CN105281902B - A kind of Web system safe login method based on mobile terminal - Google Patents
A kind of Web system safe login method based on mobile terminal Download PDFInfo
- Publication number
- CN105281902B CN105281902B CN201510887444.6A CN201510887444A CN105281902B CN 105281902 B CN105281902 B CN 105281902B CN 201510887444 A CN201510887444 A CN 201510887444A CN 105281902 B CN105281902 B CN 105281902B
- Authority
- CN
- China
- Prior art keywords
- user
- web system
- session identification
- identification data
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Information Transfer Between Computers (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention relates to a kind of Web system safe login method based on mobile terminal, the method is:When user logs in Web system using browser, inputted by browser and submit account name or identity;Web system will be shown using the session identification data between user account names or the corresponding encryption keys Web system of identity and browser and back to browser and in the form of bar code;User is with mobile scanning terminal bar code;The session identification data that the mobile login assistant of operation in the terminal is obtained by decrypting the data in bar code;Mobile terminal is logged in using user identity voucher in Web system, the session identification data that bar code obtains for ratification in the way of browser submits session identification data during login;For mobile login assistant after Web system login, the session between user browser and Web system is in login status.The existing risk being stolen when invention avoids session identification data transfer.
Description
Technical field
The invention belongs to field of information security technology, particularly a kind of Web system secure log side based on mobile terminal
Method.
Background technology
We can be potentially encountered problems with when accessing the network information or application system.
First, when we log in information or the application system that we to be accessed using public computer in public environment such as Internet bars
During system, QQ, Alipay, since public computer may be placed wooden horse, account name, the password of our login systems are such as logged in
In the presence of the risk for being monitored, stealing (even dynamic password, can not avoid this security risk).
Second, we have account name, password to remember in different information or application system, account name, password are more
It is easy to forget that, obscure.
Third, in the high occasion of some security requirements, it would be desirable to use the USB Key for having digital certificate and private key
Etc. cryptographic hardware, but if multiple USB Key cryptographic hardwares need to carry, can make troubles to user.
For these problems, in its patent application, " a kind of Web system based on mobile terminal is convenient to step on present invention applicant
Recording method " (number of patent application:201510472645.X) in for Web system propose a kind of solution party based on mobile terminal
Case, specifically:When user logs in Web system using browser, Web system is by the session mark between browser and Web system
Know data show in the form of bar code on a web browser, user scans bar code using the camera of mobile terminal, in mobile terminal
Mobile login agent session identification data are obtained from bar code, then move login agent and logged in using user identity voucher
Web system, submits what scanning obtained when mobile login agent logs in Web system in the way of browser submits session identification data
Session identification data, are achieved in login of the user browser in Web system.201510472645.X maximum feature be implement
Simply, and Web system carries out login discriminating by original mode to user, and still, the scheme in 201510472645.X is also deposited
In a problem, show back to browser and that by browser page this makes here it is session identification data with clear-text way
Obtain session identification data and there is the risk that the shell script maliciously injected is stolen (from the page).
The content of the invention
The purpose of the present invention is to propose to a kind of Web system safe login method based on mobile terminal, to overcome existing side
The deficiency of case.
To achieve these goals, technical solution proposed by the present invention is:
A kind of Web system safe login method based on mobile terminal, the method are as follows:
First step:When the Web system that user is not yet logged in using browser access one on computers, Web systems
System starts user login operation (i.e. user identity differentiate), user by browser input user in the account name of Web system or
The identity of user, and it is submitted to Web system;
Second step:After Web system receives account name or the identity of user's submission, user account names or body are used
Part identifies session identification data or meeting of the corresponding encryption key to session between Web system and user browser (Session)
The temporary identifier of words mark data is encrypted, then by the temporary mark of encrypted session identification data or session identification data
Know symbol to be transmitted to user browser and be shown on user browser in the form of bar code;What if Web system returned is encrypted
The temporary identifier of session identification data, then Web system the session identification data of unencryption are temporarily stored in memory or data at the same time
In storehouse, temporary session identification data are identified with the temporary identifier of session identification data;
Third step:User has the bar code shown on the mobile scanning terminal browser of mobile login assistant using operation;
Mobile login assistant obtains the temporary identifier of encrypted session identification data or session identification data from the bar code of scanning, so
Afterwards using user account names or the corresponding decruption key of identity to encrypted session identification data or session identification data
Temporary identifier is decrypted;If what decryption obtained is the temporary identifier of session identification data, login assistant is moved into one
The temporary identifier for the session identification data that step is obtained using decryption from Web system inquiry obtain it is temporary, with same session
The session identification data of the temporary identifier mark of mark data;Then, user passes through (under the guiding of mobile login assistant)
Mobile login assistant completes register using user identity voucher in Web system;Used in user by mobile login assistant
During Web system carries out register, mobile login assistant is carried user identity voucher by the browser that Web system is arranged
(after decryption or obtained from Web system) session identification data are included in by the mode of intersection words mark data is submitted to Web
In the HTTP request of system;Register is completed in Web system using user identity voucher by mobile login assistant in user
Afterwards, user's session between used browser and Web system on computers be in login status (by Web system mark
It is denoted as login status);
The Web system is an information system or application system based on Web technological development;
The session identification data are to include the Session ID of session between Web system and user browser
The data of (Session ID) and other session related informations;Other session related informations are the letters for limiting session
Breath;The temporary identifier of the session identification data is the meeting being used for being temporarily stored in memory or database of Web system generation
The word string that words mark data is identified;
The identity of the user is character string (such as E-mail address, movement of a unique mark user
Communicating number etc.);
The user account names or the corresponding encryption key of identity are that Web system passes through user account names or identity mark
Know the obtained key for data encryption, the user account names or the corresponding decruption key of identity are and user account
Name or the corresponding key for encryption data to be decrypted of the corresponding encryption key of identity;
The mobile terminal, which is one, to be had data network networked capabilities and carries the portable computing of camera (such as
Mobile communications device, tablet computer, intelligent wearable device etc.);
The mobile login assistant is that one for installing and running in the mobile terminal of user is used to help user's use
Browser carries out the program of Web system register on computers;The mobile login assistant passes through http protocol and Web systems
System interacts;
User's identity documents used when Web system logs in are made of subscriber identity data and private data;Institute
It is account name of the user in Web system to state subscriber identity data, or with user Web system account name it is corresponding, use
In the data (such as digital certificate) of mark user identity;The private data is for proving that user is exactly possessing for identity documents
The data of person.
If what is inputted and submit by browser in the first step user is account name, Web system is receiving
After account name, first accounts database check user submit account name whether be an effective account account name, if so, then
Using user account names or the corresponding encryption key of identity to session between Web system and user browser (Session)
Session identification data or the temporary identifiers of session identification data be encrypted, otherwise, mistake is returned to browser.
If what Web system returned is the temporary identifier of encrypted session identification data,:
When mobile login assistant obtains session identification data using the temporary identifier of session identification data from Web system
Afterwards, Web system deletes the session identification data being acquired from memory or database;Alternatively, when a session identification number
It is not acquired yet after exceeding predetermined time limit according to the temporary time, then the session identification that time-out is not acquired by Web system
Data are deleted from memory or database.
If user account names or the corresponding encryption key of identity and decruption key are same keys, to session mark
The temporary identifier of knowledge data or session identification data cryptographic algorithm used when being encrypted and decrypted is symmetric key cipher
Algorithm;
If user account names or the corresponding encryption key of identity and decruption key are not same keys, to session
The temporary identifier of mark data or session identification data cryptographic algorithm used when being encrypted and decrypted is that public-key cryptography is close
Code algorithm, user account names or the corresponding encryption key of identity are public keys, and user account names or identity are corresponding
Decruption key is private key.
It can be seen that, based on the present invention, session mark data is transferred to by Web system in the form of ciphertext from the above description
User browser simultaneously shows that the mobile login assistant in mobile terminal by bar code scan program scanning bar code and is decrypted with bar code
Obtain session identification data;Alternatively, the temporary identifier of session mark data is transferred to user by Web system in the form of ciphertext
Browser simultaneously shows that the mobile login assistant in mobile terminal is by bar code scan program scanning bar code and decrypts acquisition with bar code
The temporary identifier of session identification data, is then temporarily stored in using the temporary identifier of session identification data from Web system
Session identification data in system.The method of the present invention both maintained a kind of " the convenient login side of Web system based on mobile terminal
Method " (number of patent application:Scheme implements the advantages of simple in 201510472645.X), and is avoided that session identification data are injected into
The risk stolen of shell script.
Brief description of the drawings
Fig. 1 be Web system return be session identification data when the present invention schematic diagram.
Fig. 2 be Web system return be the temporary identifier of session identification data when the present invention schematic diagram.
Embodiment
The invention will be further described with reference to the accompanying drawings and examples.
When logging in Web system using browser except user, what Web system returned is probably the temporary of session identification data
Identifier, will be encrypted and decrypted the session identification data of return or the temporary identifier of session identification data, Yi Jiruo
Return be session identification data temporary identifier then move login assistant need from Web system obtain session identification data this
Some is outer, specific implementation and the invention " a kind of convenient login method of Web system based on mobile terminal " of remainder of the present invention
(number of patent application:201510472645.X) specific implementation it is identical (pay attention to:The middle mobile login assistant of the present invention corresponds to
Mobile login agent in 201510472645.X).
If what Web system returned is the temporary identifier of session identification data, Web system generation session identification data
The method of temporary identifier includes but is not limited to:Word string by the use of a word string generated at random or comprising random word string as
The temporary identifier of session identification data, or with unidirectionally can not inverse function (such as hash function) session identification data are transported
Calculate, the temporary identifier of session identification data is then used as by the use of the result after computing;And Web system keeps in session mark data
In memory or database and mobile login assistant is understood using the temporary identifier of session identification data from Web system
The specific implementation of words mark data is very simple for those skilled in the relevant art, herein without making further
It is bright.
Reconciliation is encrypted below by temporary identifier of the embodiment for session identification data or session identification data
Close embodiment is described.
Embodiment one
Web system carries out login discriminating using account name, password mode, has user in the accounts database of Web system
Account name, password or password hash value;User is inputted by browser when logging in Web system using browser and submits account
Name;After account name one effective account of correspondence that Web system receives the account name of user's submission and confirmation receives, from correspondence
The password or password hash value of user is obtained in account, and a symmetric key is exported by password or password hash value and (is such as taken
Their hashed value), and symmetric key cipher algorithm is used to the session identification number back to browser with this derived key
According to or the temporary identifiers of session identification data be encrypted;And move login assistant and encrypted session is obtained by bar code scan
After the temporary identifier of mark data or session identification data, same method is used using the password or password hash value of user
The temporary identifier of encrypted session identification data or session identification data is decrypted in export symmetric key.
Embodiment two
Web system carries out login discriminating using public key (such as digital certificate) mode, has in the accounts database of Web system
The public key (such as digital certificate) of user;User is inputted by browser when logging in Web system using browser and submits account name;
After account name one effective account of correspondence that Web system receives the account name of user's submission and confirmation receives, from corresponding account
Client public key is obtained in family, with client public key using public key cryptography algorithm to the session identification data back to browser or
The temporary identifier of session identification data is encrypted;And move login assistant and encrypted session identification is obtained by bar code scan
After the temporary identifier of data or session identification data, using the corresponding private key pair encryption of client public key session identification data or
The temporary identifier of session identification data is decrypted.
Embodiment three
There is the identity of user in the accounts database of Web system;User logs in Web system using browser
When inputted by browser and submit account name;The account that Web system receives the account name of user's submission and confirmation receives
After the corresponding effective account of name, the identity of user is obtained from corresponding account, with this identity it is corresponding one it is right
Claim key using symmetric key cipher algorithm to the session identification data or the temporary mark of session identification data back to browser
Know symbol to be encrypted;And move login assistant and encrypted session identification data or session identification data are obtained by bar code scan
After temporary identifier, the temporary identifier using same symmetric key to encrypted session identification data or session identification data
It is decrypted.
Example IV
There is the identity of user in the accounts database of Web system;User logs in Web system using browser
When inputted by browser and submit account name;The account that Web system receives the account name of user's submission and confirmation receives
After the corresponding effective account of name, the identity of user is obtained from corresponding account, IBC is used as using this identity
(Identity Based Cryptography) public key is using IBC cryptographic algorithms to the session identification data back to browser
Or the temporary identifier of session identification data is encrypted;And move login assistant and encrypted session mark is obtained by bar code scan
After the temporary identifier for knowing data or session identification data, the session of the corresponding IBC private key pair encryptions of User Identity is utilized
The temporary identifier of mark data or session identification data is decrypted.
Embodiment five
User is inputted by browser when logging in Web system using browser and submits the identity of user;Web
After system receives the identity of user's submission, symmetric key cipher is used with the corresponding symmetric key of this identity
Algorithm back to the session identification data of browser or the temporary identifier of session identification data to being encrypted;And move login
After assistant obtains the temporary identifier of encrypted session identification data or session identification data by bar code scan, using same
The temporary identifier of encrypted session identification data or session identification data is decrypted in symmetric key.
Embodiment six
User is inputted by browser when logging in Web system using browser and submits the identity of user;Web
System receive user submission identity after, using this identity as IBC public keys use IBC cryptographic algorithms to back to
The session identification data of browser or the temporary identifier of session identification data are encrypted;And move login assistant and pass through bar code
It is corresponding using User Identity after scanning obtains the temporary identifier of encrypted session identification data or session identification data
The session identification data of IBC private key pair encryptions or the temporary identifier of session identification data are decrypted.
The identity of user is corresponded to the implementation of a symmetric key for embodiment three, five, such as lower section can be used
Case.
Implement a key generation system, which has a seed key, for the identity mark of user
Know, key generation system generates a symmetric key as follows:
HASH (identity | | effective time | | seed key),
Wherein, HASH represents hash operations, " | | " representing that byte serial merges, effective time represents one and includes current time
Time interval, this effective time since at the time of some is predetermined by set time length change (such as one month, half a year or one
Year).
User periodically obtains that identity is corresponding, currently valid symmetric key from key generation system, for user
Before generating the corresponding symmetric key of an identity, key generation system will be verified, confirm that user possesses corresponding identity mark
Know;When Web system is kept in identifier to session identification data or session identification data and is encrypted, obtained from key generation system
The corresponding currently valid symmetric key of identity that user submits.
Other unaccounted particular techniques are implemented, and are it is well known that not saying certainly for those skilled in the relevant art
Bright.
Claims (5)
1. a kind of Web system safe login method based on mobile terminal, it is characterized in that:
First step:When the Web system that user is not yet logged in using browser access one on computers, Web system opens
Dynamic user login operation, user input user in the account name of Web system or the identity of user by browser, and
It is submitted to Web system;
Second step:After Web system receives account name or the identity of user's submission, user account names or identity mark are used
Corresponding encryption key is known to the temporary of the session identification data of session between Web system and user browser or session identification data
Deposit identifier to be encrypted, the temporary identifier of encrypted session identification data or session identification data is then transmitted to user
Browser is simultaneously shown on user browser in the form of bar code;What if Web system returned is encrypted session identification data
Identifier is kept in, then the session identification data of unencryption are temporarily stored in memory or database by Web system at the same time, and described temporary
Identifier is the data for being identified to the session identification data being temporarily stored in memory or database;The user browser
It is the browser that user's current accessed Web system is operating with, and user uses shifting during Web system is logged in
The targeted browser of dynamic terminal scanning bar code;
Third step:User has the bar code shown on the mobile scanning terminal browser of mobile login assistant using operation;It is mobile
Login assistant obtains the temporary identifier of encrypted session identification data or session identification data from the bar code of scanning, then makes
Encrypted session identification data or session identification data are kept in user account names or the corresponding decruption key of identity
Identifier is decrypted;If what decryption obtained is the temporary identifier of session identification data, it is further sharp to move login assistant
The temporary identifier of the session identification data obtained with decryption from Web system inquiry obtain it is temporary, with same session identification
The session identification data of the temporary identifier mark of data;Then, user uses user identity voucher by mobile login assistant
Register is completed in Web system;Logged in user by mobile login assistant using user identity voucher in Web system
During operation, mobile login assistant is in the way of the browser that Web system is arranged submits session identification data by session mark
Knowledge data, which are included in, to be submitted in the HTTP request of Web system;User identity voucher is used by mobile login assistant in user
After Web system completes register, user's session between used browser and Web system on computers is in
Login status;
The Web system is an information system or application system based on Web technological development;
The session identification data are to include the Session ID of session and other sessions between Web system and user browser
The data of relevant information;Other session related informations are the information for limiting session;The session identification data it is temporary
Deposit the word for being used to be identified the session identification data being temporarily stored in memory or database that identifier is Web system generation
String;
The identity of the user is the character string of a unique mark user;
The user account names or the corresponding encryption key of identity are that Web system is obtained by user account names or identity
The key for data encryption arrived, the user account names or the corresponding decruption key of identity be with user account names or
The corresponding key for encryption data to be decrypted of the corresponding encryption key of identity;
The mobile terminal, which is one, has data network networked capabilities and the portable computing with camera;
The mobile login assistant is that one for installing and running in the mobile terminal of user is used to help user's use and browses
Device carries out the program of Web system register on computers;The mobile login assistant by http protocol and Web system into
Row interaction;
User's identity documents used when Web system logs in are made of subscriber identity data and private data;The use
Family mark data is account name of the user in Web system, or with user Web system account name it is corresponding, for marking
Know the data of user identity;The private data is for proving that user is exactly the data of the owner of identity documents.
2. the Web system safe login method according to claim 1 based on mobile terminal, it is characterized in that:
If what is inputted and submit by browser in the first step user is account name, Web system is receiving account
Name after, first accounts database check user submit account name whether be an effective account account name, if so, then using
The session identification data of user account names or the corresponding encryption key of identity to session between Web system and user browser
Or the temporary identifier of session identification data is encrypted, otherwise, mistake is returned to browser.
3. the Web system safe login method according to claim 1 based on mobile terminal, it is characterized in that:
If what Web system returned is the temporary identifier of encrypted session identification data,:
After mobile login assistant obtains session identification data using the temporary identifier of session identification data from Web system, Web
System deletes the session identification data being acquired from memory or database;Alternatively, when a session identification data are kept in
Time exceed predetermined time limit after be not acquired yet, then Web system by the session identification data that are not acquired of time-out from
Deleted in memory or database.
4. the Web system safe login method according to claim 1 based on mobile terminal, it is characterized in that:
If user account names or the corresponding encryption key of identity and decruption key are same keys, to session identification number
According to or the temporary identifiers of session identification data be encrypted and decrypted when cryptographic algorithm used be symmetric key cipher algorithm;
If user account names or the corresponding encryption key of identity and decruption key are not same keys, to session identification
The temporary identifier of data or session identification data cryptographic algorithm used when being encrypted and decrypted is that public key cryptography is calculated
Method, user account names or the corresponding encryption key of identity are public keys, and user account names or the corresponding decryption of identity
Key is private key.
5. the Web system safe login method according to claim 1 based on mobile terminal, it is characterized in that:
The method of the temporary identifier of Web system generation session identification data includes:With a word string generated at random or bag
Temporary identifier of the word string containing random word string as session identification data;Alternatively, with unidirectional irreversible function pair session identification
Data carry out computing, and the temporary identifier of session identification data is then used as by the use of the result after computing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510887444.6A CN105281902B (en) | 2015-12-03 | 2015-12-03 | A kind of Web system safe login method based on mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510887444.6A CN105281902B (en) | 2015-12-03 | 2015-12-03 | A kind of Web system safe login method based on mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105281902A CN105281902A (en) | 2016-01-27 |
CN105281902B true CN105281902B (en) | 2018-04-20 |
Family
ID=55150297
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510887444.6A Active CN105281902B (en) | 2015-12-03 | 2015-12-03 | A kind of Web system safe login method based on mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105281902B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105897424B (en) * | 2016-03-14 | 2019-07-12 | 深圳奥联信息安全技术有限公司 | A kind of enhancing identity authentication method |
CN105978994B (en) * | 2016-06-22 | 2019-01-18 | 武汉理工大学 | A kind of login method of web oriented system |
CN106357669B (en) * | 2016-10-14 | 2019-07-23 | 武汉理工大学 | A kind of Web system login method and log in auxiliary system |
TWI670618B (en) * | 2017-05-26 | 2019-09-01 | 台新國際商業銀行股份有限公司 | Login system implemented along with a mobile device without password and method thereof |
CN108462706B (en) * | 2018-03-06 | 2022-05-03 | 武汉理工大学 | Single sign-on method and system |
CN109450777B (en) * | 2018-12-28 | 2021-09-17 | 苏州开心盒子软件有限公司 | Session information extraction method, device, equipment and medium |
CN110300121B (en) * | 2019-07-23 | 2021-12-07 | 上海易点时空网络有限公司 | Data processing method and device based on full duplex communication |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104038486A (en) * | 2014-06-04 | 2014-09-10 | 武汉理工大学 | System and method for realizing user login identification based on identification type codes |
CN104158797A (en) * | 2014-07-14 | 2014-11-19 | 武汉理工大学 | Word and indentifying password integrated user login authentication implementation method |
CN104202163A (en) * | 2014-08-19 | 2014-12-10 | 武汉理工大学 | Password system based on mobile terminal |
CN104202162A (en) * | 2014-08-12 | 2014-12-10 | 武汉理工大学 | System for login based on mobile phone and login method |
CN104901951A (en) * | 2015-04-23 | 2015-09-09 | 武汉理工大学 | Mobile terminal based cipher data processing and interaction method in Web application |
-
2015
- 2015-12-03 CN CN201510887444.6A patent/CN105281902B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104038486A (en) * | 2014-06-04 | 2014-09-10 | 武汉理工大学 | System and method for realizing user login identification based on identification type codes |
CN104158797A (en) * | 2014-07-14 | 2014-11-19 | 武汉理工大学 | Word and indentifying password integrated user login authentication implementation method |
CN104202162A (en) * | 2014-08-12 | 2014-12-10 | 武汉理工大学 | System for login based on mobile phone and login method |
CN104202163A (en) * | 2014-08-19 | 2014-12-10 | 武汉理工大学 | Password system based on mobile terminal |
CN104901951A (en) * | 2015-04-23 | 2015-09-09 | 武汉理工大学 | Mobile terminal based cipher data processing and interaction method in Web application |
Also Published As
Publication number | Publication date |
---|---|
CN105281902A (en) | 2016-01-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105281902B (en) | A kind of Web system safe login method based on mobile terminal | |
KR101999188B1 (en) | Secure personal devices using elliptic curve cryptography for secret sharing | |
US20210367795A1 (en) | Identity-Linked Authentication Through A User Certificate System | |
US6950523B1 (en) | Secure storage of private keys | |
CN103685282B (en) | A kind of identity identifying method based on single-sign-on | |
KR101389100B1 (en) | A method and apparatus to provide authentication and privacy with low complexity devices | |
CN101272237B (en) | Method and system for automatically generating and filling login information | |
EP2020797B1 (en) | Client-server Opaque token passing apparatus and method | |
CN109450843B (en) | SSL certificate management method and system based on block chain | |
CN115549887A (en) | Determination of a common secret and hierarchical deterministic keys for the secure exchange of information | |
US10177921B2 (en) | Secure login without passwords | |
CN113067699B (en) | Data sharing method and device based on quantum key and computer equipment | |
CN107920052B (en) | Encryption method and intelligent device | |
TW200818838A (en) | Mutual authentication and secure channel establishment between two parties using consecutive one-time passwords | |
CN101815091A (en) | Cipher providing equipment, cipher authentication system and cipher authentication method | |
US20150256336A1 (en) | End-To-End Encryption Method for Digital Data Sharing Through a Third Party | |
GB2514428A (en) | Enabling access to data | |
Mishra et al. | Design of a lightweight two-factor authentication scheme with smart card revocation | |
CN107332666A (en) | Terminal document encryption method | |
US20230299973A1 (en) | Service registration method and device | |
CN110610418B (en) | Transaction state query method, system, device and storage medium based on block chain | |
US8307209B2 (en) | Universal authentication method | |
CN116076055A (en) | Method and system for verifying user identification | |
US20100146605A1 (en) | Method and system for providing secure online authentication | |
Sharma et al. | Nonce: Life cycle, issues and challenges in cryptography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |