CN105592080A - Interactive identity authentication method between terminals - Google Patents

Interactive identity authentication method between terminals Download PDF

Info

Publication number
CN105592080A
CN105592080A CN201510950100.5A CN201510950100A CN105592080A CN 105592080 A CN105592080 A CN 105592080A CN 201510950100 A CN201510950100 A CN 201510950100A CN 105592080 A CN105592080 A CN 105592080A
Authority
CN
China
Prior art keywords
terminal
user
intelligent terminal
key
quick response
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510950100.5A
Other languages
Chinese (zh)
Other versions
CN105592080B (en
Inventor
李德来
林国臻
廖晓燕
张晓娜
赵榉云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shantou Institute of Ultrasonic Instruments Co Ltd
Original Assignee
Shantou Institute of Ultrasonic Instruments Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shantou Institute of Ultrasonic Instruments Co Ltd filed Critical Shantou Institute of Ultrasonic Instruments Co Ltd
Priority to CN201510950100.5A priority Critical patent/CN105592080B/en
Publication of CN105592080A publication Critical patent/CN105592080A/en
Application granted granted Critical
Publication of CN105592080B publication Critical patent/CN105592080B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an interactive identity authentication method between terminals. The method comprises the steps of displaying an encrypted two-dimensional code by a to-be-enter terminal; shooting the two-dimensional code displayed by the to-be-enter terminal by an intelligent terminal; synthesizing the two-dimensional code, the ID of the intelligent terminal, a user ID and a secret key into a request message by the intelligent terminal itself, and sending the request message to a system server; judging whether the access request of a user is legitimate or not by the system server according to the content of the request message, and then further judging the competence extent of the user; according to the competence extent of the user, enabling the corresponding permission of the to-be-enter terminal by the system server. According to the technical scheme of the invention, the system simultaneously judges whether the user has the permission, knows the secret key and carries an already registered intelligent terminal to access the system via a specified terminal or not. Based on the dynamic and integrated authentication method of the two-dimensional code, the ID of the intelligent terminal, the user ID and the secret key, the identity of the user and the permission of the user can be better confirmed. Therefore, the system is safer.

Description

Interactive identity identifying method between a kind of terminal
Technical field
The present invention relates to a kind of identity identifying method, relate in particular to interactive identity identifying method between a kind of terminal.
Background technology
At present, enter system and generally all adopt the method for user name encrypted code by terminal, in the situation that username and password is all correct, just allow the system of entering, trespass preventing. This identity identifying method adopts fixing user name and fixing password to protect system, and unreliable, as long as anyone knows that user name and password can both enter system, this identity identifying method cannot really be confirmed user's identity. In the time of password leakage, other people just can enter system with password, cause the leakage of confidential data, know-how, privacy etc., cause irremediable loss.
Summary of the invention
The technical problem to be solved in the present invention is to provide interactive identity identifying method between a kind of terminal, between this terminal, interactive identity identifying method adopts the dynamic comprehensive authentication method of Quick Response Code, the ID of intelligent terminal own, ID and key, identity and the extent of competence that can confirm better user, make system safer. The technical scheme adopting is as follows:
Interactive identity identifying method between a kind of terminal, is characterized in that comprising the steps:
(1) terminal to be entered shows the Quick Response Code of an encryption;
(2) user adopts and takes the shown Quick Response Code of terminal to be entered at the intelligent terminal of system registry;
(3) intelligent terminal is captured Quick Response Code, and the ID of intelligent terminal own, ID, the synthetic solicited message of key, and solicited message is sent to system server;
(4) system server, according to the content of solicited message, judges that whether this user's the request that enters is legal, in the case of user's the request of entering is legal, further judges user's extent of competence;
(5) system server is the corresponding authority of open-destination to be entered according to user's extent of competence.
The present invention abandons the identity identifying method of prior art single password, adopts the dynamic comprehensive authentication method of Quick Response Code, the ID of intelligent terminal own, ID and key, wherein, Quick Response Code is generated and is encrypted by system, for treating the unique identification that enters terminal, intelligent terminal is registered in system in advance, and with intelligent terminal, ID own identifies, and the ID of intelligent terminal own is as legal user's identify label, and the user that must hold this intelligent terminal just can enter system, ID is used for the user's who determines user identity and authority, the extent of competence corresponding to user of different identity, key is the necessary password of the system that enters. the present invention adopts the dynamic comprehensive authentication method of Quick Response Code, the ID of intelligent terminal own, ID and key, be that system judges whether user has rights of using, know key simultaneously, and carry chartered intelligent terminal and will enter system by specific terminal. like this, to enter system by terminal, specifically personnel, specific intelligent terminal, and know key, multiple-authentication, multiple secrecy provision, system is safer, even if unauthorized person is known key and also cannot be entered system, and treat and enter terminal and identify by Quick Response Code, terminal to be entered is stashed, unauthorized person does not know what identity is this terminal to be entered need, the intelligent terminal of what ID, any key just can enter, have no way of doing it at all, therefore, between this terminal, interactive identity identifying method can be confirmed user's identity and extent of competence better, secret effect more, stopping hacker completely invades by decryption, make system safer.
As preferred version of the present invention, in described step (1), described Quick Response Code is the instant Quick Response Code with certain timeliness of system Dynamic Generation. System Dynamic Generation has the instant Quick Response Code of certain timeliness, as treating the mark that enters terminal, avoids that fixing Quick Response Code can be replicated, transmission, reusable shortcoming, further increases the complexity of authentication, makes system safer.
As preferred version of the present invention, in described step (3), described key is dynamic key, the instant key with certain timeliness that dynamic key sends to specific intelligence terminal for system. System is the instant key that specific intelligent terminal Dynamic Generation has certain timeliness, legal user is without remembeing key, also avoid that fixed key can be replicated, transmission, reusable shortcoming, further increase the complexity of authentication, make system safer.
As the further preferred version of the present invention, in described step (3), Quick Response Code deciphering is formed terminal identification data by described intelligent terminal, and then the ID of combined with intelligent terminal own, ID, key carry out superencipher, form described request information. Solicited message, through superencipher, further reduces solicited message and is blocked, decodes and cause the possibility of divulging a secret, and makes system safer.
Compared with prior art, tool has the following advantages in the present invention:
The present invention adopts the dynamic comprehensive authentication method of Quick Response Code, the ID of intelligent terminal own, ID and key, be that system judges whether user has rights of using, know key simultaneously, and carry chartered intelligent terminal and will enter system by specific terminal. like this, to enter system by terminal, specifically personnel, specific intelligent terminal, and know key, multiple-authentication, multiple secrecy provision, system is safer, even if unauthorized person is known key and also cannot be entered system, and treat and enter terminal and identify by Quick Response Code, terminal to be entered is stashed, unauthorized person does not know what identity is this terminal to be entered need, the intelligent terminal of what ID, any key just can enter, have no way of doing it at all, therefore, between this terminal, interactive identity identifying method can be confirmed user's identity and extent of competence better, secret effect more, stopping hacker completely invades by decryption, make system safer.
Brief description of the drawings
Fig. 1 is the flow chart of the preferred embodiment for the present invention.
Detailed description of the invention
Be described further below in conjunction with accompanying drawing and the preferred embodiment of the present invention.
As shown in Figure 1, between this terminal, interactive identity identifying method comprises the steps:
(1) terminal to be entered shows the Quick Response Code of an encryption;
(2) user adopts and takes the shown Quick Response Code of terminal to be entered at the intelligent terminal of system registry, and wherein, Quick Response Code is the instant Quick Response Code with certain timeliness of system Dynamic Generation;
(3) captured Quick Response Code deciphering is formed terminal identification data by intelligent terminal, then the ID of combined with intelligent terminal own, ID, key carry out superencipher, a synthetic solicited message, and solicited message is sent to system server, wherein, key is dynamic key, the instant key with certain timeliness that dynamic key sends to specific intelligence terminal for system;
(4) system server is according to the content of solicited message, whether the request that enters that judges this user is legal, in user's the illegal situation of the request that enters, refusal user enters system by this terminal, in the case of user's the request of entering is legal, further judge user's extent of competence;
(5) system server is the corresponding authority of open-destination to be entered according to user's extent of competence.
Above-mentioned Quick Response Code is generated and is encrypted by system, for treating the unique identification that enters terminal, intelligent terminal is registered in system in advance, and with intelligent terminal, ID own identifies, and the ID of intelligent terminal own is as legal user's identify label, and the user that must hold this intelligent terminal just can enter system, ID is used for the user's who determines user identity and authority, the extent of competence corresponding to user of different identity, key is the necessary password of the system that enters. the present invention adopts the dynamic comprehensive authentication method of Quick Response Code, the ID of intelligent terminal own, ID and key, be that system judges whether user has rights of using, know key simultaneously, and carry chartered intelligent terminal and will enter system by specific terminal. like this, to enter system by terminal, specifically personnel, specific intelligent terminal, and know key, multiple-authentication, multiple secrecy provision, system is safer, even if unauthorized person is known key and also cannot be entered system, and treat and enter terminal and identify by Quick Response Code, terminal to be entered is stashed, unauthorized person does not know what identity is this terminal to be entered need, the intelligent terminal of what ID, any key just can enter, have no way of doing it at all, therefore, between this terminal, interactive identity identifying method can be confirmed user's identity and extent of competence better, secret effect more, stopping hacker completely invades by decryption, make system safer.
In addition; it should be noted that, the specific embodiment described in this description, its each several part titles etc. can be different; all equivalence or simple change of doing according to described structure, feature and the principle of patent design of the present invention, are included in the protection domain of patent of the present invention. Those skilled in the art can make various amendments or supplement or adopt similar mode to substitute described specific embodiment; only otherwise depart from structure of the present invention or surmount this scope as defined in the claims, all should belong to protection scope of the present invention.

Claims (4)

1. an interactive identity identifying method between terminal, is characterized in that comprising the steps:
(1) terminal to be entered shows the Quick Response Code of an encryption;
(2) user adopts and takes the shown Quick Response Code of terminal to be entered at the intelligent terminal of system registry;
(3) intelligent terminal is captured Quick Response Code, and the ID of intelligent terminal own, ID, the synthetic solicited message of key, and solicited message is sent to system server;
(4) system server, according to the content of solicited message, judges that whether this user's the request that enters is legal, in the case of user's the request of entering is legal, further judges user's extent of competence;
(5) system server is the corresponding authority of open-destination to be entered according to user's extent of competence.
2. interactive identity identifying method between terminal as claimed in claim 1, is characterized in that: in described step (1), described Quick Response Code is the instant Quick Response Code with certain timeliness of system Dynamic Generation.
3. interactive identity identifying method between terminal as claimed in claim 1, is characterized in that: in described step (3), described key is dynamic key, the instant key with certain timeliness that dynamic key sends to specific intelligence terminal for system.
4. interactive identity identifying method between the terminal as described in claim 1 or 2 or 3, it is characterized in that: in described step (3), Quick Response Code deciphering is formed terminal identification data by described intelligent terminal, then the ID of combined with intelligent terminal own, ID, key carry out superencipher, form described request information.
CN201510950100.5A 2015-12-18 2015-12-18 Identity identifying method is interacted between a kind of terminal Active CN105592080B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510950100.5A CN105592080B (en) 2015-12-18 2015-12-18 Identity identifying method is interacted between a kind of terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510950100.5A CN105592080B (en) 2015-12-18 2015-12-18 Identity identifying method is interacted between a kind of terminal

Publications (2)

Publication Number Publication Date
CN105592080A true CN105592080A (en) 2016-05-18
CN105592080B CN105592080B (en) 2019-09-24

Family

ID=55931294

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510950100.5A Active CN105592080B (en) 2015-12-18 2015-12-18 Identity identifying method is interacted between a kind of terminal

Country Status (1)

Country Link
CN (1) CN105592080B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107395581A (en) * 2017-07-11 2017-11-24 上海众人网络安全技术有限公司 Quick Response Code generates and read method, device, system, equipment and storage medium
CN112716508A (en) * 2019-10-14 2021-04-30 上海西门子医疗器械有限公司 Verification method of handheld control device and medical imaging system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200197A (en) * 2013-04-08 2013-07-10 百度在线网络技术(北京)有限公司 Method and system for controlling play of multimedia, cloud server and terminals
CN103442053A (en) * 2013-08-23 2013-12-11 深圳市奥尼视讯技术有限公司 Method and system for having remote access to storage terminal based on cloud service platform
CN104065653A (en) * 2014-06-09 2014-09-24 韩晟 Interactive authentication method, device, system and related equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200197A (en) * 2013-04-08 2013-07-10 百度在线网络技术(北京)有限公司 Method and system for controlling play of multimedia, cloud server and terminals
CN103442053A (en) * 2013-08-23 2013-12-11 深圳市奥尼视讯技术有限公司 Method and system for having remote access to storage terminal based on cloud service platform
CN104065653A (en) * 2014-06-09 2014-09-24 韩晟 Interactive authentication method, device, system and related equipment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107395581A (en) * 2017-07-11 2017-11-24 上海众人网络安全技术有限公司 Quick Response Code generates and read method, device, system, equipment and storage medium
CN107395581B (en) * 2017-07-11 2020-11-17 上海众人网络安全技术有限公司 Two-dimensional code generation and reading method, device, system, equipment and storage medium
CN112716508A (en) * 2019-10-14 2021-04-30 上海西门子医疗器械有限公司 Verification method of handheld control device and medical imaging system

Also Published As

Publication number Publication date
CN105592080B (en) 2019-09-24

Similar Documents

Publication Publication Date Title
US10659220B2 (en) Method and system for encrypting and decrypting two-dimensional code mask
CN102664885B (en) Identity authentication method based on biological feature encryption and homomorphic algorithm
CN105471584B (en) A kind of identity identifying method based on quantum key encryption
CN106936774B (en) Authentication method and system in trusted execution environment
CN107733636B (en) Authentication method and authentication system
US10263782B2 (en) Soft-token authentication system
CN104243439B (en) Document transmission processing method, system and terminal
CN103281194B (en) A kind of safety and lightweight RFID ownership transfer method based on Bilinear map
KR101631635B1 (en) Method, device, and system for identity authentication
CN109831311A (en) A kind of server validation method, system, user terminal and readable storage medium storing program for executing
CN108449322B (en) Identity registration and authentication method, system and related equipment
CN104144411A (en) Encryption and decryption terminal and encryption and decryption method applied to encryption terminal and decryption terminal
CN105657699A (en) Safe data transmission method
KR101358375B1 (en) Prevention security system and method for smishing
CN108667800B (en) Access authority authentication method and device
CN104486322A (en) Terminal access authentication authorization method and terminal access authentication authorization system
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN105592080A (en) Interactive identity authentication method between terminals
CN107070842B (en) Method and system for authenticating surrounding web applications by embedding web applications
CN104901967A (en) Registration method for trusted device
CN110912857B (en) Method and storage medium for sharing login between mobile applications
CN108337233B (en) Method for encrypting content information, electronic equipment and storage medium
CN105282738A (en) Security authentication method for mobile terminal
US20150100777A1 (en) Secure Federated Identity Service
CN108270601B (en) Mobile terminal, alarm information acquisition method and device and alarm information sending method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 515041 No. 77 Jinsha Road, Guangdong, Shantou

Patentee after: Shantou Ultrasonic Instrument Research Institute Co., Ltd

Address before: 515041 No. 77 Jinsha Road, Jinping District, Guangdong, Shantou

Patentee before: SHANTOU INSTITUTE OF ULTRASONIC INSTRUMENTS Co.,Ltd.

CP03 Change of name, title or address