CN106603472A - Method, server and system for user authentication - Google Patents

Method, server and system for user authentication Download PDF

Info

Publication number
CN106603472A
CN106603472A CN201510674599.1A CN201510674599A CN106603472A CN 106603472 A CN106603472 A CN 106603472A CN 201510674599 A CN201510674599 A CN 201510674599A CN 106603472 A CN106603472 A CN 106603472A
Authority
CN
China
Prior art keywords
user terminal
authentication
information
receiving
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510674599.1A
Other languages
Chinese (zh)
Inventor
孔勇平
钟致民
杨广龙
张玉良
郑健
周丽莎
李胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201510674599.1A priority Critical patent/CN106603472A/en
Publication of CN106603472A publication Critical patent/CN106603472A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Abstract

The invention discloses a method, authentication server and system for user authentication. The method includes performing the security authentication by means of the login request after the the login request sent by a user terminal is received; after the security authentication is successful, transmitting the location request information to the user terminal so that the user terminal can provide the current location information; determining whether the user terminal is currently in the secure area based on the location information provided by the user terminal after the location information provided by the user terminal is received; and if the user terminal is determined to be in the secure area, determining that the login authentication is successful. The method, authentication server and system carry out the authentication and verification of the login information through the account number, passwords, terminal IMSI, and location information, thereby enriching the client login information, effectively solving the security issues of the mobile client login authentication, and greatly improving the security of mobile client applications.

Description

For realizing method, server and the system of user authentication
Technical field
It is the present invention relates to mobile information technical field more particularly to a kind of for realizing user authentication Method, server and system.
Background technology
It is to ensure the important barrier that enterprise mobile application scale is promoted using safety.At present, enterprise moves The user authentication mode of dynamic application software, relies primarily on the username and password of user input, but Username and password is easily stolen and spoofed, therefore this method can not meet industry customer couple The requirement of enterprise mobile application software security.
Therefore, it is necessary to propose a kind of higher user authen method of safety to solve above-mentioned technology Problem.
The content of the invention
The disclosure technical problem to be solved is that the user for how proposing that a kind of safety is higher recognizes Card method is solving above-mentioned technical problem.
The disclosure provides a kind of method for realizing user authentication, including:Receiving user's end After the logging request that end sends, using logging request safety certification is carried out;In safety certification success Afterwards, position request information is sent to user terminal, so that user terminal provides current position letter Breath;After the positional information for receiving user terminal offer, according to the position letter that user terminal is provided Whether breath judges user terminal currently in safety zone;If judging, user terminal is currently at safety Region, it is determined that login authentication success.
Further, if judging, user terminal is not currently in safety zone, recognizes according to predetermined Card rule carries out safety certification process.
Further, after the logging request for receiving user terminal transmission, entered using logging request The step of row safety certification, includes:After the logging request for receiving user terminal transmission, using stepping on The login authentication information that record request includes is authenticated;If login authentication authentification of message success, Identification request information is sent to user terminal, so that user terminal provides the identification information of itself; After the identification information of user terminal offer is provided, judge whether the identification information for receiving is legal; If the identification information for receiving is legal, safety certification success is judged.
Further, the identification information of user terminal itself is the IMSI information of user terminal.
The present invention also provides a kind of certificate server for realizing user authentication, including receives single Unit, authentication ' unit, transmitting element and recognition unit, wherein:Receiving unit, for receive user The logging request that terminal sends;Authentication ' unit, for asking in the login for receiving user terminal transmission After asking, using logging request safety certification is carried out;Transmitting element, for recognizing according to authentication ' unit Card result, if safety certification success, sends position request information, so as to user to user terminal Terminal provides current positional information;Recognition unit, for receiving user terminal in receiving unit After the positional information of offer, judge that user terminal is currently according to the positional information that user terminal is provided It is no in safety zone;If judging, user terminal is currently at safety zone, it is determined that login authentication Success.
Further, the certificate server also includes security protection unit, wherein:Safeguard protection list Unit, for according to the judged result of recognition unit, if user terminal is not currently in safety zone, Then carry out safety certification process according to predetermined certification rule.
Further, authentication ' unit includes the first authentication module and the second authentication module, wherein:The One authentication module, for after the logging request that receiving unit receives user terminal transmission, utilizing The login authentication information that logging request includes is authenticated;If login authentication authentification of message success, Then indicate that transmitting element sends identification request information to user terminal, so that user terminal provides itself Identification information;Second authentication module, for receiving the mark of user terminal offer in receiving unit After knowledge information, judge whether the identification information for receiving is legal;If the identification information for receiving is closed Method, then judge safety certification success.
Further, the identification information of user terminal itself is the IMSI information of user terminal.
The present invention also provides a kind of system for realizing user authentication, including user terminal and as above Described certificate server, wherein:User terminal, asks for sending to log in certificate server Ask, after the position request information for receiving certificate server transmission, provide to certificate server and work as Front positional information, so that certificate server judges to determine whether login authentication is successful.
Further, user terminal is additionally operable to receiving the identification request letter of certificate server transmission After breath, the identification information of itself is supplied to into certificate server.
Method, certificate server and system provided by the present invention for realizing user authentication, base User authentication is carried out in IMSI information and location information, by with account, password and terminal IMSI and positional information are authenticated verification to log-on message, can effectively solving cell-phone customer terminal step on The safety problem of record certification, enriches client log-on message, and substantially increasing cell-phone customer terminal should Safety.
Description of the drawings
Fig. 1 illustrates the flow chart for realizing the method for user authentication of one embodiment of the invention.
Fig. 2 illustrates the flow process for realizing the method for user authentication of another embodiment of the present invention Figure.
Fig. 3 illustrates the flow chart of the certificate server of another embodiment of the present invention.
Fig. 4 illustrates the system for realizing user authentication of one embodiment of the invention.
Fig. 5 illustrates the structured flowchart of the certificate server of an alternative embodiment of the invention.
Specific embodiment
The present invention is described more fully with reference to the accompanying drawings, wherein illustrating the example of the present invention Property embodiment.
Fig. 1 illustrates the flow process for realizing the method for user authentication of one embodiment of the invention Figure.As shown in figure 1, the method mainly includes:
Step 100, certificate server is utilized after the logging request for receiving user terminal transmission Logging request carries out safety certification.
In one embodiment, after the logging request for receiving user terminal transmission, using login The login authentication information that request includes is authenticated;If login authentication authentification of message success, to User terminal sends identification request information, so that user terminal provides the identification information of itself;Connecing After the identification information of user terminal offer is provided, judge whether the identification information for receiving is legal;If The identification information for receiving is legal, then judge safety certification success.
It should be noted that the method for the checking to user account password, can adopt general account Number cipher verification technique, this method is not restricted to its authentication techniques.
In one embodiment, the identification information of user terminal itself is believed for the IMSI of user terminal Breath.
In one embodiment, terminal IMSI information, the API that can be carried using terminal are obtained Interface is read out, and to IMSI information carries out verification checking again afterwards.
Step 102, after safety certification success, to user terminal position request information is sent, with Just user terminal provides current positional information.
In one embodiment, mobile phone position information is obtained, can be obtained by third party's locating platform Take positional information;The positioning signal source that third party's locating platform is reported according to mobile phone, selects suitable Positioning result is returned cell-phone customer terminal by localization method.Specifically, can by GPS, The location technologies such as GpsOne, base station, WiFi obtain terminal positional information.
Step 104, after the positional information for receiving user terminal offer, carries according to user terminal For positional information judge user terminal currently whether in safety zone.
Step 106, if judging, user terminal is currently at safety zone, it is determined that login authentication into Work(.Relative to prior art, verified by safety zone, it is not necessary to increase the complex operation of user Property, for example do not need the identifying code that user sends checking note, input sms center is returned, certification Process is simple and convenient, and verification process is realized based on server with the alignment system of terminal, certification Efficiency high, can effectively shorten the time of user authentication, improve Consumer's Experience.
In one embodiment, the position of certificate server detection mobile terminal be whether safety zone or Deathtrap, calls corresponding attack protection mode to protect the information of user according to authentication result Shield.
In one embodiment, if judging, user terminal is not currently in safety zone, according to pre- Fixed certification rule carries out safety certification process.
Specifically, certificate server emphasis is verified to positional information, judges that certified terminal is It is no to log in legal scope.According to the rule that authentication center is previously set, for example when user not Carrying out debarkation authentication in legal region can directly return refusal logon information, or can allow user Other safety certifications are further done, such as by note, phone authentication, or reminds user that replacement is close Code etc..
Method for realizing user authentication provided in an embodiment of the present invention, it is proposed that one kind is based on The user authen method of IMSI information and location information, by with account, password and terminal IMSI and positional information are authenticated verification to log-on message, can effectively solving cell-phone customer terminal step on The safety problem of record certification, compared with prior art in the premise for not increasing user operation complexity Under, client log-on message is enriched, the safety for efficiently solving cell-phone customer terminal login authentication is asked Topic, substantially increases the safety of cell-phone customer terminal application.
Fig. 2 illustrates the flow process for realizing the method for user authentication of another embodiment of the present invention Figure.As shown in Fig. 2 the method mainly includes:
Step 200, Mobile solution starts user authentication.
Specifically, cell-phone customer terminal obtains user account and encrypted message, and initiates logging request, Backstage authentication center carries out safety certification to account and password login information first.
Step 201, user input account, password.
User needs to start the higher application softwaries of safety, such as money transfer transactions such as bank, Yong Huzhuan Firstly the need of cell-phone customer terminal is logged in during account, need to be input into username and password etc. into after client Log-on message, clicks on and logs in.
Step 202, is authenticated to the account and password of user.
User is clicked on after logging in, and by account, authentication center is authenticated, if certification success, performs Step 203, if certification is unsuccessful, continues executing with step 201, point out user input account and Password.
Step 203, using acquisition mobile terminal IMSI information.
Specifically, account authentication center initiates the request of reading terminals IMSI information.Obtain terminal After IMSI information, whether backstage authentication center judges certification cell-phone number in Verification System.
Step 204, judges whether the IMSI of mobile terminal is legal, if the IMSI information of user Legal, then execution step 205, obtain the positional information of mobile terminal, if the IMSI letters of user Breath is illegal, then point out user input illegal, and account and password are re-entered in prompting.
Specifically, after terminal receives reading IMSI information asks, directly read with terminal applies Terminal IMSI information, and IMSI information is sent to into authentication center carries out verification certification.Certification By rear just initiating terminal location information request again.
Step 205, obtains the positional information of mobile terminal.
Specifically, can be obtained eventually by location technologies such as GPS, GpsOne, base station, WiFi End position information.When mobile phone can receive gps signal, then call the machine GPS or GpsOne positioning functions obtain the current geographical location information of cell-phone customer terminal.
When mobile phone cannot receive gps signal, then put down by calling third-party stationkeeping ability Platform, using base station or WiFi signal positioning is realized, obtains the current position letter of cell-phone customer terminal Breath.
Step 206, judges whether the position of user is safe, if the position of user is located at authentication service Safety zone determined by device, then execution step 207, if the position of user is located at deathtrap, Then execution step 208.
Specifically, whether the position of backstage authentication center detection mobile terminal is safely or dangerous Ground, calls corresponding attack protection mode to protect the information of user according to authentication result.
Backstage authentication center sets up customer position information base library and certification rule, for example, works as user The region of certification is initiated not in legal range, by according to the certification rule refusal user being previously set Logging in or require user to do after further safety certification just can log in.
In one embodiment, can specify that safety zone is the radius with certain longitude and latitude as circle For the circle of x rice.For example, the longitude and latitude with the job site of user or the position of family, will as the center of circle Radius of safety is set as 500 to 1000 meters, after it is determined that the IMSI of user is legal, according to end Whether whether the location information that end uploads judges user in safety zone, judge user in safety zone Mode can be:Calculate user current location to the safety zone center of circle distance, for example with D=sqrt ((xi-x0)2+(yi-y0)2) current location is calculated to the safety zone center of circle apart from d, calculate After d, with the radius of circle determined by current safety zone ratio is done to the center of circle in current location Compared with if current location is respectively less than equal to known radius R to the center of circle apart from d, user is located at place of safety In domain, if current location is all higher than known radius R to the center of circle apart from d, then it is assumed that user is located at Outside safety zone.
In another embodiment, judge whether present terminal position can be using ground in safety zone The general-purpose algorithm in figure field, for example, can call some API of figure development field, judge user Whether safety zone is located at.
In another embodiment, security authentication center can in real time obtain the user in some cycles Position, form safety zone data base through statistics, will user in such as 2 weeks nearest one section of cycle The position at place as safety zone data base, by the peace in current location and safety zone data base Total according to being contrasted, such as user is located in safety zone, then allow user to access, if user Not in safety zone, then notify that user carries out safety verification.
In one embodiment, terminal use can for example set certain with self-defining safety zone Longitude and latitude is safety zone for the region in the center of circle, or certain city is set as into safety zone.
Step 207, debarkation authentication success.Other steps of the present embodiment are no longer performed afterwards.
Step 208, starts safeguard protection.
Specifically, backstage authentication center all matches into account number cipher, IMSI, positional information Then certification passes through work(, matches unsuccessful then login failure.
The embodiment of the present invention propose based on IMSI information and the user authen method of location information, Propose increases the high safety use of mobile phone IMSI and location information combination on the basis of account, password Family authentication method, authentication center first determines whether whether account, cipher authentication are successful, then detect Whether whether IMSI is legal, finally called in safety zone according to the position of mobile terminal corresponding Attack protection mode user profile is protected, realize safer, easy user authentication.
Fig. 3 illustrates the flow chart of the certificate server of another embodiment of the present invention.Such as Fig. 3 institutes Show, the certificate server 300 mainly includes:Including receiving unit 301, authentication ' unit 302, Transmitting element 303 and recognition unit 304, wherein:Receiving unit 301, for receive user end The logging request that end sends;Authentication ' unit 302, is connected with receiving unit 301, for connecing After receiving the logging request of user terminal transmission, using logging request safety certification is carried out;Send single Unit 303, is connected, for being entered according to the authentication result of authentication ' unit 302 with authentication ' unit 302 Row safety certification, if safety certification success, to user terminal position request information is sent, so as to User terminal provides current positional information;Recognition unit 304, is connected with receiving unit 301 Connect, for after the positional information that receiving unit 301 receives user terminal offer, according to user Whether the positional information that terminal is provided judges user terminal currently in safety zone;If judging user Terminal is currently at safety zone, it is determined that login authentication success.
In one embodiment, the certificate server 300 also includes security protection unit 305, its In:Security protection unit 305, recognizes for carrying out safety according to the judged result of recognition unit 304 Card, wherein, if user terminal is not currently in safety zone, enter according to predetermined certification rule The process of row safety certification.
In one embodiment, authentication ' unit 302 is recognized including the first authentication module 3021 and second Card module 3022, wherein:First authentication module 3021, for receiving in receiving unit 301 After the logging request that user terminal sends, the login authentication information included using logging request is carried out Certification;If login authentication authentification of message success, it indicates that transmitting element 303 to user terminal sends Identification request information, so that user terminal provides the identification information of itself;Second authentication module 3022, for after the identification information that receiving unit 301 receives user terminal offer, judging to connect Whether the identification information for receiving is legal;If the identification information for receiving is legal, safety certification is judged Success.
In one embodiment, the identification information of user terminal itself is believed for the IMSI of user terminal Breath.
Fig. 4 illustrates the system for realizing user authentication of one embodiment of the invention, such as Fig. 4 institutes Show, the system 400 includes user terminal 401 and certificate server 402, and the certificate server can To be the above-mentioned server for safety certification, here is omitted, and user terminal 401 is used for Logging request is sent to certificate server 402, in the position for receiving the transmission of certificate server 402 After solicited message, current positional information is provided to certificate server 402, so as to certificate server 402 judge to determine whether login authentication is successful.
In one embodiment, user terminal 401 is additionally operable to receiving certificate server 402 After the identification request information sent, the identification information of itself is supplied to into certificate server 402.
Fig. 5 illustrates the structured flowchart of the certificate server of an alternative embodiment of the invention, such as Fig. 5 Shown, the certificate server 500 can be host server, the individual calculus for possessing computing capability Machine PC or portable portable computer, mobile terminal or other-end etc..The present invention Specific embodiment is not limited implementing for calculate node.
Certificate server 500 includes processor (processor) 501, communication interface (Communications Interface) 502, memorizer (memory) 503 and bus 504.Its In, processor 501, communication interface 502 and memorizer 503 complete phase by bus 504 Communication between mutually.
Communication interface 502 is used for and network device communications, and wherein the network equipment includes such as virtual machine Administrative center, shared storage etc..
Processor 501 is used for configuration processor.Processor 501 can be a central processing unit CPU, or can be application-specific integrated circuit ASIC (Application Specific Integrated Circuit), or be arranged to implement the embodiment of the present invention one or more integrated circuits.
Memorizer 503 is used to deposit file.Memorizer 503 can be stored comprising high-speed RAM Device, also can also include nonvolatile memory (non-volatile memory), for example, at least one Disk memory.Memorizer 503 can also be memory array.Memorizer 503 is also possible to be divided Block, and block can be combined into virtual volume by certain rule.
In one embodiment, said procedure can be the program generation for including computer-managed instruction Code.The program is particularly used in:After the logging request for receiving user terminal transmission, using stepping on Record request carries out safety certification;After safety certification success, to user terminal position requests letter is sent Breath, so that user terminal provides current positional information;In the position for receiving user terminal offer After information, whether the positional information provided according to user terminal judges user terminal currently in safety Region;If judging, user terminal is currently at safety zone, it is determined that login authentication success.
In one embodiment, if judging, user terminal is not currently in safety zone, according to pre- Fixed certification rule carries out safety certification process.
In one embodiment, after the logging request for receiving user terminal transmission, using login The step of request carries out safety certification includes:After the logging request for receiving user terminal transmission, The login authentication information included using logging request is authenticated;If login authentication authentification of message into Work(, then send identification request information to user terminal, so that user terminal provides the mark letter of itself Breath;After the identification information for receiving user terminal offer, whether the identification information that judgement is received It is legal;If the identification information for receiving is legal, safety certification success is judged.
Those of ordinary skill in the art are it is to be appreciated that each example in embodiment described herein Property unit and algorithm steps, can be with electronic hardware or the knot of computer software and electronic hardware Close to realize.These functions are realized with hardware or software form actually, depending on technical scheme Application-specific and design constraint.Professional and technical personnel can select not for specific application With method realizing described function, but this realize it is not considered that beyond the model of the present invention Enclose.
If function being realized using in the form of computer software and as independent production marketing or being used When, then to a certain extent it is believed that all or part of technical scheme is (such as to existing Have the part that technology contributes) embody in form of a computer software product.The computer Software product is generally stored inside in the non-volatile memory medium of embodied on computer readable, including some fingers Order is used so that computer equipment (can be personal computer, server or the network equipment Deng) perform various embodiments of the present invention method all or part of step.And aforesaid storage medium bag Include USB flash disk, portable hard drive, read only memory (ROM, Read-Only Memory), random Access memorizer (RAM, Random Access Memory), magnetic disc or CD etc. are various Can be with the medium of store program codes.
Description of the invention is given for the sake of example and description, and is not exhaustively Or the form disclosed in limiting the invention to.Many modifications and variations are for the common skill of this area It is obvious for art personnel.It is to more preferably illustrate the principle of the present invention to select and describe embodiment And practical application, and one of ordinary skill in the art is made it will be appreciated that the present invention is suitable so as to design In the various embodiments with various modifications of special-purpose.

Claims (10)

1. a kind of method for realizing user authentication, it is characterised in that include:
After the logging request for receiving user terminal transmission, carry out safety using logging request and recognize Card;
After safety certification success, position request information is sent to user terminal, so as to user terminal Current positional information is provided;
After the positional information for receiving user terminal offer, according to the position letter that user terminal is provided Whether breath judges user terminal currently in safety zone;
If judging, user terminal is currently at safety zone, it is determined that login authentication success.
2. method according to claim 1, it is characterised in that
If judging, user terminal is not currently in safety zone, carries out according to predetermined certification rule Safety certification process.
3. method according to claim 1 and 2, it is characterised in that
After the logging request for receiving user terminal transmission, using logging request safety certification is carried out The step of include:
After the logging request for receiving user terminal transmission, the login included using logging request Authentication information is authenticated;
If login authentication authentification of message success, identification request information is sent to user terminal, so as to User terminal provides the identification information of itself;
After the identification information for receiving user terminal offer, whether the identification information that judgement is received It is legal;
If the identification information for receiving is legal, safety certification success is judged.
4. method according to claim 3, it is characterised in that
The identification information of user terminal itself is the IMSI information of user terminal.
5. a kind of certificate server for realizing user authentication, it is characterised in that single including receiving Unit, authentication ' unit, transmitting element and recognition unit, wherein:
Receiving unit, for the logging request that receive user terminal sends;
Authentication ' unit, for after the logging request for receiving user terminal transmission, being asked using logging in Asking carries out safety certification;
Transmitting element, for according to the authentication result of authentication ' unit, if safety certification success, to User terminal sends position request information, so that user terminal provides current positional information;
Recognition unit, for receiving unit receive user terminal offer positional information after, root Whether the positional information provided according to user terminal judges user terminal currently in safety zone;If sentencing Disconnected user terminal is currently at safety zone, it is determined that login authentication success.
6. certificate server according to claim 5, it is characterised in that also including safe guarantor Shield unit, wherein:
Security protection unit, for carrying out safety certification according to the judged result of recognition unit, its In, if user terminal is not currently in safety zone, according to predetermined certification rule safety is carried out Authentication processing.
7. the certificate server according to claim 5 or 6, it is characterised in that authentication ' unit Including the first authentication module and the second authentication module, wherein:
First authentication module, for receiving the logging request of user terminal transmission in receiving unit Afterwards, the login authentication information for being included using logging request is authenticated;If login authentication information is recognized Demonstrate,prove successfully, it indicates that transmitting element to user terminal sends identification request information, so as to user terminal The identification information of itself is provided;
Second authentication module, for receiving the identification information of user terminal offer in receiving unit Afterwards, judge whether the identification information for receiving is legal;If the identification information for receiving is legal, sentence Disconnected safety certification success.
8. certificate server according to claim 7, it is characterised in that
The identification information of user terminal itself is the IMSI information of user terminal.
9. a kind of system for realizing user authentication, it is characterised in that including user terminal and power Profit requires the certificate server that any one of 5-8 is related to, wherein:
User terminal, for sending logging request to certificate server, is receiving certificate server After the position request information of transmission, current positional information is provided to certificate server, so as to certification Server judges to determine whether login authentication is successful.
10. system according to claim 9, it is characterised in that
User terminal is additionally operable to after the identification request information for receiving certificate server transmission, will be from The identification information of body is supplied to certificate server.
CN201510674599.1A 2015-10-19 2015-10-19 Method, server and system for user authentication Pending CN106603472A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510674599.1A CN106603472A (en) 2015-10-19 2015-10-19 Method, server and system for user authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510674599.1A CN106603472A (en) 2015-10-19 2015-10-19 Method, server and system for user authentication

Publications (1)

Publication Number Publication Date
CN106603472A true CN106603472A (en) 2017-04-26

Family

ID=58553880

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510674599.1A Pending CN106603472A (en) 2015-10-19 2015-10-19 Method, server and system for user authentication

Country Status (1)

Country Link
CN (1) CN106603472A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107197075A (en) * 2017-07-03 2017-09-22 深圳市海邻科信息技术有限公司 Clean boot means of defence, device and computer-readable recording medium
CN109993533A (en) * 2017-12-29 2019-07-09 上海方付通商务服务有限公司 Location information localization method, authentication method, transaction payment method and Verification System
CN110162942A (en) * 2019-04-12 2019-08-23 平安科技(深圳)有限公司 Auth method, device, equipment and storage medium based on timestamp
CN110290142A (en) * 2019-06-28 2019-09-27 腾讯科技(深圳)有限公司 Method for authenticating, device, server and storage medium based on scene

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101321068A (en) * 2008-07-23 2008-12-10 北京握奇数据系统有限公司 Method and apparatus for implementing dual-identity authentication
CN104796255A (en) * 2014-01-21 2015-07-22 中国移动通信集团安徽有限公司 A safety certification method, device and system for a client end

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101321068A (en) * 2008-07-23 2008-12-10 北京握奇数据系统有限公司 Method and apparatus for implementing dual-identity authentication
CN104796255A (en) * 2014-01-21 2015-07-22 中国移动通信集团安徽有限公司 A safety certification method, device and system for a client end

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107197075A (en) * 2017-07-03 2017-09-22 深圳市海邻科信息技术有限公司 Clean boot means of defence, device and computer-readable recording medium
CN107197075B (en) * 2017-07-03 2019-11-05 深圳市海邻科信息技术有限公司 Clean boot means of defence, device and computer readable storage medium
CN109993533A (en) * 2017-12-29 2019-07-09 上海方付通商务服务有限公司 Location information localization method, authentication method, transaction payment method and Verification System
CN110162942A (en) * 2019-04-12 2019-08-23 平安科技(深圳)有限公司 Auth method, device, equipment and storage medium based on timestamp
CN110290142A (en) * 2019-06-28 2019-09-27 腾讯科技(深圳)有限公司 Method for authenticating, device, server and storage medium based on scene
CN110290142B (en) * 2019-06-28 2021-10-22 腾讯科技(深圳)有限公司 Scene-based authentication method, device, server and storage medium

Similar Documents

Publication Publication Date Title
US9864987B2 (en) Account provisioning authentication
US9235695B2 (en) Alias-based social media identity verification
CN105612543B (en) Method and system for provisioning payment credentials for mobile devices
CN104144419B (en) Identity authentication method, device and system
EP2783319B1 (en) Providing verification of user identification information
CN103975615B (en) It is logged in the log-on message automatically generated via near-field communication
CN105262779B (en) Identity authentication method, device and system
CN105095737A (en) Method and device for detecting weak password
KR20160006185A (en) Two factor authentication
US20180295514A1 (en) Method and apparatus for facilitating persistent authentication
US20150006399A1 (en) Social Media Based Identity Verification
CN105323253A (en) Identity verification method and device
CN103973711B (en) A kind of verification method and device
CN103455752B (en) Password arranges the device and system with method of password authentication and using the method
CN107426235A (en) Purview certification method, apparatus and system based on device-fingerprint
CN107682336A (en) A kind of auth method and device based on geographical position
CN106603472A (en) Method, server and system for user authentication
CN107204985A (en) Purview certification method based on encryption key, apparatus and system
US20170076285A1 (en) Payment Method and Apparatus and Payment Factor Processing Method and Apparatus
JP6682453B2 (en) data communication
CN108647501A (en) Multiple utility program shares password unlocking method, device, equipment and storage medium
CN107277017A (en) Purview certification method, apparatus and system based on encryption key and device-fingerprint
CN104901924A (en) Internet account verifying method and device
WO2019173620A1 (en) Method and apparatus for facilitating frictionless two-factor authentication
CN107147617A (en) A kind of single-point logging method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170426