CN105993156B - Server access verification method and device - Google Patents

Server access verification method and device Download PDF

Info

Publication number
CN105993156B
CN105993156B CN201580002092.XA CN201580002092A CN105993156B CN 105993156 B CN105993156 B CN 105993156B CN 201580002092 A CN201580002092 A CN 201580002092A CN 105993156 B CN105993156 B CN 105993156B
Authority
CN
China
Prior art keywords
server
application software
user
identifier
intelligent terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201580002092.XA
Other languages
Chinese (zh)
Other versions
CN105993156A (en
Inventor
刘均
杨唐鹤
陈明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Publication of CN105993156A publication Critical patent/CN105993156A/en
Application granted granted Critical
Publication of CN105993156B publication Critical patent/CN105993156B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The application discloses a server access verification method and device. Wherein the method comprises the following steps: receiving an access request sent by an intelligent terminal to a server through application software, wherein the access request is used for requesting service data from the server and comprises first verification information; comparing the first authentication information with a second authentication previously stored in the server; and if the first verification information is consistent with the second verification information, allowing the intelligent terminal to access the service data. The method can greatly reduce the complexity of the verification process and improve the verification efficiency.

Description

Server access verification method and device
[ technical field ] A method for producing a semiconductor device
The present application relates to the field of internet, and in particular, to a server access verification method and apparatus.
[ background of the invention ]
With the increase of various applications in the intelligent terminal, the interaction between the intelligent terminal and the server is more and more. However, the data in the server may relate to the private data of the user, and if a hacker illegally accesses the data in the server, the private data of the user may be leaked, and the data security of the user may be affected. In order to ensure the security of the user's data, the user's identity needs to be verified, but the verification method of the user's identity in the prior art is very complicated, so the verification efficiency is very low.
[ summary of the invention ]
The application provides a server access verification method, which comprises the following steps: receiving an access request sent by an intelligent terminal to a server through application software, wherein the access request is used for requesting service data from the server, and the access request contains first verification information; comparing the first authentication information with second authentication information stored in the server in advance; if the first verification information is consistent with the second verification information, allowing the intelligent terminal to access the service data, and searching the service data in the server according to the request path; and if the first verification information is inconsistent with the second verification information, returning error checking information to the intelligent terminal.
Optionally, when a user accesses the server using the application software but the user does not log in the application software, the first authentication information includes an application software identifier, an interface key value, and a numerical signature, wherein the application software identifier is used for identifying the application software, and the interface key value is used for identifying an interface when the application software accesses the server.
Optionally, when a user accesses the server using the application software and the user logs in the application software, the first authentication information includes an application software identifier, an interface key value, a numerical signature, a user identifier, and a user session identifier, wherein the application software identifier is used for identifying the application software, the interface key value is used for identifying an interface when the application software accesses the server, the user identifier is used for identifying an identity of the user at the time of login, and the user session identifier is used for identifying a user session at the time of login.
The application provides a server access verification method, which comprises the following steps: receiving an access request sent by an intelligent terminal to a server through application software, wherein the access request is used for requesting service data from the server, and the access request contains first verification information; comparing the first authentication information with a second authentication previously stored in the server; and if the first verification information is consistent with the second verification information, allowing the intelligent terminal to access the service data.
Optionally, the access request further includes a request path, and if the first verification information is consistent with the second verification information, after the intelligent terminal is allowed to access the service data, the method further includes: and searching the service data in the server according to the request path.
Optionally, when a user accesses the server using the application software but the user does not log in the application software, the first authentication information includes an application software identifier, an interface key value, and a numerical signature, wherein the application software identifier is used for identifying the application software, and the interface key value is used for identifying an interface when the application software accesses the server.
Optionally, when a user accesses the server using the application software and the user logs in the application software, the first authentication information includes an application software identifier, an interface key value, a numerical signature, a user identifier, and a user session identifier, wherein the application software identifier is used for identifying the application software, the interface key value is used for identifying an interface when the application software accesses the server, the user identifier is used for identifying an identity of the user at the time of login, and the user session identifier is used for identifying a user session at the time of login.
Optionally, the method further comprises: and if the first verification information is inconsistent with the second verification information, returning error checking information to the intelligent terminal.
The present application further provides a server access verification apparatus, the apparatus comprising: the system comprises a receiving module, a comparing module and an allowing module, wherein the receiving module is used for receiving an access request sent by an intelligent terminal to a server through application software, the access request is used for requesting service data to the server, and the access request contains first verification information; the comparison module is used for comparing the first verification information with a second verification stored in the server in advance; and the allowing module is used for allowing the intelligent terminal to access the service data when the first verification information is consistent with the second verification information.
Optionally, the apparatus further includes a searching module, where the searching module is configured to search the service data in the server according to the request path.
Optionally, when a user accesses the server using the application software but the user does not log in the application software, the first authentication information includes an application software identifier, an interface key value, and a numerical signature, wherein the application software identifier is used for identifying the application software, and the interface key value is used for identifying an interface when the application software accesses the server.
Optionally, when a user accesses the server using the application software and the user logs in the application software, the first authentication information includes an application software identifier, an interface key value, a numerical signature, a user identifier, and a user session identifier, wherein the application software identifier is used for identifying the application software, the interface key value is used for identifying an interface when the application software accesses the server, the user identifier is used for identifying an identity of the user at the time of login, and the user session identifier is used for identifying a user session at the time of login.
Optionally, the apparatus further includes a sending module, where the sending module is configured to return an error checking message to the intelligent terminal when the first verification message is inconsistent with the second verification message.
The method and the device allow the intelligent terminal to access the service data by receiving an access request sent by the intelligent terminal to the server through application software, comparing first verification information with second verification information stored in the server in advance, and allowing the intelligent terminal to access the service data if the first verification information is consistent with the second verification information. The method can greatly reduce the complexity of the verification process and improve the verification efficiency.
[ description of the drawings ]
FIG. 1 is a flow chart of a server access authentication method provided by the present invention;
fig. 2 is a schematic structural diagram of a server access authentication device provided in the present invention.
[ detailed description ] embodiments
In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular system structures, interfaces, techniques, etc. in order to provide a thorough understanding of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
Referring to fig. 1, fig. 1 is a flowchart of a server access authentication method provided by the present invention. The server access verification method provided by the embodiment comprises the following steps:
110: and receiving an access request sent by the intelligent terminal to the server through application software, wherein the access request is used for requesting service data from the server, and the access request contains first verification information.
The smart terminal may include, but is not limited to, a mobile computer, a tablet computer, a Personal Digital Assistant (PDA), a media player, a smart television, a smart watch, smart glasses, a smart bracelet, and other user devices. The application software is a client installed on the intelligent terminal, and the application software can access data in the server through the connection between the intelligent terminal and the server. Connections between the smart terminal box servers include, but are not limited to, Wi-Fi connections, cellular connections, bluetooth connections, and the like.
When the intelligent terminal needs to access the server through the application software, the intelligent terminal sends an access request to the server, wherein the access request comprises first verification information. And the server receives an access request sent to the server by the intelligent terminal through the application software. The first authentication information may be a string of pre-agreed characters not containing actual meaning, or a string of pre-agreed characters having actual meaning. When the first verification information is a pre-agreed character with practical significance, the first verification information adopts application software identification, an interface key value, a numerical signature, language coding, a system version, a software version, user identification, user session identification and the like to be combined to serve as verification information according to an actual application scene. The application software identification is used for identifying the application software, the interface key value is used for identifying an interface when the application software accesses the server, the numerical signature is used for identifying the digital information, the user identification is used for identifying the identity of a user when logging in, and the user session identification is used for identifying the user session when logging in. For example, when a user accesses a server using application software but the user is not logged into the application software, the first authentication information includes an application software identification, an interface key value, and a numerical signature. When a user accesses the server using the application software and the user logs in the application software, the first authentication information includes an application software identification, an interface key value, a numerical signature, a user identification, and a user session identification.
120: and comparing the first authentication information with second authentication information stored in the server in advance.
The second authentication information is stored in the server in advance. And after receiving the first verification information, the server compares the first verification information with second verification information stored in the server in advance. When a user uses application software to access a server but the user does not log in the application software, the server firstly verifies whether the application software identification is supported by the server, if so, the server further verifies whether the interface key value is supported by the server, and if so, the server also needs to further verify whether the digital signature is correct. If both pass, go to step 130, otherwise go to step 140. When the user uses the application software to access the server and the user logs in the application software, the user identification and the user session identification are continuously verified whether to be supported by the server, if so, the step 130 is entered, otherwise, the step 140 is entered.
130: and allowing the intelligent terminal to access the service data.
And if the first verification information is consistent with the second verification information, allowing the intelligent terminal to access the service data. When accessing the service data, the service data in the server may be accessed according to a specific path, or the service data in the server may not be accessed according to a specific path. It can be understood that if the request path is not included in the access request, when the intelligent terminal accesses the server, the service data in the server is not accessed according to a specific path. If the access request also comprises a request path, when the intelligent terminal accesses the server, the server searches the service data in the server according to the request path so as to improve the access efficiency.
140: and returning the error checking information to the intelligent terminal.
And if the first verification information and the second verification information are inconsistent, returning error checking information to the intelligent terminal.
The method and the device allow the intelligent terminal to access the service data by receiving an access request sent by the intelligent terminal to the server through application software, comparing first verification information with second verification information stored in the server in advance, and allowing the intelligent terminal to access the service data if the first verification information is consistent with the second verification information. The method can greatly reduce the complexity of the verification process and improve the verification efficiency.
Referring to fig. 2, fig. 2 is a schematic structural diagram of a server access authentication device according to the present invention. The server access authentication apparatus provided in this embodiment includes: a receiving module 210, a comparing module 220, an allowing module 230, a finding module 240, and a sending module 250.
The receiving module 210 is configured to receive an access request sent by the intelligent terminal to the server through the application software, where the access request is used to request service data from the server, and the access request includes the first authentication information.
The smart terminal may include, but is not limited to, a mobile computer, a tablet computer, a Personal Digital Assistant (PDA), a media player, a smart television, a smart watch, smart glasses, a smart bracelet, and other user devices. The application software is a client installed on the intelligent terminal, and the application software can access data in the server through the connection between the intelligent terminal and the server. Connections between the smart terminal box servers include, but are not limited to, Wi-Fi connections, cellular connections, bluetooth connections, and the like.
When the intelligent terminal needs to access the server through the application software, the intelligent terminal sends an access request to the server, wherein the access request comprises first verification information. The receiving module 210 receives an access request sent by the intelligent terminal to the server through the application software. The first authentication information may be a string of pre-agreed characters not containing actual meaning, or a string of pre-agreed characters having actual meaning. When the first verification information is a pre-agreed character with practical significance, the first verification information adopts application software identification, an interface key value, a numerical signature, language coding, a system version, a software version, user identification, user session identification and the like to be combined to serve as verification information according to an actual application scene. The application software identification is used for identifying the application software, the interface key value is used for identifying an interface when the application software accesses the server, the numerical signature is used for identifying the digital information, the user identification is used for identifying the identity of a user when logging in, and the user session identification is used for identifying the user session when logging in. For example, when a user accesses a server using application software but the user is not logged into the application software, the first authentication information includes an application software identification, an interface key value, and a numerical signature. When a user accesses the server using the application software and the user logs in the application software, the first authentication information includes an application software identification, an interface key value, a numerical signature, a user identification, and a user session identification.
The comparing module 220 is configured to compare the first authentication information with second authentication information pre-stored in the server.
The second authentication information is stored in the server in advance. When the first authentication information is received, the comparison module 220 compares the first authentication information with second authentication information stored in the server in advance. When a user uses application software to access a server but the user does not log in the application software, the server firstly verifies whether the application software identification is supported by the server, if so, the server further verifies whether the interface key value is supported by the server, and if so, the server also needs to further verify whether the digital signature is correct. If both pass, the allow module 230 is invoked, and vice versa, the send module 250 is invoked. When the user uses the application software to access the server and the user logs in the application software, the user identification and the user session identification are continuously verified whether to be supported by the server, if so, the allowing module 230 is called, otherwise, the sending module 250 is called.
The allowing module 230 is configured to allow the intelligent terminal to access the service data when the first authentication information is consistent with the second authentication information.
The allowing module 230 allows the intelligent terminal to access the service data if the first authentication information and the second authentication information are identical. When accessing the service data, the service data in the server may be accessed according to a specific path, or the service data in the server may not be accessed according to a specific path. It can be understood that if the request path is not included in the access request, when the intelligent terminal accesses the server, the service data in the server is not accessed according to a specific path. If the access request further includes a request path, when the intelligent terminal accesses the server, the searching module 240 searches the service data in the server according to the request path, so as to improve the access efficiency.
The sending module 250 is configured to return an error checking message to the intelligent terminal when the first verification message is inconsistent with the second verification message.
The method and the device allow the intelligent terminal to access the service data by receiving an access request sent by the intelligent terminal to the server through application software, comparing first verification information with second verification information stored in the server in advance, and allowing the intelligent terminal to access the service data if the first verification information is consistent with the second verification information. The method can greatly reduce the complexity of the verification process and improve the verification efficiency.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.

Claims (10)

1. A server access authentication method, comprising:
receiving an access request sent by an intelligent terminal to a server through application software, wherein the access request is used for requesting service data from the server, the access request comprises first verification information, and when a user uses the application software to access the server but the user does not log in the application software, the first verification information comprises an application software identifier, an interface key value and a numerical signature;
after receiving the first verification information, comparing the first verification information with second verification information pre-stored in a server, and verifying whether an application software identifier is supported by the server or not under the condition that the user uses the application software to access the server but does not log in the application software;
under the condition that the application software identification obtains server support, verifying whether the interface key value obtains server support;
under the condition that the interface key value is supported by a server, verifying whether the numerical signature is correct or not;
allowing the intelligent terminal to access service data under the condition that the numerical signature is correct; alternatively, the first and second electrodes may be,
under the condition that the application software identification is not supported by the server, returning error checking information to the intelligent terminal; alternatively, the first and second electrodes may be,
under the condition that the interface key value is not supported by the server, returning error checking information to the intelligent terminal; alternatively, the first and second electrodes may be,
and returning a check error message to the intelligent terminal when the numerical signature is incorrect.
2. The method of claim 1, wherein the first authentication information comprises an application identifier, an interface key value, a numerical signature, a user identifier, and a user session identifier, when the user accesses the server using the application software, wherein the application identifier is used to identify the application software, wherein the interface key value is used to identify an interface when the application software accesses the server, wherein the user identifier is used to identify the user when the user logs in, and wherein the user session identifier is used to identify a user session when the user logs in.
3. A server access authentication method, comprising:
receiving an access request sent by an intelligent terminal to a server through application software, wherein the access request is used for requesting service data from the server, the access request comprises first verification information, and when a user uses the application software to access the server but the user does not log in the application software, the first verification information comprises an application software identifier, an interface key value and a numerical signature;
after receiving the first verification information, comparing the first verification information with second verification information pre-stored in a server, and verifying whether an application software identifier is supported by the server or not under the condition that the user uses the application software to access the server but does not log in the application software;
under the condition that the application software identification obtains server support, verifying whether the interface key value obtains server support;
under the condition that the interface key value is supported by a server, verifying whether the numerical signature is correct or not;
and allowing the intelligent terminal to access service data under the condition that the numerical signature is correct.
4. The method of claim 3, wherein the access request further comprises a request path, and wherein after allowing the intelligent terminal to access the service data, the method further comprises:
and searching the service data in the server according to the request path.
5. The method of claim 4, wherein the first authentication information comprises an application identifier, an interface key value, a numerical signature, a user identifier, and a user session identifier, when the user accesses the server using the application software, wherein the application identifier is used to identify the application software, wherein the interface key value is used to identify an interface when the application software accesses the server, wherein the user identifier is used to identify the user when the user logs in, and wherein the user session identifier is used to identify a user session when the user logs in.
6. The method of claim 4, further comprising:
under the condition that the application software identification is not supported by the server, returning error checking information to the intelligent terminal; alternatively, the first and second electrodes may be,
under the condition that the interface key value is not supported by the server, returning error checking information to the intelligent terminal; alternatively, the first and second electrodes may be,
and returning a check error message to the intelligent terminal when the numerical signature is incorrect.
7. A server access authentication apparatus, the apparatus comprising: a receiving module, a comparing module and an allowing module,
the receiving module is used for receiving an access request sent by an intelligent terminal to a server through application software, wherein the access request is used for requesting service data from the server, and when a user accesses the server through the application software but does not log in the application software, the access request contains first verification information, and the first verification information comprises an application software identifier, an interface key value and a numerical signature;
the comparison module is used for comparing the first verification information with second verification information pre-stored in the server after receiving the first verification information, and verifying whether the application software identifier is supported by the server or not under the condition that the user uses the application software to access the server but does not log in the application software;
the comparison module is used for verifying whether the interface key value is supported by the server or not under the condition that the application software identification is supported by the server;
the comparison module is used for verifying whether the numerical signature is correct or not under the condition that the interface key value is supported by a server;
and the allowing module is used for allowing the intelligent terminal to access the service data under the condition that the numerical signature is correct.
8. The apparatus of claim 7, further comprising a searching module, wherein the searching module is configured to search the service data in the server according to the request path.
9. The apparatus of claim 7, wherein the first authentication information comprises an application identifier, an interface key value, a numerical signature, a user identifier, and a user session identifier, when the user accesses the server using the application software and the user logs in to the application software, wherein the application identifier is used for identifying the application software, the interface key value is used for identifying an interface when the application software accesses the server, the user identifier is used for identifying the user at login, and the user session identifier is used for identifying a user session at login.
10. The apparatus of claim 7, further comprising a sending module configured to:
under the condition that the application software identification is not supported by the server, returning error checking information to the intelligent terminal; alternatively, the first and second electrodes may be,
under the condition that the interface key value is not supported by the server, returning error checking information to the intelligent terminal; alternatively, the first and second electrodes may be,
and returning a check error message to the intelligent terminal when the numerical signature is incorrect.
CN201580002092.XA 2015-10-23 2015-10-23 Server access verification method and device Active CN105993156B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/092691 WO2017066994A1 (en) 2015-10-23 2015-10-23 Method and device for verifying access to server

Publications (2)

Publication Number Publication Date
CN105993156A CN105993156A (en) 2016-10-05
CN105993156B true CN105993156B (en) 2020-01-14

Family

ID=57040926

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201580002092.XA Active CN105993156B (en) 2015-10-23 2015-10-23 Server access verification method and device

Country Status (2)

Country Link
CN (1) CN105993156B (en)
WO (1) WO2017066994A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107743114B (en) * 2016-12-15 2020-03-17 腾讯科技(深圳)有限公司 Network access method, device and system
JP6941779B2 (en) * 2017-02-28 2021-09-29 パナソニックIpマネジメント株式会社 Controls, home appliances, and programs
CN107679372A (en) * 2017-09-26 2018-02-09 努比亚技术有限公司 Access control method, terminal and the storage medium of application program
CN111082940B (en) * 2019-11-19 2022-11-04 泰康保险集团股份有限公司 Internet of things equipment control method and device, computing equipment and storage medium
CN113722687A (en) * 2021-08-30 2021-11-30 康键信息技术(深圳)有限公司 Application software login method, device, medium and equipment
CN116032889B (en) * 2023-03-30 2023-07-21 新华三技术有限公司 IP address allocation method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7111323B1 (en) * 2001-08-31 2006-09-19 Oracle International Corporation Method and apparatus to facilitate a global timeout in a distributed computing environment
CN103188668A (en) * 2011-12-27 2013-07-03 方正国际软件(北京)有限公司 Security protection method and security protection system for mobile terminal application
CN103607374A (en) * 2013-10-28 2014-02-26 中国航天科工集团第二研究院七〇六所 Network-resource-access control method based on identity authentication and data-packet filtering technology
CN104753674A (en) * 2013-12-31 2015-07-01 中国移动通信集团公司 Application identity authentication method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104537284B (en) * 2014-12-19 2017-05-03 葛胜锦 Software protecting system and method based on remote service

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7111323B1 (en) * 2001-08-31 2006-09-19 Oracle International Corporation Method and apparatus to facilitate a global timeout in a distributed computing environment
CN103188668A (en) * 2011-12-27 2013-07-03 方正国际软件(北京)有限公司 Security protection method and security protection system for mobile terminal application
CN103607374A (en) * 2013-10-28 2014-02-26 中国航天科工集团第二研究院七〇六所 Network-resource-access control method based on identity authentication and data-packet filtering technology
CN104753674A (en) * 2013-12-31 2015-07-01 中国移动通信集团公司 Application identity authentication method and device

Also Published As

Publication number Publication date
WO2017066994A1 (en) 2017-04-27
CN105993156A (en) 2016-10-05

Similar Documents

Publication Publication Date Title
CN105993156B (en) Server access verification method and device
KR102204733B1 (en) Method, device, and server for account login
US9432358B2 (en) System and method of authenticating user account login request messages
US8869254B2 (en) User verification using voice based password
US20150135282A1 (en) Methods and systems for secure internet access and services
CN104917716B (en) Page security management method and device
CN103916244B (en) Verification method and device
US10419431B2 (en) Preventing cross-site request forgery using environment fingerprints of a client device
EP3700164A1 (en) Method and apparatus for facilitating the login of an account
US11757939B2 (en) Network-assisted secure data access
WO2013138714A1 (en) Authentication system
CN103139200A (en) Single sign-on method of web service
CN109861968A (en) Resource access control method, device, computer equipment and storage medium
WO2015074443A1 (en) An operation processing method and device
CN111818088A (en) Authorization mode management method and device, computer equipment and readable storage medium
CN104601582A (en) File transfer method, device and system
US9235696B1 (en) User authentication using a portable mobile device
US9680814B2 (en) Method, device, and system for registering terminal application
CN110445792B (en) Verification code generation method and verification code login system
WO2015176500A1 (en) Single sign-on authentication method, device and system, and computer storage medium
CN114339755A (en) Registration verification method and device, electronic equipment and computer readable storage medium
US20230147743A1 (en) Website Verification Service
CN105429954A (en) Eyeball registration method and device
CN111931159B (en) Method and system for verifying validity of webpage data interface
CN106327187B (en) Information processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20190508

Address after: 518000 Yuanzheng Industrial Park, North of Fifth Avenue, Bantian Street, Longgang District, Shenzhen City, Guangdong Province

Applicant after: Yuanzheng Science and Technology Co., Ltd., Shenzhen City

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant before: HESVIT HEALTH TECH CO., LTD.

GR01 Patent grant
GR01 Patent grant