CN105471891A - Login method based on confidential order of trusted equipment - Google Patents
Login method based on confidential order of trusted equipment Download PDFInfo
- Publication number
- CN105471891A CN105471891A CN201510995395.8A CN201510995395A CN105471891A CN 105471891 A CN105471891 A CN 105471891A CN 201510995395 A CN201510995395 A CN 201510995395A CN 105471891 A CN105471891 A CN 105471891A
- Authority
- CN
- China
- Prior art keywords
- secret order
- app
- user
- order
- secret
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention relates to the technical field of system login, and particularly relates to a login method based on a confidential order of trusted equipment. The login method comprises the following steps: a step S101: user equipment installs a confidential order APP and binds the equipment under the account per se to make the equipment become trusted equipment after logging in the APP, so as to obtain a corresponding login confidential order; a step S102: primary verification: in a login process, a user completes primary verification when inputting a username and a password; a step S103: acquisition of the confidential order of the trusted equipment: after completing the primary verification, the system will send a unique confidential order to the APP of the trusted equipment, and meanwhile, the system will remind the user to input the confidential order displayed on the APP; and a step S104: confidential order verification: after the user opens the APP and inputs the corresponding confidential order, the system verifies the confidential order. By adopting the method, the information security of the user is further guaranteed by the confidential order provided by the APP, and meanwhile, the login state of the user can be reminded by the APP in real time, in order to avoid the stolen risk of the account.
Description
Technical field
The present invention relates to system login technical field, particularly a kind of login method based on trusted devices secret order.
Background technology
The development of information age, both the network life of people had been enriched, also make the security situation of the Internet more and more severeer, the authentication mode of traditional user name+password also seems no longer safe, the deficiency of the awareness of safety of system manufacturer and user, be easy to cause the password of user to reveal, thus cause security incident.
Along with the rise of mobile Internet, popularizing of smart mobile phone brings great convenience to the life of people, mobile phone is no longer a means of communication of phone+note, but become an indispensable part for people's life, the type of carrying with of mobile phone is also born in safety guarantee, if mobile phone also to be participated in the verification process of user, undoubtedly can the fail safe of strengthening system greatly, ensure the information security of user.
Chinese invention patent application CN103618606A discloses a kind of APP login method by short-message verification, comprises step: step 1:APP user end to server sends phone number; Step 2: described server generates according to described phone number and logs in checking string; Step 3: described server sends described checking string to described APP client and APP calls link, and wherein, described APP calls link for opening APP client, and described checking string and APP call link and correspond to same URL.
Summary of the invention
The technical issues that need to address of the present invention provide a kind of system login method ensureing user information safety.
For solving above-mentioned technical problem, a kind of login method based on trusted devices secret order of the present invention, is characterized in that, comprise the following steps,
Step S101: secret order APP installed by subscriber equipment, and after login APP, by this apparatus bound under oneself account, become trusted device, thus acquisition logs in secret order accordingly;
Step S102: preliminary identification, user, in login process, completes preliminary identification when inputting username and password;
Step S103: trusted devices secret order obtains; After completing preliminary identification, system can send a unique secret order on the APP of trusted device, and simultaneity factor can the secret order of reminding user input APP display;
Step S104: secret order is verified, user opens APP and after inputting corresponding secret order, system carries out secret order checking.
Further, described step S103 trusted devices secret order obtains and specifically comprises the following steps,
Step S31: the user Token obtaining APP;
Step S32: the legitimacy of authentication of users Token;
Step S33: generate unique secret order;
Step S34: return secret order.
Further, the unique secret order generated in described step S33 is 6 bit digital secret orders.
Further, in described step S103, system alert user input APP display secret order time designated user must input before the deadline.
Further, step S04 specifically comprises the following steps,
Step S41: obtain scrip and secret order;
Step S42: the user of inquiry scrip and application message;
Step S43: the secret order information of inquiry application;
Step S44: the user of inquiry secret order and application message;
Step S45: judge whether scrip can be used, and if so, then enters step S46; If not, then step S52 is entered;
Step S46: judge whether secret order can be used, and if so, then enters step S47; If not, then step S52 is entered;
Step S47: judge whether interim card belongs to current application, if so, then enter step S48; If not, then step S52 is entered;
Step S48: judge whether scrip and secret order belong to same user, if so, then enter step S49; If not, then step S52 is entered;
Step S49: judge that whether the granting application of secret order is the secret order APP of current application, if so, then enter step S50; If not, then step S52 is entered;
Step S50: generate log-on message;
Step S51: return results, enters step S53;
Step S52: return error code;
Step S53: terminate.
After adopting said method, trusted devices joins in the system authentication process of user by the present invention, on the basis of original user name+password, the extra secret order provided by APP, ensure the information security of user further, the logging status of the real-time reminding user of APP can be passed through simultaneously, avoid the risk that account number is stolen.
Accompanying drawing explanation
Below in conjunction with the drawings and specific embodiments to being originally described in further detail.
Fig. 1 is the flow chart of a kind of login method based on trusted devices secret order of the present invention.
Fig. 2 is the flow chart of step S103 of the present invention.
Fig. 3 is the flow chart of step S104 of the present invention.
Embodiment
As shown in Figure 1, a kind of login method based on trusted devices secret order of the present invention, comprises the following steps,
Step S101: secret order APP installed by subscriber equipment, and after login APP, by this apparatus bound under oneself account, become trusted device, thus acquisition logs in secret order accordingly.
Step S102: preliminary identification, user, in login process, completes preliminary identification when inputting username and password;
Step S103: trusted devices secret order obtains; After completing preliminary identification, system can send a unique secret order on the APP of trusted device, and simultaneity factor can the secret order of reminding user input APP display.As shown in Figure 2, described step S103 trusted devices secret order obtains and specifically comprises the following steps,
Step S31: the user Token obtaining APP;
Step S32: the legitimacy of authentication of users Token;
Step S33: generate unique secret order, the unique secret order generated in present embodiment is 6 bit digital secret orders.
Step S34: return secret order.
In described step S103, system alert user input APP display secret order time designated user must input before the deadline.
Step S104: secret order is verified, user opens APP and after inputting corresponding secret order, system carries out secret order checking.As shown in Figure 3, step S04 specifically comprises the following steps,
Step S41: obtain scrip and secret order;
Step S42: the user of inquiry scrip and application message;
Step S43: the secret order information of inquiry application;
Step S44: the user of inquiry secret order and application message;
Step S45: judge whether scrip can be used, and if so, then enters step S46; If not, then step S52 is entered;
Step S46: judge whether secret order can be used, and if so, then enters step S47; If not, then step S52 is entered;
Step S47: judge whether interim card belongs to current application, if so, then enter step S48; If not, then step S52 is entered;
Step S48: judge whether scrip and secret order belong to same user, if so, then enter step S49; If not, then step S52 is entered;
Step S49: judge that whether the granting application of secret order is the secret order APP of current application, if so, then enter step S50; If not, then step S52 is entered;
Step S50: generate log-on message;
Step S51: return results, enters step S53;
Step S52: return error code;
Step S53: terminate.
The course of work of the present invention is as follows: provide APP, this APP of user installation, and after login APP, by this apparatus bound under oneself account number, becomes trusted device, thus acquisition logs in secret order accordingly.
User is in login process, after input username and password completes preliminary identification, system can send unique 6 bit digital secret orders on the APP of trusted device, simultaneity factor meeting reminding user inputs the secret order of APP display before the deadline, user opens APP and after inputting corresponding secret order, after system verification is errorless, user just enters system.
Although the foregoing describe the specific embodiment of the present invention; but those skilled in the art are to be understood that; these only illustrate; various changes or modifications can be made to present embodiment; and not deviating from principle and the essence of invention, protection scope of the present invention is only defined by the appended claims.
Claims (5)
1. based on a login method for trusted devices secret order, it is characterized in that, comprise the following steps,
Step S101: secret order APP installed by subscriber equipment, and after login APP, by this apparatus bound under oneself account, become trusted device, thus acquisition logs in secret order accordingly;
Step S102: preliminary identification, user, in login process, completes preliminary identification when inputting username and password;
Step S103: trusted devices secret order obtains; After completing preliminary identification, system can send a unique secret order on the APP of trusted device, and simultaneity factor can the secret order of reminding user input APP display;
Step S104: secret order is verified, user opens APP and after inputting corresponding secret order, system carries out secret order checking.
2. according to a kind of login method based on trusted devices secret order according to claim 1, it is characterized in that, described step S103 trusted devices secret order obtains and specifically comprises the following steps,
Step S31: the user Token obtaining APP;
Step S32: the legitimacy of authentication of users Token;
Step S33: generate unique secret order;
Step S34: return secret order.
3. according to a kind of login method based on trusted devices secret order according to claim 2, it is characterized in that: the unique secret order generated in described step S33 is 6 bit digital secret orders.
4., according to a kind of login method based on trusted devices secret order according to claim 1, it is characterized in that: in described step S103, system alert user input APP display secret order time designated user must input before the deadline.
5., according to a kind of login method based on trusted devices secret order according to any one of Claims 1-4, it is characterized in that, step S04 specifically comprises the following steps,
Step S41: obtain scrip and secret order;
Step S42: the user of inquiry scrip and application message;
Step S43: the secret order information of inquiry application;
Step S44: the user of inquiry secret order and application message;
Step S45: judge whether scrip can be used, and if so, then enters step S46; If not, then step S52 is entered;
Step S46: judge whether secret order can be used, and if so, then enters step S47; If not, then step S52 is entered;
Step S47: judge whether interim card belongs to current application, if so, then enter step S48; If not, then step S52 is entered;
Step S48: judge whether scrip and secret order belong to same user, if so, then enter step S49; If not, then step S52 is entered;
Step S49: judge that whether the granting application of secret order is the secret order APP of current application, if so, then enter step S50; If not, then step S52 is entered;
Step S50: generate log-on message;
Step S51: return results, enters step S53;
Step S52: return error code;
Step S53: terminate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510995395.8A CN105471891A (en) | 2015-12-28 | 2015-12-28 | Login method based on confidential order of trusted equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510995395.8A CN105471891A (en) | 2015-12-28 | 2015-12-28 | Login method based on confidential order of trusted equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105471891A true CN105471891A (en) | 2016-04-06 |
Family
ID=55609161
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510995395.8A Pending CN105471891A (en) | 2015-12-28 | 2015-12-28 | Login method based on confidential order of trusted equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105471891A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107491670A (en) * | 2017-08-22 | 2017-12-19 | 深圳竹云科技有限公司 | A kind of Windows system safe login methods based on OTP algorithm |
CN112104663A (en) * | 2020-10-30 | 2020-12-18 | 上海连尚网络科技有限公司 | Method and equipment for managing login user and user equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1422035A (en) * | 2001-11-28 | 2003-06-04 | Yun制造厂株式会社 | Cipher key exchange equipment, method, program and recording medium for recording the same program |
CN202424767U (en) * | 2011-03-02 | 2012-09-05 | 中国工商银行股份有限公司 | Safe client log-in system |
CN103152402A (en) * | 2013-02-07 | 2013-06-12 | 百度在线网络技术(北京)有限公司 | Method and system for logging in through mobile terminal and cloud server |
CN103458407A (en) * | 2013-07-29 | 2013-12-18 | 北京盛世光明软件股份有限公司 | Internet account number login management system and method based on short message |
CN103888265A (en) * | 2014-04-11 | 2014-06-25 | 上海博路信息技术有限公司 | Login system and method based on mobile terminal |
CA2936586A1 (en) * | 2014-02-10 | 2015-08-13 | Qualcomm Incorporated | Assisted device provisioning in a network |
CN105024819A (en) * | 2015-05-29 | 2015-11-04 | 北京中亦安图科技股份有限公司 | Multifactor authentication method and system based on mobile terminal |
-
2015
- 2015-12-28 CN CN201510995395.8A patent/CN105471891A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1422035A (en) * | 2001-11-28 | 2003-06-04 | Yun制造厂株式会社 | Cipher key exchange equipment, method, program and recording medium for recording the same program |
CN202424767U (en) * | 2011-03-02 | 2012-09-05 | 中国工商银行股份有限公司 | Safe client log-in system |
CN103152402A (en) * | 2013-02-07 | 2013-06-12 | 百度在线网络技术(北京)有限公司 | Method and system for logging in through mobile terminal and cloud server |
CN103458407A (en) * | 2013-07-29 | 2013-12-18 | 北京盛世光明软件股份有限公司 | Internet account number login management system and method based on short message |
CA2936586A1 (en) * | 2014-02-10 | 2015-08-13 | Qualcomm Incorporated | Assisted device provisioning in a network |
CN103888265A (en) * | 2014-04-11 | 2014-06-25 | 上海博路信息技术有限公司 | Login system and method based on mobile terminal |
CN105024819A (en) * | 2015-05-29 | 2015-11-04 | 北京中亦安图科技股份有限公司 | Multifactor authentication method and system based on mobile terminal |
Non-Patent Citations (1)
Title |
---|
农场老马: "从安全和体验上解析移动App的登录", 《BLOG.CSDN.NET/A345017062/ARTICLE/DETAILS/8630771》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107491670A (en) * | 2017-08-22 | 2017-12-19 | 深圳竹云科技有限公司 | A kind of Windows system safe login methods based on OTP algorithm |
CN112104663A (en) * | 2020-10-30 | 2020-12-18 | 上海连尚网络科技有限公司 | Method and equipment for managing login user and user equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107249004B (en) | Identity authentication method, device and client | |
CN105592065B (en) | A kind of Website logging method and its login system based on SMS | |
CN103297231A (en) | Identity authentication method and system | |
CN103986584A (en) | Double-factor identity verification method based on intelligent equipment | |
CN103227799A (en) | Implementing method of unified user management and single sign-on platform based on multiple application systems | |
CN106203021B (en) | A kind of more certification modes are integrated to apply login method and system | |
CN104539421A (en) | Realizing method for mobile token based on dynamic algorithm seed | |
CN104320767A (en) | Short message verification system and method | |
CN103971048A (en) | Method and system for entering password | |
CN103701781B (en) | Method for on-line issue of digital certificate of enterprise mobile terminal equipment | |
WO2023050524A1 (en) | Im-based user identity authentication method and apparatus, and server and storage medium | |
CN109362074A (en) | The method of h5 and server-side safety communication in a kind of mixed mode APP | |
CN103944861A (en) | Voice verification system | |
CN105703910A (en) | Dynamic password verifying method based on Wechat service number | |
US20140237573A1 (en) | Method and system using a cyber id to provide secure transactions | |
CN105871903A (en) | Information security control method and system as well as mobile terminal | |
CN103428161A (en) | Phone authentication service system | |
CN107566396A (en) | A kind of method based on dynamic password enhancing server VPN protocol securitys | |
CN103176987A (en) | Method and device for controlling database access | |
CN108566389B (en) | Cross-application fingerprint identity authentication method and device | |
CN105471891A (en) | Login method based on confidential order of trusted equipment | |
CN106888200B (en) | Identification association method, information sending method and device | |
KR101739446B1 (en) | User authentication system and user authentication method therefor | |
CN105719130A (en) | Payment verification method, payment verification device and payment verification system | |
CN103051447A (en) | Method for user security management of important system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160406 |
|
RJ01 | Rejection of invention patent application after publication |