CN105993156B - Server access verification method and device - Google Patents
Server access verification method and device Download PDFInfo
- Publication number
- CN105993156B CN105993156B CN201580002092.XA CN201580002092A CN105993156B CN 105993156 B CN105993156 B CN 105993156B CN 201580002092 A CN201580002092 A CN 201580002092A CN 105993156 B CN105993156 B CN 105993156B
- Authority
- CN
- China
- Prior art keywords
- server
- application software
- user
- identifier
- intelligent terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Abstract
The application discloses a server access verification method and device. Wherein the method comprises the following steps: receiving an access request sent by an intelligent terminal to a server through application software, wherein the access request is used for requesting service data from the server and comprises first verification information; comparing the first authentication information with a second authentication previously stored in the server; and if the first verification information is consistent with the second verification information, allowing the intelligent terminal to access the service data. The method can greatly reduce the complexity of the verification process and improve the verification efficiency.
Description
[ technical field ] A method for producing a semiconductor device
The present application relates to the field of internet, and in particular, to a server access verification method and apparatus.
[ background of the invention ]
With the increase of various applications in the intelligent terminal, the interaction between the intelligent terminal and the server is more and more. However, the data in the server may relate to the private data of the user, and if a hacker illegally accesses the data in the server, the private data of the user may be leaked, and the data security of the user may be affected. In order to ensure the security of the user's data, the user's identity needs to be verified, but the verification method of the user's identity in the prior art is very complicated, so the verification efficiency is very low.
[ summary of the invention ]
The application provides a server access verification method, which comprises the following steps: receiving an access request sent by an intelligent terminal to a server through application software, wherein the access request is used for requesting service data from the server, and the access request contains first verification information; comparing the first authentication information with second authentication information stored in the server in advance; if the first verification information is consistent with the second verification information, allowing the intelligent terminal to access the service data, and searching the service data in the server according to the request path; and if the first verification information is inconsistent with the second verification information, returning error checking information to the intelligent terminal.
Optionally, when a user accesses the server using the application software but the user does not log in the application software, the first authentication information includes an application software identifier, an interface key value, and a numerical signature, wherein the application software identifier is used for identifying the application software, and the interface key value is used for identifying an interface when the application software accesses the server.
Optionally, when a user accesses the server using the application software and the user logs in the application software, the first authentication information includes an application software identifier, an interface key value, a numerical signature, a user identifier, and a user session identifier, wherein the application software identifier is used for identifying the application software, the interface key value is used for identifying an interface when the application software accesses the server, the user identifier is used for identifying an identity of the user at the time of login, and the user session identifier is used for identifying a user session at the time of login.
The application provides a server access verification method, which comprises the following steps: receiving an access request sent by an intelligent terminal to a server through application software, wherein the access request is used for requesting service data from the server, and the access request contains first verification information; comparing the first authentication information with a second authentication previously stored in the server; and if the first verification information is consistent with the second verification information, allowing the intelligent terminal to access the service data.
Optionally, the access request further includes a request path, and if the first verification information is consistent with the second verification information, after the intelligent terminal is allowed to access the service data, the method further includes: and searching the service data in the server according to the request path.
Optionally, when a user accesses the server using the application software but the user does not log in the application software, the first authentication information includes an application software identifier, an interface key value, and a numerical signature, wherein the application software identifier is used for identifying the application software, and the interface key value is used for identifying an interface when the application software accesses the server.
Optionally, when a user accesses the server using the application software and the user logs in the application software, the first authentication information includes an application software identifier, an interface key value, a numerical signature, a user identifier, and a user session identifier, wherein the application software identifier is used for identifying the application software, the interface key value is used for identifying an interface when the application software accesses the server, the user identifier is used for identifying an identity of the user at the time of login, and the user session identifier is used for identifying a user session at the time of login.
Optionally, the method further comprises: and if the first verification information is inconsistent with the second verification information, returning error checking information to the intelligent terminal.
The present application further provides a server access verification apparatus, the apparatus comprising: the system comprises a receiving module, a comparing module and an allowing module, wherein the receiving module is used for receiving an access request sent by an intelligent terminal to a server through application software, the access request is used for requesting service data to the server, and the access request contains first verification information; the comparison module is used for comparing the first verification information with a second verification stored in the server in advance; and the allowing module is used for allowing the intelligent terminal to access the service data when the first verification information is consistent with the second verification information.
Optionally, the apparatus further includes a searching module, where the searching module is configured to search the service data in the server according to the request path.
Optionally, when a user accesses the server using the application software but the user does not log in the application software, the first authentication information includes an application software identifier, an interface key value, and a numerical signature, wherein the application software identifier is used for identifying the application software, and the interface key value is used for identifying an interface when the application software accesses the server.
Optionally, when a user accesses the server using the application software and the user logs in the application software, the first authentication information includes an application software identifier, an interface key value, a numerical signature, a user identifier, and a user session identifier, wherein the application software identifier is used for identifying the application software, the interface key value is used for identifying an interface when the application software accesses the server, the user identifier is used for identifying an identity of the user at the time of login, and the user session identifier is used for identifying a user session at the time of login.
Optionally, the apparatus further includes a sending module, where the sending module is configured to return an error checking message to the intelligent terminal when the first verification message is inconsistent with the second verification message.
The method and the device allow the intelligent terminal to access the service data by receiving an access request sent by the intelligent terminal to the server through application software, comparing first verification information with second verification information stored in the server in advance, and allowing the intelligent terminal to access the service data if the first verification information is consistent with the second verification information. The method can greatly reduce the complexity of the verification process and improve the verification efficiency.
[ description of the drawings ]
FIG. 1 is a flow chart of a server access authentication method provided by the present invention;
fig. 2 is a schematic structural diagram of a server access authentication device provided in the present invention.
[ detailed description ] embodiments
In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular system structures, interfaces, techniques, etc. in order to provide a thorough understanding of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
Referring to fig. 1, fig. 1 is a flowchart of a server access authentication method provided by the present invention. The server access verification method provided by the embodiment comprises the following steps:
110: and receiving an access request sent by the intelligent terminal to the server through application software, wherein the access request is used for requesting service data from the server, and the access request contains first verification information.
The smart terminal may include, but is not limited to, a mobile computer, a tablet computer, a Personal Digital Assistant (PDA), a media player, a smart television, a smart watch, smart glasses, a smart bracelet, and other user devices. The application software is a client installed on the intelligent terminal, and the application software can access data in the server through the connection between the intelligent terminal and the server. Connections between the smart terminal box servers include, but are not limited to, Wi-Fi connections, cellular connections, bluetooth connections, and the like.
When the intelligent terminal needs to access the server through the application software, the intelligent terminal sends an access request to the server, wherein the access request comprises first verification information. And the server receives an access request sent to the server by the intelligent terminal through the application software. The first authentication information may be a string of pre-agreed characters not containing actual meaning, or a string of pre-agreed characters having actual meaning. When the first verification information is a pre-agreed character with practical significance, the first verification information adopts application software identification, an interface key value, a numerical signature, language coding, a system version, a software version, user identification, user session identification and the like to be combined to serve as verification information according to an actual application scene. The application software identification is used for identifying the application software, the interface key value is used for identifying an interface when the application software accesses the server, the numerical signature is used for identifying the digital information, the user identification is used for identifying the identity of a user when logging in, and the user session identification is used for identifying the user session when logging in. For example, when a user accesses a server using application software but the user is not logged into the application software, the first authentication information includes an application software identification, an interface key value, and a numerical signature. When a user accesses the server using the application software and the user logs in the application software, the first authentication information includes an application software identification, an interface key value, a numerical signature, a user identification, and a user session identification.
120: and comparing the first authentication information with second authentication information stored in the server in advance.
The second authentication information is stored in the server in advance. And after receiving the first verification information, the server compares the first verification information with second verification information stored in the server in advance. When a user uses application software to access a server but the user does not log in the application software, the server firstly verifies whether the application software identification is supported by the server, if so, the server further verifies whether the interface key value is supported by the server, and if so, the server also needs to further verify whether the digital signature is correct. If both pass, go to step 130, otherwise go to step 140. When the user uses the application software to access the server and the user logs in the application software, the user identification and the user session identification are continuously verified whether to be supported by the server, if so, the step 130 is entered, otherwise, the step 140 is entered.
130: and allowing the intelligent terminal to access the service data.
And if the first verification information is consistent with the second verification information, allowing the intelligent terminal to access the service data. When accessing the service data, the service data in the server may be accessed according to a specific path, or the service data in the server may not be accessed according to a specific path. It can be understood that if the request path is not included in the access request, when the intelligent terminal accesses the server, the service data in the server is not accessed according to a specific path. If the access request also comprises a request path, when the intelligent terminal accesses the server, the server searches the service data in the server according to the request path so as to improve the access efficiency.
140: and returning the error checking information to the intelligent terminal.
And if the first verification information and the second verification information are inconsistent, returning error checking information to the intelligent terminal.
The method and the device allow the intelligent terminal to access the service data by receiving an access request sent by the intelligent terminal to the server through application software, comparing first verification information with second verification information stored in the server in advance, and allowing the intelligent terminal to access the service data if the first verification information is consistent with the second verification information. The method can greatly reduce the complexity of the verification process and improve the verification efficiency.
Referring to fig. 2, fig. 2 is a schematic structural diagram of a server access authentication device according to the present invention. The server access authentication apparatus provided in this embodiment includes: a receiving module 210, a comparing module 220, an allowing module 230, a finding module 240, and a sending module 250.
The receiving module 210 is configured to receive an access request sent by the intelligent terminal to the server through the application software, where the access request is used to request service data from the server, and the access request includes the first authentication information.
The smart terminal may include, but is not limited to, a mobile computer, a tablet computer, a Personal Digital Assistant (PDA), a media player, a smart television, a smart watch, smart glasses, a smart bracelet, and other user devices. The application software is a client installed on the intelligent terminal, and the application software can access data in the server through the connection between the intelligent terminal and the server. Connections between the smart terminal box servers include, but are not limited to, Wi-Fi connections, cellular connections, bluetooth connections, and the like.
When the intelligent terminal needs to access the server through the application software, the intelligent terminal sends an access request to the server, wherein the access request comprises first verification information. The receiving module 210 receives an access request sent by the intelligent terminal to the server through the application software. The first authentication information may be a string of pre-agreed characters not containing actual meaning, or a string of pre-agreed characters having actual meaning. When the first verification information is a pre-agreed character with practical significance, the first verification information adopts application software identification, an interface key value, a numerical signature, language coding, a system version, a software version, user identification, user session identification and the like to be combined to serve as verification information according to an actual application scene. The application software identification is used for identifying the application software, the interface key value is used for identifying an interface when the application software accesses the server, the numerical signature is used for identifying the digital information, the user identification is used for identifying the identity of a user when logging in, and the user session identification is used for identifying the user session when logging in. For example, when a user accesses a server using application software but the user is not logged into the application software, the first authentication information includes an application software identification, an interface key value, and a numerical signature. When a user accesses the server using the application software and the user logs in the application software, the first authentication information includes an application software identification, an interface key value, a numerical signature, a user identification, and a user session identification.
The comparing module 220 is configured to compare the first authentication information with second authentication information pre-stored in the server.
The second authentication information is stored in the server in advance. When the first authentication information is received, the comparison module 220 compares the first authentication information with second authentication information stored in the server in advance. When a user uses application software to access a server but the user does not log in the application software, the server firstly verifies whether the application software identification is supported by the server, if so, the server further verifies whether the interface key value is supported by the server, and if so, the server also needs to further verify whether the digital signature is correct. If both pass, the allow module 230 is invoked, and vice versa, the send module 250 is invoked. When the user uses the application software to access the server and the user logs in the application software, the user identification and the user session identification are continuously verified whether to be supported by the server, if so, the allowing module 230 is called, otherwise, the sending module 250 is called.
The allowing module 230 is configured to allow the intelligent terminal to access the service data when the first authentication information is consistent with the second authentication information.
The allowing module 230 allows the intelligent terminal to access the service data if the first authentication information and the second authentication information are identical. When accessing the service data, the service data in the server may be accessed according to a specific path, or the service data in the server may not be accessed according to a specific path. It can be understood that if the request path is not included in the access request, when the intelligent terminal accesses the server, the service data in the server is not accessed according to a specific path. If the access request further includes a request path, when the intelligent terminal accesses the server, the searching module 240 searches the service data in the server according to the request path, so as to improve the access efficiency.
The sending module 250 is configured to return an error checking message to the intelligent terminal when the first verification message is inconsistent with the second verification message.
The method and the device allow the intelligent terminal to access the service data by receiving an access request sent by the intelligent terminal to the server through application software, comparing first verification information with second verification information stored in the server in advance, and allowing the intelligent terminal to access the service data if the first verification information is consistent with the second verification information. The method can greatly reduce the complexity of the verification process and improve the verification efficiency.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Claims (10)
1. A server access authentication method, comprising:
receiving an access request sent by an intelligent terminal to a server through application software, wherein the access request is used for requesting service data from the server, the access request comprises first verification information, and when a user uses the application software to access the server but the user does not log in the application software, the first verification information comprises an application software identifier, an interface key value and a numerical signature;
after receiving the first verification information, comparing the first verification information with second verification information pre-stored in a server, and verifying whether an application software identifier is supported by the server or not under the condition that the user uses the application software to access the server but does not log in the application software;
under the condition that the application software identification obtains server support, verifying whether the interface key value obtains server support;
under the condition that the interface key value is supported by a server, verifying whether the numerical signature is correct or not;
allowing the intelligent terminal to access service data under the condition that the numerical signature is correct; alternatively, the first and second electrodes may be,
under the condition that the application software identification is not supported by the server, returning error checking information to the intelligent terminal; alternatively, the first and second electrodes may be,
under the condition that the interface key value is not supported by the server, returning error checking information to the intelligent terminal; alternatively, the first and second electrodes may be,
and returning a check error message to the intelligent terminal when the numerical signature is incorrect.
2. The method of claim 1, wherein the first authentication information comprises an application identifier, an interface key value, a numerical signature, a user identifier, and a user session identifier, when the user accesses the server using the application software, wherein the application identifier is used to identify the application software, wherein the interface key value is used to identify an interface when the application software accesses the server, wherein the user identifier is used to identify the user when the user logs in, and wherein the user session identifier is used to identify a user session when the user logs in.
3. A server access authentication method, comprising:
receiving an access request sent by an intelligent terminal to a server through application software, wherein the access request is used for requesting service data from the server, the access request comprises first verification information, and when a user uses the application software to access the server but the user does not log in the application software, the first verification information comprises an application software identifier, an interface key value and a numerical signature;
after receiving the first verification information, comparing the first verification information with second verification information pre-stored in a server, and verifying whether an application software identifier is supported by the server or not under the condition that the user uses the application software to access the server but does not log in the application software;
under the condition that the application software identification obtains server support, verifying whether the interface key value obtains server support;
under the condition that the interface key value is supported by a server, verifying whether the numerical signature is correct or not;
and allowing the intelligent terminal to access service data under the condition that the numerical signature is correct.
4. The method of claim 3, wherein the access request further comprises a request path, and wherein after allowing the intelligent terminal to access the service data, the method further comprises:
and searching the service data in the server according to the request path.
5. The method of claim 4, wherein the first authentication information comprises an application identifier, an interface key value, a numerical signature, a user identifier, and a user session identifier, when the user accesses the server using the application software, wherein the application identifier is used to identify the application software, wherein the interface key value is used to identify an interface when the application software accesses the server, wherein the user identifier is used to identify the user when the user logs in, and wherein the user session identifier is used to identify a user session when the user logs in.
6. The method of claim 4, further comprising:
under the condition that the application software identification is not supported by the server, returning error checking information to the intelligent terminal; alternatively, the first and second electrodes may be,
under the condition that the interface key value is not supported by the server, returning error checking information to the intelligent terminal; alternatively, the first and second electrodes may be,
and returning a check error message to the intelligent terminal when the numerical signature is incorrect.
7. A server access authentication apparatus, the apparatus comprising: a receiving module, a comparing module and an allowing module,
the receiving module is used for receiving an access request sent by an intelligent terminal to a server through application software, wherein the access request is used for requesting service data from the server, and when a user accesses the server through the application software but does not log in the application software, the access request contains first verification information, and the first verification information comprises an application software identifier, an interface key value and a numerical signature;
the comparison module is used for comparing the first verification information with second verification information pre-stored in the server after receiving the first verification information, and verifying whether the application software identifier is supported by the server or not under the condition that the user uses the application software to access the server but does not log in the application software;
the comparison module is used for verifying whether the interface key value is supported by the server or not under the condition that the application software identification is supported by the server;
the comparison module is used for verifying whether the numerical signature is correct or not under the condition that the interface key value is supported by a server;
and the allowing module is used for allowing the intelligent terminal to access the service data under the condition that the numerical signature is correct.
8. The apparatus of claim 7, further comprising a searching module, wherein the searching module is configured to search the service data in the server according to the request path.
9. The apparatus of claim 7, wherein the first authentication information comprises an application identifier, an interface key value, a numerical signature, a user identifier, and a user session identifier, when the user accesses the server using the application software and the user logs in to the application software, wherein the application identifier is used for identifying the application software, the interface key value is used for identifying an interface when the application software accesses the server, the user identifier is used for identifying the user at login, and the user session identifier is used for identifying a user session at login.
10. The apparatus of claim 7, further comprising a sending module configured to:
under the condition that the application software identification is not supported by the server, returning error checking information to the intelligent terminal; alternatively, the first and second electrodes may be,
under the condition that the interface key value is not supported by the server, returning error checking information to the intelligent terminal; alternatively, the first and second electrodes may be,
and returning a check error message to the intelligent terminal when the numerical signature is incorrect.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2015/092691 WO2017066994A1 (en) | 2015-10-23 | 2015-10-23 | Method and device for verifying access to server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105993156A CN105993156A (en) | 2016-10-05 |
CN105993156B true CN105993156B (en) | 2020-01-14 |
Family
ID=57040926
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201580002092.XA Active CN105993156B (en) | 2015-10-23 | 2015-10-23 | Server access verification method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105993156B (en) |
WO (1) | WO2017066994A1 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107743114B (en) * | 2016-12-15 | 2020-03-17 | 腾讯科技(深圳)有限公司 | Network access method, device and system |
JP6941779B2 (en) * | 2017-02-28 | 2021-09-29 | パナソニックIpマネジメント株式会社 | Controls, home appliances, and programs |
CN107679372A (en) * | 2017-09-26 | 2018-02-09 | 努比亚技术有限公司 | Access control method, terminal and the storage medium of application program |
CN111082940B (en) * | 2019-11-19 | 2022-11-04 | 泰康保险集团股份有限公司 | Internet of things equipment control method and device, computing equipment and storage medium |
CN113722687A (en) * | 2021-08-30 | 2021-11-30 | 康键信息技术(深圳)有限公司 | Application software login method, device, medium and equipment |
CN116032889B (en) * | 2023-03-30 | 2023-07-21 | 新华三技术有限公司 | IP address allocation method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7111323B1 (en) * | 2001-08-31 | 2006-09-19 | Oracle International Corporation | Method and apparatus to facilitate a global timeout in a distributed computing environment |
CN103188668A (en) * | 2011-12-27 | 2013-07-03 | 方正国际软件(北京)有限公司 | Security protection method and security protection system for mobile terminal application |
CN103607374A (en) * | 2013-10-28 | 2014-02-26 | 中国航天科工集团第二研究院七〇六所 | Network-resource-access control method based on identity authentication and data-packet filtering technology |
CN104753674A (en) * | 2013-12-31 | 2015-07-01 | 中国移动通信集团公司 | Application identity authentication method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104537284B (en) * | 2014-12-19 | 2017-05-03 | 葛胜锦 | Software protecting system and method based on remote service |
-
2015
- 2015-10-23 CN CN201580002092.XA patent/CN105993156B/en active Active
- 2015-10-23 WO PCT/CN2015/092691 patent/WO2017066994A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7111323B1 (en) * | 2001-08-31 | 2006-09-19 | Oracle International Corporation | Method and apparatus to facilitate a global timeout in a distributed computing environment |
CN103188668A (en) * | 2011-12-27 | 2013-07-03 | 方正国际软件(北京)有限公司 | Security protection method and security protection system for mobile terminal application |
CN103607374A (en) * | 2013-10-28 | 2014-02-26 | 中国航天科工集团第二研究院七〇六所 | Network-resource-access control method based on identity authentication and data-packet filtering technology |
CN104753674A (en) * | 2013-12-31 | 2015-07-01 | 中国移动通信集团公司 | Application identity authentication method and device |
Also Published As
Publication number | Publication date |
---|---|
WO2017066994A1 (en) | 2017-04-27 |
CN105993156A (en) | 2016-10-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105993156B (en) | Server access verification method and device | |
KR102204733B1 (en) | Method, device, and server for account login | |
US9432358B2 (en) | System and method of authenticating user account login request messages | |
US8869254B2 (en) | User verification using voice based password | |
US20150135282A1 (en) | Methods and systems for secure internet access and services | |
CN104917716B (en) | Page security management method and device | |
CN103916244B (en) | Verification method and device | |
US10419431B2 (en) | Preventing cross-site request forgery using environment fingerprints of a client device | |
EP3700164A1 (en) | Method and apparatus for facilitating the login of an account | |
US11757939B2 (en) | Network-assisted secure data access | |
WO2013138714A1 (en) | Authentication system | |
CN103139200A (en) | Single sign-on method of web service | |
CN109861968A (en) | Resource access control method, device, computer equipment and storage medium | |
WO2015074443A1 (en) | An operation processing method and device | |
CN111818088A (en) | Authorization mode management method and device, computer equipment and readable storage medium | |
CN104601582A (en) | File transfer method, device and system | |
US9235696B1 (en) | User authentication using a portable mobile device | |
US9680814B2 (en) | Method, device, and system for registering terminal application | |
CN110445792B (en) | Verification code generation method and verification code login system | |
WO2015176500A1 (en) | Single sign-on authentication method, device and system, and computer storage medium | |
CN114339755A (en) | Registration verification method and device, electronic equipment and computer readable storage medium | |
US20230147743A1 (en) | Website Verification Service | |
CN105429954A (en) | Eyeball registration method and device | |
CN111931159B (en) | Method and system for verifying validity of webpage data interface | |
CN106327187B (en) | Information processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20190508 Address after: 518000 Yuanzheng Industrial Park, North of Fifth Avenue, Bantian Street, Longgang District, Shenzhen City, Guangdong Province Applicant after: Yuanzheng Science and Technology Co., Ltd., Shenzhen City Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.) Applicant before: HESVIT HEALTH TECH CO., LTD. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |