CN106850699B - A kind of mobile terminal login authentication method and system - Google Patents

A kind of mobile terminal login authentication method and system Download PDF

Info

Publication number
CN106850699B
CN106850699B CN201710229518.6A CN201710229518A CN106850699B CN 106850699 B CN106850699 B CN 106850699B CN 201710229518 A CN201710229518 A CN 201710229518A CN 106850699 B CN106850699 B CN 106850699B
Authority
CN
China
Prior art keywords
app
login
token
mobile terminal
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710229518.6A
Other languages
Chinese (zh)
Other versions
CN106850699A (en
Inventor
陈玲
魏桂明
李俊浩
岑健明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
ICBC Technology Co Ltd
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN201710229518.6A priority Critical patent/CN106850699B/en
Publication of CN106850699A publication Critical patent/CN106850699A/en
Application granted granted Critical
Publication of CN106850699B publication Critical patent/CN106850699B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention provides a kind of mobile terminal login authentication method and systems, and for carrying out login authentication to the APP on mobile terminal, method includes: to receive the logging request of APP;The transaction token including user login information of mobile terminal storage is obtained according to the logging request and is sent to APP server;It receives the dynamic key application request of the APP server and safety verification is carried out to the APP server and send token dynamic key to by the APP server of the safety verification;APP server parses the transaction token acquisition user login information and the user login information is sent to APP according to the token dynamic key completes login authentication.Realize the unified identity authentication of mobile terminal.The token information in authentication procedures is generated by key encrypted and digitally signed technology with key medium, promotes the safety of entire certification link, and improves convenience and experience effect that mobile terminal uses.

Description

Mobile terminal login authentication method and system
Technical Field
The invention relates to a security technology, in particular to a login authentication method and system for a mobile terminal.
Background
With the high-speed development of the mobile internet, mobile office becomes an important development trend of enterprises in the future, and the APP of mobile terminals in the enterprises is increased. Due to the lack of unified planning and management, these discrete and independent APP applications do not bring good experience to users, and the login security and management standardization thereof also bring higher challenges to enterprises, which are mainly embodied in the following points:
since the APP applications use independent identity authentication mechanisms, a user needs to input a user name and a password for verification when logging in. For users, the APP authentication uses corresponding user names and passwords inside enterprises, repeated input is needed each time, and the usability is insufficient.
Because the APP uses the identity authentication management modules developed by the APP, the phenomenon of inconsistent login security requirements exists, and meanwhile, the unified planning and management of the internal security of an enterprise are not facilitated.
Because the identity authentication modules applied by the APP are respectively maintained by different teams, the cost of subsequent upgrading maintenance is high, the upgrading convenience is not sufficient, and the labor cost of an enterprise cannot be effectively saved.
In summary, the different complex identity authentication processes of many application software make users feel inconvenient, the development difficulty and maintenance cost of software developers are increased, and the authentication modules with different applications repeatedly occupy the storage resources of the mobile terminal.
Disclosure of Invention
The embodiment of the invention provides a mobile terminal login authentication method, which is used for login authentication of APP on a mobile terminal and comprises the following steps:
receiving a login request of an APP;
obtaining a transaction token which is stored by the mobile terminal and comprises user login information according to the login request, and sending the transaction token to the APP server;
receiving a dynamic key application request of the APP server, performing security verification on the APP server, and sending a token dynamic key to the APP server passing the security verification;
and the APP server analyzes the transaction token according to the token dynamic key to obtain user login information and sends the user login information to the APP to finish login authentication.
In the embodiment of the present invention, the login request includes: and the APP application unique identifier is a key name of the APP application.
In the embodiment of the present invention, the user login information includes: and the user name, the password, the login time and the mobile equipment serial number are stored when the login is successful.
In the embodiment of the present invention, the obtaining a transaction token including user login information stored in a mobile terminal according to the login request and sending the transaction token to an APP server includes:
judging whether the mobile terminal stores a transaction token comprising user login information;
determining that a transaction token comprising user login information is stored in the mobile terminal, and sending the transaction token to the APP server.
In the embodiment of the present invention, the obtaining a transaction token including user login information stored in a mobile terminal according to the login request and sending the transaction token to an APP server further includes:
when the fact that the transaction token is not stored in the mobile terminal is determined, a user name and a password input by a user are verified;
when the user name and the password input by the user are verified to be correct, a dynamic key pair corresponding to the login is generated;
generating a transaction token according to the dynamic key pair and the user login information through a token generation algorithm;
and storing the transaction token in a memory of the mobile terminal.
In the embodiment of the present invention, the receiving a dynamic key application request of the APP server and performing security verification on the APP server to send a token dynamic key to the APP server that passes the security verification includes:
acquiring an APP application unique identifier in a dynamic key application request of an APP server;
determining a public key of the APP according to the unique APP application identifier;
decrypting the dynamic key application request by using the determined public key of the APP, and determining that the APP server passes the security verification after the decryption is passed;
and sending the token dynamic key to the APP server passing the security verification.
In the embodiment of the present invention, the method further includes:
registering an APP (application) on a mobile terminal, and generating and storing key information of the APP, wherein the key information comprises: public key, private key, and regard the key name as the unique sign of APP application.
Meanwhile, the invention also provides a mobile terminal login authentication system, which is used for performing login authentication on the APP on the mobile terminal equipment and comprises the following steps: an identity authentication device and an identity authentication server;
the identity authentication device includes:
the login request receiving module is used for receiving a login request of the APP;
the token acquisition module is used for acquiring a transaction token comprising user login information according to the login request and sending the transaction token to the APP server;
the identity authentication server includes:
the APP server verification module is used for receiving a dynamic key application request of the APP server and performing security verification on the APP server;
the token key sending module is used for sending a token dynamic key to the APP server passing the security verification;
and the APP server analyzes the transaction token according to the token dynamic key to obtain user login information and sends the user login information to the APP to finish login authentication.
In an embodiment of the present invention, the token obtaining module includes:
the judging unit is used for judging whether the mobile terminal stores a transaction token comprising user login information;
and the sending unit is used for determining that the transaction token comprising user login information is stored in the mobile terminal and sending the transaction token to the APP server.
In this embodiment of the present invention, the token obtaining module further includes:
the password verification unit is used for verifying a user name and a password input by a user when the mobile terminal is determined not to store a transaction token;
the key pair generation unit is used for generating a dynamic key pair corresponding to the login when the user name and the password input by the user are verified to be correct;
and the token generation unit is used for generating a transaction token according to the dynamic key pair and the user login information through a token generation algorithm and storing the transaction token into the memory of the mobile terminal.
In the embodiment of the present invention, the APP server verification module includes:
the identifier obtaining unit is used for obtaining the unique identifier of the APP in the dynamic key application request of the APP server;
a public key determining unit, configured to determine a public key of the APP according to the APP application unique identifier;
and the decryption unit decrypts the dynamic key application request by using the determined public key of the APP, and determines that the APP server passes the security verification after the decryption passes.
In the embodiment of the present invention, the identity authentication apparatus further includes:
the registration module is used for registering the APP on the mobile terminal and generating the key information of the APP, wherein the key information comprises: public key, private key, and regard the key name as the unique sign of APP application.
In the embodiment of the present invention, the identity authentication server further includes:
and the storage module is used for storing the key information of the registered APP application.
The invention provides a mobile terminal identity login authentication system and a mobile terminal identity login authentication method. In the authentication link, a unique and tamper-proof token with a non-fixed length is generated by adopting key encryption and digital signature technologies, and a dynamic key of a forgery-proof request is used in the encryption process, so that the security of the authentication link is further improved. Meanwhile, the control of repeated login of a plurality of devices is realized by uniformly recording the related information of the login request in the background database of the identity authentication server.
In order to make the aforementioned and other objects, features and advantages of the invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a login authentication method for a mobile terminal according to the present invention;
FIG. 2 is a block diagram of a login authentication system of a mobile terminal according to the present invention;
fig. 3 is a block diagram of an identity authentication system of a mobile terminal according to an embodiment of the present invention;
FIG. 4 is a block diagram of an identity authentication module according to an embodiment of the present invention;
FIG. 5 is a block diagram of a token management module according to an embodiment of the present invention;
FIG. 6 is a block diagram of a key management module according to an embodiment of the present invention;
fig. 7 is a flowchart illustrating an embodiment of an identity authentication method of a mobile terminal according to the present invention;
fig. 8 is a flowchart illustrating an embodiment of an identity authentication method of a mobile terminal according to the present invention;
fig. 9 is a flowchart of an embodiment of an identity authentication method of a mobile terminal according to the present invention;
fig. 10 is a flowchart illustrating an example of an identity authentication method of a mobile terminal according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The present invention provides a login authentication method for a mobile terminal, which is used for performing login authentication on an APP on the mobile terminal, and as shown in fig. 1, is a flowchart of the login authentication method for the mobile terminal provided by the present invention, and includes:
step S1001, receiving a login request of an APP;
step S1002, obtaining a transaction token including user login information stored by the mobile terminal according to the login request and sending the transaction token to the APP server;
step S1003, receiving a dynamic key application request of the APP server, performing security verification on the APP server, and sending a token dynamic key to the APP server passing the security verification;
step S1004, the APP server analyzes the transaction token according to the token dynamic key to obtain user login information and sends the user login information to the APP to complete login authentication.
Meanwhile, the present invention also provides a mobile terminal login authentication system, a structural block diagram of which is shown in fig. 2, for performing login authentication on the APP204 on the mobile terminal device 203, including: an authentication device 201 and an authentication server 202; wherein,
the identity authentication device 201 comprises:
the login request receiving module is used for receiving a login request of the APP;
the token acquisition module is used for acquiring a transaction token comprising user login information according to the login request and sending the transaction token to the APP server;
the identity authentication server 202 includes:
the APP server verification module is used for receiving a dynamic key application request of the APP server and performing security verification on the APP server;
the token key sending module is used for sending a token dynamic key to the APP server passing the security verification;
and the APP server analyzes the transaction token according to the token dynamic key to obtain user login information and sends the user login information to the APP to finish login authentication.
The invention overcomes the problems of the existing mobile terminal multi-APP identity authentication in the aspects of usability, safety, maintenance convenience and the like, provides a mobile terminal identity authentication system and a mobile terminal identity authentication method, and realizes the unified identity authentication of the mobile terminal. In addition, the token information in the identity authentication process is generated by using a key medium through key encryption and digital signature technologies, so that the safety of the whole authentication link is improved, and the convenience and the experience effect of the use of the mobile terminal are improved. The technical solution of the present invention is further described in detail with reference to specific examples.
Fig. 3 is an architecture diagram of an identity authentication system of a mobile terminal according to the present invention. As shown in fig. 3, the identity authentication system of the present embodiment includes an identity authentication APP application 1, an identity authentication APP server 2, an identity authentication APP database 3, a mobile APP1 application 4, a mobile APP1 server 5, a mobile APP1 database 6, a mobile APP2 application 7, a mobile APP2 server 8, a mobile APP2 database 9, and a Token (Token) 10.
In this embodiment, the identity authentication APP application 1 includes an identity authentication module 11, a token management module 12, and a key management module 13. The mobile APP1 application 4 includes a login module 41, an exit module 42, an authentication common module 43 and some business processing modules 44 of its own. The mobile APP2 application 7 includes a login module 71, an exit module 72, an authentication common module 73 and some business processing modules 74 of its own. The mobile APP1 application 4 calls the standard login and exit interface packaged authentication public module 43 provided by the identity authentication APP1 through the login module 41 or the exit module 42 to perform authentication request interaction. The mobile APP1 application 7 calls the standard login and exit interface packaged authentication common module 73 provided by the identity authentication APP1 through the login module 71 or the exit module 72 to perform authentication request interaction. The Token (Token)10 in the authentication process is responsible for generation and maintenance by the identity authentication APP application 1. The mobile APP1 server 5 and the mobile APP2 server 8 perform server legal identity verification through interaction with the identity authentication APP server 2, and acquire a dynamic key to analyze an authentication processing result after the verification is passed.
Fig. 4 is a structural diagram of an identity authentication module of the identity authentication APP application 1 in fig. 3 according to an embodiment of the present invention. As shown in fig. 4, the identity authentication module 11 includes: a login authentication module 111, an exit management module 112, an encryption module 113, and a decryption module 114. Wherein: the login authentication module 111 provides a unified login authentication interface for the mobile APP application, receives login requests from the mobile APP, and performs request parsing by calling the decryption module 114. Meanwhile, the login authentication module 111 determines whether the login Token (Token)10 information exists in the memory, provides a standard login interface for the authentication request without the Token, dynamically encrypts the user name and password input by the user by calling the encryption module 113, and submits the encrypted user name and password to the identity authentication APP server 2 for verification. For the existing login token information, the token parsing module 124 is called to read and parse the token and generate a request token to be returned to the requesting mobile APP application.
In an embodiment of the present invention, the exit management module 112 provides a unified exit interface for the mobile APP application, receives an exit request from the mobile APP application, and performs request parsing by calling the decryption module 114. Meanwhile, the logout management module 112 submits the logout request to the identity authentication APP server 2, the identity authentication APP server 2 calls the identity authentication APP database 3, and the logout request processing logic is used for cleaning the related information data of the original login. After the processing is successful, the exit management module 112 first calls the token parsing module 124 to determine whether the memory has token information, and if so, then calls the token destruction module 123 to return the exit processing result to the mobile APP application after the token destruction is completed. And if no token information exists in the memory, directly returning an exit processing result to the mobile APP application.
The encryption module 113 provides common encryption and signature methods. The encryption method uses an asymmetric key encryption technique to encrypt input original text information using a specified public key, such as encryption of authentication request information, encryption of a request processing result, and the like, and outputs a ciphertext. The signature method uses a digital signature technology to digest the original text information by using a HASH function, then encrypts the digest by using a specified private key, and outputs the digest and the original text information together as signature information. Meanwhile, the signature generation time and the customized signature validity time (such as 20 seconds) are added in the original text, and the signature verification time is used for verifying the timeliness of the signature information and preventing the replay of the signature information. The encryption module 113 can be independently packaged into a component form, and is provided for the mobile APP to use in the interactive link of identity authentication.
The decryption module 114 provides a common decryption and signature verification method. The decryption method in the embodiment of the invention uses an asymmetric key encryption technology to decrypt the input original text information by using a specified private key, such as decryption of authentication request information, decryption of a request processing result and the like, and outputs the decrypted original text. The signature verification method uses a digital signature technology, a receiver decrypts encrypted abstract information by using a specified public key, and then generates abstract information for a received original text by using a HASH function, and the abstract information is compared with the decrypted abstract information. If the current time minus the signature generation time is greater than the signature effective time, the signature information is overtime and invalid, and the signature verification fails; otherwise, the signature verification is successful. The decryption module 114 can be packaged independently into a component form, and is provided for the mobile APP to use in the interactive link of identity authentication.
Fig. 5 is a block diagram of a token management module of the identity authentication APP application 1 in fig. 3. As shown in fig. 5, the token management module 12 includes: a token generation module 121, a token update module 122, a token destruction module 123, and a token parsing module 124. The token generation module 121 generates login token information by calling a token generation algorithm. The token generation algorithm is the key point of the login authentication certificate, and reflects the fact information of login authentication. The data participating in token generation consists of key elements initiating a login request, following the following principles: one, uniqueness. The combination of the login elements can effectively distinguish one login request from other logins. And secondly, safety. The combination of the login elements can realize forgery prevention and falsification prevention of the request data. Therefore, the request element participating in token generation is divided into two parts, namely a basic element and a key element, wherein the basic element is applicable to all login scenes and is an essential element; the key elements are suitable for checking login scenes and are dynamic elements. The token information is represented as:
Token=S(f(M(b1,b2...bx,p),keyX.pub),key0.pri)
wherein, Token is Token information and represents a character combination with a non-fixed length; s is a signature algorithm; f is an encryption algorithm; key0.pri is a signature private key of the identity authentication APP; pub is a dynamic encryption public key; m is composed of basic information elementsAnd a plaintext consisting of key information elements, bxFor basic user information elements, p is a mobile device unique identification key information element. The life cycle of the token depends on whether the process of the identity authentication APP exists or not, and when the mobile equipment is restarted and the process is forced to be finished, the token is correspondingly destroyed.
The token updating module 122 implements the updating process of the token, and when the user of the mobile APP application needs to perform the user switching operation, the login authentication module 111 receives the user switching request and submits the user switching request to the token updating module. The token updating module completes the updating of the memory token by calling the token destroying module 123 and the token generating module 121 in sequence.
The token destruction module 123 implements the destruction processing of the token, and when the user of the mobile APP application performs an operation of actively exiting the current account, the exit management module 112 receives the active exit request and submits the active exit request to the token destruction module, thereby implementing the destruction operation of the memory token.
The token analysis module 124 provides a common method for reading and analyzing the token, and the login authentication module 111 and the logout management module 112 realize uniform reading and processing of token information in the authentication process by calling the modules.
Fig. 6 is a block diagram of a key management module of the identity authentication APP application 1 in fig. 3. As shown in fig. 6, the key management module 13 includes: the device comprises an APP registration module 131, an APP cancellation module 132, an APP information updating module 133, a key generation module 134, a key destruction module 135 and a key updating module 136. Wherein: the APP registration module 131 provides a registration function of a mobile APP application that needs to use unified identity authentication, and generates key information of the APP, including public key and private key files, by recording relevant information of the APP, such as APP name, APP development department, APP principal, and calling the key generation module 134, and the key name is used as a unique identifier of the APP. After the registration is successful, the APP acquires a pair of public and private key files (e.g., key1.pub and key1.pri) of the APP and a public key file (e.g., key0.pub) of the identity authentication APP, which are three key files.
The APP logout module 132 provides a function of releasing the mobile APP application from using the unified identity authentication, and clears the relevant information registered by the APP in the identity authentication APP by calling this module, and simultaneously calls the key destruction module 135 to destroy the key information of the APP.
The APP information update module 133 provides update of the mobile APP application registration information, such as update of APP name, APP maintenance department, etc., and updates the APP key information by calling the key update module 136 and regenerates a new public-private key file.
The key generation module 134 implements a key generation process, and generates corresponding key pair information (e.g., KeyPair) according to the unique identifier registered by the APP application through a key pair generator (e.g., KeyPair generator) of RSA algorithm, writes the generated public key into a pub suffix file (e.g., key1.pub) in Base64 encoding format, encrypts the generated private key with a private key protection password through SHA and 3KeyTripleDES algorithm, and writes into a pri suffix file (e.g., key1.pri) in Base64 encoding format.
The key destruction module 135 implements the destruction processing of the key, and deletes the public and private key files of the APP in the identity authentication APP database by receiving the logout request of the APP logout module 132, and meanwhile, removes the key information of the APP loaded in the memory of the identity authentication APP server.
The key updating module 136 realizes the updating of the key, and updates the public and private key files of the APP in the identity authentication APP database and updates the key information of the APP loaded in the memory of the identity authentication APP server by receiving the update request of the APP information updating module 133.
The present invention also provides an identity authentication method of a mobile terminal, and in order to make the method more clear and understandable, the flow chart is taken as an example to describe in detail the flow of the embodiment of the present invention.
Fig. 7 shows a specific process of logging in a mobile application on a mobile device according to an embodiment of the present invention.
Step S101: when a user accesses a certain mobile APP1 application 4 on a mobile device, the login module 41 of the application submits a login request to the login authentication module 111 of the identity authentication APP1 by calling the authentication public module 43 encapsulated by the standard login authentication interface provided by the identity authentication APP1, and the request information also includes the unique identifier of the mobile APP1 application.
Step S102: the login authentication module 111 of the identity authentication APP application 1 calls the Token analysis module 124 to detect that there is no Token (Token)10 with successful login authentication in the memory, and then returns the detection result to the login authentication module 111, and the unified login interface is displayed by the login authentication module 111. After the user inputs a user name and a password in the interface, clicks and submits, the login authentication module 111 calls the encryption module 113 to encrypt request information and submits the request information to the identity authentication APP server 2, wherein the request information comprises the encrypted user name, the encrypted password, the mobile device serial number and the unique identifier of the mobile APP1 application.
Step S103: the identity authentication APP server 2 calls the decryption module 114 to decrypt the request information, verifies whether the user name and the password are correct through the identity authentication APP database 3, and records the relevant information of the login after the verification is passed, wherein the relevant information includes the login user name, the login time, the login mobile device serial number, the unique identifier of the mobile APP1 application and the like. Meanwhile, the identity authentication APP database 3 generates a dynamic key pair corresponding to this access, such as a public key (keyx.pub) and a private key (keyx.pri) file of keyX, records a corresponding relationship between this login and this dynamic key pair, and queries basic information (such as a user name, a department affiliated to the user, and the like) of the user through a user name, and finally returns the dynamic key pair, the basic information of the user, and a processing result of this successful authentication to the identity authentication APP application 1 through the identity authentication APP server 2.
Step S104: the login module 111 of the identity authentication APP application 1 receives the processing result of successful authentication, invokes the Token generation module 121, and generates the current authentication Token (Token)10 through a Token generation algorithm for the user basic information, the mobile device serial number, the current system time, the customized Token timeout time, the public key (keyx.pub) of the dynamic key, and the private key (e.g., key0.pri) of the identity authentication APP application 1.
Step S105: the identity authentication APP application 1 writes the Token (Token)10 into its memory again, and encapsulates the Token information into the processing result (transaction Token1) of this authentication and returns the processing result (transaction Token1) to the mobile APP1 application 4.
Step S106: after the login module 41 of the application 4 of the mobile APP1 receives the transaction Token1 returned by the application 1 of the identity authentication, the transaction Token1 is submitted to the mobile APP1 server 5 of the background for analysis.
Step S107: after the mobile APP1 server 5 receives the analysis request of the transaction Token1, the transaction Token1 uses the dynamic key for encryption, so it needs to apply the dynamic key for decryption to the identity authentication APP server 2. Meanwhile, in order to ensure the validity of the mobile APP1 server 5, the token request needs to be encrypted by using a private key file (e.g. key1.pri) generated during APP registration, and then submitted to the identity authentication APP server 2 together with the APP id to perform the legal identity authentication of the mobile APP1 server 5.
Step S108: after receiving the legal identity authentication request submitted by the mobile APP1 server 5, the identity authentication APP server 2 obtains the mobile APP1 identifier in the request and calls the decryption module 114, and decrypts the encrypted transaction Token1 through the public key1. pub. After the decryption is passed, the identity of the mobile APP1 server 5 is considered to be legal, and the identity authentication APP server 2 returns the dynamic key keyx. pri of the transaction Token1 to the mobile APP1 server 5.
Step S109: after the mobile APP1 server 5 receives the dynamic key keyx pri returned by the identity authentication APP server 2, the signature verification and decryption method of the authentication public module 43 is called for the original token, the signature verification is performed by using the public key key0.pub of the identity authentication APP, and then the decryption is performed by using the dynamic key keyx pri, so that the basic information of the user who logs in and accesses at this time is obtained. Meanwhile, the log information of the login is recorded through the mobile APP1 database 6, the related role authority of the login user is inquired, and the log information is returned to the mobile APP1 application 4 through the mobile APP1 server 5.
Step S110: after the login module 41 of the application 4 of the mobile APP1 receives the authentication success information containing the user role authority returned by the mobile APP1 server 5, the login authentication is completed, and the main interface after the corresponding login is displayed according to the user basic information in the request.
Fig. 8 is a flowchart of another embodiment of the identity authentication method of the present invention, and the flow of the embodiment is described in detail below.
Step S201: the user accesses a certain mobile APP2 application 7 on the mobile device, the login module of the application submits the login request to the login authentication module 111 of the identity authentication APP1 by calling the authentication public module encapsulated by the standard login authentication interface provided by the identity authentication APP1, and the request information simultaneously includes the unique identifier of the APP2 application.
Step S202: the login authentication module 111 of the identity authentication APP application 1 calls the Token parsing module 124, detects that a Token (Token)10 with successful login authentication exists in the memory, and encapsulates the Token information into a processing result (transaction Token2) of the current authentication and returns the processing result (transaction Token2) to the mobile APP2 application 7.
Step S203: after the login module of the mobile APP2 application 7 receives the transaction Token2 returned by the identity authentication APP application 1, the transaction Token2 is submitted to the mobile APP2 server 8 in the background for analysis.
Step S204: after the mobile APP2 server 8 receives the analysis request of the transaction Token2, the transaction Token2 uses the dynamic key for encryption, so it needs to apply the dynamic key for decryption to the identity authentication APP server 2. Meanwhile, in order to ensure the validity of the mobile APP2 server 8, the token request needs to be encrypted by using a private key file (e.g. key2.pri) generated during APP registration, and then submitted to the identity authentication APP server 2 together with the APP id to perform the legal identity authentication of the mobile APP2 server 8.
Step S205: after receiving the legal identity authentication request submitted by the mobile APP2 server 8, the identity authentication APP server 2 acquires the mobile APP id in the request and calls the decryption module 114, and decrypts the encrypted transaction Token2 through the public key2. pub. After decryption is passed, the identity of the mobile APP2 server 8 is considered legitimate. Meanwhile, the identity authentication APP server 2 calls the Token parsing module 124 to parse the transaction Token2, and obtains login user information of the Token.
Step S206: the identity authentication APP server 2 records the relevant information of the login request at this time through the identity authentication APP database 3, including the login user name, time, mobile device serial number, unique identification of the APP2 and the like, and simultaneously returns the dynamic key X.pri of the original token to the mobile APP2 server 8 through the identity authentication APP server 2.
Step S207: after receiving the dynamic key keyx pri returned by the identity authentication APP server 2, the mobile APP2 server 8 calls a signature verification and decryption method of the authentication public module for the original token, firstly uses the public key key0.pub of the identity authentication APP to verify the signature, and then uses the dynamic key keyx pri to decrypt, so as to obtain the user basic information of the login access. Meanwhile, the log information of the login is recorded through the mobile APP2 database 9, the related role authority of the login user is inquired, and the log information is returned to the mobile APP2 application 7 through the mobile APP2 server 8.
Step S208: and after the login module of the application 7 of the mobile APP2 receives the authentication success information containing the user role authority returned by the mobile APP2 server 8, the login authentication is completed at this time, and the main interface after the corresponding login is displayed according to the user basic information in the request.
Fig. 9 is a flowchart of another embodiment of the identity authentication method of the present invention, and the flow of the embodiment is described in detail below.
Step S301: the user has logged in a certain mobile APP1 application 4 on the mobile device, and clicks the function of switching the user, the login module 41 of the application submits the request of switching the user to the login authentication module 111 of the identity authentication APP1 by calling the authentication public module 43 encapsulated by the standard login authentication interface provided by the identity authentication APP1, and the request information includes the unique identifier of the mobile APP1 application and the operation identifier of the switching user.
Step S302: the login authentication module 111 of the identity authentication APP application 1 calls the Token parsing module 124 to detect that a Token (Token)10 with successful login authentication exists in the memory, and then returns a detection result to the login authentication module 111, and the login authentication module presents a uniform login interface according to the switching user request identifier sent by the mobile APP1 application 4. After the user inputs a user name and a password on the interface and clicks and submits the user name and the password, the login authentication module 111 calls the encryption module 113 to encrypt request information and submits the request information to the identity authentication APP server 2, wherein the request information comprises the encrypted user name, the encrypted password, a switching user operation identifier, a mobile equipment serial number and a unique identifier of the mobile APP1 application.
Step S303: the identity authentication APP server 2 calls the decryption module 114 to decrypt the request information, verifies whether the user name and the password are correct through the identity authentication APP database 3, and updates the related information of the login according to the operation identifier of the switching user after the verification is passed, wherein the related information comprises the login user name, the login time, the login mobile equipment serial number, the unique identifier of the mobile APP1 application and the like. Meanwhile, the identity authentication APP database 3 regenerates a dynamic key pair corresponding to the access, such as a public key (key.pub) and a private key (key.pri) file of key, records a corresponding relationship between the login and the dynamic key pair, queries basic information (such as a user name, a department affiliated to the user and the like) of the user through a user name, and finally returns the dynamic key pair, the basic information of the user and a processing result of successful login authentication of the user switched this time to the identity authentication APP application 1 through the identity authentication APP server 2.
Step S304: the login module 111 of the identity authentication APP application 1 receives the processing result of successful authentication, invokes the Token generation module 121, and generates the current authentication Token (Token)10 through a Token generation algorithm for the user basic information, the mobile device serial number, the current system time, the customized Token timeout time, the public key (keyy.pub) of the dynamic key, and the private key (e.g., key0.pri) of the identity authentication APP application 1.
Step S305: the identity authentication APP application 1 writes the Token (Token)10 into its memory again, and encapsulates the Token information into the processing result (transaction Token1) of this authentication and returns the processing result (transaction Token1) to the mobile APP1 application 4.
Step S306: after the login module 41 of the application 4 of the mobile APP1 receives the transaction Token1 returned by the application 1 of the identity authentication, the transaction Token1 is submitted to the mobile APP1 server 5 of the background for analysis. Step S307: after the mobile APP1 server 5 receives the analysis request of the transaction Token1, the transaction Token1 uses the dynamic key for encryption, so it needs to apply the dynamic key for decryption to the identity authentication APP server 2. Meanwhile, in order to ensure the validity of the mobile APP1 server 5, the token request needs to be encrypted by using a private key file (e.g. key1.pri) generated during APP registration, and then submitted to the identity authentication APP server 2 together with the APP id to perform the legal identity authentication of the mobile APP1 server 5.
Step S308: after receiving the legal identity authentication request submitted by the mobile APP1 server 5, the identity authentication APP server 2 acquires the mobile APP id in the request and calls the decryption module 114, and decrypts the encrypted transaction Token1 through the public key1. pub. After the decryption is passed, the identity of the mobile APP1 server 5 is considered to be legal, and the identity authentication APP server 2 returns the dynamic key y. pri of the transaction Token1 to the mobile APP1 server 5.
Step S309: after receiving the dynamic key y.pri returned by the identity authentication APP server 2, the mobile APP1 server 5 calls the signature verification method of the authentication public module 43 for the original token, firstly uses the public key0.pub of the identity authentication APP to verify the signature, and then uses the dynamic key y.pri to decrypt, so as to obtain the user basic information of the login access. Meanwhile, the log information of the login is recorded through the mobile APP1 database 6, the related role authority of the login user is inquired, and the log information is returned to the mobile APP1 application 4 through the mobile APP1 server 5.
Step S310: after the login module 41 of the application 4 of the mobile APP1 receives the authentication success information containing the user role authority returned by the mobile APP1 server 5, the login authentication of the user to be switched at this time is completed, and the corresponding main interface after login is displayed according to the user basic information in the request.
Fig. 10 is a flowchart of another embodiment of the identity authentication method of the present invention, and the flow of the embodiment is described in detail below.
Step S401: the user logs in a certain mobile APP2 application 7 on the mobile device, clicks the function of actively logging out the current account, the logging-out module of the application submits the active logging-out request to the logging-out management module 112 of the identity authentication APP1 by calling the authentication public module encapsulated by the standard logging-out management interface provided by the identity authentication APP1, and the request information simultaneously includes the unique identifier of the mobile APP2 application. For the ordinary closing APP operation, the exit management interface of the identity authentication APP1 is not required to be called.
Step S402: the logout management module 112 of the identity authentication APP application 1 calls the Token parsing module 124 to detect that the Token (Token)10 with successful login authentication exists in the memory, and then returns the detection result to the logout management module 112 and submits a logout request to the identity authentication APP server 2, where the request information includes the mobile device serial number and the unique identifier of the APP 2.
Step S403: after receiving the submitted quit request, the identity authentication APP server 2 clears the related login information originally recorded by the mobile equipment through the identity authentication APP database 3, wherein the related login information includes dynamic key information and corresponding relation information of a login user, records a log of quitting operation of the user, and returns a processing result.
Step S404: after receiving the processing result of the logout request returned by the identity authentication APP server 2, the logout management module 112 of the identity authentication APP application 1 destroys the token information in the memory by calling the token destruction module 123, and returns the processing result of the logout request to the mobile APP2 application 7.
Step S405: after receiving the result that the identity authentication APP application 1 quits the request processing is successful, the quit module of the mobile APP2 application 7 forwards the processing result to the mobile APP2 server 8.
Step S406: the mobile APP2 server 8 receives the quitting success result information, records the quitting log information through the mobile APP2 database 9, and returns the quitting processing result to the mobile APP2 application 7.
Step S407: after receiving the quit processing result returned by the mobile APP2 server 8, the mobile APP2 application 7 closes the mobile APP2 application, and finishes the quit operation this time.
The invention provides a mobile terminal identity authentication system and a mobile terminal identity authentication method. In the authentication link, a unique and tamper-proof token with a non-fixed length is generated by adopting key encryption and digital signature technologies, and a dynamic key of a forgery-proof request is used in the encryption process, so that the security of the authentication link is further improved. Meanwhile, the control of repeated login of a plurality of devices is realized by uniformly recording the related information of the login request in the background database of the identity authentication server.
The invention overcomes the problems of the existing mobile terminal multi-APP identity authentication in the aspects of usability, safety, maintenance convenience and the like, provides a mobile terminal identity authentication system and a mobile terminal identity authentication method, and realizes the unified identity authentication of the mobile terminal. In addition, the token information in the identity authentication process is generated by using a key medium through key encryption and digital signature technologies, so that the safety of the whole authentication link is improved, and the convenience and the experience effect of the use of the mobile terminal are improved.
The invention provides an identity authentication method of a mobile terminal, which improves the existing identity authentication mode applied to a mobile network, combines a digital encryption technology to generate a token, overcomes the problem of insecurity in the authentication process, and mainly has the following effects and advantages:
1. by the identity authentication system designed by the invention, the user information and the equipment environment in the login process are stored in the form of the token, and the verification is read immediately in the authentication process, so that the links of repeatedly inputting the user name and the password by the user are reduced, and the usability of the user login operation is improved.
2. The identity authentication system designed by the invention realizes the login authentication and exit interface of the internal standard of an enterprise, improves the standardization and the convenience of subsequent upgrade maintenance, and saves the investment of labor cost.
3. The identity authentication system designed by the invention effectively avoids the problems that the authentication information is stolen and the authentication server is imitated. According to each authentication request message, a certain secret key encryption and decryption algorithm and a digital signature technology are adopted, so that the integrity of the transmission of the authentication request message and the identity authentication of a requester are ensured, and the repudiation in the transaction is prevented.
The identity authentication system designed by the invention utilizes the characteristic of the background database for recording the authentication information to solve the problem of preventing repeated login of different mobile devices in the authentication link, and can carry out real-time statistics and analysis on the authentication conditions of the user and the devices.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (13)

1. A login authentication method for a mobile terminal is used for performing login authentication on an APP on the mobile terminal, and is characterized by comprising the following steps:
receiving a login request of an APP;
obtaining a transaction token which is stored by the mobile terminal and comprises user login information according to the login request, and sending the transaction token to the APP server;
receiving a dynamic key application request of the APP server, performing security verification on the APP server, and sending a token dynamic key to the APP server passing the security verification;
the APP server analyzes the transaction token according to the token dynamic key to obtain user login information and sends the user login information to the APP to complete login authentication;
receiving the dynamic key application request of the APP server and performing security verification on the APP server, and sending a token dynamic key to the APP server passing the security verification includes:
acquiring an APP application unique identifier in a dynamic key application request of an APP server;
determining a public key of the APP according to the unique APP application identifier;
decrypting the dynamic key application request by using the determined public key of the APP, and determining that the APP server passes the security verification after the decryption is passed;
and sending the token dynamic key to the APP server passing the security verification.
2. The mobile terminal login authentication method of claim 1, wherein the login request comprises: and the APP application unique identifier is a key name of the APP application.
3. The mobile terminal login authentication method of claim 2, wherein the user login information comprises: and the user name, the password, the login time and the equipment serial number of the mobile terminal are stored when the login is successful.
4. The mobile terminal login authentication method of claim 3, wherein the obtaining of the transaction token including user login information stored by the mobile terminal according to the login request and sending the transaction token to the APP server comprises:
judging whether the mobile terminal stores a transaction token comprising user login information;
determining that a transaction token comprising user login information is stored in the mobile terminal, and sending the transaction token to the APP server.
5. The method for login authentication of a mobile terminal according to claim 3, wherein the obtaining of the transaction token including the user login information stored in the mobile terminal according to the login request and sending the transaction token to the APP server further comprises:
when the fact that the transaction token is not stored in the mobile terminal is determined, a user name and a password input by a user are verified;
when the user name and the password input by the user are verified to be correct, a dynamic key pair corresponding to the login is generated;
generating a transaction token according to the dynamic key pair and the user login information through a token generation algorithm;
and storing the transaction token in a memory of the mobile terminal.
6. The mobile terminal login authentication method of claim 1, wherein the method further comprises:
registering an APP (application) on a mobile terminal, and generating and storing key information of the APP, wherein the key information comprises: public key, private key, and regard the key name as the unique sign of APP application.
7. A mobile terminal login authentication system is used for login authentication of APP on a mobile terminal, and is characterized in that the system comprises: an identity authentication device and an identity authentication server; wherein,
the identity authentication device comprises:
the login request receiving module is used for receiving a login request of the APP;
the token acquisition module is used for acquiring a transaction token comprising user login information according to the login request and sending the transaction token to the APP server;
the identity authentication server includes:
the APP server verification module is used for receiving a dynamic key application request of the APP server and performing security verification on the APP server;
the token key sending module is used for sending a token dynamic key to the APP server passing the security verification;
the APP server analyzes the transaction token according to the token dynamic key to obtain user login information and sends the user login information to the APP to complete login authentication;
the APP server verification module comprises:
the identification obtaining unit is used for obtaining the unique APP identification in the dynamic key application request of the APP server;
a public key determining unit, configured to determine a public key of the APP according to the APP application unique identifier;
and the decryption unit decrypts the dynamic key application request by using the determined public key of the APP, and determines that the APP server passes the security verification after the decryption passes.
8. The mobile terminal login authentication system of claim 7, wherein the login request comprises: and the APP application unique identifier is a key name of the APP application.
9. The mobile terminal login authentication system of claim 8, wherein the user login information comprises: and the user name, the password, the login time and the equipment serial number of the mobile terminal are stored when the login is successful.
10. The mobile terminal login authentication system of claim 9, wherein the token acquisition module comprises:
the judging unit is used for judging whether the mobile terminal stores a transaction token comprising user login information;
and the sending unit is used for determining that the transaction token comprising user login information is stored in the mobile terminal and sending the transaction token to the APP server.
11. The mobile terminal login authentication system of claim 9, wherein the token acquisition module further comprises:
the password verification unit is used for verifying a user name and a password input by a user when the mobile terminal is determined not to store a transaction token;
the key pair generation unit is used for generating a dynamic key pair corresponding to the login when the user name and the password input by the user are verified to be correct;
and the token generation unit is used for generating a transaction token according to the dynamic key pair and the user login information through a token generation algorithm and storing the transaction token into the memory of the mobile terminal.
12. The system of claim 7, wherein the identity authentication means further comprises:
the registration module is used for registering the APP on the mobile terminal and generating the key information of the APP, wherein the key information comprises: public key, private key, and regard the key name as the unique sign of APP application.
13. The system of claim 12, wherein the authentication server further comprises:
and the storage module is used for storing the key information of the registered APP application.
CN201710229518.6A 2017-04-10 2017-04-10 A kind of mobile terminal login authentication method and system Active CN106850699B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710229518.6A CN106850699B (en) 2017-04-10 2017-04-10 A kind of mobile terminal login authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710229518.6A CN106850699B (en) 2017-04-10 2017-04-10 A kind of mobile terminal login authentication method and system

Publications (2)

Publication Number Publication Date
CN106850699A CN106850699A (en) 2017-06-13
CN106850699B true CN106850699B (en) 2019-11-29

Family

ID=59148085

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710229518.6A Active CN106850699B (en) 2017-04-10 2017-04-10 A kind of mobile terminal login authentication method and system

Country Status (1)

Country Link
CN (1) CN106850699B (en)

Families Citing this family (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11836706B2 (en) * 2012-04-16 2023-12-05 Sticky.Io, Inc. Systems and methods for facilitating a transaction using a virtual card on a mobile device
KR102385474B1 (en) * 2017-07-19 2022-04-13 현대자동차주식회사 Vehicle system and control method thereof
US10903997B2 (en) 2017-10-19 2021-01-26 Autnhive Corporation Generating keys using controlled corruption in computer networks
JP7448220B2 (en) * 2017-10-19 2024-03-12 オートンハイブ コーポレイション Key generation/deposit system and method for multipoint authentication
CN110035033B (en) 2018-01-11 2022-11-25 华为技术有限公司 Key distribution method, device and system
CN108495309B (en) * 2018-02-06 2022-03-25 咪咕文化科技有限公司 Information processing method, electronic device, and storage medium
CN108200089B (en) * 2018-02-07 2022-06-07 腾讯云计算(北京)有限责任公司 Method, device and system for realizing information security and storage medium
CN108848079B (en) * 2018-05-31 2021-05-11 腾讯科技(深圳)有限公司 Method, system, device and computer system for realizing information verification
CN108809988A (en) * 2018-06-14 2018-11-13 北京中电普华信息技术有限公司 A kind of authentication method and system of request
TWI725352B (en) * 2018-11-05 2021-04-21 緯創資通股份有限公司 Method for authentication and authorization and authentication server using the same
CN111242248B (en) * 2018-11-09 2023-07-21 中移(杭州)信息技术有限公司 Personnel information monitoring method, device and computer storage medium
CN109302422B (en) * 2018-11-22 2022-02-25 北京顺丰同城科技有限公司 Method for logging in mobile application, mobile terminal, electronic equipment, system and storage medium
CN110032855A (en) * 2019-02-28 2019-07-19 招银云创(深圳)信息技术有限公司 Login method, device, computer equipment and the storage medium of application
CN112016918B (en) * 2019-05-30 2024-06-25 小米数字科技有限公司 Signature writing method, signature verification method, device and storage medium
CN110381021B (en) * 2019-06-13 2021-04-20 视联动力信息技术股份有限公司 Method and device for preventing illegal attack, electronic equipment and storage medium
CN110417730B (en) * 2019-06-17 2022-07-19 平安科技(深圳)有限公司 Unified access method of multiple application programs and related equipment
CN110234116B (en) * 2019-06-24 2021-11-02 飞天诚信科技股份有限公司 Security authentication method and system
CN110362984B (en) * 2019-06-28 2021-04-30 北京思源理想控股集团有限公司 Method and device for operating service system by multiple devices
CN110536118A (en) * 2019-09-06 2019-12-03 腾讯科技(深圳)有限公司 A kind of data capture method, device and computer storage medium
CN112751800B (en) * 2019-10-29 2023-11-24 杭州海康威视系统技术有限公司 Authentication method and device
CN110868301B (en) * 2019-11-07 2022-03-29 浪潮软件股份有限公司 Identity authentication system and method based on state cryptographic algorithm
CN111162908B (en) * 2019-12-11 2022-07-22 深圳供电局有限公司 Key solar power transmission line field operation method and system
CN111176710B (en) * 2019-12-30 2023-10-03 宁波视睿迪光电有限公司 Operation method of terminal software management system and terminal software management system
CN111241499B (en) * 2020-01-07 2023-05-05 腾讯科技(深圳)有限公司 Application program login method, device, terminal and storage medium
CN111212427A (en) * 2020-01-14 2020-05-29 陈良准 Application APP account login management system based on mobile terminal
CN112003706B (en) * 2020-08-24 2023-07-18 北京字节跳动网络技术有限公司 Signature method, signature device, computer equipment and storage medium
CN112491787B (en) * 2020-10-18 2022-12-27 苏州浪潮智能科技有限公司 Method and equipment for safety management of user data
CN113067827B (en) * 2021-03-25 2022-08-02 中国工商银行股份有限公司 System unification authentication method and device
CN113452782B (en) * 2021-06-28 2022-04-26 烽火通信科技股份有限公司 Upgrading method and device under mesh networking
CN113824691A (en) * 2021-08-25 2021-12-21 浪潮软件股份有限公司 Method for implementing silent login strategy applied by mobile terminal third party H5
CN113868625A (en) * 2021-09-29 2021-12-31 商派软件有限公司 Identity authentication method and system
CN113821446A (en) * 2021-10-11 2021-12-21 中国银行股份有限公司 Test verification method and device for transaction system
CN113872983A (en) * 2021-10-13 2021-12-31 苏州兆晶智能科技有限公司 Block chain chip identity authentication system and authentication method thereof
CN113949566B (en) * 2021-10-15 2024-06-11 工银科技有限公司 Resource access method, device, electronic equipment and medium
CN114244627B (en) * 2022-01-04 2023-12-26 上海华申智能卡应用系统有限公司 Authorization method and system
CN114866247B (en) * 2022-04-18 2024-01-02 杭州海康威视数字技术股份有限公司 Communication method, device, system, terminal and server
CN114710281B (en) * 2022-04-24 2024-08-23 中国工商银行股份有限公司 Method and device for exiting online banking system
CN114900344A (en) * 2022-04-26 2022-08-12 四川智能建造科技股份有限公司 Identity authentication method, system, terminal and computer readable storage medium
CN115174236A (en) * 2022-07-08 2022-10-11 上海百家云科技有限公司 Authentication method, authentication device, electronic equipment and storage medium
CN115361171A (en) * 2022-07-22 2022-11-18 上汽通用五菱汽车股份有限公司 Login method and login system
CN115860037B (en) * 2023-02-24 2023-06-06 中国(上海)宝玉石交易中心有限公司 Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting assembly for precious stones

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104767731A (en) * 2015-03-12 2015-07-08 江苏中天科技软件技术有限公司 Identity authentication protection method of Restful mobile transaction system
CN105577691A (en) * 2016-02-03 2016-05-11 飞天诚信科技股份有限公司 Security access method and server
CN106161348A (en) * 2015-03-30 2016-11-23 中兴通讯股份有限公司 A kind of method of single-sign-on, system and terminal
CN106209749A (en) * 2015-05-08 2016-12-07 阿里巴巴集团控股有限公司 Single-point logging method and the processing method and processing device of device, relevant device and application

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103139163B (en) * 2011-11-29 2016-01-13 阿里巴巴集团控股有限公司 Data access method, server and terminal
US9258121B2 (en) * 2014-06-20 2016-02-09 Gemalto Sa Method to manage modification of encryption credentials
US9779233B2 (en) * 2015-03-05 2017-10-03 Ricoh Co., Ltd. Broker-based authentication system architecture and design
CN105721502B (en) * 2016-04-11 2019-02-01 上海上实龙创智慧能源科技股份有限公司 A kind of authorization access method for browser client and server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104767731A (en) * 2015-03-12 2015-07-08 江苏中天科技软件技术有限公司 Identity authentication protection method of Restful mobile transaction system
CN106161348A (en) * 2015-03-30 2016-11-23 中兴通讯股份有限公司 A kind of method of single-sign-on, system and terminal
CN106209749A (en) * 2015-05-08 2016-12-07 阿里巴巴集团控股有限公司 Single-point logging method and the processing method and processing device of device, relevant device and application
CN105577691A (en) * 2016-02-03 2016-05-11 飞天诚信科技股份有限公司 Security access method and server

Also Published As

Publication number Publication date
CN106850699A (en) 2017-06-13

Similar Documents

Publication Publication Date Title
CN106850699B (en) A kind of mobile terminal login authentication method and system
CN111708991B (en) Service authorization method, device, computer equipment and storage medium
CN110519260B (en) Information processing method and information processing device
CN103795692B (en) Open authorization method, system and certification authority server
CN108173662B (en) Equipment authentication method and device
CN114900338B (en) Encryption and decryption method, device, equipment and medium
CN106685973B (en) Remember method and device, log-in control method and the device of log-on message
CN106452772B (en) Terminal authentication method and device
CN109510802B (en) Authentication method, device and system
CN111030814A (en) Key negotiation method and device
CN105075176B (en) Challenge-response method and associated client device
US20110069839A1 (en) Authentication information generating system, authentication information generating method, client apparatus, and authentication information generating program for implementing the method
KR101817152B1 (en) Method for providing trusted right information, method for issuing user credential including trusted right information, and method for obtaining user credential
CN112528250A (en) System and method for realizing data privacy and digital identity through block chain
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN111241492A (en) Product multi-tenant secure credit granting method, system and electronic equipment
CN112084521A (en) Unstructured data processing method, device and system for block chain
CN106936797A (en) The management method and system of magnetic disk of virtual machine and file encryption key in a kind of cloud
CN109150811B (en) Method and device for realizing trusted session and computing equipment
CN113852628A (en) Decentralized single sign-on method, decentralized single sign-on device and storage medium
CN114629713B (en) Identity verification method, device and system
CN114338091B (en) Data transmission method, device, electronic equipment and storage medium
CN113505353B (en) Authentication method, authentication device, authentication equipment and storage medium
CN112235276B (en) Master-slave equipment interaction method, device, system, electronic equipment and computer medium
CN113704734A (en) Distributed digital identity-based method for realizing certificate verification and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210107

Address after: 100140, 55, Fuxing Avenue, Xicheng District, Beijing

Patentee after: INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Patentee after: ICBC Technology Co.,Ltd.

Address before: 100140, 55, Fuxing Avenue, Xicheng District, Beijing

Patentee before: INDUSTRIAL AND COMMERCIAL BANK OF CHINA

TR01 Transfer of patent right