CN105993156A - Server access authentication method and device - Google Patents
Server access authentication method and device Download PDFInfo
- Publication number
- CN105993156A CN105993156A CN201580002092.XA CN201580002092A CN105993156A CN 105993156 A CN105993156 A CN 105993156A CN 201580002092 A CN201580002092 A CN 201580002092A CN 105993156 A CN105993156 A CN 105993156A
- Authority
- CN
- China
- Prior art keywords
- server
- application software
- checking information
- user
- identifying
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Abstract
The present invention discloses a server access authentication method and device. The method comprises: receiving an access request sent by an intelligent terminal to the server through the application software, wherein the access request is used to request the service data to the server, the access request contains the first authentication information; comparing the first authentication information with the second authentication information pre-stored in the server; if the first authentication information and the second authentication information are consistent, allowing the intelligent terminal to access to the service data. The above method can greatly reduce the complexity of the authentication process and improve the efficiency of verification.
Description
[technical field]
The application relates to internet arena, particularly relates to server access verification method and dress
Put.
[background technology]
The increasing of various application in intelligent terminal, between intelligent terminal and server mutual also
More and more.But, the data in server may relate to the private data of user, if quilt
Data in hacker unauthorized access server, the private data that may result in user reveals, shadow
Ring the data safety to user.In order to ensure the safety of the data of user, need the identity to user
Verify, but, the verification method of the identity of the user of prior art is sufficiently complex, so testing
The efficiency of card is very low.
[content of the invention]
This application provides a kind of server access verification method, comprising: receive intelligent terminal and pass through
The access request that application software sends to server, wherein, described access request is for described clothes
Business device requested service data, described access request comprises the first checking information;By described first checking
Information contrasts with the second checking information being stored in advance in described server;If described
One checking information is consistent with described second checking information, then allow described intelligent terminal to access described industry
Business data, find described business datum according to described request path in described server;If institute
First checking information of stating is inconsistent with described second checking information, then return inspection to described intelligent terminal
Error checking false information.
Alternatively, when user uses server described in described accessible with application software but described user does not has
When logging in described application software, described first checking information includes that application software mark, interface are crucial
Value and numerical value signature, wherein, described application software mark is used for identifying described application software, institute
State interface key value for identifying interface during server described in described accessible with application software.
Alternatively, when user uses server described in described accessible with application software and described user to step on
When recording described application software, described first checking information include application software mark, interface key value,
Numerical value signature, ID and user conversation mark, wherein, described application software mark is used for
Identifying described application software, described interface key value is used for identifying clothes described in described accessible with application software
Interface during business device, described ID for identifying the identity of user, described user when logging in
Session identification for identifying user conversation when logging in.
This application provides a kind of server access verification method, comprising: receive intelligent terminal and pass through
The access request that application software sends to server, wherein, described access request is for described clothes
Business device requested service data, described access request comprises the first checking information;By described first checking
Information contrasts with the second checking being stored in advance in described server;If described first tests
Card information is consistent with described second checking information, then allow described intelligent terminal to access described business number
According to.
Alternatively, described access request also includes request path, if described first checking information with
Described second checking information is consistent, then allow described intelligent terminal to go back after accessing described business datum
Including: in described server, find described business datum according to described request path.
Alternatively, when user uses server described in described accessible with application software but described user does not has
When logging in described application software, described first checking information includes that application software mark, interface are crucial
Value and numerical value signature, wherein, described application software mark is used for identifying described application software, institute
State interface key value for identifying interface during server described in described accessible with application software.
Alternatively, when user uses server described in described accessible with application software and described user to step on
When recording described application software, described first checking information include application software mark, interface key value,
Numerical value signature, ID and user conversation mark, wherein, described application software mark is used for
Identifying described application software, described interface key value is used for identifying clothes described in described accessible with application software
Interface during business device, described ID for identifying the identity of user, described user when logging in
Session identification for identifying user conversation when logging in.
Alternatively, described method also includes: if described first checking information and described second checking
Information is inconsistent, then return inspection error message to described intelligent terminal.
The application provides also provides a kind of server access checking device, and described device includes: receive
Module, comparison module and permission module, described receiver module is used for receiving intelligent terminal by answering
The access request sending to server with software, wherein, described access request is for described service
Device requested service data, described access request comprises the first checking information;Described comparison module is used for
Described first checking information is contrasted with the second checking being stored in advance in described server;
Described permission module is for when described first verifies that information is consistent with described second checking information, permitting
Permitted described intelligent terminal and accessed described business datum.
Alternatively, described device also includes finding module, and described searching module is for asking according to described
Path is asked to find described business datum in described server.
Alternatively, when user uses server described in described accessible with application software but described user does not has
When logging in described application software, described first checking information includes that application software mark, interface are crucial
Value and numerical value signature, wherein, described application software mark is used for identifying described application software, institute
State interface key value for identifying interface during server described in described accessible with application software.
Alternatively, when user uses server described in described accessible with application software and described user to step on
When recording described application software, described first checking information include application software mark, interface key value,
Numerical value signature, ID and user conversation mark, wherein, described application software mark is used for
Identifying described application software, described interface key value is used for identifying clothes described in described accessible with application software
Interface during business device, described ID for identifying the identity of user, described user when logging in
Session identification for identifying user conversation when logging in.
Alternatively, described device also includes sending module, and described sending module is for described first
When checking information is inconsistent with described second checking information, return inspection mistake to described intelligent terminal
Information.
The access request that the application is sent to server by application software by reception intelligent terminal,
And the first checking information is contrasted with the second checking prestoring in the server, first tests
Card information is consistent with the second checking information, then allow intelligent terminal access service data.Said method
The complexity of proof procedure can be greatly reduced, improve the efficiency of checking.
[brief description]
Fig. 1 is the flow chart of a kind of server access verification method that the present invention provides;
Fig. 2 is the structural representation of a kind of server access checking device that the present invention provides.
[detailed description of the invention]
In below describing, in order to illustrate rather than in order to limit, it is proposed that such as particular system structure,
The detail of interface, technology etc, in order to thoroughly understand the application.But, the skill of this area
Art personnel are it should be clear that also can realize this in other embodiments do not have these details
Application.In other situations, omit to well-known device, circuit and method specifically
Bright, in order to avoid unnecessary details hinders the description of the present application.
Refering to Fig. 1, Fig. 1 is the flow chart of a kind of server access verification method that the present invention provides.
The server access verification method that the present embodiment provides includes:
110: the access request that reception intelligent terminal is sent to server by application software, wherein,
Access request is for server request business datum, and access request comprises the first checking information.
Intelligent terminal can include but is not limited to removable computer, panel computer, personal digital assistant
(Personal Digital Assistant, PDA), media player, intelligent television, intelligent watch,
The user equipment such as intelligent glasses, Intelligent bracelet.Application software is mounted in the client on intelligent terminal
End, application software can be by the number in the connected reference server between intelligent terminal and server
According to.Connection between intelligent terminal box server includes but is not limited to Wi-Fi connection, honeycomb connects,
Bluetooth connection etc..
When intelligent terminal needs by accessible with application software server, intelligent terminal is sent out to server
Go out access request, wherein, access request contains the first checking information.Server receives intelligence
The access request that terminal is sent to server by application software.First checking information can be a string
That makes an appointment does not comprise practical significance character, it is also possible to be a string make an appointment have actual meaning
The character of justice.When the character that the first checking information is being of practical significance of making an appointment, first tests
Card information uses application software mark, interface key value, numerical value label according to actual application scenarios
Name, speech encoding, system version, software version, ID and user conversation mark etc.
It is combined using as checking information.Wherein, application software mark is used for identifying application software, connects
Mouth key value is for identifying interface during accessible with application software server, and numerical value signature is used for differentiating number
Word information, ID for identifying the identity of user when logging in, and user conversation mark is used for
User conversation is identified when logging in.For example, when user uses accessible with application software server but user does not has
Have login application software when, the first checking information include application software mark, interface key value and
Numerical value is signed.When user uses accessible with application software server and user to log in application software,
First checking information include application software mark, interface key value, numerical value signature, ID with
And user conversation mark.
120: the first checking information is carried out with the second checking information prestoring in the server
Contrast.
Store the second checking information in advance in the server.When server receives the first checking letter
After breath, it is right to carry out the first checking information and the second checking information prestoring in the server
Ratio.When user uses accessible with application software server but user is not logged on application software, service
It is to obtain server to support, if obtaining server that device first verifies that application software identifies whether
Support, then server verifies whether interface key value obtains what server was supported further, if
Obtain server to support then to also need to verify that whether digital signature is correct further.If it is above-mentioned
All pass through, enter step 130, otherwise, then enter step 140.When user uses application software
When access server and user log in application software, also need to continue checking ID and user's meeting
Words identify whether that obtaining server supports, if it is, enter step 130, otherwise, then enter
Step 140.
130: allow intelligent terminal access service data.
If the first checking information is consistent with the second checking information, then allow intelligent terminal access service
Data.During access service data, can be according to the business number in specific path access server
According to, it is also possible to it is not according to the business datum in specific path access server.It is appreciated that
If access request does not include request path, then when intelligent terminal accesses server, not basis
Business datum in specific path access server.If access request also including ask road
Footpath, then, when intelligent terminal accesses server, server is found in the server according to request path
Business datum, to improve the efficiency of access.
140: return inspection error message to intelligent terminal.
If the first checking information and the second checking information are inconsistent, then return inspection to intelligent terminal
Error message.
The access request that the application is sent to server by application software by reception intelligent terminal,
And the first checking information is contrasted with the second checking prestoring in the server, first tests
Card information is consistent with the second checking information, then allow intelligent terminal access service data.Said method
The complexity of proof procedure can be greatly reduced, improve the efficiency of checking.
Refering to Fig. 2, Fig. 2 is that the structure of a kind of server access checking device that the present invention provides is shown
It is intended to.The server access checking device that the present embodiment provides includes: the 210th, receiver module compares
The 220th, module allows module the 230th, to find module 240 and sending module 250.
Receiver module 210 is for receiving the access that intelligent terminal is sent to server by application software
Request, wherein, access request is for server request business datum, and access request comprises first
Checking information.
Intelligent terminal can include but is not limited to removable computer, panel computer, personal digital assistant
(Personal Digital Assistant, PDA), media player, intelligent television, intelligent watch,
The user equipment such as intelligent glasses, Intelligent bracelet.Application software is mounted in the client on intelligent terminal
End, application software can be by the number in the connected reference server between intelligent terminal and server
According to.Connection between intelligent terminal box server includes but is not limited to Wi-Fi connection, honeycomb connects,
Bluetooth connection etc..
When intelligent terminal needs by accessible with application software server, intelligent terminal is sent out to server
Go out access request, wherein, access request contains the first checking information.Receiver module 210 connects
Receive the access request that intelligent terminal is sent to server by application software.First checking information is permissible
Be a string make an appointment do not comprise practical significance character, it is also possible to be a string make an appointment have
The character of practical significance.When the character that the first checking information is being of practical significance of making an appointment,
First checking information use according to actual application scenarios application software mark, interface key value,
Numerical value signature, speech encoding, system version, software version, ID and user conversation mark
Knowledge etc. is combined using as checking information.Wherein, application software mark is used for identifying that application is soft
Part, interface key value is for identifying interface during accessible with application software server, and numerical value signature is used for
Differentiating digital information, ID for identifying the identity of user when logging in, and user conversation identifies
For identifying user conversation when logging in.For example, when user uses accessible with application software server but
When user is not logged on application software, the first checking information includes that application software mark, interface are crucial
Value and numerical value signature.When user use accessible with application software server and user log in application soft
During part, the first checking information includes application software mark, interface key value, numerical value signature, user
Mark and user conversation mark.
Comparison module 220 for by the first checking information with prestore second testing in the server
Card information contrasts.
Store the second checking information in advance in the server.After receiving the first checking information,
First checking information is entered by comparison module 220 with the second checking information prestoring in the server
Row contrast.When user uses accessible with application software server but user is not logged on application software,
It is to obtain server to support, if obtaining clothes that server first verifies that application software identifies whether
Business device is supported, then server verifies whether interface key value obtains what server was supported further,
If obtain server support then also need to verify that whether digital signature correct further.If
Above-mentioned all pass through, call permission module 230, otherwise, call sending module 250.When user makes
When logging in application software with accessible with application software server and user, also need to continue checking ID
And user conversation identifies whether that obtaining server supports, if it is, call permission module 230,
Otherwise, then sending module 250 is called.
Allow module 230 for when the first checking information is consistent with the second checking information, it is allowed to intelligence
Can terminal access business datum.
If the first checking information is consistent with the second checking information, then module 230 is allowed to allow intelligence
Terminal access business datum.During access service data, can be according to specific path access service
Business datum in device, it is also possible to be not according to the business number in specific path access server
According to.It is appreciated that if access request does not include request path, then when intelligent terminal accesses clothes
During business device, not according to the business datum in specific path access server.If in access request
Also include request path, then, when intelligent terminal accesses server, find module 240 according to request
Business datum is found in path in the server, to improve the efficiency of access.
Sending module 250 is used for when the first checking information is inconsistent with the second checking information, Xiang Zhi
Terminal can return inspection error message.
The access request that the application is sent to server by application software by reception intelligent terminal,
And the first checking information is contrasted with the second checking prestoring in the server, first tests
Card information is consistent with the second checking information, then allow intelligent terminal access service data.Said method
The complexity of proof procedure can be greatly reduced, improve the efficiency of checking.
In several embodiments provided herein, it should be understood that disclosed system,
Apparatus and method, can realize by another way.For example, device described above is implemented
Mode is only schematically, for example, the division of described module or unit, it is only a kind of logic
Function divides, and actual can have other dividing mode when realizing, for example multiple unit or assembly can
To combine or to be desirably integrated into another system, or some features can be ignored, or does not performs.
Another point, shown or discussed coupling each other or direct-coupling or communication connection can be
By some interfaces, the INDIRECT COUPLING of device or unit or communication connection, can be electrical, machinery
Or other form.
The described unit illustrating as separating component can be or may not be physically separate
, can be as the parts that unit shows or may not be physical location, i.e. may be located at
One place, or also can be distributed on multiple NE.Can select according to the actual needs
Select some or all of unit therein to realize the purpose of present embodiment scheme.
In addition, each functional unit in each embodiment of the application can be integrated in a process
In unit, it is also possible to be that unit is individually physically present, it is also possible to two or more unit
Integrated in a unit.Above-mentioned integrated unit both can use the form of hardware to realize, it is possible to
To use the form of SFU software functional unit to realize.
If described integrated unit realizes and as independent product using the form of SFU software functional unit
When product are sold or use, can be stored in a computer read/write memory medium.Based on so
Understanding, the part that prior art is contributed by the technical scheme of the application substantially in other words or
Completely or partially can embodying with the form of software product of this technical scheme of person, this computer
Software product is stored in a storage medium, including some instructions are with so that a computer sets
Standby (can be personal computer, server, or the network equipment etc.) or processor (processor)
Perform all or part of step of method described in each embodiment of the application.And aforesaid storage is situated between
Matter includes: USB flash disk, portable hard drive, read-only storage (ROM, Read-Only Memory),
Random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are each
Plant the medium that can store program code.
Claims (13)
1. a server access verification method, it is characterised in that include:
Receive the access request that intelligent terminal is sent to server by application software, wherein, described
Access request is for described server request business datum, and described access request comprises the first checking
Information;
By described first checking information and the second checking information being stored in advance in described server
Contrast;
If described first checking information is consistent with described second checking information, then allow described intelligence
Business datum described in terminal access, finds described industry according to described request path in described server
Business data;If with described second, described first checking information verifies that information is inconsistent, then to described
Intelligent terminal returns inspection error message.
2. method according to claim 1, it is characterised in that when user uses described answering
When being not logged on described application software with server described in softward interview but described user, described first
Checking information include application software mark, interface key value and numerical value signature, wherein, described should
Being used for identifying described application software by software identification, described interface key value is used for identifying described application
Interface during server described in softward interview.
3. method according to claim 1, it is characterised in that when user uses described answering
When logging in described application software with server described in softward interview and described user, described first tests
Card information includes application software mark, interface key value, numerical value signature, ID and user
Session identification, wherein, described application software mark is used for identifying described application software, described interface
Key value is for identifying interface during server described in described accessible with application software, described ID
For identifying the identity of user when logging in, described user conversation mark is used for identifying when logging in
Family session.
4. a server access verification method, it is characterised in that include:
Receive the access request that intelligent terminal is sent to server by application software, wherein, described
Access request is for described server request business datum, and described access request comprises the first checking
Information;
By described first checking information and the second checking information being stored in advance in described server
Contrast;
If described first checking information is consistent with described second checking information, then allow described intelligence
Business datum described in terminal access.
5. method according to claim 4, it is characterised in that described access request is also wrapped
Include request path,
If described first checking information is consistent with described second checking information, then allow described intelligence
Also include after business datum described in terminal access:
Find described business datum according to described request path in described server.
6. method according to claim 4, it is characterised in that when user uses described answering
When being not logged on described application software with server described in softward interview but described user, described first
Checking information include application software mark, interface key value and numerical value signature, wherein, described should
Being used for identifying described application software by software identification, described interface key value is used for identifying described application
Interface during server described in softward interview.
7. method according to claim 4, it is characterised in that when user uses described answering
When logging in described application software with server described in softward interview and described user, described first tests
Card information includes application software mark, interface key value, numerical value signature, ID and user
Session identification, wherein, described application software mark is used for identifying described application software, described interface
Key value is for identifying interface during server described in described accessible with application software, described ID
For identifying the identity of user when logging in, described user conversation mark is used for identifying when logging in
Family session.
8. method according to claim 4, it is characterised in that described method also includes:
If described first checking information is inconsistent with described second checking information, then to described intelligence
Terminal returns inspection error message.
9. a server access checking device, it is characterised in that described device includes: receive
Module, comparison module and permission module,
Described receiver module is for receiving the visit that intelligent terminal is sent to server by application software
Asking request, wherein, described access request is for described server request business datum, described visit
The request of asking comprises the first checking information;
Described comparison module for by described first checking information be stored in advance in described server
In the second checking information contrast;
Described first, described permission module is for verifying that information is consistent with described second checking information
When, it is allowed to described intelligent terminal accesses described business datum.
10. device according to claim 9, it is characterised in that described device also includes seeking
Looking for module, described searching module is for according to described request path is found in described server
Business datum.
11. devices according to claim 9, it is characterised in that when user uses described answering
When being not logged on described application software with server described in softward interview but described user, described first
Checking information include application software mark, interface key value and numerical value signature, wherein, described should
Being used for identifying described application software by software identification, described interface key value is used for identifying described application
Interface during server described in softward interview.
12. devices according to claim 9, it is characterised in that when user uses described answering
When logging in described application software with server described in softward interview and described user, described first tests
Card information includes application software mark, interface key value, numerical value signature, ID and user
Session identification, wherein, described application software mark is used for identifying described application software, described interface
Key value is for identifying interface during server described in described accessible with application software, described ID
For identifying the identity of user when logging in, described user conversation mark is used for identifying when logging in
Family session.
13. devices according to claim 9, it is characterised in that described device also includes sending out
Sending module, described sending module is for verifying information with described second checking information not described first
When consistent, return inspection error message to described intelligent terminal.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2015/092691 WO2017066994A1 (en) | 2015-10-23 | 2015-10-23 | Method and device for verifying access to server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105993156A true CN105993156A (en) | 2016-10-05 |
CN105993156B CN105993156B (en) | 2020-01-14 |
Family
ID=57040926
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201580002092.XA Active CN105993156B (en) | 2015-10-23 | 2015-10-23 | Server access verification method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105993156B (en) |
WO (1) | WO2017066994A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107679372A (en) * | 2017-09-26 | 2018-02-09 | 努比亚技术有限公司 | Access control method, terminal and the storage medium of application program |
CN107743114A (en) * | 2016-12-15 | 2018-02-27 | 腾讯科技(深圳)有限公司 | A kind of Network Access Method, device and system |
CN110352426A (en) * | 2017-02-28 | 2019-10-18 | 松下知识产权经营株式会社 | Control device, premises equipment and program |
CN111082940A (en) * | 2019-11-19 | 2020-04-28 | 泰康保险集团股份有限公司 | Internet of things equipment control method and device, computing equipment and storage medium |
CN113722687A (en) * | 2021-08-30 | 2021-11-30 | 康键信息技术(深圳)有限公司 | Application software login method, device, medium and equipment |
CN116032889A (en) * | 2023-03-30 | 2023-04-28 | 新华三技术有限公司 | IP address allocation method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7111323B1 (en) * | 2001-08-31 | 2006-09-19 | Oracle International Corporation | Method and apparatus to facilitate a global timeout in a distributed computing environment |
CN103188668A (en) * | 2011-12-27 | 2013-07-03 | 方正国际软件(北京)有限公司 | Security protection method and security protection system for mobile terminal application |
CN103607374A (en) * | 2013-10-28 | 2014-02-26 | 中国航天科工集团第二研究院七〇六所 | Network-resource-access control method based on identity authentication and data-packet filtering technology |
CN104753674A (en) * | 2013-12-31 | 2015-07-01 | 中国移动通信集团公司 | Application identity authentication method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104537284B (en) * | 2014-12-19 | 2017-05-03 | 葛胜锦 | Software protecting system and method based on remote service |
-
2015
- 2015-10-23 WO PCT/CN2015/092691 patent/WO2017066994A1/en active Application Filing
- 2015-10-23 CN CN201580002092.XA patent/CN105993156B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7111323B1 (en) * | 2001-08-31 | 2006-09-19 | Oracle International Corporation | Method and apparatus to facilitate a global timeout in a distributed computing environment |
CN103188668A (en) * | 2011-12-27 | 2013-07-03 | 方正国际软件(北京)有限公司 | Security protection method and security protection system for mobile terminal application |
CN103607374A (en) * | 2013-10-28 | 2014-02-26 | 中国航天科工集团第二研究院七〇六所 | Network-resource-access control method based on identity authentication and data-packet filtering technology |
CN104753674A (en) * | 2013-12-31 | 2015-07-01 | 中国移动通信集团公司 | Application identity authentication method and device |
Non-Patent Citations (1)
Title |
---|
罗富强: "《WEB应用程序设计实用教程》", 31 December 2010 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107743114A (en) * | 2016-12-15 | 2018-02-27 | 腾讯科技(深圳)有限公司 | A kind of Network Access Method, device and system |
CN107743114B (en) * | 2016-12-15 | 2020-03-17 | 腾讯科技(深圳)有限公司 | Network access method, device and system |
CN110352426A (en) * | 2017-02-28 | 2019-10-18 | 松下知识产权经营株式会社 | Control device, premises equipment and program |
CN107679372A (en) * | 2017-09-26 | 2018-02-09 | 努比亚技术有限公司 | Access control method, terminal and the storage medium of application program |
CN111082940A (en) * | 2019-11-19 | 2020-04-28 | 泰康保险集团股份有限公司 | Internet of things equipment control method and device, computing equipment and storage medium |
CN111082940B (en) * | 2019-11-19 | 2022-11-04 | 泰康保险集团股份有限公司 | Internet of things equipment control method and device, computing equipment and storage medium |
CN113722687A (en) * | 2021-08-30 | 2021-11-30 | 康键信息技术(深圳)有限公司 | Application software login method, device, medium and equipment |
CN116032889A (en) * | 2023-03-30 | 2023-04-28 | 新华三技术有限公司 | IP address allocation method and device |
CN116032889B (en) * | 2023-03-30 | 2023-07-21 | 新华三技术有限公司 | IP address allocation method and device |
Also Published As
Publication number | Publication date |
---|---|
WO2017066994A1 (en) | 2017-04-27 |
CN105993156B (en) | 2020-01-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105993156A (en) | Server access authentication method and device | |
US20210084052A1 (en) | Identity verification and login methods, apparatuses, and computer devices | |
CN105024986B (en) | The methods, devices and systems that account number logs in | |
CN104639517B (en) | The method and apparatus for carrying out authentication using human body biological characteristics | |
CN104364790B (en) | System and method for implementing dual factor anthentication | |
CN105246073B (en) | The access authentication method and server of wireless network | |
CN107294721A (en) | The method and apparatus of identity registration, certification based on biological characteristic | |
CN104753677B (en) | Password hierarchical control method and system | |
CN108009825A (en) | A kind of identity management system and method based on block chain technology | |
KR102024694B1 (en) | Decentralized service platform using multiple service nodes based on block chain | |
CN104995626A (en) | Identification delegation for devices | |
US20190342753A1 (en) | Device configuration method, apparatus and system | |
US20130185645A1 (en) | Determining repeat website users via browser uniqueness tracking | |
CN103415014B (en) | The method and apparatus authenticated is carried out for mobile terminal | |
CN108256303A (en) | Electronic device, auth method and storage medium | |
CN107688960A (en) | Shared billboard launches the auditing system and server of content | |
CN113268336B (en) | Service acquisition method, device, equipment and readable medium | |
CN107580032B (en) | Data processing method, device and equipment | |
CN108647501A (en) | Multiple utility program shares password unlocking method, device, equipment and storage medium | |
CN107197462A (en) | Detection method, device and the electronic equipment of wireless network type | |
CN109525949A (en) | Register method and device, storage medium, server, user terminal | |
CN103001934B (en) | The method and system that terminal applies logs in | |
CN110324344A (en) | The method and device of account information certification | |
CN105337739B (en) | Safe login method, device, server and terminal | |
CN114139135B (en) | Equipment login management method, device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20190508 Address after: 518000 Yuanzheng Industrial Park, North of Fifth Avenue, Bantian Street, Longgang District, Shenzhen City, Guangdong Province Applicant after: Yuanzheng Science and Technology Co., Ltd., Shenzhen City Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.) Applicant before: HESVIT HEALTH TECH CO., LTD. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |