CN107241310A - A kind of client identity verification method and device - Google Patents

A kind of client identity verification method and device Download PDF

Info

Publication number
CN107241310A
CN107241310A CN201710309240.3A CN201710309240A CN107241310A CN 107241310 A CN107241310 A CN 107241310A CN 201710309240 A CN201710309240 A CN 201710309240A CN 107241310 A CN107241310 A CN 107241310A
Authority
CN
China
Prior art keywords
client
flow bag
solicited message
key
side information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710309240.3A
Other languages
Chinese (zh)
Other versions
CN107241310B (en
Inventor
谢州为
谢京辉
张佰春
黄正兴
李超
张菊元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Longzhixin Technology Co ltd
Original Assignee
Beijing Panda Mutual Entertainment Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Panda Mutual Entertainment Technology Co Ltd filed Critical Beijing Panda Mutual Entertainment Technology Co Ltd
Priority to CN201710309240.3A priority Critical patent/CN107241310B/en
Publication of CN107241310A publication Critical patent/CN107241310A/en
Application granted granted Critical
Publication of CN107241310B publication Critical patent/CN107241310B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of client identity verification method and device.Methods described includes:Receive the client-side information that the client is carried in relevant the first solicited message serviced using application correspondence flow bag sent after client terminal start-up application, first solicited message;According to the client-side information, the corresponding flow bag key of the client is obtained;The second solicited message is sent to traffic service provider with reference to the flow bag key, so that the traffic service provider carries out authentication according to the flow bag key to the client, and is that the client opens the flow bag after being verified.The embodiment of the present invention can improve the security of flow bag key, illegally be stolen to prevent fluid stopping amount bag key.

Description

A kind of client identity verification method and device
Technical field
The present invention relates to Internet technical field, more particularly to a kind of client identity verification method and device.
Background technology
Carry out listening song or viewing live video institute online using application APP (application, using) to reduce user The campus network used, many APP providers can combine with major operators (China Telecom, CHINAUNICOM and China Mobile) Exclusive flow bag is released, for example:QQ music flows bag, panda TV flow bags etc..
In the prior art, having ordered the client of exclusive flow bag can locally be stored with authentication secret, and client needs to make Tested with identity is carried out to the client there is provided the operator of exclusive flow bag service needs during the exclusive flow bag ordered Card, is verified, the client could use the exclusive flow bag.However, authentication secret is stored in client, it is easy to Illegally stolen, cause the economic loss of validated user.
The content of the invention
The present invention provides a kind of client identity verification method and device, it is therefore intended that improve the safety of flow bag key Property, illegally stolen to prevent fluid stopping amount bag key.
In order to solve the above-mentioned technical problem, the present invention provides a kind of client identity verification method, including:
Receive relevant the first request letter serviced using application correspondence flow bag sent after client terminal start-up application The client-side information of the client is carried in breath, first solicited message;
According to the client-side information, the corresponding flow bag key of the client is obtained;
The second solicited message is sent to traffic service provider with reference to the flow bag key, so that the traffic service is carried Supplier carries out authentication according to the flow bag key to the client, and is provided after being verified for the client The flow bag service.
Alternatively, the client-side information includes:Client identification module SIM card information, the user's letter for logging in the application Breath and/or terminal iidentification.
Alternatively, according to the client-side information, the corresponding flow bag key of the client is obtained, including:
Corresponding relation based on preset client-side information and flow bag key, inquires about the corresponding institute of the client-side information State flow bag key.
Alternatively, the second solicited message is sent to traffic service provider with reference to the flow bag key, including:
Second solicited message is generated with reference to the flow bag key;
Second solicited message is sent to the traffic service provider with temporarily redirecting mode.
Alternatively, second solicited message is generated with reference to the flow bag key, including:
The specified location that the flow bag key is filled in first solicited message, generates the second request letter Breath;Or
According to the client-side information and the flow bag key, second solicited message is generated.
In order to solve the above-mentioned technical problem, the present invention also provides a kind of client identity checking device, including:
Receiving module, what is sent for receiving after client terminal start-up application is relevant using application correspondence flow bag service The first solicited message, the client-side information of the client is carried in first solicited message;
Acquisition module, for according to the client-side information, obtaining the corresponding flow bag key of the client;
Sending module, for sending the second solicited message to traffic service provider with reference to the flow bag key, so that The traffic service provider carries out authentication according to the flow bag key to the client, and is after being verified The client provides the flow bag service.
It is easy to illegally be cracked due to flow bag key is stored in into client, therefore the embodiments of the invention provide one Plant and key is preserved using intermediate proxy server and sent from intermediate proxy server agent client to traffic service provider The implementation of key.The difficulty that service end is illegally cracked is larger, therefore key can effectively be increased in the presence of in service side The security of strong encryption keys, reduces the stolen risk of flow bag key.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are this hairs Some bright embodiments, for those of ordinary skill in the art on the premise of not paying creative work, can be with root Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is the flow chart of one embodiment of client identity verification method provided in an embodiment of the present invention;
Fig. 2 is the flow chart of another embodiment of client identity verification method provided in an embodiment of the present invention;
Fig. 3 is the structural representation of one embodiment that client identity provided in an embodiment of the present invention verifies device.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is A part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
The term used in embodiments of the present invention is the purpose only merely for description specific embodiment, and is not intended to be limiting The present invention." one kind ", " described " and "the" of singulative used in the embodiment of the present invention and appended claims It is also intended to including most forms, unless context clearly shows that other implications, " a variety of " generally comprise at least two, but not Exclude and include at least one situation.
It should be appreciated that term "and/or" used herein is only a kind of incidence relation for describing affiliated partner, represent There may be three kinds of relations, for example, A and/or B, can be represented:Individualism A, while there is A and B, individualism B these three Situation.In addition, character "/" herein, it is a kind of relation of "or" to typically represent forward-backward correlation object.
It will be appreciated that though XXX may be described using term first, second, third, etc. in embodiments of the present invention, but These XXX should not necessarily be limited by these terms.These terms are only used for XXX being distinguished from each other out.For example, not departing from implementation of the present invention In the case of example scope, the first XXX can also be referred to as the 2nd XXX, similarly, and the 2nd XXX can also be referred to as the first XXX.
Depending on linguistic context, word as used in this " if ", " if " can be construed to " ... when " or " when ... " or " in response to determining " or " in response to monitoring ".Similarly, depending on linguistic context, phrase " if it is determined that " or " such as Fruit monitoring (condition or event of statement) " can be construed to " when it is determined that when " or " in response to determine " or " when monitoring (statement Condition or event) when " or " in response to monitoring (condition or event of statement) ".
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Comprising, so that commodity or system including a series of key elements not only include those key elements, but also including without clear and definite Other key elements listed, or also include for this commodity or the intrinsic key element of system.In the feelings of not more limitations Under condition, the key element limited by sentence "including a ...", it is not excluded that in the commodity or system including the key element also There is other identical element.
Fig. 1 is the flow chart of one embodiment of client identity verification method provided in an embodiment of the present invention.Such as Fig. 1 institutes Show, this method includes:
101st, receive sent after client terminal start-up application it is relevant using application correspondence flow bag service first please Seek the client-side information that the client is carried in information, first solicited message.
102nd, according to the client-side information, the corresponding flow bag key of the client is obtained.
103rd, the second solicited message is sent to traffic service provider with reference to the flow bag key, so that the flow takes Business provider carries out authentication according to the flow bag key to the client, and is the client after being verified The flow bag service is provided.
Wherein, the flow bag refers to that the application APP providers combine with Virtual network operator for such application APP The exclusive flow bag released, the client for ordering the exclusive flow bag should described in on-line operation under 2G/3G/4G networking states Used time can enjoy the flow bag service of Virtual network operator offer, and the local flow of client is not spent.At present, Virtual network operator The exclusive flow released is surrounded by music flow bag, live video flow bag and order video flow bag etc..
In above-mentioned steps 101, when user is applying described in client terminal start-up, the client end response starts behaviour in described Make, the first solicited message is sent to an intermediate proxy server, to ask to use the corresponding flow bag services of the application APP, The client-side information of the client is carried in first solicited message.
Or, after client enables the application, user can trigger manually when needed enables the application correspondence stream Amount bag service.A kind of achievable scheme is:Client end response is in the triggering about enabling the application correspondence flow bag service Operation, the first solicited message is sent to an intermediate proxy server.For example, being provided with related control in, user clicks on should Control is to complete the above-mentioned trigger action about enabling the application correspondence flow bag service.
In above-mentioned steps 102, the corresponding flow bag key of the client is to order the application pair in the client During the flow bag answered, the flow bag key that service provider is configured by the client, the follow-up client uses described During flow bag, service provider needs to carry out authentication to the client according to flow bag key.Service provider is institute State client to have configured after the corresponding flow bag key of the application, the flow bag key is sent to middle-agent's service Device, intermediate proxy server is stored accordingly locally.When user subsequently needs to use the flow bag, middle-agent The client-side information carried in the first solicited message that server is sent according to the client, is locally obtaining the client Hold corresponding flow bag key.Wherein, service provider refers to providing the Virtual network operator of the flow bag service.
In above-mentioned steps 103, client-side information of the intermediate proxy server in being asked according to first finds the visitor After the corresponding flow bag key in family end, the second solicited message, second are sent to service provider with reference to the flow bag key Solicited message not only includes the flow bag key, in addition to the client-side information.Service provider receive it is described After flow bag key and the client-side information, authentication is carried out to the client, once it is verified, it is allowed to it is described Client uses the corresponding flow bag of the application.
In above-described embodiment or following embodiments, according to the client-side information, the corresponding stream of the client is obtained Measuring bag key can be:Corresponding relation based on preset client-side information and flow bag key, inquires about the client correspondence The flow bag key.
Wherein, the client-side information can include:Client identification module SIM card information, the user for logging in the application Information and/or terminal iidentification.Therefore, the corresponding relation of preset client-side information and flow bag key can recognize mould for client The corresponding relation of block SIM card information and flow bag key, or log in the user profile and flow bag key of the application Corresponding relation, or be the corresponding relation of terminal iidentification and flow bag key.
What it is when the first solicited message carrying that the client is sent is client identification module SIM card information, then according to visitor The corresponding relation of family identification module SIM card information and flow bag key, to search the corresponding flow bag key of the client;When The user profile for being logged on the application that the first solicited message that the client is sent is carried, then according to logging in the application User profile and flow bag key corresponding relation, to search the corresponding flow bag key of the client;As the client Hold the first solicited message sent carrying is terminal iidentification, then according to terminal iidentification and the corresponding relation of flow bag key, is come Search the corresponding flow bag key of the client.
It is easy to illegally be cracked due to flow bag key is stored in into client, therefore the embodiments of the invention provide one Plant and key is preserved using intermediate proxy server and sent from intermediate proxy server agent client to traffic service provider The implementation of key.The difficulty that service end is illegally cracked is larger, therefore key can effectively be increased in the presence of in service side The security of strong encryption keys, reduces the stolen risk of flow bag key.
In order to further ensure that the security of client-side information and flow bag key in transmitting procedure, client exists First is sent under https (Hyper Text Transfer Protocol over Secure Socket Layer) agreement please Information is sought to intermediate proxy server, intermediate proxy server also sends the second solicited message under https agreements and carried to service Supplier.Because https is the Encryption Transmission Protocol with security, therefore, even if in transmitting procedure, solicited message is illegal Interception, because solicited message is in encrypted state, illegal interceptor can not also know the specifying information in the solicited message.
Fig. 2 is the flow chart of another embodiment of client identity verification method provided in an embodiment of the present invention.Such as Fig. 2 Shown, this method includes:
201st, receive sent after client terminal start-up application it is relevant using application correspondence flow bag service first please Seek the client-side information that the client is carried in information, first solicited message.
202nd, according to the client-side information, the corresponding flow bag key of the client is obtained.
203rd, second solicited message is generated with reference to the flow bag key.
204th, second solicited message is sent to the traffic service provider with temporarily redirecting mode, so that institute State traffic service provider and authentication is carried out to the client according to the flow bag key, and be institute after being verified State client and the flow bag service is provided.
Wherein, above-mentioned steps 201 and step 202 can be found in the corresponding contents in above-described embodiment, and here is omitted.
It should be noted that in the specific implementation, joint network operator releases the APP providers of flow bag service, can One intermediate proxy server is pre-configured with a application APP under, and deposited in advance on the intermediate proxy server The client-side information of the corresponding flow bags of such application APP and the corresponding relation of flow bag key have been ordered in storage;It can also be directed to Under many money application APP be pre-configured with an intermediate proxy server, and on the intermediate proxy server, respectively for described A APP in many money application APP, prestores the client-side information and flow for having ordered the application APP correspondences flow bag The corresponding relation of bag key.So, different application APP likely corresponds to different intermediate proxy servers, therefore, client Institute can be included by starting relevant the first solicited message serviced using the corresponding flow bag of the application sent after the application Application identities are stated, the application identities can include Apply Names and version number., please by described first according to the application identities Information locating is sought to the intermediate proxy server configured in advance for the APP.
In above-mentioned steps 203, in being adopted with the following method with reference to flow bag key generation second solicited message One or more realizations:
Mode one, the specified location for filling in the flow bag key in first solicited message, generate described the Two solicited messages.
Mode two, according to the client-side information and the flow bag key, generate second solicited message.
It is easy to illegally be cracked due to flow bag key is stored in into client, therefore the embodiments of the invention provide one Plant and key is preserved using intermediate proxy server and sent from intermediate proxy server agent client to traffic service provider The implementation of key.The difficulty that service end is illegally cracked is larger, therefore key can effectively be increased in the presence of in service side The security of strong encryption keys, reduces the stolen risk of flow bag key.
Fig. 3 is the structural representation of one embodiment that client identity provided in an embodiment of the present invention verifies device.Such as Shown in Fig. 3, the device includes:Receiving module 301, acquisition module 302 and sending module 303.
Receiving module 301, what is sent for receiving after client terminal start-up application is relevant using application correspondence flow bag The client-side information of the client is carried in first solicited message of service, first solicited message.
Acquisition module 302, for according to the client-side information, obtaining the corresponding flow bag key of the client.
Sending module 303, for sending the second solicited message to traffic service provider with reference to the flow bag key, with The traffic service provider is set to carry out authentication to the client according to the flow bag key, and after being verified The flow bag service is provided for the client.
Wherein, the client-side information can include:Client identification module SIM card information, the user for logging in the application Information and/or terminal iidentification.
Alternatively, the acquisition module 302, including:
Query unit, for the corresponding relation based on preset client-side information and flow bag key, inquires about the client The corresponding flow bag key of client information.
Alternatively, sending module 303, including:
Generation unit, for generating second solicited message with reference to the flow bag key;
Transmitting element, for being sent second solicited message to traffic service offer with temporarily redirecting mode Side.
Alternatively, the generation unit, is additionally operable to:
The specified location that the flow bag key is filled in first solicited message, generates the second request letter Breath;Or
According to the client-side information and the flow bag key, second solicited message is generated.
It is easy to illegally be cracked due to flow bag key is stored in into client, therefore the embodiments of the invention provide one Plant and key is preserved using intermediate proxy server and sent from intermediate proxy server agent client to traffic service provider The implementation of key.The difficulty that service end is illegally cracked is larger, therefore key can effectively be increased in the presence of in service side The security of strong encryption keys, reduces the stolen risk of flow bag key.Need exist for explanation be:The page that above-described embodiment is provided Loading device can realize the technical scheme described in above method embodiment, and the principle that above-mentioned each module or unit are implemented can Referring to the corresponding contents in above-mentioned each method embodiment, here is omitted.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although The present invention is described in detail with reference to the foregoing embodiments, it will be understood by those within the art that:It still may be used To be modified to the technical scheme described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic; And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical scheme spirit and Scope.

Claims (10)

1. a kind of client identity verification method, it is characterised in that including:
Receive relevant the first solicited message serviced using application correspondence flow bag sent after client terminal start-up application, institute State the client-side information that the client is carried in the first solicited message;
According to the client-side information, the corresponding flow bag key of the client is obtained;
The second solicited message is sent to traffic service provider with reference to the flow bag key, so that the traffic service provider Authentication is carried out to the client according to the flow bag key, and provides described after being verified for the client Flow bag is serviced.
2. according to the method described in claim 1, it is characterised in that the client-side information includes:Client identification module SIM card Information, the user profile and/or terminal iidentification for logging in the application.
3. according to the method described in claim 1, it is characterised in that according to the client-side information, obtain the client pair The flow bag key answered, including:
Corresponding relation based on preset client-side information and flow bag key, inquires about the corresponding stream of the client-side information Measure bag key.
4. according to the method in any one of claims 1 to 3, it is characterised in that with reference to the flow bag key to flow Service provider sends the second solicited message, including:
Second solicited message is generated with reference to the flow bag key;
Second solicited message is sent to the traffic service provider with temporarily redirecting mode.
5. method according to claim 4, it is characterised in that with reference to flow bag key generation the second request letter Breath, including:
The specified location that the flow bag key is filled in first solicited message, generates second solicited message; Or
According to the client-side information and the flow bag key, second solicited message is generated.
6. a kind of client identity verifies device, it is characterised in that including:
Receiving module, sent for receiving after client terminal start-up application it is relevant serviced using application correspondence flow bag the The client-side information of the client is carried in one solicited message, first solicited message;
Acquisition module, for according to the client-side information, obtaining the corresponding flow bag key of the client;
Sending module, for sending the second solicited message to traffic service provider with reference to the flow bag key, so that described Traffic service provider carries out authentication according to the flow bag key to the client, and is described after being verified Client provides the flow bag service.
7. device according to claim 6, it is characterised in that the client-side information includes:Client identification module SIM card Information, the user profile and/or terminal iidentification for logging in the application.
8. device according to claim 6, it is characterised in that the acquisition module, including:
Query unit, for the corresponding relation based on preset client-side information and flow bag key, inquires about the client letter Cease the corresponding flow bag key.
9. the device according to any one of claim 6 to 8, it is characterised in that the sending module, including:
Generation unit, for generating second solicited message with reference to the flow bag key;
Transmitting element, for being sent second solicited message to the traffic service provider with temporarily redirecting mode.
10. device according to claim 9, it is characterised in that the generation unit, is additionally operable to:
The specified location that the flow bag key is filled in first solicited message, generates second solicited message; Or
According to the client-side information and the flow bag key, second solicited message is generated.
CN201710309240.3A 2017-05-04 2017-05-04 Client identity verification method and device Expired - Fee Related CN107241310B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710309240.3A CN107241310B (en) 2017-05-04 2017-05-04 Client identity verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710309240.3A CN107241310B (en) 2017-05-04 2017-05-04 Client identity verification method and device

Publications (2)

Publication Number Publication Date
CN107241310A true CN107241310A (en) 2017-10-10
CN107241310B CN107241310B (en) 2020-11-06

Family

ID=59984261

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710309240.3A Expired - Fee Related CN107241310B (en) 2017-05-04 2017-05-04 Client identity verification method and device

Country Status (1)

Country Link
CN (1) CN107241310B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635714A (en) * 2009-05-31 2010-01-27 北京飞天诚信科技有限公司 Method and system for improving network application safety
CN101795243A (en) * 2010-03-26 2010-08-04 成都市华为赛门铁克科技有限公司 Method, device and system for accessing attachment files in electronic mails
CN101902327A (en) * 2009-06-01 2010-12-01 中国移动通信集团公司 Method and device for realizing single-point log-in and system thereof
CN102594817A (en) * 2012-02-15 2012-07-18 李晶 Password agent method, user terminal equipment and password agent server
CN103220372A (en) * 2012-01-19 2013-07-24 中国移动通信集团公司 Data service access method and system
CN103648087A (en) * 2013-12-23 2014-03-19 成都西加云杉科技有限公司 Charging method and system in cross-network communication
WO2015100615A1 (en) * 2013-12-31 2015-07-09 华为技术有限公司 Method and apparatus for processing service packet, and gateway device
CN104902452A (en) * 2015-06-30 2015-09-09 北京奇虎科技有限公司 Mobile terminal and network access method thereof
CN104933614A (en) * 2015-06-30 2015-09-23 北京奇虎科技有限公司 Shopping method, proxy server and system applying to mobile terminal
CN106161475A (en) * 2016-09-12 2016-11-23 沈书荣 The implementation method of subscription authentication and device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635714A (en) * 2009-05-31 2010-01-27 北京飞天诚信科技有限公司 Method and system for improving network application safety
CN101902327A (en) * 2009-06-01 2010-12-01 中国移动通信集团公司 Method and device for realizing single-point log-in and system thereof
CN101795243A (en) * 2010-03-26 2010-08-04 成都市华为赛门铁克科技有限公司 Method, device and system for accessing attachment files in electronic mails
CN103220372A (en) * 2012-01-19 2013-07-24 中国移动通信集团公司 Data service access method and system
CN102594817A (en) * 2012-02-15 2012-07-18 李晶 Password agent method, user terminal equipment and password agent server
CN103648087A (en) * 2013-12-23 2014-03-19 成都西加云杉科技有限公司 Charging method and system in cross-network communication
WO2015100615A1 (en) * 2013-12-31 2015-07-09 华为技术有限公司 Method and apparatus for processing service packet, and gateway device
CN104902452A (en) * 2015-06-30 2015-09-09 北京奇虎科技有限公司 Mobile terminal and network access method thereof
CN104933614A (en) * 2015-06-30 2015-09-23 北京奇虎科技有限公司 Shopping method, proxy server and system applying to mobile terminal
CN106161475A (en) * 2016-09-12 2016-11-23 沈书荣 The implementation method of subscription authentication and device

Also Published As

Publication number Publication date
CN107241310B (en) 2020-11-06

Similar Documents

Publication Publication Date Title
US6363479B1 (en) System and method for signing markup language data
EP1976181B1 (en) A method, apparatus and data download system for controlling the validity of the download transaction
CN106209726B (en) Mobile application single sign-on method and device
US20090228966A1 (en) Authentication Method for Wireless Transactions
CN104753674B (en) A kind of verification method and equipment of application identity
CN111131416B (en) Service providing method and device, storage medium and electronic device
CN109347700B (en) Test method, test device, electronic equipment and storage medium
CN103503408A (en) System and method for providing access credentials
CN108243176B (en) Data transmission method and device
CN106789834B (en) The method of user identity, gateway, PCRF network element and system for identification
CN110351228A (en) Remote entry method, device and system
CN103874069B (en) A kind of wireless terminal MAC authentication devices and method
CN104125565A (en) Method for realizing terminal authentication based on OMA DM, terminal and server
CN103297437A (en) Safety server access method for mobile intelligent terminal
EP3334115B1 (en) User authentication based on token
CN107426339A (en) A kind of cut-in method, the apparatus and system of data interface channel
CN107046544A (en) A kind of method and apparatus of the unauthorized access request recognized to website
CN107508822A (en) Access control method and device
CN104283903A (en) Downloading method for files and device thereof
CN109862009B (en) Client identity verification method and device
CN107864475A (en) The quick authentication methods of WiFi based on Portal+ dynamic passwords
CN113382001B (en) Communication encryption method and related device
CN108259457A (en) A kind of WEB authentication methods and device
CN109409109A (en) Data processing method, device, processor and server in network service
CN104821951B (en) A kind of method and apparatus of secure communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Xie Zhouwei

Inventor after: Xie Jinghui

Inventor after: Zhang Baichun

Inventor after: Huang Zhengxing

Inventor after: Li Chao

Inventor after: Zhang Juyuan

Inventor before: Xie Zhouwei

Inventor before: Xie Jinghui

Inventor before: Zhang Baichun

Inventor before: Huang Zhengxing

Inventor before: Li Chao

Inventor before: Zhang Juyuan

CB03 Change of inventor or designer information
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210205

Address after: 101300 309, 3rd floor, 60 Fuqian 1st Street, Tianzhu District, Shunyi District, Beijing

Patentee after: Beijing longzhixin Technology Co.,Ltd.

Address before: 100041 room 120, 4th floor, building 17, yard 30, Shixing street, Shijingshan District, Beijing

Patentee before: BEIJING PANDA MUTUAL ENTERTAINMENT TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201106

CF01 Termination of patent right due to non-payment of annual fee