CN105336020B - A kind of method and system of authentication - Google Patents

A kind of method and system of authentication Download PDF

Info

Publication number
CN105336020B
CN105336020B CN201410386982.2A CN201410386982A CN105336020B CN 105336020 B CN105336020 B CN 105336020B CN 201410386982 A CN201410386982 A CN 201410386982A CN 105336020 B CN105336020 B CN 105336020B
Authority
CN
China
Prior art keywords
result
timeliness
quick response
response code
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410386982.2A
Other languages
Chinese (zh)
Other versions
CN105336020A (en
Inventor
关奇
褚尧
宋刚
杨玉
李洪敏
毕永生
孙芳杰
高肇明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Heilongjiang Co Ltd
Original Assignee
China Mobile Group Heilongjiang Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Heilongjiang Co Ltd filed Critical China Mobile Group Heilongjiang Co Ltd
Priority to CN201410386982.2A priority Critical patent/CN105336020B/en
Publication of CN105336020A publication Critical patent/CN105336020A/en
Application granted granted Critical
Publication of CN105336020B publication Critical patent/CN105336020B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention provides a kind of method and system of authentication, wherein, this method includes:Obtain disengaging information;The disengaging information is audited;In the disengaging signal auditing by rear, generation timeliness Quick Response Code;It is determined that checking message;The checking message is sent to receiving terminal;Receive the timeliness Quick Response Code that importer and exporter send;Verified according to whether the identity included in the timeliness Quick Response Code of reception is legal to importer and exporter's identity, obtain the first the result;Whether the timeliness Quick Response Code of reception is effectively verified according to the entry time and time departure included in the timeliness Quick Response Code of reception, obtains the second the result;The authentication result of the importer and exporter is determined according to first the result and second the result.The solution of the present invention, which avoids client authenticating information loss or usurped, causes identity theft;Simultaneously so that the term of validity of timeliness Quick Response Code is precisely the time limit of first use, realizes fine-grained authentication in due order, temporally.

Description

A kind of method and system of authentication
Technical field
The present invention relates to communication technical field, more particularly to a kind of method and system of authentication.
Background technology
Computer room and auxiliary facility are only being chartered, specific equipment is had by oneself using client in the computer room trustship business of equipment, client Need often disengaging computer room to carry out client and have the work such as scene adjustment, maintenance and the cutover of equipment by oneself.With the people of disengaging computer room Secondary increase, the difficulty that each personnel for passing in and out computer room are carried out with authentication increase.
At present, it is to the mode of computer room importer and exporter progress authentication:Scene receives the various papery materials that importer and exporter submit Material, after examination & verification passes through, make the computer room access papery card or computer room access IC (Integrated for carrying the term of validity accordingly Circuit, integrated circuit) card, when importer and exporter pass in and out computer room, the computer room access papery card or computer room provided importer and exporter is accurate Enter IC-card to be verified, importer and exporter are allowed in the term of validity of the card with sticking into out computer room.
Computer room access papery card or computer room access IC-card in aforesaid way for authentication are easy to lose or forged, Importer and exporter's identity theft is in turn resulted in, therefore exists and usurps identity person within period of validity by computer room access before the deadline Papery card or computer room access IC-card enter the situation of computer room, reduce the accuracy of authentication.
The content of the invention
It is an object of the invention to provide a kind of method and system of authentication, can solve the problem that and pass in and out machine to importer and exporter at present Room is handled, and can not realize the traditionally on paper access of fine-grained authentication and client disengaging computer room in due order, temporally The problem of card and IC-card are easy to lose or forged.
In order to solve the above-mentioned technical problem, embodiments of the invention provide a kind of method of authentication, wherein, including:
Obtain disengaging information;
The disengaging information is audited, the disengaging information comprises at least identity, entry time, time departure And receiving terminal;
In the disengaging signal auditing by rear, generation is including at least the identity, the entry time and described The timeliness Quick Response Code of time departure;
Checking message is determined according to the timeliness Quick Response Code of generation;
The checking message, which is sent, to the receiving terminal, makes to receive the receiving terminal of checking message according to receiving Checking message obtain timeliness Quick Response Code;
Receive the timeliness Quick Response Code that importer and exporter send;
Obtain identity, entry time and the time departure included in the timeliness Quick Response Code received;
Verified according to whether the identity included in the timeliness Quick Response Code of reception is legal to importer and exporter's identity, Obtain the first the result;
According to the entry time and time departure included in the timeliness Quick Response Code of reception to the timeliness Quick Response Code of reception whether Effectively verified, obtain the second the result;
The authentication result of the importer and exporter is determined according to first the result and second the result.
Wherein, described the step of checking message is determined according to the timeliness Quick Response Code of generation, including:
Using the timeliness Quick Response Code as checking message.
Wherein, described the step of checking message is determined according to the timeliness Quick Response Code of generation, including:
It is determined that uniform resource position mark URL corresponding with the timeliness Quick Response Code;
Using the URL as checking message.
Wherein, whether the identity included in the timeliness Quick Response Code according to reception is legal to importer and exporter's identity Verified, the step of obtaining the first the result, including:
The identity included in the timeliness Quick Response Code of reception is made comparisons with the identity obtained in advance;
If the identity included in the timeliness Quick Response Code received is identical with the identity obtained in advance, first is obtained The result is legal;
If the identity that includes differs with the identity obtained in advance in the timeliness Quick Response Code received, the is obtained One the result is illegal.
Wherein, the timeliness two of the entry time that is included in the timeliness Quick Response Code according to reception and time departure to reception Whether dimension code effectively verified, the step of obtaining the second the result, including:
Obtain current time;
If outside entry time and time departure that the current time includes in the timeliness Quick Response Code received, It is invalid to the second the result;
If between entry time and time departure that the current time includes in the timeliness Quick Response Code received, or The entry time that the current time includes in the timeliness Quick Response Code for reception, or the current time are the timeliness two of reception The time departure included in dimension code, then it is effective to obtain the second the result.
Wherein, it is described to determine that the identity of the importer and exporter is tested according to first the result and second the result The step of demonstrate,proving result, including:
If first the result is legal, and second the result is effective, it is determined that the importer and exporter's Authentication result is to pass through;
If first the result is legal, and second the result is invalid, it is determined that the importer and exporter's Authentication result is not pass through;
If first the result is illegal, and second the result is effective, it is determined that the importer and exporter's Authentication result is not pass through;
If first the result is illegal, and second the result is invalid, it is determined that the importer and exporter's Authentication result is not pass through.
In order to solve the above-mentioned technical problem, embodiments of the invention also provide a kind of system of authentication, wherein, bag Include:
First acquisition module, information is passed in and out for obtaining;
Auditing module, for being audited to the disengaging information, the disengaging information comprises at least identity, entered Time, time departure and receiving terminal;
Generation module, in the disengaging signal auditing by rear, generation including at least the identity, it is described enter The angle of incidence and the timeliness Quick Response Code of the time departure;
First determining module, for determining checking message according to the timeliness Quick Response Code of generation;
Sending module, for the checking message to be sent into the reception for the receiving terminal, making to receive checking message Terminal obtains timeliness Quick Response Code according to the checking message received;
Receiving module, for receiving the timeliness Quick Response Code of importer and exporter's transmission;
Second acquisition module, for obtaining the identity included in the timeliness Quick Response Code received, entry time and leaving Time;
First authentication module, for the identity that is included in the timeliness Quick Response Code according to reception to importer and exporter's identity Whether it is legal verified, obtain the first the result;
Second authentication module, for the entry time that is included in the timeliness Quick Response Code according to reception and time departure to receiving Timeliness Quick Response Code whether effectively verified, obtain the second the result;
Second determining module, for determining the importer and exporter according to first the result and second the result Authentication result.
Wherein, first determining module includes:
First determination sub-module, for using the timeliness Quick Response Code as checking message.
Wherein, first determining module includes:
Second determination sub-module, for determining uniform resource position mark URL corresponding with the timeliness Quick Response Code;
3rd determination sub-module, for using the URL as checking message.
Wherein, first authentication module includes:
Comparison sub-module, for the identity included in the timeliness Quick Response Code by reception and the identity obtained in advance Make comparisons;
First obtains submodule, for when the identity included in the timeliness Quick Response Code received and the identity obtained in advance When identifying identical, it is legal to obtain the first the result;
Second obtains submodule, for when the identity included in the timeliness Quick Response Code received and the identity obtained in advance When mark differs, it is illegal to obtain the first the result.
Wherein, second authentication module includes:
Acquisition submodule, for obtaining current time;
3rd obtains submodule, for the entry time included when the current time in the timeliness Quick Response Code received During with outside time departure, it is invalid to obtain the second the result;
4th obtains submodule, for the entry time included when the current time in the timeliness Quick Response Code received Between time departure, either the current time for the entry time that includes in the timeliness Quick Response Code that receives or described is worked as During the time departure that the preceding time includes in the timeliness Quick Response Code for reception, it is effective to obtain the second the result.
Wherein, second determining module includes:
4th determination sub-module, for being legal when first the result, and second the result is effective When, the authentication result for determining the importer and exporter is to pass through;
5th determination sub-module, for being legal when first the result, and second the result is invalid When, the authentication result for determining the importer and exporter is not pass through;
6th determination sub-module, for being illegal when first the result, and second the result is effective When, the authentication result for determining the importer and exporter is not pass through;
7th determination sub-module, for being illegal when first the result, and second the result is invalid When, the authentication result for determining the importer and exporter is not pass through.
The beneficial effects of the invention are as follows:
The solution of the present invention is using voucher of the timeliness Quick Response Code comprising identity as the computer room that comes in and goes out, due to client The timeliness Quick Response Code can be carried using a terminal, to substitute existing traditionally on paper computer room access card or IC-card, solve tradition The problem of papery computer room access card or IC-card easy to be lost;
, therefore, can be to the computer room that comes in and goes out due to the identity of the client comprising the computer room that comes in and goes out in the timeliness Quick Response Code Personnel carry out authentication, it is therefore prevented that the identity personation of appropriator;
Meanwhile entry time information, time departure information are further comprises in timeliness Quick Response Code so that timeliness Quick Response Code is entering Time corresponding to angle of incidence information comes into force and failed after reaching in the time corresponding to time departure information when reaching so that timeliness two The term of validity for tieing up code is precisely the time limit of first use, realizes fine-grained authentication in due order, temporally.
Brief description of the drawings
Fig. 1 represents the method flow schematic diagram of the authentication of the present invention;
Fig. 2 represents the system structure diagram one of the authentication of the present invention;
Fig. 3 represents the system structure diagram two of the authentication of the present invention;
Fig. 4 represents the system structure diagram three of the authentication of the present invention;
Fig. 5 represents the system structure diagram four of the authentication of the present invention;
Fig. 6 represents the system structure diagram five of the authentication of the present invention;
Fig. 7 represents the system structure diagram six of the authentication of the present invention.
Embodiment
It is right below in conjunction with the accompanying drawings and the specific embodiments to make the object, technical solutions and advantages of the present invention clearer The present invention is described in detail.
As shown in figure 1, embodiments of the invention provide a kind of auth method, this method comprises the following steps:
Step 10, disengaging information is obtained;
Step 11, to it is described disengaging information audit, it is described disengaging information comprise at least identity, entry time, Time departure and receiving terminal;
Step 12, in the disengaging signal auditing by rear, generation is including at least the identity, the entry time With the timeliness Quick Response Code of the time departure;
Step 13, checking message is determined according to the timeliness Quick Response Code of generation;
Step 14, the checking message is sent to the receiving terminal root for the receiving terminal, making to receive checking message Timeliness Quick Response Code is obtained according to the checking message received;
Step 15, the timeliness Quick Response Code that importer and exporter send is received;
Step 16, identity, entry time and the time departure included in the timeliness Quick Response Code of reception is obtained;
Step 17, according to the identity included in the timeliness Quick Response Code of reception it is whether legal to importer and exporter's identity enter Row checking, obtains the first the result;
Step 18, the timeliness two dimension according to the entry time and time departure included in the timeliness Quick Response Code of reception to reception Whether code is effectively verified, obtains the second the result;
Step 19, the authentication of the importer and exporter is determined according to first the result and second the result As a result.
Above-mentioned steps 10 to step 11 are elaborated below in conjunction with specific embodiments:
First, the client terminal of IDC (Internet Data Center, Internet data center) computer room to be come in and gone out proposes Come in and go out the examination & approval announcement information of the computer room:
The registered client terminal opened an account can be on the internet integrated service management client or the Android of oneself Cell-phone customer terminal proposes the examination & approval announcement information of disengaging computer room, wherein, the examination & approval announcement information includes:The identity of client (name of client, cell-phone number, client's photo etc.), into computer room time, leave the time of computer room, receive checking information Receiving terminal and cause information of entrance computer room etc..
Then, the IDC computer rooms terminal obtains entering for client terminal transmission from integrated service management client or short message interface Go out the above-mentioned examination & approval announcement information of computer room, then the examination & approval announcement information of acquisition is audited.
Below in conjunction with specific embodiments, above-mentioned steps 12 to step 13 are described in detail:
Above-mentioned IDC computer rooms terminal-pair obtain the examination & approval announcement information audited, and examination & verification pass through after, the IDC machines Room terminal can then generate a timeliness Quick Response Code for carrying the above-mentioned examination & approval announcement information at once.The computer room terminal can generate this Timeliness Quick Response Code, or determine corresponding with the timeliness Quick Response Code URL (Uniform Resoure Locator, unified resource Finger URL) after using the URL as checking message.
Above-mentioned steps 14 are described in detail below in conjunction with specific embodiments:
After the above-mentioned computer room terminal determines checking message, by the checking message (the timeliness Quick Response Code or with the timeliness URL corresponding to Quick Response Code) fed back by short message interface in client terminal, or fed back by integrated service management client in visitor Family terminal is sent to client terminal so that client terminal can go to obtain the timeliness according to the checking message that the computer room terminal is fed back Quick Response Code.But to prevent client terminal from losing the timeliness Quick Response Code received, then preferred scheme is, the computer room terminal will The timeliness Quick Response Code of the generation and URL corresponding with the timeliness Quick Response Code are sent to client terminal, so just prevent visitor Family terminal can also go to give birth to again when the timeliness Quick Response Code got is lost according to the URL corresponding with the timeliness Quick Response Code Into the timeliness Quick Response Code.
And the client terminal can also carry out other processing after the checking message is received to the checking message.Than Such as, client terminal, if client is for some reason, is abandoned out after the application of this IDC computer room that come in and go out is examined Enter the IDC computer rooms, in order to prevent the checking message of the reception to be stolen, then delete processing etc. can be carried out to it, certain user also may be used Do not delete.
If user wants the timeliness Quick Response Code, the acquisition of the timeliness Quick Response Code has a variety of support patterns:Such as
One kind is short message mode, and client terminal obtains the timeliness Quick Response Code by short message interface;Or pass through short message interface URL corresponding with the timeliness Quick Response Code is obtained, then according to the URL, goes to obtain the timeliness Quick Response Code;
Another kind is Android ad hoc mode, and client terminal obtains timeliness two dimension from integrated service management management client Code;Or management client is managed by integrated service and obtains URL corresponding with the timeliness Quick Response Code, then according to the URL, go Obtain the timeliness Quick Response Code;
Another kind is printing type, and client terminal can get this in (on internet) integrated service management client After timeliness Quick Response Code, picture is printed, obtains the paper for carrying the timeliness Quick Response Code;Or in (on internet) Integrated service management client obtains URL corresponding with the timeliness Quick Response Code, then according to the URL, goes to obtain timeliness two dimension Code, is then printed picture, obtains the paper for carrying the timeliness Quick Response Code.
Three kinds of modes facilitate the different demands of different engineers.
Above flow is the detailed description of the product process of the timeliness Quick Response Code, and the flow of the generation 2 D code information only needs The very short time, human and material resources are saved, greatly improve the perception of client.
Above-mentioned steps 15 to 19 are described in detail below in conjunction with specific embodiments:
If have the IDC computer rooms importer and exporter (holder of the importer and exporter and the above-mentioned client terminal referred to can with identical, Can also be different), it is desirable to come in and go out the IDC computer rooms, and the importer and exporter can go acquisition one according to the embodiment of above-mentioned steps 14 A timeliness Quick Response Code for the IDC computer rooms that come in and go out.Due to timeliness Quick Response Code the generation time may earlier than enter computer room when Between so that into before the time arrival of computer room, importer and exporter may receive the timeliness Quick Response Code, if importer and exporter are when getting After imitating Quick Response Code, it is intended to enter computer room using the timeliness Quick Response Code before reaching in the time for entering computer room, now due to current time The time of computer room is not arrived into, and timeliness Quick Response Code, which does not arrive, to come into force, and the examination & verification to timeliness Quick Response Code is unsuccessful, therefore produces and do not permit Perhaps current importer and exporter enter the command information of computer room.
After the time for entering computer room reaches, the timeliness Quick Response Code got can come into force, and computer room terminal can be to this The timeliness Quick Response Code that current importer and exporter obtain carries out scanning parsing for the first time, i.e., is parsed into the scanning of computer room, when obtaining this Imitate the examination & approval announcement information entrained by Quick Response Code;Because foregoing computer room terminal has got examination & approval notice letter in advance Breath, the examination & approval announcement information that the computer room terminal can obtain this in advance are made with the obtained examination & approval announcement information that parses scanned at present Compare, it is as follows to compare flow:
The identity carried in examination & approval announcement information that current scanline obtains and above-mentioned client for obtaining in advance is whole The identity carried in the examination & approval announcement information submitted is held to make comparisons, if the identification information that the scanning obtains is advance with this The identity of acquisition is identical, then it is legal to obtain the first the result;If the identity that the scanning obtains obtains in advance with this The identity taken differs, then it is illegal to obtain the first the result.
Meanwhile obtain current time;If the current time in the timeliness Quick Response Code received the entry time that includes and Outside time departure, then it is invalid to obtain the second the result;
If between entry time and time departure that the current time includes in the timeliness Quick Response Code received, Huo Zhesuo The entry time included in the timeliness Quick Response Code for stating current time to receive, or the current time are two-dimentional for the timeliness received The time departure included in code, then it is effective to obtain the second the result.
Above-mentioned is the detailed description to step 15 to step 18, below will be according to the first the result obtained above and Two the results, carry out step 19:
The authentication result of above-mentioned importer and exporter, while root are determined according to first the result and second the result Determine whether to agree to that the importer and exporter pass in and out computer room according to the result.Comprise the following steps that:
If first the result is legal, and second the result is effective, it is determined that the identity of the importer and exporter is tested Card result is to pass through;Agree to that the importer and exporter come in and go out the computer room;
If first the result is legal, and second the result is invalid, it is determined that the identity of the importer and exporter is tested Card result is not pass through;Refuse importer and exporter discrepancy computer room;
If first the result is illegal, and second the result is effective, it is determined that the identity of the importer and exporter The result is not pass through;Refuse the importer and exporter to come in and go out the computer room;
If first the result is illegal, and second the result is invalid, it is determined that the identity of the importer and exporter is tested Card result is not pass through;Refuse the importer and exporter to come in and go out the computer room.
Wherein, when current importer and exporter enter computer room in advance, determine that the first the result is legal in the above-mentioned computer room terminal And second the result for it is effective when, then allow current importer and exporter to enter computer room, and current disengaging can be automatically performed Person enters the entrance record information of computer room, and this includes into record information:The identity of current importer and exporter, current importer and exporter enter Enter time, the address information into computer room and cause information into computer room of computer room etc..
When leaving computer room in advance in current importer and exporter, determine that the first the result is legal and is somebody's turn to do in the above-mentioned computer room terminal Second the result for it is effective when, then allow current importer and exporter to leave computer room, and can be automatically performed current importer and exporter from The entrance record information in start room, this, which leaves record information, includes:The identity of current importer and exporter, current importer and exporter leave machine The time in room, the address information for leaving computer room and cause information into computer room etc..When reaching the time that this leaves computer room, The timeliness Quick Response Code fails.
To sum up, the solution of the present invention uses voucher of the timeliness Quick Response Code comprising identity as the computer room that comes in and goes out, by The timeliness Quick Response Code can be carried using a terminal in client, to substitute existing traditionally on paper computer room access card or IC-card, solved The problem of traditionally on paper computer room access card or IC-card easy to be lost;
, therefore, can be to the computer room that comes in and goes out due to the identity of the client comprising the computer room that comes in and goes out in the timeliness Quick Response Code Personnel carry out authentication, it is therefore prevented that the identity personation of appropriator.
When client wants to be again introduced into computer room, it should apply for a timeliness Quick Response Code again, this application and previous application are mutual Do not influence, the timeliness Quick Response Code applied again includes the identity, new of new time into computer room, new client Leave time of computer room, new address information into computer room and new into cause information of computer room etc..Then according to The step of acquisition timeliness Quick Response Code of above-mentioned steps 14 and step 15 to step 19 computer room terminal-pair client by generation when The step of effect Quick Response Code disengaging computer room is handled, passes in and out computer room to client and carries out relevant treatment again so that timeliness Quick Response Code The term of validity precisely be first use time limit, realize fine-grained authentication in due order, temporally.
To sum up, the solution of the present invention uses voucher of the timeliness Quick Response Code comprising identity as the computer room that comes in and goes out, by The timeliness Quick Response Code can be carried using a terminal in client, to substitute existing traditionally on paper computer room access card or IC-card, solved The problem of traditionally on paper computer room access card or IC-card easy to be lost;
, therefore, can be to the computer room that comes in and goes out due to the identity of the client comprising the computer room that comes in and goes out in the timeliness Quick Response Code Personnel carry out authentication, it is therefore prevented that the identity personation of appropriator;
Meanwhile entry time information, time departure information are further comprises in timeliness Quick Response Code so that timeliness Quick Response Code is entering Time corresponding to angle of incidence information comes into force and failed after reaching in the time corresponding to time departure information when reaching so that timeliness two The term of validity for tieing up code is precisely the time limit of first use, realizes fine-grained authentication in due order, temporally.
As shown in Fig. 2 embodiments of the invention also provide a kind of system of authentication, wherein, the system includes:
First acquisition module 20, information is passed in and out for obtaining;
Auditing module 21, for being audited to the disengaging information, the disengaging information comprises at least identity, entered The angle of incidence, time departure and receiving terminal;
Generation module 22, for by rear, generation to be including at least the identity, described in the disengaging signal auditing The timeliness Quick Response Code of entry time and the time departure;
First determining module 23, for determining checking message according to the timeliness Quick Response Code of generation;
Sending module 24, for the checking message to be sent to the receiving terminal, make to receive connecing for checking message Receive terminal and timeliness Quick Response Code is obtained according to the checking message received;
Receiving module 25, for receiving the timeliness Quick Response Code of importer and exporter's transmission;
Second acquisition module 26, for obtain receive timeliness Quick Response Code in include identity, entry time and from ETAD expected time of arrival and departure;
First authentication module 27, for the identity that is included in the timeliness Quick Response Code according to reception to importer and exporter's body Whether part is legal to be verified, obtains the first the result;
Second authentication module 28, for entry time and the time departure docking included in the timeliness Quick Response Code according to reception Whether the timeliness Quick Response Code of receipts is effectively verified, obtains the second the result;
Second determining module 29, for determining the disengaging according to first the result and second the result The authentication result of person.
Wherein, as shown in figure 3, first determining module 23 includes:
First determination sub-module 31, for using the timeliness Quick Response Code as checking message.
Wherein, as shown in figure 4, first determining module 23 includes:
Second determination sub-module 41, for determining uniform resource position mark URL corresponding with the timeliness Quick Response Code;
3rd determination sub-module 42, for using the URL as checking message.
Wherein, as shown in figure 5, first authentication module 27 includes:
Comparison sub-module 51, for the identity included in the timeliness Quick Response Code by reception and the identity mark obtained in advance Knowledge is made comparisons;
First obtains submodule 52, for when the identity included in the timeliness Quick Response Code received and the body obtained in advance When part mark is identical, it is legal to obtain the first the result;
Second obtains submodule 53, for when the identity included in the timeliness Quick Response Code received and the body obtained in advance When part mark differs, it is illegal to obtain the first the result.
Wherein, as shown in fig. 6, second authentication module 28 includes:
Acquisition submodule 61, for obtaining current time;
3rd obtains submodule 62, for when the current time positioned at receive timeliness Quick Response Code in include enter it is fashionable Between and time departure outside when, obtain the second the result to be invalid;
4th obtains submodule 63, for when the current time positioned at receive timeliness Quick Response Code in include enter it is fashionable Between between time departure, either the current time is the entry time or described that includes in the timeliness Quick Response Code that receives During the time departure that current time includes in the timeliness Quick Response Code for reception, it is effective to obtain the second the result.
Wherein, as shown in fig. 7, second determining module 29 includes:
4th determination sub-module 71, for being legal when first the result, and second the result is to have During effect, the authentication result for determining the importer and exporter is to pass through;
5th determination sub-module 72, for being legal when first the result, and second the result is nothing During effect, the authentication result for determining the importer and exporter is not pass through;
6th determination sub-module 73, for being illegal when first the result, and second the result is to have During effect, the authentication result for determining the importer and exporter is not pass through;
7th determination sub-module 74, for being illegal when first the result, and second the result is nothing During effect, the authentication result for determining the importer and exporter is not pass through.
It should be noted that the system is to include the system of the above method, the implementation of the embodiment of the above method is fitted For in the embodiment of the system, can also reach identical technique effect.
Described above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (8)

  1. A kind of 1. method of authentication, it is characterised in that including:
    Obtain disengaging information;
    The disengaging information is audited, the disengaging information comprises at least identity, entry time, time departure and connect Receive terminal;
    In the disengaging signal auditing by rear, generation is including at least the identity, the entry time and described leaves The timeliness Quick Response Code of time;
    Checking message is determined according to the timeliness Quick Response Code of generation, the checking message includes the timeliness Quick Response Code and the timeliness URL corresponding to Quick Response Code;
    The receiving terminal that the checking message, which is sent, to the receiving terminal, makes to receive checking message is tested according to what is received Demonstrate,prove message and obtain timeliness Quick Response Code;
    Receive the timeliness Quick Response Code that importer and exporter send;
    Obtain identity, entry time and the time departure included in the timeliness Quick Response Code received;
    Verify, obtain according to whether the identity included in the timeliness Quick Response Code of reception is legal to importer and exporter's identity First the result;
    It is whether effective to the timeliness Quick Response Code of reception according to the entry time and time departure that are included in the timeliness Quick Response Code of reception Verified, obtain the second the result;
    The authentication result of the importer and exporter is determined according to first the result and second the result.
  2. 2. the method for authentication according to claim 1, it is characterised in that in the timeliness Quick Response Code according to reception Comprising identity it is whether legal to importer and exporter's identity verify, the step of obtaining the first the result, including:
    The identity included in the timeliness Quick Response Code of reception is made comparisons with the identity obtained in advance;
    If the identity included in the timeliness Quick Response Code received is identical with the identity obtained in advance, the first checking is obtained As a result to be legal;
    If the identity included in the timeliness Quick Response Code received differs with the identity obtained in advance, obtain first and test It is illegal to demonstrate,prove result.
  3. 3. the method for authentication according to claim 1, it is characterised in that in the timeliness Quick Response Code according to reception Comprising entry time and time departure whether the timeliness Quick Response Code of reception is effectively verified, obtain the second the result Step, including:
    Obtain current time;
    If the current time outside the entry time that includes in the timeliness Quick Response Code received and time departure, obtains the Two the results are invalid;
    If between entry time and time departure that the current time includes in the timeliness Quick Response Code received, or it is described The entry time that current time includes in the timeliness Quick Response Code for reception, or the current time are the timeliness Quick Response Code of reception In the time departure that includes, then it is effective to obtain the second the result.
  4. 4. the method for authentication according to claim 1, it is characterised in that it is described according to first the result and Second the result determines the step of authentication result of the importer and exporter, including:
    If first the result is legal, and second the result is effective, it is determined that the identity of the importer and exporter The result is to pass through;
    If first the result is legal, and second the result is invalid, it is determined that the identity of the importer and exporter The result is not pass through;
    If first the result is illegal, and second the result is effective, it is determined that the identity of the importer and exporter The result is not pass through;
    If first the result is illegal, and second the result is invalid, it is determined that the identity of the importer and exporter The result is not pass through.
  5. A kind of 5. system of authentication, it is characterised in that including:
    First acquisition module, information is passed in and out for obtaining;
    Auditing module, for it is described disengaging information audit, it is described disengaging information comprise at least identity, enter it is fashionable Between, time departure and receiving terminal;
    Generation module, in the disengaging signal auditing by rear, generation including at least the identity, it is described enter it is fashionable Between and the time departure timeliness Quick Response Code;
    First determining module, for determining checking message according to the timeliness Quick Response Code of generation, when the checking message includes described Imitate URL corresponding to Quick Response Code and the timeliness Quick Response Code;
    Sending module, for the checking message to be sent into the receiving terminal for the receiving terminal, making to receive checking message Timeliness Quick Response Code is obtained according to the checking message received;
    Receiving module, for receiving the timeliness Quick Response Code of importer and exporter's transmission;
    Second acquisition module, for obtaining the identity, entry time and the time departure that are included in the timeliness Quick Response Code received;
    First authentication module, for the identity that is included in the timeliness Quick Response Code according to reception to importer and exporter's identity whether It is legal to be verified, obtain the first the result;
    Second authentication module, for the entry time that is included in the timeliness Quick Response Code according to reception and time departure to reception when Whether effect Quick Response Code is effectively verified, obtains the second the result;
    Second determining module, for determining the body of the importer and exporter according to first the result and second the result Part the result.
  6. 6. the system of authentication according to claim 5, it is characterised in that first authentication module includes:
    Comparison sub-module, the identity for being included in the timeliness Quick Response Code by reception make ratio with the identity obtained in advance Compared with;
    First obtains submodule, for when the identity included in the timeliness Quick Response Code received and the identity obtained in advance When identical, it is legal to obtain the first the result;
    Second obtains submodule, for when the identity included in the timeliness Quick Response Code received and the identity obtained in advance When differing, it is illegal to obtain the first the result.
  7. 7. the system of authentication according to claim 5, it is characterised in that second authentication module includes:
    Acquisition submodule, for obtaining current time;
    3rd obtains submodule, for when the current time in the timeliness Quick Response Code received the entry time that includes and from When outside ETAD expected time of arrival and departure, it is invalid to obtain the second the result;
    4th obtains submodule, for when the current time in the timeliness Quick Response Code received the entry time that includes and from Between ETAD expected time of arrival and departure, either the current time for the entry time that includes in the timeliness Quick Response Code that receives or it is described current when Between for receive timeliness Quick Response Code in include time departure when, it is effective to obtain the second the result.
  8. 8. the system of authentication according to claim 5, it is characterised in that second determining module includes:
    4th determination sub-module, for when first the result is legal, and second the result for it is effective when, really The authentication result of the fixed importer and exporter is to pass through;
    5th determination sub-module, for when first the result is legal, and second the result for it is invalid when, really The authentication result of the fixed importer and exporter is not pass through;
    6th determination sub-module, for when first the result be it is illegal, and second the result for it is effective when, really The authentication result of the fixed importer and exporter is not pass through;
    7th determination sub-module, for when first the result be it is illegal, and second the result for it is invalid when, really The authentication result of the fixed importer and exporter is not pass through.
CN201410386982.2A 2014-08-07 2014-08-07 A kind of method and system of authentication Active CN105336020B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410386982.2A CN105336020B (en) 2014-08-07 2014-08-07 A kind of method and system of authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410386982.2A CN105336020B (en) 2014-08-07 2014-08-07 A kind of method and system of authentication

Publications (2)

Publication Number Publication Date
CN105336020A CN105336020A (en) 2016-02-17
CN105336020B true CN105336020B (en) 2018-02-23

Family

ID=55286520

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410386982.2A Active CN105336020B (en) 2014-08-07 2014-08-07 A kind of method and system of authentication

Country Status (1)

Country Link
CN (1) CN105336020B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108734615A (en) * 2018-04-17 2018-11-02 新大陆(福建)公共服务有限公司 Replace the method for processing business and computer equipment of certificate based on dynamic two-dimension code
CN109726898B (en) * 2018-12-13 2024-03-05 平安科技(深圳)有限公司 Personnel access management method, device, equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5969263B2 (en) * 2012-05-10 2016-08-17 株式会社東海理化電機製作所 Electronic key registration system
CN103544746A (en) * 2012-07-08 2014-01-29 上海博路信息技术有限公司 Electronic access control system of dynamic bar code
CN103903316B (en) * 2012-12-28 2016-08-17 中国电信股份有限公司 Intelligent access control system and access control method thereof
CN103606211A (en) * 2013-10-30 2014-02-26 小米科技有限责任公司 Method, equipment and system used for realization of intelligent entrance guard
CN103903319A (en) * 2014-02-10 2014-07-02 袁磊 Electronic lock system based on internet dynamic authorization

Also Published As

Publication number Publication date
CN105336020A (en) 2016-02-17

Similar Documents

Publication Publication Date Title
CN104935438B (en) Method and apparatus for authentication
CN104166827B (en) Transaction processing system based on Quick Response Code and the method for processing business based on Quick Response Code
CN106101136A (en) The authentication method of a kind of biological characteristic contrast and system
CN108764848B (en) Electronic contract signing method and system
CN106355206A (en) Examinee identity authentication system and method
CN106789855A (en) The method and device of user login validation
CN104917722B (en) The method, apparatus and system of authentication
CN104158664A (en) Identity authentication method and system
CN106257480A (en) A kind of method and device preventing the robot tool malicious access page
CN106941483A (en) The distribution method and device of a kind of virtual objects
CN106709730A (en) Bio-feature identification-based transaction method and apparatus
CN110033399A (en) A kind of information publication, extracting method and the system of the wisdom class board based on recognition of face
CN105336020B (en) A kind of method and system of authentication
US20110231333A1 (en) Registration method and registration system of network service system
CN113705506B (en) Nucleic acid detection method, apparatus, device, and computer-readable storage medium
CN110298984A (en) A kind of inter-bank based on withdrawal element is without card enchashment processing method and processing device
CN106789585A (en) Can verify that Email sends the method and device of time
CN104753940B (en) A kind of method to issue invoice, common invoice self-service terminal and server
CN105893969A (en) Using method of automatic face recognition system
CN111583475A (en) Electronic identity authentication method and system for airport security check
CN103745314B (en) A kind of method and apparatus of document table transmission
CN106161388A (en) Information Authentication method, server and system
CN110457876A (en) Identity identifying method, apparatus and system
CN110147978A (en) Special equipment uses the intelligent approval system of license
CN108200043A (en) Picture validation code verification method and picture validation code verification device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant