year).
User periodically obtains that identity is corresponding, currently valid symmetric key from key generation system, for user Before generating the corresponding symmetric key of an identity, key generation system will be verified, confirm that user possesses corresponding identity mark Know;When Web system is kept in identifier to session identification data or session identification data and is encrypted, obtained from key generation system The corresponding currently valid symmetric key of identity that user submits.
Other unaccounted particular techniques are implemented, and are it is well known that not saying certainly for those skilled in the relevant art Bright.

Claims (5)

1. a kind of Web system safe login method based on mobile terminal, it is characterized in that:
First step:When the Web system that user is not yet logged in using browser access one on computers, Web system opens Dynamic user login operation, user input user in the account name of Web system or the identity of user by browser, and It is submitted to Web system;
Second step:After Web system receives account name or the identity of user's submission, user account names or identity mark are used Corresponding encryption key is known to the temporary of the session identification data of session between Web system and user browser or session identification data Deposit identifier to be encrypted, the temporary identifier of encrypted session identification data or session identification data is then transmitted to user Browser is simultaneously shown on user browser in the form of bar code;What if Web system returned is encrypted session identification data Identifier is kept in, then the session identification data of unencryption are temporarily stored in memory or database by Web system at the same time, and described temporary Identifier is the data for being identified to the session identification data being temporarily stored in memory or database;The user browser It is the browser that user's current accessed Web system is operating with, and user uses shifting during Web system is logged in The targeted browser of dynamic terminal scanning bar code;
Third step:User has the bar code shown on the mobile scanning terminal browser of mobile login assistant using operation;It is mobile Login assistant obtains the temporary identifier of encrypted session identification data or session identification data from the bar code of scanning, then makes Encrypted session identification data or session identification data are kept in user account names or the corresponding decruption key of identity Identifier is decrypted;If what decryption obtained is the temporary identifier of session identification data, it is further sharp to move login assistant The temporary identifier of the session identification data obtained with decryption from Web system inquiry obtain it is temporary, with same session identification The session identification data of the temporary identifier mark of data;Then, user uses user identity voucher by mobile login assistant Register is completed in Web system;Logged in user by mobile login assistant using user identity voucher in Web system During operation, mobile login assistant is in the way of the browser that Web system is arranged submits session identification data by session mark Knowledge data, which are included in, to be submitted in the HTTP request of Web system;User identity voucher is used by mobile login assistant in user After Web system completes register, user's session between used browser and Web system on computers is in Login status;
The Web system is an information system or application system based on Web technological development;
The session identification data are to include the Session ID of session and other sessions between Web system and user browser The data of relevant information;Other session related informations are the information for limiting session;The session identification data it is temporary Deposit the word for being used to be identified the session identification data being temporarily stored in memory or database that identifier is Web system generation String;
The identity of the user is the character string of a unique mark user;
The user account names or the corresponding encryption key of identity are that Web system is obtained by user account names or identity The key for data encryption arrived, the user account names or the corresponding decruption key of identity be with user account names or The corresponding key for encryption data to be decrypted of the corresponding encryption key of identity;
The mobile terminal, which is one, has data network networked capabilities and the portable computing with camera;
The mobile login assistant is that one for installing and running in the mobile terminal of user is used to help user's use and browses Device carries out the program of Web system register on computers;The mobile login assistant by http protocol and Web system into Row interaction;
User's identity documents used when Web system logs in are made of subscriber identity data and private data;The use Family mark data is account name of the user in Web system, or with user Web system account name it is corresponding, for marking Know the data of user identity;The private data is for proving that user is exactly the data of the owner of identity documents.
2. the Web system safe login method according to claim 1 based on mobile terminal, it is characterized in that:
If what is inputted and submit by browser in the first step user is account name, Web system is receiving account Name after, first accounts database check user submit account name whether be an effective account account name, if so, then using The session identification data of user account names or the corresponding encryption key of identity to session between Web system and user browser Or the temporary identifier of session identification data is encrypted, otherwise, mistake is returned to browser.
3. the Web system safe login method according to claim 1 based on mobile terminal, it is characterized in that:
If what Web system returned is the temporary identifier of encrypted session identification data,:
After mobile login assistant obtains session identification data using the temporary identifier of session identification data from Web system, Web System deletes the session identification data being acquired from memory or database;Alternatively, when a session identification data are kept in Time exceed predetermined time limit after be not acquired yet, then Web system by the session identification data that are not acquired of time-out from Deleted in memory or database.
4. the Web system safe login method according to claim 1 based on mobile terminal, it is characterized in that:
If user account names or the corresponding encryption key of identity and decruption key are same keys, to session identification number According to or the temporary identifiers of session identification data be encrypted and decrypted when cryptographic algorithm used be symmetric key cipher algorithm;
If user account names or the corresponding encryption key of identity and decruption key are not same keys, to session identification The temporary identifier of data or session identification data cryptographic algorithm used when being encrypted and decrypted is that public key cryptography is calculated Method, user account names or the corresponding encryption key of identity are public keys, and user account names or the corresponding decryption of identity Key is private key.
5. the Web system safe login method according to claim 1 based on mobile terminal, it is characterized in that:
The method of the temporary identifier of Web system generation session identification data includes:With a word string generated at random or bag Temporary identifier of the word string containing random word string as session identification data;Alternatively, with unidirectional irreversible function pair session identification Data carry out computing, and the temporary identifier of session identification data is then used as by the use of the result after computing.
CN201510887444.6A 2015-12-03 2015-12-03 A kind of Web system safe login method based on mobile terminal Active CN105281902B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510887444.6A CN105281902B (en) 2015-12-03 2015-12-03 A kind of Web system safe login method based on mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510887444.6A CN105281902B (en) 2015-12-03 2015-12-03 A kind of Web system safe login method based on mobile terminal

Publications (2)

Publication Number Publication Date
CN105281902A CN105281902A (en) 2016-01-27
CN105281902B true CN105281902B (en) 2018-04-20

Family

ID=55150297

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510887444.6A Active CN105281902B (en) 2015-12-03 2015-12-03 A kind of Web system safe login method based on mobile terminal

Country Status (1)

Country Link
CN (1) CN105281902B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105897424B (en) * 2016-03-14 2019-07-12 深圳奥联信息安全技术有限公司 A kind of enhancing identity authentication method
CN105978994B (en) * 2016-06-22 2019-01-18 武汉理工大学 A kind of login method of web oriented system
CN106357669B (en) * 2016-10-14 2019-07-23 武汉理工大学 A kind of Web system login method and log in auxiliary system
TWI670618B (en) * 2017-05-26 2019-09-01 台新國際商業銀行股份有限公司 Login system implemented along with a mobile device without password and method thereof
CN108462706B (en) * 2018-03-06 2022-05-03 武汉理工大学 Single sign-on method and system
CN109450777B (en) * 2018-12-28 2021-09-17 苏州开心盒子软件有限公司 Session information extraction method, device, equipment and medium
CN110300121B (en) * 2019-07-23 2021-12-07 上海易点时空网络有限公司 Data processing method and device based on full duplex communication

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104038486A (en) * 2014-06-04 2014-09-10 武汉理工大学 System and method for realizing user login identification based on identification type codes
CN104158797A (en) * 2014-07-14 2014-11-19 武汉理工大学 Word and indentifying password integrated user login authentication implementation method
CN104202163A (en) * 2014-08-19 2014-12-10 武汉理工大学 Password system based on mobile terminal
CN104202162A (en) * 2014-08-12 2014-12-10 武汉理工大学 System for login based on mobile phone and login method
CN104901951A (en) * 2015-04-23 2015-09-09 武汉理工大学 Mobile terminal based cipher data processing and interaction method in Web application

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104038486A (en) * 2014-06-04 2014-09-10 武汉理工大学 System and method for realizing user login identification based on identification type codes
CN104158797A (en) * 2014-07-14 2014-11-19 武汉理工大学 Word and indentifying password integrated user login authentication implementation method
CN104202162A (en) * 2014-08-12 2014-12-10 武汉理工大学 System for login based on mobile phone and login method
CN104202163A (en) * 2014-08-19 2014-12-10 武汉理工大学 Password system based on mobile terminal
CN104901951A (en) * 2015-04-23 2015-09-09 武汉理工大学 Mobile terminal based cipher data processing and interaction method in Web application

Also Published As

Publication number Publication date
CN105281902A (en) 2016-01-27

Similar Documents

Publication Publication Date Title
CN105281902B (en) A kind of Web system safe login method based on mobile terminal
KR101999188B1 (en) Secure personal devices using elliptic curve cryptography for secret sharing
US20210367795A1 (en) Identity-Linked Authentication Through A User Certificate System
US6950523B1 (en) Secure storage of private keys
CN103685282B (en) A kind of identity identifying method based on single-sign-on
KR101389100B1 (en) A method and apparatus to provide authentication and privacy with low complexity devices
CN101272237B (en) Method and system for automatically generating and filling login information
EP2020797B1 (en) Client-server Opaque token passing apparatus and method
CN109450843B (en) SSL certificate management method and system based on block chain
CN115549887A (en) Determination of a common secret and hierarchical deterministic keys for the secure exchange of information
US10177921B2 (en) Secure login without passwords
CN113067699B (en) Data sharing method and device based on quantum key and computer equipment
CN107920052B (en) Encryption method and intelligent device
TW200818838A (en) Mutual authentication and secure channel establishment between two parties using consecutive one-time passwords
CN101815091A (en) Cipher providing equipment, cipher authentication system and cipher authentication method
US20150256336A1 (en) End-To-End Encryption Method for Digital Data Sharing Through a Third Party
GB2514428A (en) Enabling access to data
Mishra et al. Design of a lightweight two-factor authentication scheme with smart card revocation
CN107332666A (en) Terminal document encryption method
US20230299973A1 (en) Service registration method and device
CN110610418B (en) Transaction state query method, system, device and storage medium based on block chain
US8307209B2 (en) Universal authentication method
CN116076055A (en) Method and system for verifying user identification
US20100146605A1 (en) Method and system for providing secure online authentication
Sharma et al. Nonce: Life cycle, issues and challenges in cryptography

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant