CN107222498B - Binding processing method for shared data - Google Patents

Binding processing method for shared data Download PDF

Info

Publication number
CN107222498B
CN107222498B CN201710524863.2A CN201710524863A CN107222498B CN 107222498 B CN107222498 B CN 107222498B CN 201710524863 A CN201710524863 A CN 201710524863A CN 107222498 B CN107222498 B CN 107222498B
Authority
CN
China
Prior art keywords
mobile terminal
server
authentication information
information
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710524863.2A
Other languages
Chinese (zh)
Other versions
CN107222498A (en
Inventor
崔卫洁
张利达
张振新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Borui Tongyun Technology Co.,Ltd.
Original Assignee
Jiangxi Borui Tongyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangxi Borui Tongyun Technology Co Ltd filed Critical Jiangxi Borui Tongyun Technology Co Ltd
Priority to CN201710524863.2A priority Critical patent/CN107222498B/en
Publication of CN107222498A publication Critical patent/CN107222498A/en
Application granted granted Critical
Publication of CN107222498B publication Critical patent/CN107222498B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The invention relates to a binding processing method of shared data, wherein a first mobile terminal sends a second terminal number to a server, the server sends first authentication information to the second mobile terminal, and the first mobile terminal sends a login password and second authentication information to the server; if the second authentication information is successfully matched with the first authentication information, the login password is bound with the second terminal number; the first mobile terminal sends binding request information, and the server generates a confirmed website link address and sends the confirmed website link address to the second mobile terminal; the server identifies the validity of the access information generated by the second mobile terminal and returns binding confirmation information, after the second mobile terminal returns verification code request information, the server sends third authentication information and verifies the consistency of the third authentication information and fourth authentication information, and if the third authentication information and the fourth authentication information are consistent, the first terminal number and the second terminal number are associated and bound. The invention can avoid the risk of internal network caused by account theft.

Description

Binding processing method for shared data
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method for binding and processing shared data.
Background
The method adopted by the prior art for realizing internal privacy information sharing is that a terminal to be associated automatically applies for or registers to join the internal network, and other members of the internal network do not or rarely need to participate in the application or registration process, and the terminal to be associated is directly connected with a server in the whole application or registration process. If the terminal is stolen or the account is stolen, the connection with the internal network can be smoothly established.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a binding processing method of shared data, which comprises the following steps:
the first mobile terminal sends a second terminal number of the second mobile terminal to the server;
the server generates first authentication information corresponding to the second terminal number and sends the first authentication information to the second mobile terminal;
the first mobile terminal generates a login password corresponding to the second mobile terminal and sends the login password and second authentication information to a server;
the server verifies that the second authentication information is in consistency matching with the first authentication information, and if the second authentication information is in consistency matching with the first authentication information, the login password and the second terminal number are bound;
the first mobile terminal sends binding request information to the server, wherein the binding request information comprises a first terminal number and a second terminal number of the first mobile terminal;
the server generates a confirmed website link address according to the binding request information and sends the website link address to the second terminal;
the second mobile terminal accesses the website corresponding to the website link address to generate access information;
the server sends binding confirmation information to the second mobile terminal according to the validity identified by the access information;
the second mobile terminal sends verification code request information to the server according to the binding confirmation information;
the server generates third authentication information and sends the third authentication information to the second mobile terminal;
the second mobile terminal sends fourth authentication information to the server;
and the server verifies the consistency of the third authentication information and the fourth authentication information, and if the third authentication information and the fourth authentication information are consistent, the server performs association binding processing on the first terminal number and the second terminal number.
Further, the server receives the second terminal number, performs identification processing on the second terminal number, and generates first authentication information corresponding to the second terminal number and sends the first authentication information to the second mobile terminal if the second terminal number does not exist in the server.
Further, before the server binds the login password and the second terminal number, the server authenticates the login password, and if the login password meets the authentication rule, the login password passes the authentication.
Further, the server sends a confirmed website link address to the second mobile terminal, and sends the first terminal number, the second terminal number and the confirmed website link address to a database for storage.
Further, the server sets a first effective time threshold value for the first mobile terminal to submit the second authentication information in a database field; the second mobile terminal submits a second effective time threshold value of the website generation access information corresponding to the website link address; and the second mobile terminal submits a third effective time threshold of fourth authentication information to the server.
Further, whether the submission time of the second authentication information, the website generation access information corresponding to the website link address, and the fourth authentication information is within the corresponding valid time threshold value, and if not, the submission is successful.
Further, the binding confirmation information sent by the server to the second mobile terminal includes a first terminal number, a verification code input box, a verification code acquisition button, and a binding confirmation button.
Further, the first mobile terminal sends a request for checking the bound mobile terminal to the server, and the server returns the information of the bound mobile terminal;
further, the first mobile terminal sends a request for acquiring the data of the bound mobile terminal to the server, and if the server judges that the first terminal and the mobile terminal are bound, the data of the mobile terminal is sent to the first mobile terminal; and if the server judges that the mobile terminal is not bound with the first mobile terminal, sending user error information to the first mobile terminal.
Further, the server sends the first authentication information, the second authentication information, the third authentication information and the fourth authentication information to a database for storage.
The invention also relates to a binding processing device of the shared data, which comprises a first mobile terminal, a second mobile terminal and a server;
the first mobile terminal is used for sending a second terminal number of a second mobile terminal to the server; the second mobile terminal is also used for generating a login password corresponding to the second mobile terminal and sending the login password and second authentication information to the server; the first mobile terminal is further configured to send binding request information to the server, where the binding request information includes a first terminal number and the second terminal number of the first mobile terminal;
the second mobile terminal is used for accessing the website corresponding to the website link address to generate access information; the server is also used for sending verification code request information and fourth authentication information to the server according to the binding confirmation information;
the server is used for generating first authentication information corresponding to the second terminal number and sending the first authentication information to the second mobile terminal; the second authentication information is used for carrying out consistency matching on the second authentication information and the first authentication information, and if the matching is successful, the login password and the second terminal number are bound; the server is used for generating a confirmed website link address according to the binding request information, sending the website link address to the second terminal, identifying the validity of the access information and sending binding confirmation information to the second mobile terminal; the server is also used for generating third authentication information and sending the third authentication information to the second mobile terminal; the server is further used for verifying the consistency of the third authentication information and the fourth authentication information, and if the consistency is consistent, the first terminal number and the second terminal number are subjected to associated binding processing.
The binding processing method of the shared data provided by the embodiment of the invention can avoid the risk of the internal network caused by the account theft.
Drawings
FIG. 1 is a flowchart of a binding processing method for shared data according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a binding processing apparatus for sharing data according to an embodiment of the present invention.
Detailed Description
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Fig. 1 is a flowchart of a binding processing method for shared data according to the present invention, as shown in the figure, the method includes:
step 101: and the first mobile terminal sends the second terminal number of the second mobile terminal to the server.
When a second mobile terminal needs to join the local area intranet, the first mobile terminal which has joined the local area intranet sends the second mobile terminal number to the server, and simultaneously sends a request of the second mobile terminal joining the local area intranet.
Further, the server receives the second terminal number, performs identification processing on the second terminal number, and generates first authentication information corresponding to the second terminal number and sends the first authentication information to the second mobile terminal if the second terminal number does not exist in the server. And if the corresponding second terminal number already exists in the server, the server returns the information that the second terminal number already exists.
Step 102: and the server generates first authentication information corresponding to the second terminal number and sends the first authentication information to the second mobile terminal.
And when receiving a second mobile terminal number sent by the first mobile terminal and a request of the second mobile terminal for joining the local area intranet, the server generates first authentication information aiming at the second mobile terminal number and sends the first authentication information to the second mobile terminal, wherein the first authentication information is used for confirming whether the second mobile terminal number is real and valid. If the first authentication information is transmitted to the first mobile terminal, it may happen that the first mobile terminal performs an illegal operation to falsely register a second mobile terminal number, thereby causing a loss to other users of the local area intranet. The first authentication information is sent to the second mobile terminal, so that the situation can be effectively avoided.
Step 103: and the first mobile terminal generates a login password corresponding to the second mobile terminal and sends the login password and the second authentication information to a server.
After receiving the first authentication information sent by the server, the second mobile terminal inputs second authentication information corresponding to the first authentication information through the first mobile terminal, and the first mobile terminal simultaneously generates login authentication information corresponding to the second mobile terminal, such as an Identity (ID), a login password and the like. And the first mobile terminal sends the login authentication information and the second authentication information to a server.
Step 104: and the server verifies that the second authentication information is in consistency matching with the first authentication information.
And after receiving the second authentication information sent by the first mobile terminal, the server performs matching authentication on the second authentication information and the first authentication information. The successful matching of the second authentication information and the first authentication information means that the second authentication information corresponds to the first authentication information. There are several reasons why the second authentication information does not match the first authentication information, for example, the entry time of the second authentication information exceeds the valid time threshold due to an error entry of the second authentication information.
Further, the server sets a first effective time threshold value for the first mobile terminal to submit the second authentication information in a database field; the first validity time threshold may be a certain time, such as 15min or 30 min. And when the submission time of the second authentication information exceeds the first valid time threshold, the second authentication information is considered invalid, and the information that the second authentication information is invalid is returned.
Step 105: and if the matching is successful, the login password and the second terminal number are bound.
If the server successfully matches the second authentication information with the first authentication information, the server binds the login authentication information sent by the first mobile terminal with the second terminal numbers of a plurality of second mobile terminals, namely, registration information of the second terminal numbers in the local area intranet is generated, namely, the second mobile terminals are successfully registered in the local area intranet. And if the second authentication information is not successfully matched with the first authentication information, the server returns matching failure information, and generates the first authentication information again and sends the first authentication information to the second mobile terminal or finishes the operation.
Further, before the server binds the login password and the second terminal number, the server authenticates the login password, and if the login password meets the authentication rule, the login password passes the authentication. For example, whether the number of characters of the login password is 6-18 digits, whether special characters which are not allowed to be registered are contained, whether the account exists or not is checked, if the check is passed, the registration is successful, and the information of successful registration is returned to the first mobile terminal in real time; and if the mobile terminal fails, the mobile terminal returns to register failure information to the first mobile terminal in real time.
Step 106: the first mobile terminal sends binding request information to the server, wherein the binding request information comprises a first terminal number and a second terminal number of the first mobile terminal;
after the second mobile terminal is successfully registered in the local area intranet, the first mobile terminal may initiate a request message for binding with the second mobile terminal, where the binding request message should include a first terminal number of the first mobile terminal and a second terminal number of the second mobile terminal. The first terminal number and the second terminal number are used for the server to extract and bind the identity information and the terminal information of the two terminal numbers.
Step 107: and the server generates a confirmed website link address according to the binding request information and sends the website link address to the second mobile terminal.
The server generates corresponding confirmation information after receiving the binding request sent by the first mobile terminal, wherein the confirmation information has various expression forms, such as confirming a website link address, a network confirmation verification code, a short message confirmation verification code and the like, and sends the confirmation information to the second mobile terminal.
Further, the server sends the confirmed website link address to the second mobile terminal, and simultaneously sends the first terminal number, the second terminal number and the confirmed website link address to a database for storage.
Step 108: and the second mobile terminal accesses the website corresponding to the website link address to generate access information.
And after receiving the confirmation information sent by the server, the second mobile terminal generates corresponding authentication information. For example, if the confirmation information is the confirmation website link address, generating website access information corresponding to the website link address; if the confirmation information is the network confirmation verification code, generating a corresponding network verification code; if the confirmation information is the short message confirmation verification code, generating a corresponding short message verification code, and if the confirmation information is the confirmation information in other forms, generating the verification code in the corresponding form.
Step 109: and the server sends binding confirmation information to the second mobile terminal according to the validity identified by the access information.
And if the second mobile terminal successfully returns authentication information to the server, for example, website access information corresponding to the website link address is confirmed, the binding request is confirmed to be true and valid, that is, whether the second mobile terminal agrees to perform the binding operation is confirmed. The significance of this step is that if the first mobile terminal sends a wrong binding instruction, the second mobile terminal can reject the wrong binding instruction, or the second mobile terminal can reject the wrong binding instruction when considering that the binding instruction is an illegal instruction so as to protect the own rights and interests from being lost. The server then sends the binding acknowledgement information of the first mobile terminal to the second mobile terminal.
Further, the server presets a second effective time threshold value of the second mobile terminal submitting the website generation access information corresponding to the website link address; the second validity time threshold may be a certain time, such as 15min or 30 min. And when the submission time of the website generation access information corresponding to the website link address submitted by the second mobile terminal exceeds the second effective time threshold, the access information is considered invalid, and the information with invalid access information is returned.
Step 110: and the second mobile terminal sends verification code request information to the server according to the binding confirmation information.
Step 111: and the server generates third authentication information and sends the third authentication information to the second mobile terminal.
And the second mobile terminal receives the binding confirmation information sent by the server and agrees to the binding operation, and then sends verification code request information to the server, and the server receives the verification code request information, then generates third authentication information and sends the third authentication information to the second mobile terminal. The third authentication information is used for confirming whether the second mobile terminal agrees to bind with the first mobile terminal again, and if the second mobile terminal agrees to bind with the first mobile terminal, the binding can be refused.
Further, the binding confirmation information sent by the server to the second mobile terminal includes a first terminal number, a verification code input box, a verification code acquisition button, and a binding confirmation button. When the first terminal number is sent, in order to remind the second mobile terminal that the object to be bound is the first mobile terminal, the verification code obtaining button is used for the second mobile terminal to send verification code request information to the server, the verification code input box is used for inputting the verification code, and the binding confirming button is used for agreeing with the binding request of the first mobile terminal.
Step 112: and the second mobile terminal sends fourth authentication information to the server.
And after the second mobile terminal receives the third authentication information sent by the server and agrees to bind with the first mobile terminal, the second mobile terminal sends fourth authentication information to the server.
Step 113: the server verifies consistency of the third authentication information and the fourth authentication information.
After receiving the fourth authentication information sent by the second mobile terminal, the server judges the consistency of the fourth authentication information and the third authentication information, if the fourth authentication information is not matched with the third authentication information or the submission time of the fourth authentication information is not within the preset effective time threshold, the server considers that the matching fails, and after the matching fails, the server can regenerate the third authentication information or stop the operation.
Further, the server presets a third effective time threshold for the second mobile terminal to submit fourth authentication information to the server. The third validity time threshold may be a certain time, such as 15min or 30 min. And when the submission time of the second mobile terminal submitting the fourth authentication information exceeds the third valid time threshold, the fourth authentication information is considered invalid, and the information that the fourth authentication information is invalid is returned.
Further, the method further comprises the step that the server sends the first authentication information, the second authentication information, the third authentication information and the fourth authentication information to a database for storage.
Step 114: and the server performs association binding processing on the first terminal number and the second terminal number.
And when the server judges that the fourth authentication information and the third authentication information are successfully matched, the server considers that the second mobile terminal agrees to perform association binding with the first mobile terminal, namely, the server performs association binding processing on the first terminal number and the second terminal number.
It should be noted that, in the local area intranet, any one mobile terminal or terminal may request to establish association binding with other mobile terminals or terminals, and a process of requesting to establish association binding with the first mobile terminal by another mobile terminal, such as the second mobile terminal, is similar to a process of requesting to establish association binding with the second mobile terminal by the first mobile terminal.
Further, the first mobile terminal sends a request for checking the bound mobile terminal to the server, and the server returns the information of the bound mobile terminal.
After the first mobile terminal and the second mobile terminal are successfully bound, a request for checking the bound mobile terminal of the mobile terminal can be sent to the server, and after the server receives the checking request of the first mobile terminal, the server searches in the database according to the identity information and the terminal information of the first mobile terminal and sends the searched information of the bound mobile terminal to the first mobile terminal. Similarly, other mobile terminals in the local area network may also perform this operation.
The method comprises the steps that a first mobile terminal sends a request for acquiring bound mobile terminal data to a server, and if the server judges that the first terminal and the mobile terminal are bound, the mobile terminal data are sent to the first mobile terminal; and if the server judges that the mobile terminal is not bound with the first mobile terminal, sending user error information to the first mobile terminal.
Specifically, when a first mobile terminal needs to acquire data of a bound mobile terminal, a request for acquiring the data of the bound mobile terminal needs to be sent to a server, the server firstly confirms the binding relationship between the first mobile terminal and the mobile terminal, if the server confirms that the mobile terminal and the first mobile terminal are bound, the request for acquiring the data of the first mobile terminal is sent to the mobile terminal, and if the mobile terminal agrees with the request, the server sends the data of the mobile terminal to the first mobile terminal; if the mobile terminal refuses the request, the server sends refusing request information to the first mobile terminal. And if the off-server judges that the mobile terminal is not bound with the first mobile terminal, user error information or mobile terminal unbound information is sent to the first mobile terminal, and the first mobile terminal can initiate a binding request with the mobile terminal.
Fig. 2 is a schematic diagram of a binding processing device for shared data according to the present invention, where as shown in the figure, the binding processing device includes a first mobile terminal 2, a second mobile terminal 3, and a server 1, where the first mobile terminal 2 and the server 1 have an electrical connection relationship, and the second mobile terminal 3 and the server 1 have an electrical connection relationship.
The first mobile terminal 2 is used for sending a second terminal number of the second mobile terminal 3 to the server 1; the mobile terminal is further configured to generate a login password corresponding to the second mobile terminal 3, and send the login password and the second authentication information to the server 1; the first mobile terminal 2 is further configured to send binding request information to the server 1, where the binding request information includes the first terminal number and the second terminal number of the first mobile terminal 2.
The first mobile terminal 2 is a necessary tool for the second mobile terminal 3 to join the local area intranet, and if the first mobile terminal 2 is not matched, the second mobile terminal 3 cannot successfully join the local area intranet under the condition that the setting of the server 1 is not changed, so that the situation that the mobile terminal or the terminal joins the local area intranet through illegal operation to cause loss to other mobile terminals in the local area intranet or steal data information of the local area intranet is avoided.
The second mobile terminal 3 is configured to access a website corresponding to the website link address to generate access information; and is further configured to send verification code request information and fourth authentication information to the server 1 according to the binding acknowledgement information.
After the second mobile terminal 3 successfully joins the local area intranet, an association binding relationship may be established with other mobile terminals, and when the association binding relationship is established, a requested party, that is, the second mobile terminal 3 performs a main binding operation, such as an agreement on a relevant binding operation with the first mobile terminal 2.
The server 1 is configured to generate first authentication information corresponding to the second terminal number and send the first authentication information to the second mobile terminal 3; the second authentication information is used for carrying out consistency matching on the second authentication information and the first authentication information, and if the matching is successful, the login password and the second terminal number are bound; the server 1 is configured to generate a website link address confirmation according to the binding request information, send the website link address to the second terminal, identify validity of the access information, and send binding confirmation information to the second mobile terminal 3; the server 1 is further configured to generate third authentication information and send the third authentication information to the second mobile terminal 3; the server 1 is further configured to verify consistency of the third authentication information and the fourth authentication information, and if the third authentication information and the fourth authentication information are consistent, perform association binding processing on the first terminal number and the second terminal number.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware, a software module executed by a processor, or a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (10)

1. A binding processing method for shared data is characterized by comprising the following steps:
the first mobile terminal sends a second terminal number of the second mobile terminal to the server;
the server generates first authentication information corresponding to the second terminal number and sends the first authentication information to the second mobile terminal;
the first mobile terminal generates a login password corresponding to the second mobile terminal and sends the login password and second authentication information to a server;
the server verifies that the second authentication information is in consistency matching with the first authentication information, and if the second authentication information is in consistency matching with the first authentication information, the login password and the second terminal number are bound;
the first mobile terminal sends binding request information to the server, wherein the binding request information comprises a first terminal number and a second terminal number of the first mobile terminal;
the server generates a confirmed website link address according to the binding request information and sends the website link address to the second mobile terminal;
the second mobile terminal accesses the website corresponding to the website link address to generate access information;
the server sends binding confirmation information to the second mobile terminal according to the validity identified by the access information;
the second mobile terminal sends verification code request information to the server according to the binding confirmation information;
the server generates third authentication information and sends the third authentication information to the second mobile terminal;
the second mobile terminal sends fourth authentication information to the server;
and the server verifies the consistency of the third authentication information and the fourth authentication information, and if the third authentication information and the fourth authentication information are consistent, the server performs association binding processing on the first terminal number and the second terminal number.
2. The method according to claim 1, further comprising the step of the server receiving the second terminal number and then performing identification processing on the second terminal number, and if the second terminal number does not exist in the server, generating first authentication information corresponding to the second terminal number and sending the first authentication information to the second mobile terminal.
3. The method according to claim 1, further comprising, before the server binds the login password and the second terminal number, authenticating the login password by the server, and if the login password conforms to an authentication rule, authenticating the login password.
4. The method of claim 1, further comprising the server sending a confirmation website link address to the second mobile terminal and sending the first terminal number, the second terminal number, and the confirmation website link address to a database for storage.
5. The method according to claim 1, further comprising the server setting a first validity time threshold in a database field for the first mobile terminal to submit the second authentication information; the second mobile terminal submits a second effective time threshold value of the website generation access information corresponding to the website link address; and the second mobile terminal submits a third effective time threshold of fourth authentication information to the server.
6. The method according to claim 5, further comprising determining whether submission times of the second authentication information, the website generation access information corresponding to the website link address, and the fourth authentication information are within corresponding valid time thresholds, and if not, submitting successfully.
7. The method according to claim 1, further comprising the step of the server sending binding confirmation information to the second mobile terminal including the first terminal number, the verification code input box, the verification code obtaining button and the binding confirmation button.
8. The method of claim 1, further comprising the first mobile terminal sending a view bound mobile terminal request to the server, the server returning bound mobile terminal information;
the method comprises the steps that a first mobile terminal sends a request for acquiring bound mobile terminal data to a server, and if the server judges that the first terminal and the mobile terminal are bound, the mobile terminal data are sent to the first mobile terminal; and if the server judges that the mobile terminal is not bound with the first mobile terminal, sending user error information to the first mobile terminal.
9. The method of claim 1, further comprising the server sending the first authentication information, the second authentication information, the third authentication information, and the fourth authentication information to a database store.
10. The binding processing device for the shared data is characterized by comprising a first mobile terminal, a second mobile terminal and a server;
the first mobile terminal is used for sending a second terminal number of the second mobile terminal to the server;
the server is used for generating first authentication information corresponding to the second terminal number and sending the first authentication information to the second mobile terminal;
the first mobile terminal is further used for generating a login password corresponding to the second mobile terminal and sending the login password and second authentication information to a server;
the server is also used for carrying out consistency matching on the second authentication information and the first authentication information, and if the matching is successful, the login password and the second terminal number are bound;
the first mobile terminal is further configured to send binding request information to the server, where the binding request information includes a first terminal number and the second terminal number of the first mobile terminal;
the server is also used for generating a confirmed website link address according to the binding request information and sending the website link address to the second terminal;
the second mobile terminal is used for accessing the website corresponding to the website link address to generate access information;
the server is also used for identifying the validity of the access information and sending binding confirmation information to the second mobile terminal according to the validity identified by the access information;
the second mobile terminal is also used for sending verification code request information to the server according to the binding confirmation information;
the server is also used for generating third authentication information and sending the third authentication information to the second mobile terminal;
the second mobile terminal is further used for sending fourth authentication information to the server;
the server is further used for verifying the consistency of the third authentication information and the fourth authentication information, and if the consistency is consistent, the first terminal number and the second terminal number are subjected to associated binding processing.
CN201710524863.2A 2017-06-30 2017-06-30 Binding processing method for shared data Active CN107222498B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710524863.2A CN107222498B (en) 2017-06-30 2017-06-30 Binding processing method for shared data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710524863.2A CN107222498B (en) 2017-06-30 2017-06-30 Binding processing method for shared data

Publications (2)

Publication Number Publication Date
CN107222498A CN107222498A (en) 2017-09-29
CN107222498B true CN107222498B (en) 2020-02-21

Family

ID=59951827

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710524863.2A Active CN107222498B (en) 2017-06-30 2017-06-30 Binding processing method for shared data

Country Status (1)

Country Link
CN (1) CN107222498B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112311730B (en) * 2019-07-29 2023-10-20 西安中兴新软件有限责任公司 Pairing information uploading, connecting and authenticating method, terminal and server

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104519485B (en) * 2013-09-29 2019-09-17 腾讯科技(深圳)有限公司 Communication means, device and system between a kind of terminal
CN104766209B (en) * 2014-01-07 2017-07-21 腾讯科技(深圳)有限公司 A kind of batch data processing method and system
CN104796385B (en) * 2014-01-20 2019-04-16 腾讯科技(深圳)有限公司 Terminal binding method, apparatus and system
CN105530222B (en) * 2014-09-29 2019-03-05 腾讯科技(深圳)有限公司 Connection method for building up between multiple terminals, device and system
CN105812413B (en) * 2014-12-29 2020-04-21 深圳市腾讯计算机系统有限公司 Communication method and device
TWI547830B (en) * 2015-04-24 2016-09-01 致伸科技股份有限公司 Input system and method
CN105207867A (en) * 2015-10-30 2015-12-30 北京奇艺世纪科技有限公司 Equipment connecting method and equipment connecting device

Also Published As

Publication number Publication date
CN107222498A (en) 2017-09-29

Similar Documents

Publication Publication Date Title
CN104077689B (en) A kind of method of Information Authentication, relevant apparatus and system
KR101666374B1 (en) Method, apparatus and computer program for issuing user certificate and verifying user
CN107948204B (en) One-key login method and system, related equipment and computer readable storage medium
US10460309B2 (en) Payment verification method, apparatus and system
US8590024B2 (en) Method for generating digital fingerprint using pseudo random number code
CN105516195A (en) Security authentication system and security authentication method based on application platform login
CN107426235B (en) Authority authentication method, device and system based on equipment fingerprint
CN109308416B (en) Business service data processing method, device, system, storage medium and equipment
KR20120024745A (en) Shared registration system multi-factor authentication
US20140053251A1 (en) User account recovery
US11218464B2 (en) Information registration and authentication method and device
CN114531277A (en) User identity authentication method based on block chain technology
CN109496443A (en) Mobile authentication method and system for it
KR20220167366A (en) Cross authentication method and system between online service server and client
CN114338149B (en) Login credential authorization method of server, terminal and key escrow platform
CN115982694A (en) Resource access method, device, equipment and medium
CN112437068B (en) Authentication and key agreement method, device and system
CN107222498B (en) Binding processing method for shared data
KR101879843B1 (en) Authentication mehtod and system using ip address and short message service
CN113872990A (en) VPN network certificate authentication method and device based on SSL protocol and computer equipment
KR102199138B1 (en) Method, apparatus and program for user authentication
KR101133167B1 (en) Method and apparatus for user verifing process with enhanced security
CN111901359B (en) Resource account authorization method, device, system, computer equipment and medium
CN106533685B (en) Identity authentication method, device and system
CN114500074B (en) Single-point system security access method and device and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200916

Address after: 100020 Beijing, East Third Ring Road, North Road, a building, floor 1702, room 17, room 26

Patentee after: Beijing Borui Tongyun Technology Co.,Ltd.

Address before: 330000 Jiangxi province Nanchang City Airport Economic Zone Confucianism Le Hu Street No. 399

Patentee before: JIANGXI BORUITONGYUN TECHNOLOGY Co.,Ltd.

CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Shi Lihong

Inventor after: Cui Weijie

Inventor after: Zhang Lida

Inventor after: Zhang Zhenxin

Inventor before: Cui Weijie

Inventor before: Zhang Lida

Inventor before: Zhang Zhenxin