CN105993156A - Server access authentication method and device - Google Patents

Server access authentication method and device Download PDF

Info

Publication number
CN105993156A
CN105993156A CN201580002092.XA CN201580002092A CN105993156A CN 105993156 A CN105993156 A CN 105993156A CN 201580002092 A CN201580002092 A CN 201580002092A CN 105993156 A CN105993156 A CN 105993156A
Authority
CN
China
Prior art keywords
server
application software
checking information
user
identifying
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201580002092.XA
Other languages
Chinese (zh)
Other versions
CN105993156B (en
Inventor
刘均
杨唐鹤
陈明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Hesvit Health Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hesvit Health Technology Co Ltd filed Critical Hesvit Health Technology Co Ltd
Publication of CN105993156A publication Critical patent/CN105993156A/en
Application granted granted Critical
Publication of CN105993156B publication Critical patent/CN105993156B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The present invention discloses a server access authentication method and device. The method comprises: receiving an access request sent by an intelligent terminal to the server through the application software, wherein the access request is used to request the service data to the server, the access request contains the first authentication information; comparing the first authentication information with the second authentication information pre-stored in the server; if the first authentication information and the second authentication information are consistent, allowing the intelligent terminal to access to the service data. The above method can greatly reduce the complexity of the authentication process and improve the efficiency of verification.

Description

Server access verification method and device
[technical field]
The application relates to internet arena, particularly relates to server access verification method and dress Put.
[background technology]
The increasing of various application in intelligent terminal, between intelligent terminal and server mutual also More and more.But, the data in server may relate to the private data of user, if quilt Data in hacker unauthorized access server, the private data that may result in user reveals, shadow Ring the data safety to user.In order to ensure the safety of the data of user, need the identity to user Verify, but, the verification method of the identity of the user of prior art is sufficiently complex, so testing The efficiency of card is very low.
[content of the invention]
This application provides a kind of server access verification method, comprising: receive intelligent terminal and pass through The access request that application software sends to server, wherein, described access request is for described clothes Business device requested service data, described access request comprises the first checking information;By described first checking Information contrasts with the second checking information being stored in advance in described server;If described One checking information is consistent with described second checking information, then allow described intelligent terminal to access described industry Business data, find described business datum according to described request path in described server;If institute First checking information of stating is inconsistent with described second checking information, then return inspection to described intelligent terminal Error checking false information.
Alternatively, when user uses server described in described accessible with application software but described user does not has When logging in described application software, described first checking information includes that application software mark, interface are crucial Value and numerical value signature, wherein, described application software mark is used for identifying described application software, institute State interface key value for identifying interface during server described in described accessible with application software.
Alternatively, when user uses server described in described accessible with application software and described user to step on When recording described application software, described first checking information include application software mark, interface key value, Numerical value signature, ID and user conversation mark, wherein, described application software mark is used for Identifying described application software, described interface key value is used for identifying clothes described in described accessible with application software Interface during business device, described ID for identifying the identity of user, described user when logging in Session identification for identifying user conversation when logging in.
This application provides a kind of server access verification method, comprising: receive intelligent terminal and pass through The access request that application software sends to server, wherein, described access request is for described clothes Business device requested service data, described access request comprises the first checking information;By described first checking Information contrasts with the second checking being stored in advance in described server;If described first tests Card information is consistent with described second checking information, then allow described intelligent terminal to access described business number According to.
Alternatively, described access request also includes request path, if described first checking information with Described second checking information is consistent, then allow described intelligent terminal to go back after accessing described business datum Including: in described server, find described business datum according to described request path.
Alternatively, when user uses server described in described accessible with application software but described user does not has When logging in described application software, described first checking information includes that application software mark, interface are crucial Value and numerical value signature, wherein, described application software mark is used for identifying described application software, institute State interface key value for identifying interface during server described in described accessible with application software.
Alternatively, when user uses server described in described accessible with application software and described user to step on When recording described application software, described first checking information include application software mark, interface key value, Numerical value signature, ID and user conversation mark, wherein, described application software mark is used for Identifying described application software, described interface key value is used for identifying clothes described in described accessible with application software Interface during business device, described ID for identifying the identity of user, described user when logging in Session identification for identifying user conversation when logging in.
Alternatively, described method also includes: if described first checking information and described second checking Information is inconsistent, then return inspection error message to described intelligent terminal.
The application provides also provides a kind of server access checking device, and described device includes: receive Module, comparison module and permission module, described receiver module is used for receiving intelligent terminal by answering The access request sending to server with software, wherein, described access request is for described service Device requested service data, described access request comprises the first checking information;Described comparison module is used for Described first checking information is contrasted with the second checking being stored in advance in described server; Described permission module is for when described first verifies that information is consistent with described second checking information, permitting Permitted described intelligent terminal and accessed described business datum.
Alternatively, described device also includes finding module, and described searching module is for asking according to described Path is asked to find described business datum in described server.
Alternatively, when user uses server described in described accessible with application software but described user does not has When logging in described application software, described first checking information includes that application software mark, interface are crucial Value and numerical value signature, wherein, described application software mark is used for identifying described application software, institute State interface key value for identifying interface during server described in described accessible with application software.
Alternatively, when user uses server described in described accessible with application software and described user to step on When recording described application software, described first checking information include application software mark, interface key value, Numerical value signature, ID and user conversation mark, wherein, described application software mark is used for Identifying described application software, described interface key value is used for identifying clothes described in described accessible with application software Interface during business device, described ID for identifying the identity of user, described user when logging in Session identification for identifying user conversation when logging in.
Alternatively, described device also includes sending module, and described sending module is for described first When checking information is inconsistent with described second checking information, return inspection mistake to described intelligent terminal Information.
The access request that the application is sent to server by application software by reception intelligent terminal, And the first checking information is contrasted with the second checking prestoring in the server, first tests Card information is consistent with the second checking information, then allow intelligent terminal access service data.Said method The complexity of proof procedure can be greatly reduced, improve the efficiency of checking.
[brief description]
Fig. 1 is the flow chart of a kind of server access verification method that the present invention provides;
Fig. 2 is the structural representation of a kind of server access checking device that the present invention provides.
[detailed description of the invention]
In below describing, in order to illustrate rather than in order to limit, it is proposed that such as particular system structure, The detail of interface, technology etc, in order to thoroughly understand the application.But, the skill of this area Art personnel are it should be clear that also can realize this in other embodiments do not have these details Application.In other situations, omit to well-known device, circuit and method specifically Bright, in order to avoid unnecessary details hinders the description of the present application.
Refering to Fig. 1, Fig. 1 is the flow chart of a kind of server access verification method that the present invention provides. The server access verification method that the present embodiment provides includes:
110: the access request that reception intelligent terminal is sent to server by application software, wherein, Access request is for server request business datum, and access request comprises the first checking information.
Intelligent terminal can include but is not limited to removable computer, panel computer, personal digital assistant (Personal Digital Assistant, PDA), media player, intelligent television, intelligent watch, The user equipment such as intelligent glasses, Intelligent bracelet.Application software is mounted in the client on intelligent terminal End, application software can be by the number in the connected reference server between intelligent terminal and server According to.Connection between intelligent terminal box server includes but is not limited to Wi-Fi connection, honeycomb connects, Bluetooth connection etc..
When intelligent terminal needs by accessible with application software server, intelligent terminal is sent out to server Go out access request, wherein, access request contains the first checking information.Server receives intelligence The access request that terminal is sent to server by application software.First checking information can be a string That makes an appointment does not comprise practical significance character, it is also possible to be a string make an appointment have actual meaning The character of justice.When the character that the first checking information is being of practical significance of making an appointment, first tests Card information uses application software mark, interface key value, numerical value label according to actual application scenarios Name, speech encoding, system version, software version, ID and user conversation mark etc. It is combined using as checking information.Wherein, application software mark is used for identifying application software, connects Mouth key value is for identifying interface during accessible with application software server, and numerical value signature is used for differentiating number Word information, ID for identifying the identity of user when logging in, and user conversation mark is used for User conversation is identified when logging in.For example, when user uses accessible with application software server but user does not has Have login application software when, the first checking information include application software mark, interface key value and Numerical value is signed.When user uses accessible with application software server and user to log in application software, First checking information include application software mark, interface key value, numerical value signature, ID with And user conversation mark.
120: the first checking information is carried out with the second checking information prestoring in the server Contrast.
Store the second checking information in advance in the server.When server receives the first checking letter After breath, it is right to carry out the first checking information and the second checking information prestoring in the server Ratio.When user uses accessible with application software server but user is not logged on application software, service It is to obtain server to support, if obtaining server that device first verifies that application software identifies whether Support, then server verifies whether interface key value obtains what server was supported further, if Obtain server to support then to also need to verify that whether digital signature is correct further.If it is above-mentioned All pass through, enter step 130, otherwise, then enter step 140.When user uses application software When access server and user log in application software, also need to continue checking ID and user's meeting Words identify whether that obtaining server supports, if it is, enter step 130, otherwise, then enter Step 140.
130: allow intelligent terminal access service data.
If the first checking information is consistent with the second checking information, then allow intelligent terminal access service Data.During access service data, can be according to the business number in specific path access server According to, it is also possible to it is not according to the business datum in specific path access server.It is appreciated that If access request does not include request path, then when intelligent terminal accesses server, not basis Business datum in specific path access server.If access request also including ask road Footpath, then, when intelligent terminal accesses server, server is found in the server according to request path Business datum, to improve the efficiency of access.
140: return inspection error message to intelligent terminal.
If the first checking information and the second checking information are inconsistent, then return inspection to intelligent terminal Error message.
The access request that the application is sent to server by application software by reception intelligent terminal, And the first checking information is contrasted with the second checking prestoring in the server, first tests Card information is consistent with the second checking information, then allow intelligent terminal access service data.Said method The complexity of proof procedure can be greatly reduced, improve the efficiency of checking.
Refering to Fig. 2, Fig. 2 is that the structure of a kind of server access checking device that the present invention provides is shown It is intended to.The server access checking device that the present embodiment provides includes: the 210th, receiver module compares The 220th, module allows module the 230th, to find module 240 and sending module 250.
Receiver module 210 is for receiving the access that intelligent terminal is sent to server by application software Request, wherein, access request is for server request business datum, and access request comprises first Checking information.
Intelligent terminal can include but is not limited to removable computer, panel computer, personal digital assistant (Personal Digital Assistant, PDA), media player, intelligent television, intelligent watch, The user equipment such as intelligent glasses, Intelligent bracelet.Application software is mounted in the client on intelligent terminal End, application software can be by the number in the connected reference server between intelligent terminal and server According to.Connection between intelligent terminal box server includes but is not limited to Wi-Fi connection, honeycomb connects, Bluetooth connection etc..
When intelligent terminal needs by accessible with application software server, intelligent terminal is sent out to server Go out access request, wherein, access request contains the first checking information.Receiver module 210 connects Receive the access request that intelligent terminal is sent to server by application software.First checking information is permissible Be a string make an appointment do not comprise practical significance character, it is also possible to be a string make an appointment have The character of practical significance.When the character that the first checking information is being of practical significance of making an appointment, First checking information use according to actual application scenarios application software mark, interface key value, Numerical value signature, speech encoding, system version, software version, ID and user conversation mark Knowledge etc. is combined using as checking information.Wherein, application software mark is used for identifying that application is soft Part, interface key value is for identifying interface during accessible with application software server, and numerical value signature is used for Differentiating digital information, ID for identifying the identity of user when logging in, and user conversation identifies For identifying user conversation when logging in.For example, when user uses accessible with application software server but When user is not logged on application software, the first checking information includes that application software mark, interface are crucial Value and numerical value signature.When user use accessible with application software server and user log in application soft During part, the first checking information includes application software mark, interface key value, numerical value signature, user Mark and user conversation mark.
Comparison module 220 for by the first checking information with prestore second testing in the server Card information contrasts.
Store the second checking information in advance in the server.After receiving the first checking information, First checking information is entered by comparison module 220 with the second checking information prestoring in the server Row contrast.When user uses accessible with application software server but user is not logged on application software, It is to obtain server to support, if obtaining clothes that server first verifies that application software identifies whether Business device is supported, then server verifies whether interface key value obtains what server was supported further, If obtain server support then also need to verify that whether digital signature correct further.If Above-mentioned all pass through, call permission module 230, otherwise, call sending module 250.When user makes When logging in application software with accessible with application software server and user, also need to continue checking ID And user conversation identifies whether that obtaining server supports, if it is, call permission module 230, Otherwise, then sending module 250 is called.
Allow module 230 for when the first checking information is consistent with the second checking information, it is allowed to intelligence Can terminal access business datum.
If the first checking information is consistent with the second checking information, then module 230 is allowed to allow intelligence Terminal access business datum.During access service data, can be according to specific path access service Business datum in device, it is also possible to be not according to the business number in specific path access server According to.It is appreciated that if access request does not include request path, then when intelligent terminal accesses clothes During business device, not according to the business datum in specific path access server.If in access request Also include request path, then, when intelligent terminal accesses server, find module 240 according to request Business datum is found in path in the server, to improve the efficiency of access.
Sending module 250 is used for when the first checking information is inconsistent with the second checking information, Xiang Zhi Terminal can return inspection error message.
The access request that the application is sent to server by application software by reception intelligent terminal, And the first checking information is contrasted with the second checking prestoring in the server, first tests Card information is consistent with the second checking information, then allow intelligent terminal access service data.Said method The complexity of proof procedure can be greatly reduced, improve the efficiency of checking.
In several embodiments provided herein, it should be understood that disclosed system, Apparatus and method, can realize by another way.For example, device described above is implemented Mode is only schematically, for example, the division of described module or unit, it is only a kind of logic Function divides, and actual can have other dividing mode when realizing, for example multiple unit or assembly can To combine or to be desirably integrated into another system, or some features can be ignored, or does not performs. Another point, shown or discussed coupling each other or direct-coupling or communication connection can be By some interfaces, the INDIRECT COUPLING of device or unit or communication connection, can be electrical, machinery Or other form.
The described unit illustrating as separating component can be or may not be physically separate , can be as the parts that unit shows or may not be physical location, i.e. may be located at One place, or also can be distributed on multiple NE.Can select according to the actual needs Select some or all of unit therein to realize the purpose of present embodiment scheme.
In addition, each functional unit in each embodiment of the application can be integrated in a process In unit, it is also possible to be that unit is individually physically present, it is also possible to two or more unit Integrated in a unit.Above-mentioned integrated unit both can use the form of hardware to realize, it is possible to To use the form of SFU software functional unit to realize.
If described integrated unit realizes and as independent product using the form of SFU software functional unit When product are sold or use, can be stored in a computer read/write memory medium.Based on so Understanding, the part that prior art is contributed by the technical scheme of the application substantially in other words or Completely or partially can embodying with the form of software product of this technical scheme of person, this computer Software product is stored in a storage medium, including some instructions are with so that a computer sets Standby (can be personal computer, server, or the network equipment etc.) or processor (processor) Perform all or part of step of method described in each embodiment of the application.And aforesaid storage is situated between Matter includes: USB flash disk, portable hard drive, read-only storage (ROM, Read-Only Memory), Random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are each Plant the medium that can store program code.

Claims (13)

1. a server access verification method, it is characterised in that include:
Receive the access request that intelligent terminal is sent to server by application software, wherein, described Access request is for described server request business datum, and described access request comprises the first checking Information;
By described first checking information and the second checking information being stored in advance in described server Contrast;
If described first checking information is consistent with described second checking information, then allow described intelligence Business datum described in terminal access, finds described industry according to described request path in described server Business data;If with described second, described first checking information verifies that information is inconsistent, then to described Intelligent terminal returns inspection error message.
2. method according to claim 1, it is characterised in that when user uses described answering When being not logged on described application software with server described in softward interview but described user, described first Checking information include application software mark, interface key value and numerical value signature, wherein, described should Being used for identifying described application software by software identification, described interface key value is used for identifying described application Interface during server described in softward interview.
3. method according to claim 1, it is characterised in that when user uses described answering When logging in described application software with server described in softward interview and described user, described first tests Card information includes application software mark, interface key value, numerical value signature, ID and user Session identification, wherein, described application software mark is used for identifying described application software, described interface Key value is for identifying interface during server described in described accessible with application software, described ID For identifying the identity of user when logging in, described user conversation mark is used for identifying when logging in Family session.
4. a server access verification method, it is characterised in that include:
Receive the access request that intelligent terminal is sent to server by application software, wherein, described Access request is for described server request business datum, and described access request comprises the first checking Information;
By described first checking information and the second checking information being stored in advance in described server Contrast;
If described first checking information is consistent with described second checking information, then allow described intelligence Business datum described in terminal access.
5. method according to claim 4, it is characterised in that described access request is also wrapped Include request path,
If described first checking information is consistent with described second checking information, then allow described intelligence Also include after business datum described in terminal access:
Find described business datum according to described request path in described server.
6. method according to claim 4, it is characterised in that when user uses described answering When being not logged on described application software with server described in softward interview but described user, described first Checking information include application software mark, interface key value and numerical value signature, wherein, described should Being used for identifying described application software by software identification, described interface key value is used for identifying described application Interface during server described in softward interview.
7. method according to claim 4, it is characterised in that when user uses described answering When logging in described application software with server described in softward interview and described user, described first tests Card information includes application software mark, interface key value, numerical value signature, ID and user Session identification, wherein, described application software mark is used for identifying described application software, described interface Key value is for identifying interface during server described in described accessible with application software, described ID For identifying the identity of user when logging in, described user conversation mark is used for identifying when logging in Family session.
8. method according to claim 4, it is characterised in that described method also includes:
If described first checking information is inconsistent with described second checking information, then to described intelligence Terminal returns inspection error message.
9. a server access checking device, it is characterised in that described device includes: receive Module, comparison module and permission module,
Described receiver module is for receiving the visit that intelligent terminal is sent to server by application software Asking request, wherein, described access request is for described server request business datum, described visit The request of asking comprises the first checking information;
Described comparison module for by described first checking information be stored in advance in described server In the second checking information contrast;
Described first, described permission module is for verifying that information is consistent with described second checking information When, it is allowed to described intelligent terminal accesses described business datum.
10. device according to claim 9, it is characterised in that described device also includes seeking Looking for module, described searching module is for according to described request path is found in described server Business datum.
11. devices according to claim 9, it is characterised in that when user uses described answering When being not logged on described application software with server described in softward interview but described user, described first Checking information include application software mark, interface key value and numerical value signature, wherein, described should Being used for identifying described application software by software identification, described interface key value is used for identifying described application Interface during server described in softward interview.
12. devices according to claim 9, it is characterised in that when user uses described answering When logging in described application software with server described in softward interview and described user, described first tests Card information includes application software mark, interface key value, numerical value signature, ID and user Session identification, wherein, described application software mark is used for identifying described application software, described interface Key value is for identifying interface during server described in described accessible with application software, described ID For identifying the identity of user when logging in, described user conversation mark is used for identifying when logging in Family session.
13. devices according to claim 9, it is characterised in that described device also includes sending out Sending module, described sending module is for verifying information with described second checking information not described first When consistent, return inspection error message to described intelligent terminal.
CN201580002092.XA 2015-10-23 2015-10-23 Server access verification method and device Active CN105993156B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/092691 WO2017066994A1 (en) 2015-10-23 2015-10-23 Method and device for verifying access to server

Publications (2)

Publication Number Publication Date
CN105993156A true CN105993156A (en) 2016-10-05
CN105993156B CN105993156B (en) 2020-01-14

Family

ID=57040926

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201580002092.XA Active CN105993156B (en) 2015-10-23 2015-10-23 Server access verification method and device

Country Status (2)

Country Link
CN (1) CN105993156B (en)
WO (1) WO2017066994A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107679372A (en) * 2017-09-26 2018-02-09 努比亚技术有限公司 Access control method, terminal and the storage medium of application program
CN107743114A (en) * 2016-12-15 2018-02-27 腾讯科技(深圳)有限公司 A kind of Network Access Method, device and system
CN110352426A (en) * 2017-02-28 2019-10-18 松下知识产权经营株式会社 Control device, premises equipment and program
CN111082940A (en) * 2019-11-19 2020-04-28 泰康保险集团股份有限公司 Internet of things equipment control method and device, computing equipment and storage medium
CN113722687A (en) * 2021-08-30 2021-11-30 康键信息技术(深圳)有限公司 Application software login method, device, medium and equipment
CN116032889A (en) * 2023-03-30 2023-04-28 新华三技术有限公司 IP address allocation method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7111323B1 (en) * 2001-08-31 2006-09-19 Oracle International Corporation Method and apparatus to facilitate a global timeout in a distributed computing environment
CN103188668A (en) * 2011-12-27 2013-07-03 方正国际软件(北京)有限公司 Security protection method and security protection system for mobile terminal application
CN103607374A (en) * 2013-10-28 2014-02-26 中国航天科工集团第二研究院七〇六所 Network-resource-access control method based on identity authentication and data-packet filtering technology
CN104753674A (en) * 2013-12-31 2015-07-01 中国移动通信集团公司 Application identity authentication method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104537284B (en) * 2014-12-19 2017-05-03 葛胜锦 Software protecting system and method based on remote service

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7111323B1 (en) * 2001-08-31 2006-09-19 Oracle International Corporation Method and apparatus to facilitate a global timeout in a distributed computing environment
CN103188668A (en) * 2011-12-27 2013-07-03 方正国际软件(北京)有限公司 Security protection method and security protection system for mobile terminal application
CN103607374A (en) * 2013-10-28 2014-02-26 中国航天科工集团第二研究院七〇六所 Network-resource-access control method based on identity authentication and data-packet filtering technology
CN104753674A (en) * 2013-12-31 2015-07-01 中国移动通信集团公司 Application identity authentication method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
罗富强: "《WEB应用程序设计实用教程》", 31 December 2010 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107743114A (en) * 2016-12-15 2018-02-27 腾讯科技(深圳)有限公司 A kind of Network Access Method, device and system
CN107743114B (en) * 2016-12-15 2020-03-17 腾讯科技(深圳)有限公司 Network access method, device and system
CN110352426A (en) * 2017-02-28 2019-10-18 松下知识产权经营株式会社 Control device, premises equipment and program
CN107679372A (en) * 2017-09-26 2018-02-09 努比亚技术有限公司 Access control method, terminal and the storage medium of application program
CN111082940A (en) * 2019-11-19 2020-04-28 泰康保险集团股份有限公司 Internet of things equipment control method and device, computing equipment and storage medium
CN111082940B (en) * 2019-11-19 2022-11-04 泰康保险集团股份有限公司 Internet of things equipment control method and device, computing equipment and storage medium
CN113722687A (en) * 2021-08-30 2021-11-30 康键信息技术(深圳)有限公司 Application software login method, device, medium and equipment
CN116032889A (en) * 2023-03-30 2023-04-28 新华三技术有限公司 IP address allocation method and device
CN116032889B (en) * 2023-03-30 2023-07-21 新华三技术有限公司 IP address allocation method and device

Also Published As

Publication number Publication date
WO2017066994A1 (en) 2017-04-27
CN105993156B (en) 2020-01-14

Similar Documents

Publication Publication Date Title
CN105993156A (en) Server access authentication method and device
US20210084052A1 (en) Identity verification and login methods, apparatuses, and computer devices
CN105024986B (en) The methods, devices and systems that account number logs in
CN104639517B (en) The method and apparatus for carrying out authentication using human body biological characteristics
CN104364790B (en) System and method for implementing dual factor anthentication
CN105246073B (en) The access authentication method and server of wireless network
CN107294721A (en) The method and apparatus of identity registration, certification based on biological characteristic
CN104753677B (en) Password hierarchical control method and system
CN108009825A (en) A kind of identity management system and method based on block chain technology
KR102024694B1 (en) Decentralized service platform using multiple service nodes based on block chain
CN104995626A (en) Identification delegation for devices
US20190342753A1 (en) Device configuration method, apparatus and system
US20130185645A1 (en) Determining repeat website users via browser uniqueness tracking
CN103415014B (en) The method and apparatus authenticated is carried out for mobile terminal
CN108256303A (en) Electronic device, auth method and storage medium
CN107688960A (en) Shared billboard launches the auditing system and server of content
CN113268336B (en) Service acquisition method, device, equipment and readable medium
CN107580032B (en) Data processing method, device and equipment
CN108647501A (en) Multiple utility program shares password unlocking method, device, equipment and storage medium
CN107197462A (en) Detection method, device and the electronic equipment of wireless network type
CN109525949A (en) Register method and device, storage medium, server, user terminal
CN103001934B (en) The method and system that terminal applies logs in
CN110324344A (en) The method and device of account information certification
CN105337739B (en) Safe login method, device, server and terminal
CN114139135B (en) Equipment login management method, device and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20190508

Address after: 518000 Yuanzheng Industrial Park, North of Fifth Avenue, Bantian Street, Longgang District, Shenzhen City, Guangdong Province

Applicant after: Yuanzheng Science and Technology Co., Ltd., Shenzhen City

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant before: HESVIT HEALTH TECH CO., LTD.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant