CN105336020B - A kind of method and system of authentication - Google Patents
A kind of method and system of authentication Download PDFInfo
- Publication number
- CN105336020B CN105336020B CN201410386982.2A CN201410386982A CN105336020B CN 105336020 B CN105336020 B CN 105336020B CN 201410386982 A CN201410386982 A CN 201410386982A CN 105336020 B CN105336020 B CN 105336020B
- Authority
- CN
- China
- Prior art keywords
- result
- timeliness
- quick response
- response code
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention provides a kind of method and system of authentication, wherein, this method includes:Obtain disengaging information;The disengaging information is audited;In the disengaging signal auditing by rear, generation timeliness Quick Response Code;It is determined that checking message;The checking message is sent to receiving terminal;Receive the timeliness Quick Response Code that importer and exporter send;Verified according to whether the identity included in the timeliness Quick Response Code of reception is legal to importer and exporter's identity, obtain the first the result;Whether the timeliness Quick Response Code of reception is effectively verified according to the entry time and time departure included in the timeliness Quick Response Code of reception, obtains the second the result;The authentication result of the importer and exporter is determined according to first the result and second the result.The solution of the present invention, which avoids client authenticating information loss or usurped, causes identity theft;Simultaneously so that the term of validity of timeliness Quick Response Code is precisely the time limit of first use, realizes fine-grained authentication in due order, temporally.
Description
Technical field
The present invention relates to communication technical field, more particularly to a kind of method and system of authentication.
Background technology
Computer room and auxiliary facility are only being chartered, specific equipment is had by oneself using client in the computer room trustship business of equipment, client
Need often disengaging computer room to carry out client and have the work such as scene adjustment, maintenance and the cutover of equipment by oneself.With the people of disengaging computer room
Secondary increase, the difficulty that each personnel for passing in and out computer room are carried out with authentication increase.
At present, it is to the mode of computer room importer and exporter progress authentication:Scene receives the various papery materials that importer and exporter submit
Material, after examination & verification passes through, make the computer room access papery card or computer room access IC (Integrated for carrying the term of validity accordingly
Circuit, integrated circuit) card, when importer and exporter pass in and out computer room, the computer room access papery card or computer room provided importer and exporter is accurate
Enter IC-card to be verified, importer and exporter are allowed in the term of validity of the card with sticking into out computer room.
Computer room access papery card or computer room access IC-card in aforesaid way for authentication are easy to lose or forged,
Importer and exporter's identity theft is in turn resulted in, therefore exists and usurps identity person within period of validity by computer room access before the deadline
Papery card or computer room access IC-card enter the situation of computer room, reduce the accuracy of authentication.
The content of the invention
It is an object of the invention to provide a kind of method and system of authentication, can solve the problem that and pass in and out machine to importer and exporter at present
Room is handled, and can not realize the traditionally on paper access of fine-grained authentication and client disengaging computer room in due order, temporally
The problem of card and IC-card are easy to lose or forged.
In order to solve the above-mentioned technical problem, embodiments of the invention provide a kind of method of authentication, wherein, including:
Obtain disengaging information;
The disengaging information is audited, the disengaging information comprises at least identity, entry time, time departure
And receiving terminal;
In the disengaging signal auditing by rear, generation is including at least the identity, the entry time and described
The timeliness Quick Response Code of time departure;
Checking message is determined according to the timeliness Quick Response Code of generation;
The checking message, which is sent, to the receiving terminal, makes to receive the receiving terminal of checking message according to receiving
Checking message obtain timeliness Quick Response Code;
Receive the timeliness Quick Response Code that importer and exporter send;
Obtain identity, entry time and the time departure included in the timeliness Quick Response Code received;
Verified according to whether the identity included in the timeliness Quick Response Code of reception is legal to importer and exporter's identity,
Obtain the first the result;
According to the entry time and time departure included in the timeliness Quick Response Code of reception to the timeliness Quick Response Code of reception whether
Effectively verified, obtain the second the result;
The authentication result of the importer and exporter is determined according to first the result and second the result.
Wherein, described the step of checking message is determined according to the timeliness Quick Response Code of generation, including:
Using the timeliness Quick Response Code as checking message.
Wherein, described the step of checking message is determined according to the timeliness Quick Response Code of generation, including:
It is determined that uniform resource position mark URL corresponding with the timeliness Quick Response Code;
Using the URL as checking message.
Wherein, whether the identity included in the timeliness Quick Response Code according to reception is legal to importer and exporter's identity
Verified, the step of obtaining the first the result, including:
The identity included in the timeliness Quick Response Code of reception is made comparisons with the identity obtained in advance;
If the identity included in the timeliness Quick Response Code received is identical with the identity obtained in advance, first is obtained
The result is legal;
If the identity that includes differs with the identity obtained in advance in the timeliness Quick Response Code received, the is obtained
One the result is illegal.
Wherein, the timeliness two of the entry time that is included in the timeliness Quick Response Code according to reception and time departure to reception
Whether dimension code effectively verified, the step of obtaining the second the result, including:
Obtain current time;
If outside entry time and time departure that the current time includes in the timeliness Quick Response Code received,
It is invalid to the second the result;
If between entry time and time departure that the current time includes in the timeliness Quick Response Code received, or
The entry time that the current time includes in the timeliness Quick Response Code for reception, or the current time are the timeliness two of reception
The time departure included in dimension code, then it is effective to obtain the second the result.
Wherein, it is described to determine that the identity of the importer and exporter is tested according to first the result and second the result
The step of demonstrate,proving result, including:
If first the result is legal, and second the result is effective, it is determined that the importer and exporter's
Authentication result is to pass through;
If first the result is legal, and second the result is invalid, it is determined that the importer and exporter's
Authentication result is not pass through;
If first the result is illegal, and second the result is effective, it is determined that the importer and exporter's
Authentication result is not pass through;
If first the result is illegal, and second the result is invalid, it is determined that the importer and exporter's
Authentication result is not pass through.
In order to solve the above-mentioned technical problem, embodiments of the invention also provide a kind of system of authentication, wherein, bag
Include:
First acquisition module, information is passed in and out for obtaining;
Auditing module, for being audited to the disengaging information, the disengaging information comprises at least identity, entered
Time, time departure and receiving terminal;
Generation module, in the disengaging signal auditing by rear, generation including at least the identity, it is described enter
The angle of incidence and the timeliness Quick Response Code of the time departure;
First determining module, for determining checking message according to the timeliness Quick Response Code of generation;
Sending module, for the checking message to be sent into the reception for the receiving terminal, making to receive checking message
Terminal obtains timeliness Quick Response Code according to the checking message received;
Receiving module, for receiving the timeliness Quick Response Code of importer and exporter's transmission;
Second acquisition module, for obtaining the identity included in the timeliness Quick Response Code received, entry time and leaving
Time;
First authentication module, for the identity that is included in the timeliness Quick Response Code according to reception to importer and exporter's identity
Whether it is legal verified, obtain the first the result;
Second authentication module, for the entry time that is included in the timeliness Quick Response Code according to reception and time departure to receiving
Timeliness Quick Response Code whether effectively verified, obtain the second the result;
Second determining module, for determining the importer and exporter according to first the result and second the result
Authentication result.
Wherein, first determining module includes:
First determination sub-module, for using the timeliness Quick Response Code as checking message.
Wherein, first determining module includes:
Second determination sub-module, for determining uniform resource position mark URL corresponding with the timeliness Quick Response Code;
3rd determination sub-module, for using the URL as checking message.
Wherein, first authentication module includes:
Comparison sub-module, for the identity included in the timeliness Quick Response Code by reception and the identity obtained in advance
Make comparisons;
First obtains submodule, for when the identity included in the timeliness Quick Response Code received and the identity obtained in advance
When identifying identical, it is legal to obtain the first the result;
Second obtains submodule, for when the identity included in the timeliness Quick Response Code received and the identity obtained in advance
When mark differs, it is illegal to obtain the first the result.
Wherein, second authentication module includes:
Acquisition submodule, for obtaining current time;
3rd obtains submodule, for the entry time included when the current time in the timeliness Quick Response Code received
During with outside time departure, it is invalid to obtain the second the result;
4th obtains submodule, for the entry time included when the current time in the timeliness Quick Response Code received
Between time departure, either the current time for the entry time that includes in the timeliness Quick Response Code that receives or described is worked as
During the time departure that the preceding time includes in the timeliness Quick Response Code for reception, it is effective to obtain the second the result.
Wherein, second determining module includes:
4th determination sub-module, for being legal when first the result, and second the result is effective
When, the authentication result for determining the importer and exporter is to pass through;
5th determination sub-module, for being legal when first the result, and second the result is invalid
When, the authentication result for determining the importer and exporter is not pass through;
6th determination sub-module, for being illegal when first the result, and second the result is effective
When, the authentication result for determining the importer and exporter is not pass through;
7th determination sub-module, for being illegal when first the result, and second the result is invalid
When, the authentication result for determining the importer and exporter is not pass through.
The beneficial effects of the invention are as follows:
The solution of the present invention is using voucher of the timeliness Quick Response Code comprising identity as the computer room that comes in and goes out, due to client
The timeliness Quick Response Code can be carried using a terminal, to substitute existing traditionally on paper computer room access card or IC-card, solve tradition
The problem of papery computer room access card or IC-card easy to be lost;
, therefore, can be to the computer room that comes in and goes out due to the identity of the client comprising the computer room that comes in and goes out in the timeliness Quick Response Code
Personnel carry out authentication, it is therefore prevented that the identity personation of appropriator;
Meanwhile entry time information, time departure information are further comprises in timeliness Quick Response Code so that timeliness Quick Response Code is entering
Time corresponding to angle of incidence information comes into force and failed after reaching in the time corresponding to time departure information when reaching so that timeliness two
The term of validity for tieing up code is precisely the time limit of first use, realizes fine-grained authentication in due order, temporally.
Brief description of the drawings
Fig. 1 represents the method flow schematic diagram of the authentication of the present invention;
Fig. 2 represents the system structure diagram one of the authentication of the present invention;
Fig. 3 represents the system structure diagram two of the authentication of the present invention;
Fig. 4 represents the system structure diagram three of the authentication of the present invention;
Fig. 5 represents the system structure diagram four of the authentication of the present invention;
Fig. 6 represents the system structure diagram five of the authentication of the present invention;
Fig. 7 represents the system structure diagram six of the authentication of the present invention.
Embodiment
It is right below in conjunction with the accompanying drawings and the specific embodiments to make the object, technical solutions and advantages of the present invention clearer
The present invention is described in detail.
As shown in figure 1, embodiments of the invention provide a kind of auth method, this method comprises the following steps:
Step 10, disengaging information is obtained;
Step 11, to it is described disengaging information audit, it is described disengaging information comprise at least identity, entry time,
Time departure and receiving terminal;
Step 12, in the disengaging signal auditing by rear, generation is including at least the identity, the entry time
With the timeliness Quick Response Code of the time departure;
Step 13, checking message is determined according to the timeliness Quick Response Code of generation;
Step 14, the checking message is sent to the receiving terminal root for the receiving terminal, making to receive checking message
Timeliness Quick Response Code is obtained according to the checking message received;
Step 15, the timeliness Quick Response Code that importer and exporter send is received;
Step 16, identity, entry time and the time departure included in the timeliness Quick Response Code of reception is obtained;
Step 17, according to the identity included in the timeliness Quick Response Code of reception it is whether legal to importer and exporter's identity enter
Row checking, obtains the first the result;
Step 18, the timeliness two dimension according to the entry time and time departure included in the timeliness Quick Response Code of reception to reception
Whether code is effectively verified, obtains the second the result;
Step 19, the authentication of the importer and exporter is determined according to first the result and second the result
As a result.
Above-mentioned steps 10 to step 11 are elaborated below in conjunction with specific embodiments:
First, the client terminal of IDC (Internet Data Center, Internet data center) computer room to be come in and gone out proposes
Come in and go out the examination & approval announcement information of the computer room:
The registered client terminal opened an account can be on the internet integrated service management client or the Android of oneself
Cell-phone customer terminal proposes the examination & approval announcement information of disengaging computer room, wherein, the examination & approval announcement information includes:The identity of client
(name of client, cell-phone number, client's photo etc.), into computer room time, leave the time of computer room, receive checking information
Receiving terminal and cause information of entrance computer room etc..
Then, the IDC computer rooms terminal obtains entering for client terminal transmission from integrated service management client or short message interface
Go out the above-mentioned examination & approval announcement information of computer room, then the examination & approval announcement information of acquisition is audited.
Below in conjunction with specific embodiments, above-mentioned steps 12 to step 13 are described in detail:
Above-mentioned IDC computer rooms terminal-pair obtain the examination & approval announcement information audited, and examination & verification pass through after, the IDC machines
Room terminal can then generate a timeliness Quick Response Code for carrying the above-mentioned examination & approval announcement information at once.The computer room terminal can generate this
Timeliness Quick Response Code, or determine corresponding with the timeliness Quick Response Code URL (Uniform Resoure Locator, unified resource
Finger URL) after using the URL as checking message.
Above-mentioned steps 14 are described in detail below in conjunction with specific embodiments:
After the above-mentioned computer room terminal determines checking message, by the checking message (the timeliness Quick Response Code or with the timeliness
URL corresponding to Quick Response Code) fed back by short message interface in client terminal, or fed back by integrated service management client in visitor
Family terminal is sent to client terminal so that client terminal can go to obtain the timeliness according to the checking message that the computer room terminal is fed back
Quick Response Code.But to prevent client terminal from losing the timeliness Quick Response Code received, then preferred scheme is, the computer room terminal will
The timeliness Quick Response Code of the generation and URL corresponding with the timeliness Quick Response Code are sent to client terminal, so just prevent visitor
Family terminal can also go to give birth to again when the timeliness Quick Response Code got is lost according to the URL corresponding with the timeliness Quick Response Code
Into the timeliness Quick Response Code.
And the client terminal can also carry out other processing after the checking message is received to the checking message.Than
Such as, client terminal, if client is for some reason, is abandoned out after the application of this IDC computer room that come in and go out is examined
Enter the IDC computer rooms, in order to prevent the checking message of the reception to be stolen, then delete processing etc. can be carried out to it, certain user also may be used
Do not delete.
If user wants the timeliness Quick Response Code, the acquisition of the timeliness Quick Response Code has a variety of support patterns:Such as
One kind is short message mode, and client terminal obtains the timeliness Quick Response Code by short message interface;Or pass through short message interface
URL corresponding with the timeliness Quick Response Code is obtained, then according to the URL, goes to obtain the timeliness Quick Response Code;
Another kind is Android ad hoc mode, and client terminal obtains timeliness two dimension from integrated service management management client
Code;Or management client is managed by integrated service and obtains URL corresponding with the timeliness Quick Response Code, then according to the URL, go
Obtain the timeliness Quick Response Code;
Another kind is printing type, and client terminal can get this in (on internet) integrated service management client
After timeliness Quick Response Code, picture is printed, obtains the paper for carrying the timeliness Quick Response Code;Or in (on internet)
Integrated service management client obtains URL corresponding with the timeliness Quick Response Code, then according to the URL, goes to obtain timeliness two dimension
Code, is then printed picture, obtains the paper for carrying the timeliness Quick Response Code.
Three kinds of modes facilitate the different demands of different engineers.
Above flow is the detailed description of the product process of the timeliness Quick Response Code, and the flow of the generation 2 D code information only needs
The very short time, human and material resources are saved, greatly improve the perception of client.
Above-mentioned steps 15 to 19 are described in detail below in conjunction with specific embodiments:
If have the IDC computer rooms importer and exporter (holder of the importer and exporter and the above-mentioned client terminal referred to can with identical,
Can also be different), it is desirable to come in and go out the IDC computer rooms, and the importer and exporter can go acquisition one according to the embodiment of above-mentioned steps 14
A timeliness Quick Response Code for the IDC computer rooms that come in and go out.Due to timeliness Quick Response Code the generation time may earlier than enter computer room when
Between so that into before the time arrival of computer room, importer and exporter may receive the timeliness Quick Response Code, if importer and exporter are when getting
After imitating Quick Response Code, it is intended to enter computer room using the timeliness Quick Response Code before reaching in the time for entering computer room, now due to current time
The time of computer room is not arrived into, and timeliness Quick Response Code, which does not arrive, to come into force, and the examination & verification to timeliness Quick Response Code is unsuccessful, therefore produces and do not permit
Perhaps current importer and exporter enter the command information of computer room.
After the time for entering computer room reaches, the timeliness Quick Response Code got can come into force, and computer room terminal can be to this
The timeliness Quick Response Code that current importer and exporter obtain carries out scanning parsing for the first time, i.e., is parsed into the scanning of computer room, when obtaining this
Imitate the examination & approval announcement information entrained by Quick Response Code;Because foregoing computer room terminal has got examination & approval notice letter in advance
Breath, the examination & approval announcement information that the computer room terminal can obtain this in advance are made with the obtained examination & approval announcement information that parses scanned at present
Compare, it is as follows to compare flow:
The identity carried in examination & approval announcement information that current scanline obtains and above-mentioned client for obtaining in advance is whole
The identity carried in the examination & approval announcement information submitted is held to make comparisons, if the identification information that the scanning obtains is advance with this
The identity of acquisition is identical, then it is legal to obtain the first the result;If the identity that the scanning obtains obtains in advance with this
The identity taken differs, then it is illegal to obtain the first the result.
Meanwhile obtain current time;If the current time in the timeliness Quick Response Code received the entry time that includes and
Outside time departure, then it is invalid to obtain the second the result;
If between entry time and time departure that the current time includes in the timeliness Quick Response Code received, Huo Zhesuo
The entry time included in the timeliness Quick Response Code for stating current time to receive, or the current time are two-dimentional for the timeliness received
The time departure included in code, then it is effective to obtain the second the result.
Above-mentioned is the detailed description to step 15 to step 18, below will be according to the first the result obtained above and
Two the results, carry out step 19:
The authentication result of above-mentioned importer and exporter, while root are determined according to first the result and second the result
Determine whether to agree to that the importer and exporter pass in and out computer room according to the result.Comprise the following steps that:
If first the result is legal, and second the result is effective, it is determined that the identity of the importer and exporter is tested
Card result is to pass through;Agree to that the importer and exporter come in and go out the computer room;
If first the result is legal, and second the result is invalid, it is determined that the identity of the importer and exporter is tested
Card result is not pass through;Refuse importer and exporter discrepancy computer room;
If first the result is illegal, and second the result is effective, it is determined that the identity of the importer and exporter
The result is not pass through;Refuse the importer and exporter to come in and go out the computer room;
If first the result is illegal, and second the result is invalid, it is determined that the identity of the importer and exporter is tested
Card result is not pass through;Refuse the importer and exporter to come in and go out the computer room.
Wherein, when current importer and exporter enter computer room in advance, determine that the first the result is legal in the above-mentioned computer room terminal
And second the result for it is effective when, then allow current importer and exporter to enter computer room, and current disengaging can be automatically performed
Person enters the entrance record information of computer room, and this includes into record information:The identity of current importer and exporter, current importer and exporter enter
Enter time, the address information into computer room and cause information into computer room of computer room etc..
When leaving computer room in advance in current importer and exporter, determine that the first the result is legal and is somebody's turn to do in the above-mentioned computer room terminal
Second the result for it is effective when, then allow current importer and exporter to leave computer room, and can be automatically performed current importer and exporter from
The entrance record information in start room, this, which leaves record information, includes:The identity of current importer and exporter, current importer and exporter leave machine
The time in room, the address information for leaving computer room and cause information into computer room etc..When reaching the time that this leaves computer room,
The timeliness Quick Response Code fails.
To sum up, the solution of the present invention uses voucher of the timeliness Quick Response Code comprising identity as the computer room that comes in and goes out, by
The timeliness Quick Response Code can be carried using a terminal in client, to substitute existing traditionally on paper computer room access card or IC-card, solved
The problem of traditionally on paper computer room access card or IC-card easy to be lost;
, therefore, can be to the computer room that comes in and goes out due to the identity of the client comprising the computer room that comes in and goes out in the timeliness Quick Response Code
Personnel carry out authentication, it is therefore prevented that the identity personation of appropriator.
When client wants to be again introduced into computer room, it should apply for a timeliness Quick Response Code again, this application and previous application are mutual
Do not influence, the timeliness Quick Response Code applied again includes the identity, new of new time into computer room, new client
Leave time of computer room, new address information into computer room and new into cause information of computer room etc..Then according to
The step of acquisition timeliness Quick Response Code of above-mentioned steps 14 and step 15 to step 19 computer room terminal-pair client by generation when
The step of effect Quick Response Code disengaging computer room is handled, passes in and out computer room to client and carries out relevant treatment again so that timeliness Quick Response Code
The term of validity precisely be first use time limit, realize fine-grained authentication in due order, temporally.
To sum up, the solution of the present invention uses voucher of the timeliness Quick Response Code comprising identity as the computer room that comes in and goes out, by
The timeliness Quick Response Code can be carried using a terminal in client, to substitute existing traditionally on paper computer room access card or IC-card, solved
The problem of traditionally on paper computer room access card or IC-card easy to be lost;
, therefore, can be to the computer room that comes in and goes out due to the identity of the client comprising the computer room that comes in and goes out in the timeliness Quick Response Code
Personnel carry out authentication, it is therefore prevented that the identity personation of appropriator;
Meanwhile entry time information, time departure information are further comprises in timeliness Quick Response Code so that timeliness Quick Response Code is entering
Time corresponding to angle of incidence information comes into force and failed after reaching in the time corresponding to time departure information when reaching so that timeliness two
The term of validity for tieing up code is precisely the time limit of first use, realizes fine-grained authentication in due order, temporally.
As shown in Fig. 2 embodiments of the invention also provide a kind of system of authentication, wherein, the system includes:
First acquisition module 20, information is passed in and out for obtaining;
Auditing module 21, for being audited to the disengaging information, the disengaging information comprises at least identity, entered
The angle of incidence, time departure and receiving terminal;
Generation module 22, for by rear, generation to be including at least the identity, described in the disengaging signal auditing
The timeliness Quick Response Code of entry time and the time departure;
First determining module 23, for determining checking message according to the timeliness Quick Response Code of generation;
Sending module 24, for the checking message to be sent to the receiving terminal, make to receive connecing for checking message
Receive terminal and timeliness Quick Response Code is obtained according to the checking message received;
Receiving module 25, for receiving the timeliness Quick Response Code of importer and exporter's transmission;
Second acquisition module 26, for obtain receive timeliness Quick Response Code in include identity, entry time and from
ETAD expected time of arrival and departure;
First authentication module 27, for the identity that is included in the timeliness Quick Response Code according to reception to importer and exporter's body
Whether part is legal to be verified, obtains the first the result;
Second authentication module 28, for entry time and the time departure docking included in the timeliness Quick Response Code according to reception
Whether the timeliness Quick Response Code of receipts is effectively verified, obtains the second the result;
Second determining module 29, for determining the disengaging according to first the result and second the result
The authentication result of person.
Wherein, as shown in figure 3, first determining module 23 includes:
First determination sub-module 31, for using the timeliness Quick Response Code as checking message.
Wherein, as shown in figure 4, first determining module 23 includes:
Second determination sub-module 41, for determining uniform resource position mark URL corresponding with the timeliness Quick Response Code;
3rd determination sub-module 42, for using the URL as checking message.
Wherein, as shown in figure 5, first authentication module 27 includes:
Comparison sub-module 51, for the identity included in the timeliness Quick Response Code by reception and the identity mark obtained in advance
Knowledge is made comparisons;
First obtains submodule 52, for when the identity included in the timeliness Quick Response Code received and the body obtained in advance
When part mark is identical, it is legal to obtain the first the result;
Second obtains submodule 53, for when the identity included in the timeliness Quick Response Code received and the body obtained in advance
When part mark differs, it is illegal to obtain the first the result.
Wherein, as shown in fig. 6, second authentication module 28 includes:
Acquisition submodule 61, for obtaining current time;
3rd obtains submodule 62, for when the current time positioned at receive timeliness Quick Response Code in include enter it is fashionable
Between and time departure outside when, obtain the second the result to be invalid;
4th obtains submodule 63, for when the current time positioned at receive timeliness Quick Response Code in include enter it is fashionable
Between between time departure, either the current time is the entry time or described that includes in the timeliness Quick Response Code that receives
During the time departure that current time includes in the timeliness Quick Response Code for reception, it is effective to obtain the second the result.
Wherein, as shown in fig. 7, second determining module 29 includes:
4th determination sub-module 71, for being legal when first the result, and second the result is to have
During effect, the authentication result for determining the importer and exporter is to pass through;
5th determination sub-module 72, for being legal when first the result, and second the result is nothing
During effect, the authentication result for determining the importer and exporter is not pass through;
6th determination sub-module 73, for being illegal when first the result, and second the result is to have
During effect, the authentication result for determining the importer and exporter is not pass through;
7th determination sub-module 74, for being illegal when first the result, and second the result is nothing
During effect, the authentication result for determining the importer and exporter is not pass through.
It should be noted that the system is to include the system of the above method, the implementation of the embodiment of the above method is fitted
For in the embodiment of the system, can also reach identical technique effect.
Described above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should
It is considered as protection scope of the present invention.
Claims (8)
- A kind of 1. method of authentication, it is characterised in that including:Obtain disengaging information;The disengaging information is audited, the disengaging information comprises at least identity, entry time, time departure and connect Receive terminal;In the disengaging signal auditing by rear, generation is including at least the identity, the entry time and described leaves The timeliness Quick Response Code of time;Checking message is determined according to the timeliness Quick Response Code of generation, the checking message includes the timeliness Quick Response Code and the timeliness URL corresponding to Quick Response Code;The receiving terminal that the checking message, which is sent, to the receiving terminal, makes to receive checking message is tested according to what is received Demonstrate,prove message and obtain timeliness Quick Response Code;Receive the timeliness Quick Response Code that importer and exporter send;Obtain identity, entry time and the time departure included in the timeliness Quick Response Code received;Verify, obtain according to whether the identity included in the timeliness Quick Response Code of reception is legal to importer and exporter's identity First the result;It is whether effective to the timeliness Quick Response Code of reception according to the entry time and time departure that are included in the timeliness Quick Response Code of reception Verified, obtain the second the result;The authentication result of the importer and exporter is determined according to first the result and second the result.
- 2. the method for authentication according to claim 1, it is characterised in that in the timeliness Quick Response Code according to reception Comprising identity it is whether legal to importer and exporter's identity verify, the step of obtaining the first the result, including:The identity included in the timeliness Quick Response Code of reception is made comparisons with the identity obtained in advance;If the identity included in the timeliness Quick Response Code received is identical with the identity obtained in advance, the first checking is obtained As a result to be legal;If the identity included in the timeliness Quick Response Code received differs with the identity obtained in advance, obtain first and test It is illegal to demonstrate,prove result.
- 3. the method for authentication according to claim 1, it is characterised in that in the timeliness Quick Response Code according to reception Comprising entry time and time departure whether the timeliness Quick Response Code of reception is effectively verified, obtain the second the result Step, including:Obtain current time;If the current time outside the entry time that includes in the timeliness Quick Response Code received and time departure, obtains the Two the results are invalid;If between entry time and time departure that the current time includes in the timeliness Quick Response Code received, or it is described The entry time that current time includes in the timeliness Quick Response Code for reception, or the current time are the timeliness Quick Response Code of reception In the time departure that includes, then it is effective to obtain the second the result.
- 4. the method for authentication according to claim 1, it is characterised in that it is described according to first the result and Second the result determines the step of authentication result of the importer and exporter, including:If first the result is legal, and second the result is effective, it is determined that the identity of the importer and exporter The result is to pass through;If first the result is legal, and second the result is invalid, it is determined that the identity of the importer and exporter The result is not pass through;If first the result is illegal, and second the result is effective, it is determined that the identity of the importer and exporter The result is not pass through;If first the result is illegal, and second the result is invalid, it is determined that the identity of the importer and exporter The result is not pass through.
- A kind of 5. system of authentication, it is characterised in that including:First acquisition module, information is passed in and out for obtaining;Auditing module, for it is described disengaging information audit, it is described disengaging information comprise at least identity, enter it is fashionable Between, time departure and receiving terminal;Generation module, in the disengaging signal auditing by rear, generation including at least the identity, it is described enter it is fashionable Between and the time departure timeliness Quick Response Code;First determining module, for determining checking message according to the timeliness Quick Response Code of generation, when the checking message includes described Imitate URL corresponding to Quick Response Code and the timeliness Quick Response Code;Sending module, for the checking message to be sent into the receiving terminal for the receiving terminal, making to receive checking message Timeliness Quick Response Code is obtained according to the checking message received;Receiving module, for receiving the timeliness Quick Response Code of importer and exporter's transmission;Second acquisition module, for obtaining the identity, entry time and the time departure that are included in the timeliness Quick Response Code received;First authentication module, for the identity that is included in the timeliness Quick Response Code according to reception to importer and exporter's identity whether It is legal to be verified, obtain the first the result;Second authentication module, for the entry time that is included in the timeliness Quick Response Code according to reception and time departure to reception when Whether effect Quick Response Code is effectively verified, obtains the second the result;Second determining module, for determining the body of the importer and exporter according to first the result and second the result Part the result.
- 6. the system of authentication according to claim 5, it is characterised in that first authentication module includes:Comparison sub-module, the identity for being included in the timeliness Quick Response Code by reception make ratio with the identity obtained in advance Compared with;First obtains submodule, for when the identity included in the timeliness Quick Response Code received and the identity obtained in advance When identical, it is legal to obtain the first the result;Second obtains submodule, for when the identity included in the timeliness Quick Response Code received and the identity obtained in advance When differing, it is illegal to obtain the first the result.
- 7. the system of authentication according to claim 5, it is characterised in that second authentication module includes:Acquisition submodule, for obtaining current time;3rd obtains submodule, for when the current time in the timeliness Quick Response Code received the entry time that includes and from When outside ETAD expected time of arrival and departure, it is invalid to obtain the second the result;4th obtains submodule, for when the current time in the timeliness Quick Response Code received the entry time that includes and from Between ETAD expected time of arrival and departure, either the current time for the entry time that includes in the timeliness Quick Response Code that receives or it is described current when Between for receive timeliness Quick Response Code in include time departure when, it is effective to obtain the second the result.
- 8. the system of authentication according to claim 5, it is characterised in that second determining module includes:4th determination sub-module, for when first the result is legal, and second the result for it is effective when, really The authentication result of the fixed importer and exporter is to pass through;5th determination sub-module, for when first the result is legal, and second the result for it is invalid when, really The authentication result of the fixed importer and exporter is not pass through;6th determination sub-module, for when first the result be it is illegal, and second the result for it is effective when, really The authentication result of the fixed importer and exporter is not pass through;7th determination sub-module, for when first the result be it is illegal, and second the result for it is invalid when, really The authentication result of the fixed importer and exporter is not pass through.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410386982.2A CN105336020B (en) | 2014-08-07 | 2014-08-07 | A kind of method and system of authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410386982.2A CN105336020B (en) | 2014-08-07 | 2014-08-07 | A kind of method and system of authentication |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105336020A CN105336020A (en) | 2016-02-17 |
CN105336020B true CN105336020B (en) | 2018-02-23 |
Family
ID=55286520
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410386982.2A Active CN105336020B (en) | 2014-08-07 | 2014-08-07 | A kind of method and system of authentication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105336020B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108734615A (en) * | 2018-04-17 | 2018-11-02 | 新大陆(福建)公共服务有限公司 | Replace the method for processing business and computer equipment of certificate based on dynamic two-dimension code |
CN109726898B (en) * | 2018-12-13 | 2024-03-05 | 平安科技(深圳)有限公司 | Personnel access management method, device, equipment and storage medium |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5969263B2 (en) * | 2012-05-10 | 2016-08-17 | 株式会社東海理化電機製作所 | Electronic key registration system |
CN103544746A (en) * | 2012-07-08 | 2014-01-29 | 上海博路信息技术有限公司 | Electronic access control system of dynamic bar code |
CN103903316B (en) * | 2012-12-28 | 2016-08-17 | 中国电信股份有限公司 | Intelligent access control system and access control method thereof |
CN103606211A (en) * | 2013-10-30 | 2014-02-26 | 小米科技有限责任公司 | Method, equipment and system used for realization of intelligent entrance guard |
CN103903319A (en) * | 2014-02-10 | 2014-07-02 | 袁磊 | Electronic lock system based on internet dynamic authorization |
-
2014
- 2014-08-07 CN CN201410386982.2A patent/CN105336020B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN105336020A (en) | 2016-02-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104935438B (en) | Method and apparatus for authentication | |
CN104166827B (en) | Transaction processing system based on Quick Response Code and the method for processing business based on Quick Response Code | |
US20150089613A1 (en) | Method and system for providing zero sign on user authentication | |
CN106101136A (en) | The authentication method of a kind of biological characteristic contrast and system | |
CN108764848B (en) | Electronic contract signing method and system | |
CN106355206A (en) | Examinee identity authentication system and method | |
CN107292986A (en) | A kind of conference service method, server and host terminal | |
CN104767714B (en) | A kind of ID and the correlating method of user resources information, terminal and system | |
CN106789855A (en) | The method and device of user login validation | |
CN104158664A (en) | Identity authentication method and system | |
WO2017193912A1 (en) | Login authentication method and apparatus based on face recognition, terminal and server | |
CN110298984A (en) | A kind of inter-bank based on withdrawal element is without card enchashment processing method and processing device | |
CN106257480A (en) | A kind of method and device preventing the robot tool malicious access page | |
CN106709730A (en) | Bio-feature identification-based transaction method and apparatus | |
CN106998289A (en) | A kind of method of registering based on display screen terminal | |
CN110033399A (en) | A kind of information publication, extracting method and the system of the wisdom class board based on recognition of face | |
CN105336020B (en) | A kind of method and system of authentication | |
CN106921500B (en) | Identity authentication method and device for mobile equipment | |
US20110231333A1 (en) | Registration method and registration system of network service system | |
CN110457876A (en) | Identity identifying method, apparatus and system | |
CN104753940B (en) | A kind of method to issue invoice, common invoice self-service terminal and server | |
CN111583475A (en) | Electronic identity authentication method and system for airport security check | |
CN103745314B (en) | A kind of method and apparatus of document table transmission | |
CN106161388A (en) | Information Authentication method, server and system | |
CN110147978A (en) | Special equipment uses the intelligent approval system of license |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |