CN107888592A - A kind of VPN login authentication methods and device - Google Patents
A kind of VPN login authentication methods and device Download PDFInfo
- Publication number
- CN107888592A CN107888592A CN201711112980.4A CN201711112980A CN107888592A CN 107888592 A CN107888592 A CN 107888592A CN 201711112980 A CN201711112980 A CN 201711112980A CN 107888592 A CN107888592 A CN 107888592A
- Authority
- CN
- China
- Prior art keywords
- login
- user terminal
- vpn
- hardware identifier
- login account
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
This application discloses a kind of VPN login authentication methods, applied to certificate server, methods described includes:Receive the VPN login authentication information that user terminal is sent;Wherein, the VPN login authentications information includes the hardware identifier of login account, login password and the user terminal;The login account and login password are authenticated;If certification is by it is determined that whether the hardware identifier received matches the default hardware identifier with login account binding;If it is not, receive the secondary VPN login authentications that user terminal is initiated.The application can ensure that user, when logging in different terminals, remains able to normally access VPN using same account on the premise of compromise between security.
Description
Technical field
The application is related to the communications field, more particularly to a kind of VPN login authentication methods and device.
Background technology
In the prior art, in order to ensure the Information Security of VPN user, a variety of login authentication modes of generally use are entered jointly
Row certification.The hardware identifier of the VPN login authentication mode generally uses login account of main flow, login password and user terminal is common
It is authenticated.
Before VPN logins are carried out, the VPN client that user first can carry in user terminal completes registration.Registering
Cheng Zhong, user can fill in login account, login password, while VPN client can obtain the hardware identifier of the user terminal,
The hardware identifier that the login account that now user fills in obtains with VPN client can be completed to bind.Carrying out VPN login process
In, user can input login account, login password, and VPN client can now obtain the hardware identifier of user terminal, when
Login account, login password are detected with consistent with the content filled in during registration, and the hardware identifier now obtained and registration
When the hardware identifier that obtains it is consistent, then can determine that user logins successfully in same user terminal.
In actual applications, the hardware identifier of each user terminal differs, and user needs to lead in other users terminal
When crossing login account progress VPN logins, due to the hardware identifier of other users terminal and the hardware mark of login account binding
Knowledge differs, therefore the problem of user normally can not access VPN using same account when being logged in different terminals be present.
The content of the invention
The application provides a kind of VPN login authentication methods, applied to certificate server, including:
Receive the VPN login authentication information that user terminal is sent;Wherein, the VPN login authentications information includes logging in account
Number, the hardware identifier of login password and the user terminal;
The login account and login password are authenticated;
If certification by, it is determined that the hardware identifier received whether match it is default hard with login account binding
Part identifies;
If it is not, receive the secondary VPN login authentications that user terminal is initiated.
Optionally, whether the hardware identifier for determining to receive matches the default hardware with login account binding
Mark, including:
Determine whether the login account has bound hardware identifier;
If it is not, the hardware identifier of the login account and the user terminal is bound;
If so, further determining that whether the hardware identifier received matches the default hardware with login account binding
Mark.
Optionally, the secondary VPN login authentications for receiving user terminal and initiating, including:
The authorization prompt information for carrying checking information is issued to the user terminal, to prompt user in the user terminal
Input the checking information and initiate secondary VPN login authentications to the certificate server;
It is determined that whether the checking information received matches the checking information issued to the user terminal;
If it is, determine that the user terminal passes through secondary VPN login authentications.
Optionally, the checking information includes:
The checking for being used to carry out secondary VPN login authentications issued to the user mobile phone number bound with the login account
Code.
The application also provides a kind of VPN login authentications device, applied to certificate server, including:
Receiving module, for receiving the VPN login authentication information of user terminal transmission;Wherein, the VPN login authentications letter
Breath includes the hardware identifier of login account, login password and the user terminal;
Authentication module, for being authenticated to the login account and login password,
Matching module, if certification is by the way that whether the hardware identifier for determining to receive matches and the login account
The default hardware identifier of binding;
Re-authentication module, if the default hardware identifier of the hardware identifier received and the login account binding is not
Match somebody with somebody, for receiving the secondary VPN login authentications of user terminal initiation.
Optionally, the matching module is further used for:
Determine whether the login account has bound hardware identifier;
If it is not, the hardware identifier of the login account and the user terminal is bound;
If so, further determining that whether the hardware identifier received matches the default hardware with login account binding
Mark.
Optionally, the re-authentication module is further used for:
The authorization prompt information for carrying checking information is issued to the user terminal, to prompt user in the user terminal
Input the checking information and initiate secondary VPN login authentications to the certificate server;
It is determined that whether the checking information received matches the checking information issued to the user terminal;
If it is, determine that the user terminal passes through secondary VPN login authentications.
Optionally, the checking information includes:
The checking for being used to carry out secondary VPN login authentications issued to the user mobile phone number bound with the login account
Code.
In this application, the VPN login authentication information sent by receiving user terminal;Wherein, the VPN login authentications
Information includes the hardware identifier of login account, login password and the user terminal;The login account and login password are entered
Row certification;If certification by, it is determined that the hardware identifier received whether match it is default hard with login account binding
Part identifies;If it is not, receive the secondary VPN login authentications that user terminal is initiated.
On the one hand, because the hardware identifier of login account, login password and the user terminal carries out login authentication jointly,
Therefore the security of user account can be caused to be protected.
On the other hand, due to the hardware identifier received in certificate server and the login account bind it is default hard
In the case of part mark is unmatched, certificate server still can prompt user terminal to initiate re-authentication, therefore can ensure
User, when logging in different terminals, remains able to normally access VPN using same account.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, come for those of ordinary skill in the art
Say, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet for VPN login authentication methods that the embodiment of the application one provides;
Fig. 2 is a kind of networking schematic diagram for VPN login authentication methods that the embodiment of the application one provides;
Fig. 3 is a kind of interaction schematic diagram for VPN login authentication methods that the embodiment of the application one provides;
Fig. 4 is a kind of logic diagram for VPN login authentications device that the embodiment of the application one provides;
Fig. 5 is carrying a kind of hardware of the network equipment of VPN login authentications device that the embodiment of the application one provides
Structure chart.
Embodiment
In the prior art, in order to ensure the Information Security of VPN user, a variety of login authentication modes of generally use are entered jointly
Row certification.The hardware identifier of the VPN login authentication mode generally uses login account of main flow, login password and user terminal is common
It is authenticated.
Before VPN logins are carried out, the VPN client that user first can carry in user terminal completes registration.Registering
Cheng Zhong, user can fill in login account, login password, while VPN client can obtain the hardware identifier of the user terminal,
The hardware identifier that the login account that now user fills in obtains with VPN client can be completed to bind.
In VPN login process is carried out, user can input login account, login password, and VPN client now can be with
Obtain the hardware identifier of user terminal.
When certificate server detect login account, login password with registration when the content filled in it is consistent, and now
The hardware identifier of acquisition is consistent with the hardware identifier obtained during registration, then can determine user same user terminal log in into
Work(.
Above-mentioned user terminal can be understood as being equipped with the common apparatus of VPN client;Such as it is equipped with VPN client
Personal computer, tablet personal computer, cell phone etc..
Above-mentioned VPN client can be understood as to build the logical code of vpn tunneling, its shape with the certificate server
Formula can be primary APP etc..
Above-mentioned hardware identifier can be understood as the mark for identifying subscriber terminal, and the mark and the user terminal are one by one
It is corresponding;Such as can be the hardware characteristics code of user terminal, its form can be such as " SKDJF2344I895SDFDFED "
Sequence number.
In actual applications, the hardware identifier of each user terminal differs, and user needs to lead in other users terminal
When crossing login account progress VPN logins, due to the hardware identifier of other users terminal and the hardware mark of login account binding
Knowledge differs, therefore the problem of user normally can not access VPN using same account when being logged in different terminals be present.
In view of considerations above, the application proposes a kind of VPN login authentication methods, applied to certificate server, passes through reception
The VPN login authentication information that user terminal is sent;Wherein, the VPN login authentications information include login account, login password and
The hardware identifier of the user terminal;The login account and login password are authenticated;If certification is by it is determined that receive
To hardware identifier whether match with the login account binding default hardware identifier;Initiated if it is not, receiving user terminal
Secondary VPN login authentications.
On the one hand, because the hardware identifier of login account, login password and the user terminal carries out login authentication jointly,
Therefore the security of user account can be caused to be protected.
On the other hand, due to the hardware identifier received in certificate server and the login account bind it is default hard
In the case of part mark is unmatched, certificate server still can prompt user terminal to initiate re-authentication, therefore can ensure
User, when logging in different terminals, remains able to normally access VPN using same account.
The application is described below by specific embodiment and with reference to specific application scenarios.
Referring to Fig. 1, Fig. 1 be the embodiment of the present application provide a kind of VPN login authentication methods schematic flow sheet, shown side
Method is applied to certificate server, performs following steps:
S101, receive the VPN login authentication information that user terminal is sent;Wherein, the VPN login authentications information includes stepping on
Record the hardware identifier of account, login password and the user terminal;
S102, the login account and login password are authenticated;
S103, if certification by, it is determined that the hardware identifier received whether match with the login account binding it is pre-
If hardware identifier;
S104, if it is not, receiving the secondary VPN login authentications that user terminal is initiated.
Above-mentioned certificate server can be understood as a server cluster with login authentication function, the server set
Group can include one or more servers, and referring to Fig. 2, Fig. 2 is a kind of VPN login authentication sides that the embodiment of the application one provides
The networking schematic diagram of method.
Wherein, the server cluster can be made up of SSL vpn servers and radius server;Wherein, the SSL
Vpn server can be used for establishing vpn tunneling with the user terminal, and the radius server can be with third-party server
Identity the VPN login accounts of user are safeguarded.
It is understood that by the radius server come to safeguard the VPN login accounts of user be to save
State the memory space of SSL vpn servers;When the VPN login account quantity of user is smaller, the SSL vpn servers are complete
The VPN login accounts of user can be safeguarded.
Shown in Figure 3, Fig. 3 is a kind of interaction schematic diagram for VPN login authentication methods that the embodiment of the application one provides.
In this example, the VPN client that user first can carry in user terminal completes the registration of VPN login accounts.
In registration process, user can fill in login account, login password, while VPN client can obtain the use
The hardware identifier of family terminal, and login account, modification logging and the hardware identifier are committed to radius server.
After succeeding in registration, radius server can update the associated login authentication information of VPN login accounts, that is,
Say, the hardware mark of the VPN login accounts, login password and the user terminal that succeed in registration can be stored in radius server
Know, now the hardware identifier of the login account of user's registration and the user terminal is completed to bind.
In a kind of embodiment shown, the VPN client that user first can carry in user terminal completes VPN logins
The registration of account.
In registration process, user can fill in login account, login password, and the VPN client can will log in account
Number and modification logging be committed to radius server.
When user first logs into after succeeding in registration, radius server may determine that whether the login account is bound
Default hardware identifier.If the unbound hardware identifier of login account, radius server can pass through the VPN client
End obtains the hardware identifier of this user terminal logged in of user, and the hardware identifier and the login account are bound.
In this example, when user needs to carry out VPN login authentications in a user terminal, user can first start the user
The VPN client that terminal is carried, then user can input login account in the interaction page of VPN client and login is close
Code.
In this example, after user starts the VPN client, the VPN client can obtain the user terminal
Hardware identifier, then the VPN client VPN login authentication information can be sent to SSL vpn servers;Wherein, it is described
The login account and log in close that VPN login authentications information can input including the hardware identifier that VPN client is got with user
Code.
In this example, after SSL vpn servers receive the VPN login authentication information of user terminal transmission, it will can receive
To VPN login authentication information be forwarded to radius server.
, can be to the login account that receives after the radius server receives VPN login authentication information in this example
It is authenticated with login password.
On the one hand, if logged on account and modification logging and the login account and login password of radius server storage
With failure, then radius server can return to user terminal the instruction for indicating authentification failure through SSL vpn servers
Message.
On the other hand, if the login account that is stored if logged on account and modification logging with radius server and logged in
Password match is successful, then radius server may further determine that the hardware identifier received and login account binding
Whether hardware identifier matches.
Wherein, if the match is successful for the hardware identifier received and the hardware identifier of login account binding,
Radius server can be returned to SSL vpn servers for indicating that certification successfully indicates message.
In SSL vpn servers after being used to indicate that certification successfully indicates message described in receiving, SSL vpn servers
Corresponding user resources can be back to the user terminal.
But if the hardware identifier of the hardware identifier received and the login account binding it fails to match,
Radius server can issue the authorization prompt information for carrying checking information through SSL vpn servers to user terminal, to carry
Show that user inputs the checking information in the user terminal and initiates secondary VPN login authentications to the certificate server.
In a kind of embodiment shown, radius server can be through SSL vpn servers to the user terminal
Issue the authorization prompt information for carrying checking information.
In this embodiment, after user terminal receives prompt message, user can input in the user terminal
The checking information, and the checking information of input is committed to radius server.
In this embodiment, after the checking information that radius server receives user terminal submission, RADIUS clothes
Business device may further determine that whether the checking information received matches the checking information issued to the user terminal.
If it is, radius server can be returned to SSL vpn servers for indicating that certification successfully indicates message.
In SSL vpn servers after being used to indicate that certification successfully indicates message described in receiving, SSL vpn servers
Corresponding user resources can be back to the user terminal.
Wherein, the form of the checking information can include identifying code, tick boxes, mouse slider bar etc., it is possible to understand that
It is that due to the form wide variety of the checking information, and to the present invention without materially affect, therefore the present invention does not limit specifically
It is fixed.
In the another embodiment shown, radius server can be sent to the mobile terminal of user for carrying out
The identifying code of secondary VPN login authentications.
In this embodiment, after the mobile terminal of user receives checking information, user can be defeated in user terminal
Enter the checking information, and the checking information of input is committed to radius server.
For example, radius server can carry identifying code to the sending short message by mobile phone of user, the short message.Then,
The identifying code received can be input in personal computer by user, and the identifying code is submitted.
In this embodiment, after the identifying code that radius server receives user terminal submission, RADIUS service
Device may further determine that whether the identifying code received matches the identifying code issued to the mobile terminal of the user.
If it is, radius server can be returned to SSL vpn servers for indicating that certification successfully indicates message.
In SSL vpn servers after being used to indicate that certification successfully indicates message described in receiving, SSL vpn servers
Corresponding user resources can be back to the user terminal.
In this way, the hardware identifier received in certificate server and the login account are bound default hard
In the case of part mark is unmatched, certificate server still can prompt user terminal to initiate re-authentication, therefore can ensure
User, when logging in different terminals, remains able to normally access VPN using same account.
Corresponding with above method embodiment, present invention also provides the embodiment of device.
Fig. 4 is refer to, Fig. 4 is a kind of VPN login authentications device 40 that the embodiment of the application one provides, and is taken applied to certification
Business end;Wherein, Fig. 5 is refer to, as the hardware structure carried involved by the network equipment of the VPN login authentications device 40
In, generally include CPU, internal memory, nonvolatile memory and internal bus etc.;Exemplified by implemented in software, the VPN, which is logged in, to be recognized
Card device 40 is generally understood that the computer program being carried in internal memory, the software and hardware phase formed afterwards by CPU operations
With reference to logic device, the VPN login authentications device 40, applied to certificate server, described device includes:
Receiving module 401, for receiving the VPN login authentication information of user terminal transmission;Wherein, the VPN is logged in and recognized
Card information includes the hardware identifier of login account, login password and the user terminal;
Authentication module 402, for being authenticated to the login account and login password;
Matching module 403, if certification is by the way that whether the hardware identifier for determining to receive matches and the login account
Number binding default hardware identifier;
Re-authentication module 404, if the hardware identifier received and the default hardware identifier of login account binding
Mismatch, for receiving the secondary VPN login authentications of user terminal initiation.
Optionally, the matching module is further used for:
Determine whether the login account has bound hardware identifier;
If it is not, the hardware identifier of the login account and the user terminal is bound;
If so, further determining that whether the hardware identifier received matches the default hardware with login account binding
Mark.
Optionally, the re-authentication module is further used for:
The authorization prompt information for carrying checking information is issued to the user terminal, to prompt user in the user terminal
Input the checking information and initiate secondary VPN login authentications to the certificate server;
It is determined that whether the checking information received matches the checking information issued to the user terminal;
If it is, determine that the user terminal passes through secondary VPN login authentications.
Optionally, the checking information includes:
The checking for being used to carry out secondary VPN login authentications issued to the user mobile phone number bound with the login account
Code.
For device embodiment, because it corresponds essentially to embodiment of the method, so related part is real referring to method
Apply the part explanation of example.Device embodiment described above is only schematical, wherein described be used as separating component
The unit of explanation can be or may not be physically separate, can be as the part that unit is shown or can also
It is not physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can be according to reality
Need to select some or all of module therein to realize the purpose of application scheme.Those of ordinary skill in the art are not paying
In the case of going out creative work, you can to understand and implement.
The preferred embodiment of the application is the foregoing is only, not limiting the application, all essences in the application
God any modification, equivalent substitution and improvements done etc., should be included within the scope of the application protection with principle.
Claims (8)
- A kind of 1. VPN login authentication methods, it is characterised in that applied to certificate server, including:Receive the VPN login authentication information that user terminal is sent;Wherein, the VPN login authentications information includes login account, stepped on Record the hardware identifier of password and the user terminal;The login account and login password are authenticated;If certification is by it is determined that whether the hardware identifier received matches the default hardware mark with login account binding Know;If it is not, receive the secondary VPN login authentications that user terminal is initiated.
- 2. according to the method for claim 1, it is characterised in that whether the hardware identifier for determining to receive matches and institute The default hardware identifier of login account binding is stated, including:Determine whether the login account has bound hardware identifier;If it is not, the hardware identifier of the login account and the user terminal is bound;If so, further determining that whether the hardware identifier received matches the default hardware mark with login account binding Know.
- 3. according to the method for claim 1, it is characterised in that the secondary VPN for receiving user terminal initiation, which is logged in, to be recognized Card, including:The authorization prompt information for carrying checking information is issued to the user terminal, to prompt user to be inputted in the user terminal The checking information initiates secondary VPN login authentications to the certificate server;It is determined that whether the checking information received matches the checking information issued to the user terminal;If it is, determine that the user terminal passes through secondary VPN login authentications.
- 4. according to the method for claim 3, it is characterised in that the checking information includes:The identifying code for being used to carry out secondary VPN login authentications issued to the user mobile phone number bound with the login account.
- A kind of 5. VPN login authentications device, it is characterised in that applied to certificate server, including:Receiving module, for receiving the VPN login authentication information of user terminal transmission;Wherein, the VPN login authentications packet Include the hardware identifier of login account, login password and the user terminal;Authentication module, for being authenticated to the login account and login password,Matching module, if certification is by the way that whether the hardware identifier for determining to receive matches is bound with the login account Default hardware identifier;Re-authentication module, if the hardware identifier received and the default hardware identifier of login account binding mismatch, For receiving the secondary VPN login authentications of user terminal initiation.
- 6. device according to claim 5, it is characterised in that the matching module is further used for:Determine whether the login account has bound hardware identifier;If it is not, the hardware identifier of the login account and the user terminal is bound;If so, further determining that whether the hardware identifier received matches the default hardware mark with login account binding Know.
- 7. device according to claim 5, it is characterised in that the re-authentication module is further used for:The authorization prompt information for carrying checking information is issued to the user terminal, to prompt user to be inputted in the user terminal The checking information initiates secondary VPN login authentications to the certificate server;It is determined that whether the checking information received matches the checking information issued to the user terminal;If it is, determine that the user terminal passes through secondary VPN login authentications.
- 8. device according to claim 5, it is characterised in that the checking information includes:The identifying code for being used to carry out secondary VPN login authentications issued to the user mobile phone number bound with the login account.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711112980.4A CN107888592A (en) | 2017-11-13 | 2017-11-13 | A kind of VPN login authentication methods and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711112980.4A CN107888592A (en) | 2017-11-13 | 2017-11-13 | A kind of VPN login authentication methods and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107888592A true CN107888592A (en) | 2018-04-06 |
Family
ID=61780205
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711112980.4A Pending CN107888592A (en) | 2017-11-13 | 2017-11-13 | A kind of VPN login authentication methods and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107888592A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109361659A (en) * | 2018-09-28 | 2019-02-19 | 新华三技术有限公司 | A kind of authentication method and device |
CN109756509A (en) * | 2019-01-24 | 2019-05-14 | 太仓红码软件技术有限公司 | A kind of network authentication system and its working method based on information receipt |
CN109803159A (en) * | 2018-12-17 | 2019-05-24 | 视联动力信息技术股份有限公司 | A kind of verification method and system of terminal |
CN110177111A (en) * | 2019-06-06 | 2019-08-27 | 北京芯盾时代科技有限公司 | A kind of Information Authentication method, system and device |
CN110290150A (en) * | 2019-07-17 | 2019-09-27 | 秒针信息技术有限公司 | A kind of login validation method and login authentication device of Virtual Private Network VPN |
CN110445769A (en) * | 2019-07-18 | 2019-11-12 | 阿里巴巴集团控股有限公司 | The access method and device of operation system |
CN112714099A (en) * | 2020-11-30 | 2021-04-27 | 南方电网数字电网研究院有限公司 | Communication system and method |
CN113742656A (en) * | 2020-05-28 | 2021-12-03 | 千寻位置网络有限公司 | Software authorization authentication method and device |
US11652818B2 (en) | 2019-07-18 | 2023-05-16 | Advanced New Technologies Co., Ltd. | Method and apparatus for accessing service system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105656948A (en) * | 2016-03-30 | 2016-06-08 | 北京小米移动软件有限公司 | Account login method and device |
CN106452738A (en) * | 2016-09-21 | 2017-02-22 | 北京神州绿盟信息安全科技股份有限公司 | Authentication method, device and system for logging in equipment |
CN107241329A (en) * | 2017-06-07 | 2017-10-10 | 北京奇艺世纪科技有限公司 | Account login process method and device |
-
2017
- 2017-11-13 CN CN201711112980.4A patent/CN107888592A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105656948A (en) * | 2016-03-30 | 2016-06-08 | 北京小米移动软件有限公司 | Account login method and device |
CN106452738A (en) * | 2016-09-21 | 2017-02-22 | 北京神州绿盟信息安全科技股份有限公司 | Authentication method, device and system for logging in equipment |
CN107241329A (en) * | 2017-06-07 | 2017-10-10 | 北京奇艺世纪科技有限公司 | Account login process method and device |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109361659A (en) * | 2018-09-28 | 2019-02-19 | 新华三技术有限公司 | A kind of authentication method and device |
CN109803159A (en) * | 2018-12-17 | 2019-05-24 | 视联动力信息技术股份有限公司 | A kind of verification method and system of terminal |
CN109756509B (en) * | 2019-01-24 | 2021-08-06 | 金润方舟科技股份有限公司 | Network authentication system based on information receipt and working method thereof |
CN109756509A (en) * | 2019-01-24 | 2019-05-14 | 太仓红码软件技术有限公司 | A kind of network authentication system and its working method based on information receipt |
CN110177111B (en) * | 2019-06-06 | 2021-09-14 | 北京芯盾时代科技有限公司 | Information verification method, system and device |
CN110177111A (en) * | 2019-06-06 | 2019-08-27 | 北京芯盾时代科技有限公司 | A kind of Information Authentication method, system and device |
CN110290150A (en) * | 2019-07-17 | 2019-09-27 | 秒针信息技术有限公司 | A kind of login validation method and login authentication device of Virtual Private Network VPN |
CN110445769A (en) * | 2019-07-18 | 2019-11-12 | 阿里巴巴集团控股有限公司 | The access method and device of operation system |
CN110445769B (en) * | 2019-07-18 | 2021-03-26 | 创新先进技术有限公司 | Access method and device of business system |
US11652818B2 (en) | 2019-07-18 | 2023-05-16 | Advanced New Technologies Co., Ltd. | Method and apparatus for accessing service system |
CN113742656A (en) * | 2020-05-28 | 2021-12-03 | 千寻位置网络有限公司 | Software authorization authentication method and device |
CN113742656B (en) * | 2020-05-28 | 2024-07-26 | 千寻位置网络有限公司 | Software authorization authentication method and device |
CN112714099A (en) * | 2020-11-30 | 2021-04-27 | 南方电网数字电网研究院有限公司 | Communication system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107888592A (en) | A kind of VPN login authentication methods and device | |
CN106101258B (en) | Interface calling method, device and system of hybrid cloud | |
CN107948204B (en) | One-key login method and system, related equipment and computer readable storage medium | |
CN103095659B (en) | Account logon method and system in a kind of the Internet | |
CN111917773B (en) | Service data processing method and device and server | |
US9369286B2 (en) | System and methods for facilitating authentication of an electronic device accessing plurality of mobile applications | |
CN105323253B (en) | Identity verification method and device | |
CN105337949B (en) | A kind of SSO authentication method, web server, authentication center and token verify center | |
CN102624720B (en) | Method, device and system for identity authentication | |
US10212151B2 (en) | Method for operating a designated service, service unlocking method, and terminal | |
CN104917727B (en) | A kind of method, system and device of account's authentication | |
CN103457738B (en) | Method and system for login processing based on browser | |
US9887997B2 (en) | Web authentication using client platform root of trust | |
JP5739008B2 (en) | Method, apparatus, and system for verifying a communication session | |
CN107086979B (en) | User terminal verification login method and device | |
CN108965341A (en) | The method, apparatus and system of login authentication | |
CN111010363B (en) | Information authentication method and system, authentication module and user terminal | |
CN106161475B (en) | Method and device for realizing user authentication | |
CN103200150A (en) | Identity authentication method and system | |
CN111371725A (en) | Method for improving security of session mechanism, terminal equipment and storage medium | |
CN106713321A (en) | Authority management method and device for debugging function of point of sale | |
US20210081521A1 (en) | Method for exchanging data between a web browser and an application | |
CN104009850B (en) | A kind of method for authenticating user identity and system | |
CN101867588A (en) | Access control system based on 802.1x | |
CN109699015A (en) | Binding machine and card relationship authentication method, device and communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180406 |