CN105471891A - Login method based on confidential order of trusted equipment - Google Patents

Login method based on confidential order of trusted equipment Download PDF

Info

Publication number
CN105471891A
CN105471891A CN201510995395.8A CN201510995395A CN105471891A CN 105471891 A CN105471891 A CN 105471891A CN 201510995395 A CN201510995395 A CN 201510995395A CN 105471891 A CN105471891 A CN 105471891A
Authority
CN
China
Prior art keywords
secret order
app
user
order
secret
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510995395.8A
Other languages
Chinese (zh)
Inventor
覃璐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Yi Fang Softcom Ltd
Original Assignee
Hunan Yi Fang Softcom Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Yi Fang Softcom Ltd filed Critical Hunan Yi Fang Softcom Ltd
Priority to CN201510995395.8A priority Critical patent/CN105471891A/en
Publication of CN105471891A publication Critical patent/CN105471891A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to the technical field of system login, and particularly relates to a login method based on a confidential order of trusted equipment. The login method comprises the following steps: a step S101: user equipment installs a confidential order APP and binds the equipment under the account per se to make the equipment become trusted equipment after logging in the APP, so as to obtain a corresponding login confidential order; a step S102: primary verification: in a login process, a user completes primary verification when inputting a username and a password; a step S103: acquisition of the confidential order of the trusted equipment: after completing the primary verification, the system will send a unique confidential order to the APP of the trusted equipment, and meanwhile, the system will remind the user to input the confidential order displayed on the APP; and a step S104: confidential order verification: after the user opens the APP and inputs the corresponding confidential order, the system verifies the confidential order. By adopting the method, the information security of the user is further guaranteed by the confidential order provided by the APP, and meanwhile, the login state of the user can be reminded by the APP in real time, in order to avoid the stolen risk of the account.

Description

A kind of login method based on trusted devices secret order
Technical field
The present invention relates to system login technical field, particularly a kind of login method based on trusted devices secret order.
Background technology
The development of information age, both the network life of people had been enriched, also make the security situation of the Internet more and more severeer, the authentication mode of traditional user name+password also seems no longer safe, the deficiency of the awareness of safety of system manufacturer and user, be easy to cause the password of user to reveal, thus cause security incident.
Along with the rise of mobile Internet, popularizing of smart mobile phone brings great convenience to the life of people, mobile phone is no longer a means of communication of phone+note, but become an indispensable part for people's life, the type of carrying with of mobile phone is also born in safety guarantee, if mobile phone also to be participated in the verification process of user, undoubtedly can the fail safe of strengthening system greatly, ensure the information security of user.
Chinese invention patent application CN103618606A discloses a kind of APP login method by short-message verification, comprises step: step 1:APP user end to server sends phone number; Step 2: described server generates according to described phone number and logs in checking string; Step 3: described server sends described checking string to described APP client and APP calls link, and wherein, described APP calls link for opening APP client, and described checking string and APP call link and correspond to same URL.
Summary of the invention
The technical issues that need to address of the present invention provide a kind of system login method ensureing user information safety.
For solving above-mentioned technical problem, a kind of login method based on trusted devices secret order of the present invention, is characterized in that, comprise the following steps,
Step S101: secret order APP installed by subscriber equipment, and after login APP, by this apparatus bound under oneself account, become trusted device, thus acquisition logs in secret order accordingly;
Step S102: preliminary identification, user, in login process, completes preliminary identification when inputting username and password;
Step S103: trusted devices secret order obtains; After completing preliminary identification, system can send a unique secret order on the APP of trusted device, and simultaneity factor can the secret order of reminding user input APP display;
Step S104: secret order is verified, user opens APP and after inputting corresponding secret order, system carries out secret order checking.
Further, described step S103 trusted devices secret order obtains and specifically comprises the following steps,
Step S31: the user Token obtaining APP;
Step S32: the legitimacy of authentication of users Token;
Step S33: generate unique secret order;
Step S34: return secret order.
Further, the unique secret order generated in described step S33 is 6 bit digital secret orders.
Further, in described step S103, system alert user input APP display secret order time designated user must input before the deadline.
Further, step S04 specifically comprises the following steps,
Step S41: obtain scrip and secret order;
Step S42: the user of inquiry scrip and application message;
Step S43: the secret order information of inquiry application;
Step S44: the user of inquiry secret order and application message;
Step S45: judge whether scrip can be used, and if so, then enters step S46; If not, then step S52 is entered;
Step S46: judge whether secret order can be used, and if so, then enters step S47; If not, then step S52 is entered;
Step S47: judge whether interim card belongs to current application, if so, then enter step S48; If not, then step S52 is entered;
Step S48: judge whether scrip and secret order belong to same user, if so, then enter step S49; If not, then step S52 is entered;
Step S49: judge that whether the granting application of secret order is the secret order APP of current application, if so, then enter step S50; If not, then step S52 is entered;
Step S50: generate log-on message;
Step S51: return results, enters step S53;
Step S52: return error code;
Step S53: terminate.
After adopting said method, trusted devices joins in the system authentication process of user by the present invention, on the basis of original user name+password, the extra secret order provided by APP, ensure the information security of user further, the logging status of the real-time reminding user of APP can be passed through simultaneously, avoid the risk that account number is stolen.
Accompanying drawing explanation
Below in conjunction with the drawings and specific embodiments to being originally described in further detail.
Fig. 1 is the flow chart of a kind of login method based on trusted devices secret order of the present invention.
Fig. 2 is the flow chart of step S103 of the present invention.
Fig. 3 is the flow chart of step S104 of the present invention.
Embodiment
As shown in Figure 1, a kind of login method based on trusted devices secret order of the present invention, comprises the following steps,
Step S101: secret order APP installed by subscriber equipment, and after login APP, by this apparatus bound under oneself account, become trusted device, thus acquisition logs in secret order accordingly.
Step S102: preliminary identification, user, in login process, completes preliminary identification when inputting username and password;
Step S103: trusted devices secret order obtains; After completing preliminary identification, system can send a unique secret order on the APP of trusted device, and simultaneity factor can the secret order of reminding user input APP display.As shown in Figure 2, described step S103 trusted devices secret order obtains and specifically comprises the following steps,
Step S31: the user Token obtaining APP;
Step S32: the legitimacy of authentication of users Token;
Step S33: generate unique secret order, the unique secret order generated in present embodiment is 6 bit digital secret orders.
Step S34: return secret order.
In described step S103, system alert user input APP display secret order time designated user must input before the deadline.
Step S104: secret order is verified, user opens APP and after inputting corresponding secret order, system carries out secret order checking.As shown in Figure 3, step S04 specifically comprises the following steps,
Step S41: obtain scrip and secret order;
Step S42: the user of inquiry scrip and application message;
Step S43: the secret order information of inquiry application;
Step S44: the user of inquiry secret order and application message;
Step S45: judge whether scrip can be used, and if so, then enters step S46; If not, then step S52 is entered;
Step S46: judge whether secret order can be used, and if so, then enters step S47; If not, then step S52 is entered;
Step S47: judge whether interim card belongs to current application, if so, then enter step S48; If not, then step S52 is entered;
Step S48: judge whether scrip and secret order belong to same user, if so, then enter step S49; If not, then step S52 is entered;
Step S49: judge that whether the granting application of secret order is the secret order APP of current application, if so, then enter step S50; If not, then step S52 is entered;
Step S50: generate log-on message;
Step S51: return results, enters step S53;
Step S52: return error code;
Step S53: terminate.
The course of work of the present invention is as follows: provide APP, this APP of user installation, and after login APP, by this apparatus bound under oneself account number, becomes trusted device, thus acquisition logs in secret order accordingly.
User is in login process, after input username and password completes preliminary identification, system can send unique 6 bit digital secret orders on the APP of trusted device, simultaneity factor meeting reminding user inputs the secret order of APP display before the deadline, user opens APP and after inputting corresponding secret order, after system verification is errorless, user just enters system.
Although the foregoing describe the specific embodiment of the present invention; but those skilled in the art are to be understood that; these only illustrate; various changes or modifications can be made to present embodiment; and not deviating from principle and the essence of invention, protection scope of the present invention is only defined by the appended claims.

Claims (5)

1. based on a login method for trusted devices secret order, it is characterized in that, comprise the following steps,
Step S101: secret order APP installed by subscriber equipment, and after login APP, by this apparatus bound under oneself account, become trusted device, thus acquisition logs in secret order accordingly;
Step S102: preliminary identification, user, in login process, completes preliminary identification when inputting username and password;
Step S103: trusted devices secret order obtains; After completing preliminary identification, system can send a unique secret order on the APP of trusted device, and simultaneity factor can the secret order of reminding user input APP display;
Step S104: secret order is verified, user opens APP and after inputting corresponding secret order, system carries out secret order checking.
2. according to a kind of login method based on trusted devices secret order according to claim 1, it is characterized in that, described step S103 trusted devices secret order obtains and specifically comprises the following steps,
Step S31: the user Token obtaining APP;
Step S32: the legitimacy of authentication of users Token;
Step S33: generate unique secret order;
Step S34: return secret order.
3. according to a kind of login method based on trusted devices secret order according to claim 2, it is characterized in that: the unique secret order generated in described step S33 is 6 bit digital secret orders.
4., according to a kind of login method based on trusted devices secret order according to claim 1, it is characterized in that: in described step S103, system alert user input APP display secret order time designated user must input before the deadline.
5., according to a kind of login method based on trusted devices secret order according to any one of Claims 1-4, it is characterized in that, step S04 specifically comprises the following steps,
Step S41: obtain scrip and secret order;
Step S42: the user of inquiry scrip and application message;
Step S43: the secret order information of inquiry application;
Step S44: the user of inquiry secret order and application message;
Step S45: judge whether scrip can be used, and if so, then enters step S46; If not, then step S52 is entered;
Step S46: judge whether secret order can be used, and if so, then enters step S47; If not, then step S52 is entered;
Step S47: judge whether interim card belongs to current application, if so, then enter step S48; If not, then step S52 is entered;
Step S48: judge whether scrip and secret order belong to same user, if so, then enter step S49; If not, then step S52 is entered;
Step S49: judge that whether the granting application of secret order is the secret order APP of current application, if so, then enter step S50; If not, then step S52 is entered;
Step S50: generate log-on message;
Step S51: return results, enters step S53;
Step S52: return error code;
Step S53: terminate.
CN201510995395.8A 2015-12-28 2015-12-28 Login method based on confidential order of trusted equipment Pending CN105471891A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510995395.8A CN105471891A (en) 2015-12-28 2015-12-28 Login method based on confidential order of trusted equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510995395.8A CN105471891A (en) 2015-12-28 2015-12-28 Login method based on confidential order of trusted equipment

Publications (1)

Publication Number Publication Date
CN105471891A true CN105471891A (en) 2016-04-06

Family

ID=55609161

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510995395.8A Pending CN105471891A (en) 2015-12-28 2015-12-28 Login method based on confidential order of trusted equipment

Country Status (1)

Country Link
CN (1) CN105471891A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107491670A (en) * 2017-08-22 2017-12-19 深圳竹云科技有限公司 A kind of Windows system safe login methods based on OTP algorithm
CN112104663A (en) * 2020-10-30 2020-12-18 上海连尚网络科技有限公司 Method and equipment for managing login user and user equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1422035A (en) * 2001-11-28 2003-06-04 Yun制造厂株式会社 Cipher key exchange equipment, method, program and recording medium for recording the same program
CN202424767U (en) * 2011-03-02 2012-09-05 中国工商银行股份有限公司 Safe client log-in system
CN103152402A (en) * 2013-02-07 2013-06-12 百度在线网络技术(北京)有限公司 Method and system for logging in through mobile terminal and cloud server
CN103458407A (en) * 2013-07-29 2013-12-18 北京盛世光明软件股份有限公司 Internet account number login management system and method based on short message
CN103888265A (en) * 2014-04-11 2014-06-25 上海博路信息技术有限公司 Login system and method based on mobile terminal
CA2936586A1 (en) * 2014-02-10 2015-08-13 Qualcomm Incorporated Assisted device provisioning in a network
CN105024819A (en) * 2015-05-29 2015-11-04 北京中亦安图科技股份有限公司 Multifactor authentication method and system based on mobile terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1422035A (en) * 2001-11-28 2003-06-04 Yun制造厂株式会社 Cipher key exchange equipment, method, program and recording medium for recording the same program
CN202424767U (en) * 2011-03-02 2012-09-05 中国工商银行股份有限公司 Safe client log-in system
CN103152402A (en) * 2013-02-07 2013-06-12 百度在线网络技术(北京)有限公司 Method and system for logging in through mobile terminal and cloud server
CN103458407A (en) * 2013-07-29 2013-12-18 北京盛世光明软件股份有限公司 Internet account number login management system and method based on short message
CA2936586A1 (en) * 2014-02-10 2015-08-13 Qualcomm Incorporated Assisted device provisioning in a network
CN103888265A (en) * 2014-04-11 2014-06-25 上海博路信息技术有限公司 Login system and method based on mobile terminal
CN105024819A (en) * 2015-05-29 2015-11-04 北京中亦安图科技股份有限公司 Multifactor authentication method and system based on mobile terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
农场老马: "从安全和体验上解析移动App的登录", 《BLOG.CSDN.NET/A345017062/ARTICLE/DETAILS/8630771》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107491670A (en) * 2017-08-22 2017-12-19 深圳竹云科技有限公司 A kind of Windows system safe login methods based on OTP algorithm
CN112104663A (en) * 2020-10-30 2020-12-18 上海连尚网络科技有限公司 Method and equipment for managing login user and user equipment

Similar Documents

Publication Publication Date Title
CN107249004B (en) Identity authentication method, device and client
CN105592065B (en) A kind of Website logging method and its login system based on SMS
CN103297231A (en) Identity authentication method and system
CN103986584A (en) Double-factor identity verification method based on intelligent equipment
CN103227799A (en) Implementing method of unified user management and single sign-on platform based on multiple application systems
CN106203021B (en) A kind of more certification modes are integrated to apply login method and system
CN104539421A (en) Realizing method for mobile token based on dynamic algorithm seed
CN104320767A (en) Short message verification system and method
CN103971048A (en) Method and system for entering password
CN103701781B (en) Method for on-line issue of digital certificate of enterprise mobile terminal equipment
WO2023050524A1 (en) Im-based user identity authentication method and apparatus, and server and storage medium
CN109362074A (en) The method of h5 and server-side safety communication in a kind of mixed mode APP
CN103944861A (en) Voice verification system
CN105703910A (en) Dynamic password verifying method based on Wechat service number
US20140237573A1 (en) Method and system using a cyber id to provide secure transactions
CN105871903A (en) Information security control method and system as well as mobile terminal
CN103428161A (en) Phone authentication service system
CN107566396A (en) A kind of method based on dynamic password enhancing server VPN protocol securitys
CN103176987A (en) Method and device for controlling database access
CN108566389B (en) Cross-application fingerprint identity authentication method and device
CN105471891A (en) Login method based on confidential order of trusted equipment
CN106888200B (en) Identification association method, information sending method and device
KR101739446B1 (en) User authentication system and user authentication method therefor
CN105719130A (en) Payment verification method, payment verification device and payment verification system
CN103051447A (en) Method for user security management of important system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160406

RJ01 Rejection of invention patent application after publication