CN107888592A - A kind of VPN login authentication methods and device - Google Patents

A kind of VPN login authentication methods and device Download PDF

Info

Publication number
CN107888592A
CN107888592A CN201711112980.4A CN201711112980A CN107888592A CN 107888592 A CN107888592 A CN 107888592A CN 201711112980 A CN201711112980 A CN 201711112980A CN 107888592 A CN107888592 A CN 107888592A
Authority
CN
China
Prior art keywords
login
user terminal
vpn
hardware identifier
login account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711112980.4A
Other languages
Chinese (zh)
Inventor
陈立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou DPTech Technologies Co Ltd
Original Assignee
Hangzhou DPTech Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou DPTech Technologies Co Ltd filed Critical Hangzhou DPTech Technologies Co Ltd
Priority to CN201711112980.4A priority Critical patent/CN107888592A/en
Publication of CN107888592A publication Critical patent/CN107888592A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

This application discloses a kind of VPN login authentication methods, applied to certificate server, methods described includes:Receive the VPN login authentication information that user terminal is sent;Wherein, the VPN login authentications information includes the hardware identifier of login account, login password and the user terminal;The login account and login password are authenticated;If certification is by it is determined that whether the hardware identifier received matches the default hardware identifier with login account binding;If it is not, receive the secondary VPN login authentications that user terminal is initiated.The application can ensure that user, when logging in different terminals, remains able to normally access VPN using same account on the premise of compromise between security.

Description

A kind of VPN login authentication methods and device
Technical field
The application is related to the communications field, more particularly to a kind of VPN login authentication methods and device.
Background technology
In the prior art, in order to ensure the Information Security of VPN user, a variety of login authentication modes of generally use are entered jointly Row certification.The hardware identifier of the VPN login authentication mode generally uses login account of main flow, login password and user terminal is common It is authenticated.
Before VPN logins are carried out, the VPN client that user first can carry in user terminal completes registration.Registering Cheng Zhong, user can fill in login account, login password, while VPN client can obtain the hardware identifier of the user terminal, The hardware identifier that the login account that now user fills in obtains with VPN client can be completed to bind.Carrying out VPN login process In, user can input login account, login password, and VPN client can now obtain the hardware identifier of user terminal, when Login account, login password are detected with consistent with the content filled in during registration, and the hardware identifier now obtained and registration When the hardware identifier that obtains it is consistent, then can determine that user logins successfully in same user terminal.
In actual applications, the hardware identifier of each user terminal differs, and user needs to lead in other users terminal When crossing login account progress VPN logins, due to the hardware identifier of other users terminal and the hardware mark of login account binding Knowledge differs, therefore the problem of user normally can not access VPN using same account when being logged in different terminals be present.
The content of the invention
The application provides a kind of VPN login authentication methods, applied to certificate server, including:
Receive the VPN login authentication information that user terminal is sent;Wherein, the VPN login authentications information includes logging in account Number, the hardware identifier of login password and the user terminal;
The login account and login password are authenticated;
If certification by, it is determined that the hardware identifier received whether match it is default hard with login account binding Part identifies;
If it is not, receive the secondary VPN login authentications that user terminal is initiated.
Optionally, whether the hardware identifier for determining to receive matches the default hardware with login account binding Mark, including:
Determine whether the login account has bound hardware identifier;
If it is not, the hardware identifier of the login account and the user terminal is bound;
If so, further determining that whether the hardware identifier received matches the default hardware with login account binding Mark.
Optionally, the secondary VPN login authentications for receiving user terminal and initiating, including:
The authorization prompt information for carrying checking information is issued to the user terminal, to prompt user in the user terminal Input the checking information and initiate secondary VPN login authentications to the certificate server;
It is determined that whether the checking information received matches the checking information issued to the user terminal;
If it is, determine that the user terminal passes through secondary VPN login authentications.
Optionally, the checking information includes:
The checking for being used to carry out secondary VPN login authentications issued to the user mobile phone number bound with the login account Code.
The application also provides a kind of VPN login authentications device, applied to certificate server, including:
Receiving module, for receiving the VPN login authentication information of user terminal transmission;Wherein, the VPN login authentications letter Breath includes the hardware identifier of login account, login password and the user terminal;
Authentication module, for being authenticated to the login account and login password,
Matching module, if certification is by the way that whether the hardware identifier for determining to receive matches and the login account The default hardware identifier of binding;
Re-authentication module, if the default hardware identifier of the hardware identifier received and the login account binding is not Match somebody with somebody, for receiving the secondary VPN login authentications of user terminal initiation.
Optionally, the matching module is further used for:
Determine whether the login account has bound hardware identifier;
If it is not, the hardware identifier of the login account and the user terminal is bound;
If so, further determining that whether the hardware identifier received matches the default hardware with login account binding Mark.
Optionally, the re-authentication module is further used for:
The authorization prompt information for carrying checking information is issued to the user terminal, to prompt user in the user terminal Input the checking information and initiate secondary VPN login authentications to the certificate server;
It is determined that whether the checking information received matches the checking information issued to the user terminal;
If it is, determine that the user terminal passes through secondary VPN login authentications.
Optionally, the checking information includes:
The checking for being used to carry out secondary VPN login authentications issued to the user mobile phone number bound with the login account Code.
In this application, the VPN login authentication information sent by receiving user terminal;Wherein, the VPN login authentications Information includes the hardware identifier of login account, login password and the user terminal;The login account and login password are entered Row certification;If certification by, it is determined that the hardware identifier received whether match it is default hard with login account binding Part identifies;If it is not, receive the secondary VPN login authentications that user terminal is initiated.
On the one hand, because the hardware identifier of login account, login password and the user terminal carries out login authentication jointly, Therefore the security of user account can be caused to be protected.
On the other hand, due to the hardware identifier received in certificate server and the login account bind it is default hard In the case of part mark is unmatched, certificate server still can prompt user terminal to initiate re-authentication, therefore can ensure User, when logging in different terminals, remains able to normally access VPN using same account.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, come for those of ordinary skill in the art Say, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet for VPN login authentication methods that the embodiment of the application one provides;
Fig. 2 is a kind of networking schematic diagram for VPN login authentication methods that the embodiment of the application one provides;
Fig. 3 is a kind of interaction schematic diagram for VPN login authentication methods that the embodiment of the application one provides;
Fig. 4 is a kind of logic diagram for VPN login authentications device that the embodiment of the application one provides;
Fig. 5 is carrying a kind of hardware of the network equipment of VPN login authentications device that the embodiment of the application one provides Structure chart.
Embodiment
In the prior art, in order to ensure the Information Security of VPN user, a variety of login authentication modes of generally use are entered jointly Row certification.The hardware identifier of the VPN login authentication mode generally uses login account of main flow, login password and user terminal is common It is authenticated.
Before VPN logins are carried out, the VPN client that user first can carry in user terminal completes registration.Registering Cheng Zhong, user can fill in login account, login password, while VPN client can obtain the hardware identifier of the user terminal, The hardware identifier that the login account that now user fills in obtains with VPN client can be completed to bind.
In VPN login process is carried out, user can input login account, login password, and VPN client now can be with Obtain the hardware identifier of user terminal.
When certificate server detect login account, login password with registration when the content filled in it is consistent, and now The hardware identifier of acquisition is consistent with the hardware identifier obtained during registration, then can determine user same user terminal log in into Work(.
Above-mentioned user terminal can be understood as being equipped with the common apparatus of VPN client;Such as it is equipped with VPN client Personal computer, tablet personal computer, cell phone etc..
Above-mentioned VPN client can be understood as to build the logical code of vpn tunneling, its shape with the certificate server Formula can be primary APP etc..
Above-mentioned hardware identifier can be understood as the mark for identifying subscriber terminal, and the mark and the user terminal are one by one It is corresponding;Such as can be the hardware characteristics code of user terminal, its form can be such as " SKDJF2344I895SDFDFED " Sequence number.
In actual applications, the hardware identifier of each user terminal differs, and user needs to lead in other users terminal When crossing login account progress VPN logins, due to the hardware identifier of other users terminal and the hardware mark of login account binding Knowledge differs, therefore the problem of user normally can not access VPN using same account when being logged in different terminals be present.
In view of considerations above, the application proposes a kind of VPN login authentication methods, applied to certificate server, passes through reception The VPN login authentication information that user terminal is sent;Wherein, the VPN login authentications information include login account, login password and The hardware identifier of the user terminal;The login account and login password are authenticated;If certification is by it is determined that receive To hardware identifier whether match with the login account binding default hardware identifier;Initiated if it is not, receiving user terminal Secondary VPN login authentications.
On the one hand, because the hardware identifier of login account, login password and the user terminal carries out login authentication jointly, Therefore the security of user account can be caused to be protected.
On the other hand, due to the hardware identifier received in certificate server and the login account bind it is default hard In the case of part mark is unmatched, certificate server still can prompt user terminal to initiate re-authentication, therefore can ensure User, when logging in different terminals, remains able to normally access VPN using same account.
The application is described below by specific embodiment and with reference to specific application scenarios.
Referring to Fig. 1, Fig. 1 be the embodiment of the present application provide a kind of VPN login authentication methods schematic flow sheet, shown side Method is applied to certificate server, performs following steps:
S101, receive the VPN login authentication information that user terminal is sent;Wherein, the VPN login authentications information includes stepping on Record the hardware identifier of account, login password and the user terminal;
S102, the login account and login password are authenticated;
S103, if certification by, it is determined that the hardware identifier received whether match with the login account binding it is pre- If hardware identifier;
S104, if it is not, receiving the secondary VPN login authentications that user terminal is initiated.
Above-mentioned certificate server can be understood as a server cluster with login authentication function, the server set Group can include one or more servers, and referring to Fig. 2, Fig. 2 is a kind of VPN login authentication sides that the embodiment of the application one provides The networking schematic diagram of method.
Wherein, the server cluster can be made up of SSL vpn servers and radius server;Wherein, the SSL Vpn server can be used for establishing vpn tunneling with the user terminal, and the radius server can be with third-party server Identity the VPN login accounts of user are safeguarded.
It is understood that by the radius server come to safeguard the VPN login accounts of user be to save State the memory space of SSL vpn servers;When the VPN login account quantity of user is smaller, the SSL vpn servers are complete The VPN login accounts of user can be safeguarded.
Shown in Figure 3, Fig. 3 is a kind of interaction schematic diagram for VPN login authentication methods that the embodiment of the application one provides.
In this example, the VPN client that user first can carry in user terminal completes the registration of VPN login accounts.
In registration process, user can fill in login account, login password, while VPN client can obtain the use The hardware identifier of family terminal, and login account, modification logging and the hardware identifier are committed to radius server.
After succeeding in registration, radius server can update the associated login authentication information of VPN login accounts, that is, Say, the hardware mark of the VPN login accounts, login password and the user terminal that succeed in registration can be stored in radius server Know, now the hardware identifier of the login account of user's registration and the user terminal is completed to bind.
In a kind of embodiment shown, the VPN client that user first can carry in user terminal completes VPN logins The registration of account.
In registration process, user can fill in login account, login password, and the VPN client can will log in account Number and modification logging be committed to radius server.
When user first logs into after succeeding in registration, radius server may determine that whether the login account is bound Default hardware identifier.If the unbound hardware identifier of login account, radius server can pass through the VPN client End obtains the hardware identifier of this user terminal logged in of user, and the hardware identifier and the login account are bound.
In this example, when user needs to carry out VPN login authentications in a user terminal, user can first start the user The VPN client that terminal is carried, then user can input login account in the interaction page of VPN client and login is close Code.
In this example, after user starts the VPN client, the VPN client can obtain the user terminal Hardware identifier, then the VPN client VPN login authentication information can be sent to SSL vpn servers;Wherein, it is described The login account and log in close that VPN login authentications information can input including the hardware identifier that VPN client is got with user Code.
In this example, after SSL vpn servers receive the VPN login authentication information of user terminal transmission, it will can receive To VPN login authentication information be forwarded to radius server.
, can be to the login account that receives after the radius server receives VPN login authentication information in this example It is authenticated with login password.
On the one hand, if logged on account and modification logging and the login account and login password of radius server storage With failure, then radius server can return to user terminal the instruction for indicating authentification failure through SSL vpn servers Message.
On the other hand, if the login account that is stored if logged on account and modification logging with radius server and logged in Password match is successful, then radius server may further determine that the hardware identifier received and login account binding Whether hardware identifier matches.
Wherein, if the match is successful for the hardware identifier received and the hardware identifier of login account binding, Radius server can be returned to SSL vpn servers for indicating that certification successfully indicates message.
In SSL vpn servers after being used to indicate that certification successfully indicates message described in receiving, SSL vpn servers Corresponding user resources can be back to the user terminal.
But if the hardware identifier of the hardware identifier received and the login account binding it fails to match, Radius server can issue the authorization prompt information for carrying checking information through SSL vpn servers to user terminal, to carry Show that user inputs the checking information in the user terminal and initiates secondary VPN login authentications to the certificate server.
In a kind of embodiment shown, radius server can be through SSL vpn servers to the user terminal Issue the authorization prompt information for carrying checking information.
In this embodiment, after user terminal receives prompt message, user can input in the user terminal The checking information, and the checking information of input is committed to radius server.
In this embodiment, after the checking information that radius server receives user terminal submission, RADIUS clothes Business device may further determine that whether the checking information received matches the checking information issued to the user terminal.
If it is, radius server can be returned to SSL vpn servers for indicating that certification successfully indicates message.
In SSL vpn servers after being used to indicate that certification successfully indicates message described in receiving, SSL vpn servers Corresponding user resources can be back to the user terminal.
Wherein, the form of the checking information can include identifying code, tick boxes, mouse slider bar etc., it is possible to understand that It is that due to the form wide variety of the checking information, and to the present invention without materially affect, therefore the present invention does not limit specifically It is fixed.
In the another embodiment shown, radius server can be sent to the mobile terminal of user for carrying out The identifying code of secondary VPN login authentications.
In this embodiment, after the mobile terminal of user receives checking information, user can be defeated in user terminal Enter the checking information, and the checking information of input is committed to radius server.
For example, radius server can carry identifying code to the sending short message by mobile phone of user, the short message.Then, The identifying code received can be input in personal computer by user, and the identifying code is submitted.
In this embodiment, after the identifying code that radius server receives user terminal submission, RADIUS service Device may further determine that whether the identifying code received matches the identifying code issued to the mobile terminal of the user.
If it is, radius server can be returned to SSL vpn servers for indicating that certification successfully indicates message.
In SSL vpn servers after being used to indicate that certification successfully indicates message described in receiving, SSL vpn servers Corresponding user resources can be back to the user terminal.
In this way, the hardware identifier received in certificate server and the login account are bound default hard In the case of part mark is unmatched, certificate server still can prompt user terminal to initiate re-authentication, therefore can ensure User, when logging in different terminals, remains able to normally access VPN using same account.
Corresponding with above method embodiment, present invention also provides the embodiment of device.
Fig. 4 is refer to, Fig. 4 is a kind of VPN login authentications device 40 that the embodiment of the application one provides, and is taken applied to certification Business end;Wherein, Fig. 5 is refer to, as the hardware structure carried involved by the network equipment of the VPN login authentications device 40 In, generally include CPU, internal memory, nonvolatile memory and internal bus etc.;Exemplified by implemented in software, the VPN, which is logged in, to be recognized Card device 40 is generally understood that the computer program being carried in internal memory, the software and hardware phase formed afterwards by CPU operations With reference to logic device, the VPN login authentications device 40, applied to certificate server, described device includes:
Receiving module 401, for receiving the VPN login authentication information of user terminal transmission;Wherein, the VPN is logged in and recognized Card information includes the hardware identifier of login account, login password and the user terminal;
Authentication module 402, for being authenticated to the login account and login password;
Matching module 403, if certification is by the way that whether the hardware identifier for determining to receive matches and the login account Number binding default hardware identifier;
Re-authentication module 404, if the hardware identifier received and the default hardware identifier of login account binding Mismatch, for receiving the secondary VPN login authentications of user terminal initiation.
Optionally, the matching module is further used for:
Determine whether the login account has bound hardware identifier;
If it is not, the hardware identifier of the login account and the user terminal is bound;
If so, further determining that whether the hardware identifier received matches the default hardware with login account binding Mark.
Optionally, the re-authentication module is further used for:
The authorization prompt information for carrying checking information is issued to the user terminal, to prompt user in the user terminal Input the checking information and initiate secondary VPN login authentications to the certificate server;
It is determined that whether the checking information received matches the checking information issued to the user terminal;
If it is, determine that the user terminal passes through secondary VPN login authentications.
Optionally, the checking information includes:
The checking for being used to carry out secondary VPN login authentications issued to the user mobile phone number bound with the login account Code.
For device embodiment, because it corresponds essentially to embodiment of the method, so related part is real referring to method Apply the part explanation of example.Device embodiment described above is only schematical, wherein described be used as separating component The unit of explanation can be or may not be physically separate, can be as the part that unit is shown or can also It is not physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can be according to reality Need to select some or all of module therein to realize the purpose of application scheme.Those of ordinary skill in the art are not paying In the case of going out creative work, you can to understand and implement.
The preferred embodiment of the application is the foregoing is only, not limiting the application, all essences in the application God any modification, equivalent substitution and improvements done etc., should be included within the scope of the application protection with principle.

Claims (8)

  1. A kind of 1. VPN login authentication methods, it is characterised in that applied to certificate server, including:
    Receive the VPN login authentication information that user terminal is sent;Wherein, the VPN login authentications information includes login account, stepped on Record the hardware identifier of password and the user terminal;
    The login account and login password are authenticated;
    If certification is by it is determined that whether the hardware identifier received matches the default hardware mark with login account binding Know;
    If it is not, receive the secondary VPN login authentications that user terminal is initiated.
  2. 2. according to the method for claim 1, it is characterised in that whether the hardware identifier for determining to receive matches and institute The default hardware identifier of login account binding is stated, including:
    Determine whether the login account has bound hardware identifier;
    If it is not, the hardware identifier of the login account and the user terminal is bound;
    If so, further determining that whether the hardware identifier received matches the default hardware mark with login account binding Know.
  3. 3. according to the method for claim 1, it is characterised in that the secondary VPN for receiving user terminal initiation, which is logged in, to be recognized Card, including:
    The authorization prompt information for carrying checking information is issued to the user terminal, to prompt user to be inputted in the user terminal The checking information initiates secondary VPN login authentications to the certificate server;
    It is determined that whether the checking information received matches the checking information issued to the user terminal;
    If it is, determine that the user terminal passes through secondary VPN login authentications.
  4. 4. according to the method for claim 3, it is characterised in that the checking information includes:
    The identifying code for being used to carry out secondary VPN login authentications issued to the user mobile phone number bound with the login account.
  5. A kind of 5. VPN login authentications device, it is characterised in that applied to certificate server, including:
    Receiving module, for receiving the VPN login authentication information of user terminal transmission;Wherein, the VPN login authentications packet Include the hardware identifier of login account, login password and the user terminal;
    Authentication module, for being authenticated to the login account and login password,
    Matching module, if certification is by the way that whether the hardware identifier for determining to receive matches is bound with the login account Default hardware identifier;
    Re-authentication module, if the hardware identifier received and the default hardware identifier of login account binding mismatch, For receiving the secondary VPN login authentications of user terminal initiation.
  6. 6. device according to claim 5, it is characterised in that the matching module is further used for:
    Determine whether the login account has bound hardware identifier;
    If it is not, the hardware identifier of the login account and the user terminal is bound;
    If so, further determining that whether the hardware identifier received matches the default hardware mark with login account binding Know.
  7. 7. device according to claim 5, it is characterised in that the re-authentication module is further used for:
    The authorization prompt information for carrying checking information is issued to the user terminal, to prompt user to be inputted in the user terminal The checking information initiates secondary VPN login authentications to the certificate server;
    It is determined that whether the checking information received matches the checking information issued to the user terminal;
    If it is, determine that the user terminal passes through secondary VPN login authentications.
  8. 8. device according to claim 5, it is characterised in that the checking information includes:
    The identifying code for being used to carry out secondary VPN login authentications issued to the user mobile phone number bound with the login account.
CN201711112980.4A 2017-11-13 2017-11-13 A kind of VPN login authentication methods and device Pending CN107888592A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711112980.4A CN107888592A (en) 2017-11-13 2017-11-13 A kind of VPN login authentication methods and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711112980.4A CN107888592A (en) 2017-11-13 2017-11-13 A kind of VPN login authentication methods and device

Publications (1)

Publication Number Publication Date
CN107888592A true CN107888592A (en) 2018-04-06

Family

ID=61780205

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711112980.4A Pending CN107888592A (en) 2017-11-13 2017-11-13 A kind of VPN login authentication methods and device

Country Status (1)

Country Link
CN (1) CN107888592A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109361659A (en) * 2018-09-28 2019-02-19 新华三技术有限公司 A kind of authentication method and device
CN109756509A (en) * 2019-01-24 2019-05-14 太仓红码软件技术有限公司 A kind of network authentication system and its working method based on information receipt
CN109803159A (en) * 2018-12-17 2019-05-24 视联动力信息技术股份有限公司 A kind of verification method and system of terminal
CN110177111A (en) * 2019-06-06 2019-08-27 北京芯盾时代科技有限公司 A kind of Information Authentication method, system and device
CN110290150A (en) * 2019-07-17 2019-09-27 秒针信息技术有限公司 A kind of login validation method and login authentication device of Virtual Private Network VPN
CN110445769A (en) * 2019-07-18 2019-11-12 阿里巴巴集团控股有限公司 The access method and device of operation system
CN112714099A (en) * 2020-11-30 2021-04-27 南方电网数字电网研究院有限公司 Communication system and method
CN113742656A (en) * 2020-05-28 2021-12-03 千寻位置网络有限公司 Software authorization authentication method and device
US11652818B2 (en) 2019-07-18 2023-05-16 Advanced New Technologies Co., Ltd. Method and apparatus for accessing service system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105656948A (en) * 2016-03-30 2016-06-08 北京小米移动软件有限公司 Account login method and device
CN106452738A (en) * 2016-09-21 2017-02-22 北京神州绿盟信息安全科技股份有限公司 Authentication method, device and system for logging in equipment
CN107241329A (en) * 2017-06-07 2017-10-10 北京奇艺世纪科技有限公司 Account login process method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105656948A (en) * 2016-03-30 2016-06-08 北京小米移动软件有限公司 Account login method and device
CN106452738A (en) * 2016-09-21 2017-02-22 北京神州绿盟信息安全科技股份有限公司 Authentication method, device and system for logging in equipment
CN107241329A (en) * 2017-06-07 2017-10-10 北京奇艺世纪科技有限公司 Account login process method and device

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109361659A (en) * 2018-09-28 2019-02-19 新华三技术有限公司 A kind of authentication method and device
CN109803159A (en) * 2018-12-17 2019-05-24 视联动力信息技术股份有限公司 A kind of verification method and system of terminal
CN109756509B (en) * 2019-01-24 2021-08-06 金润方舟科技股份有限公司 Network authentication system based on information receipt and working method thereof
CN109756509A (en) * 2019-01-24 2019-05-14 太仓红码软件技术有限公司 A kind of network authentication system and its working method based on information receipt
CN110177111B (en) * 2019-06-06 2021-09-14 北京芯盾时代科技有限公司 Information verification method, system and device
CN110177111A (en) * 2019-06-06 2019-08-27 北京芯盾时代科技有限公司 A kind of Information Authentication method, system and device
CN110290150A (en) * 2019-07-17 2019-09-27 秒针信息技术有限公司 A kind of login validation method and login authentication device of Virtual Private Network VPN
CN110445769A (en) * 2019-07-18 2019-11-12 阿里巴巴集团控股有限公司 The access method and device of operation system
CN110445769B (en) * 2019-07-18 2021-03-26 创新先进技术有限公司 Access method and device of business system
US11652818B2 (en) 2019-07-18 2023-05-16 Advanced New Technologies Co., Ltd. Method and apparatus for accessing service system
CN113742656A (en) * 2020-05-28 2021-12-03 千寻位置网络有限公司 Software authorization authentication method and device
CN113742656B (en) * 2020-05-28 2024-07-26 千寻位置网络有限公司 Software authorization authentication method and device
CN112714099A (en) * 2020-11-30 2021-04-27 南方电网数字电网研究院有限公司 Communication system and method

Similar Documents

Publication Publication Date Title
CN107888592A (en) A kind of VPN login authentication methods and device
CN106101258B (en) Interface calling method, device and system of hybrid cloud
CN107948204B (en) One-key login method and system, related equipment and computer readable storage medium
CN103095659B (en) Account logon method and system in a kind of the Internet
CN111917773B (en) Service data processing method and device and server
US9369286B2 (en) System and methods for facilitating authentication of an electronic device accessing plurality of mobile applications
CN105323253B (en) Identity verification method and device
CN105337949B (en) A kind of SSO authentication method, web server, authentication center and token verify center
CN102624720B (en) Method, device and system for identity authentication
US10212151B2 (en) Method for operating a designated service, service unlocking method, and terminal
CN104917727B (en) A kind of method, system and device of account's authentication
CN103457738B (en) Method and system for login processing based on browser
US9887997B2 (en) Web authentication using client platform root of trust
JP5739008B2 (en) Method, apparatus, and system for verifying a communication session
CN107086979B (en) User terminal verification login method and device
CN108965341A (en) The method, apparatus and system of login authentication
CN111010363B (en) Information authentication method and system, authentication module and user terminal
CN106161475B (en) Method and device for realizing user authentication
CN103200150A (en) Identity authentication method and system
CN111371725A (en) Method for improving security of session mechanism, terminal equipment and storage medium
CN106713321A (en) Authority management method and device for debugging function of point of sale
US20210081521A1 (en) Method for exchanging data between a web browser and an application
CN104009850B (en) A kind of method for authenticating user identity and system
CN101867588A (en) Access control system based on 802.1x
CN109699015A (en) Binding machine and card relationship authentication method, device and communication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180406