CN108183924A - A kind of login validation method and terminal device - Google Patents

A kind of login validation method and terminal device Download PDF

Info

Publication number
CN108183924A
CN108183924A CN201810170984.6A CN201810170984A CN108183924A CN 108183924 A CN108183924 A CN 108183924A CN 201810170984 A CN201810170984 A CN 201810170984A CN 108183924 A CN108183924 A CN 108183924A
Authority
CN
China
Prior art keywords
information
authentication
verification
target terminal
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810170984.6A
Other languages
Chinese (zh)
Inventor
游昌永
秦溪
罗爱军
封文进
郭巧佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Maimaiti Mdt Infotech Ltd Shenzhen
Original Assignee
Maimaiti Mdt Infotech Ltd Shenzhen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Maimaiti Mdt Infotech Ltd Shenzhen filed Critical Maimaiti Mdt Infotech Ltd Shenzhen
Priority to CN201810170984.6A priority Critical patent/CN108183924A/en
Publication of CN108183924A publication Critical patent/CN108183924A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention belongs to field of communication technology, a kind of login validation method and terminal device provided by the invention, the method includes:The logging request that target terminal is sent is received, target account information and target terminal device identification are carried in logging request;Judge in the Terminal Equipment Identifier to prestore with the presence or absence of target terminal device identification;If it is determined that there is no target terminal device identifications in the Terminal Equipment Identifier to prestore, then the corresponding subscriber identity information of target account information is obtained;Authentication prompt message is generated according to subscriber identity information;Authentication prompt message is sent to target terminal;The authentication information that target terminal returns is received, and judges whether authentication information matches with identity information;If it is determined that authentication information is matched with identity information, then allow target terminal login service device.Due to needing that repeatedly effective login authentication is carried out to logging device, it ensure that the safety of logon account, reduce the risk that login account is stolen.

Description

A kind of login validation method and terminal device
Technical field
The invention belongs to field of communication technology more particularly to a kind of login validation methods and terminal device.
Background technology
With the development of Internet technology, network is inseparable with people’s lives, and more and more people select net Tool of the network as communication, amusement and shopping.In the sales process of financial product, sale user is needed through terminal device, Such as mobile phone, tablet computer (Personal Digital Assistant, PDA) etc., log in background server and carry out financial business It handles.
At present, user is sold in a manner that middle terminal device records background server progress device authentication, mainly terminal Just whether equipment sends logging request to background server, judge the log-on message carried in the logging request by background server Really, allow to log in if correct, if incorrect login failure.But this side only logged in by a kind of verification of log-on message Formula, the process of login authentication are too simple, it is impossible to ensure the safety of logon account, there are the risks that account is stolen.
Invention content
In view of this, an embodiment of the present invention provides a kind of login validation method and terminal devices, and login can be set in fact Standby repeatedly effectively verifies, ensures the safety of logon account.
The embodiment of the present invention in a first aspect, provide a kind of equipment login validation method, including:
The logging request that target terminal is sent is received, target account information is carried in the logging request and target terminal is set Standby mark;
Judge in the Terminal Equipment Identifier to prestore with the presence or absence of the target terminal device identification;
If it is determined that there is no the target terminal device identifications in the Terminal Equipment Identifier to prestore, then the mesh is obtained Mark the corresponding subscriber identity information of account information;
Authentication prompt message is generated according to the subscriber identity information;
The authentication prompt message is sent to the target terminal;
The authentication information that the target terminal returns is received, and judges that the authentication information is believed with the identity Whether breath matches;
If it is determined that the authentication information is matched with the identity information, then the target terminal is allowed to log in the clothes Business device.
The second aspect of the embodiment of the present invention provides a kind of login authentication device, including:
For receiving the logging request of target terminal transmission, target account is carried in the logging request for first receiving module Family information and target terminal device identification;
First judgment module, for judging in the Terminal Equipment Identifier to prestore with the presence or absence of the target terminal equipment mark Know;
First acquisition module, for if it is determined that the target terminal equipment is not present in the Terminal Equipment Identifier to prestore Mark, then obtain the corresponding subscriber identity information of the target account information;
First generation module, for generating authentication prompt message according to the subscriber identity information;
First sending module, for sending the authentication prompt message to the target terminal;
Second judgment module for receiving the authentication information that the target terminal returns, and judges that the identity is tested Whether card information matches with the identity information;
Login process module, for if it is determined that the authentication information is matched with the identity information, then described in permission Target terminal logs in the server.
The third aspect of the embodiment of the present invention provides a kind of login authentication terminal device, including memory, processor with And the computer program that can be run in the memory and on the processor is stored in, the processor performs the calculating The step of above-mentioned login validation method is realized during machine program.
The fourth aspect of the embodiment of the present invention, provides a kind of computer readable storage medium, described computer-readable to deposit Storage media is stored with computer program, and the computer program realizes the step of above-mentioned login validation method when being executed by processor Suddenly.
The advantageous effect of the embodiment of the present invention compared with prior art is:Login validation method provided in an embodiment of the present invention And terminal device, by receiving the logging request of target terminal transmission, target account information is carried in logging request and target is whole End equipment identifies;Judge in the Terminal Equipment Identifier to prestore with the presence or absence of target terminal device identification;If it is determined that the terminal to prestore There is no target terminal device identifications in device identification, then obtain the corresponding subscriber identity information of target account information;According to Family identity information generation authentication prompt message;Authentication prompt message is sent to target terminal;Target terminal is received to return The authentication information returned, and judge whether authentication information matches with identity information;If it is determined that authentication information and body Part information matches, then allow target terminal login service device.Login validation method and terminal device provided in an embodiment of the present invention, Due to needing that repeatedly effective login authentication is carried out to logging device, it ensure that the safety of logon account, reduce login account quilt The risk of robber.
Description of the drawings
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description be only the present invention some Embodiment, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is the flow diagram of a kind of login authentication that one embodiment of the invention provides;
Fig. 2 is the flow diagram of a kind of login authentication that another embodiment of the present invention provides;
Fig. 3 is the flow diagram of a kind of login authentication that further embodiment of this invention provides;
Fig. 4 is the flow diagram of a kind of login authentication that further embodiment of this invention provides;
Fig. 5 is the structure diagram of a kind of login authentication device that one embodiment of the invention provides;
Fig. 6 is the schematic block diagram of one embodiment of the invention login authentication terminal device.
Specific embodiment
In being described below, in order to illustrate rather than in order to limit, it is proposed that such as tool of particular system structure, technology etc Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specifically The present invention can also be realized in the other embodiments of details.In other situations, it omits to well-known system, device, electricity Road and the detailed description of method, in case unnecessary details interferes description of the invention.
It should be appreciated that ought use in this specification and in the appended claims, term " comprising " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded Body, step, operation, element, component and/or its presence or addition gathered.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and the appended claims is Refer to any combinations and all possible combinations of one or more of the associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In order to illustrate technical scheme of the present invention, illustrated below by specific embodiment.
With reference to figure 1, Fig. 1 is the flow diagram of a kind of login authentication that one embodiment of the invention provides.This method can be with Applied to server, example server can be one or more, and details are as follows for the present embodiment:
S101:The logging request that target terminal is sent is received, target account information and target terminal are carried in logging request Device identification.
In the present embodiment, target terminal can be mobile phone terminal, palm PC (Personal DigitalAssistant, PDA) etc. terminal devices.Target account information can be register account number or cell-phone number.Such as target is whole End can be the terminal device for being mounted with sales applications.Target terminal device identification can be the international mobile device of target terminal Identity code (International Mobile Equipment Identity, IMEI).
S102:Judge in the Terminal Equipment Identifier to prestore with the presence or absence of target terminal device identification.
In the present embodiment, the Terminal Equipment Identifier to prestore can be in advance registration or logged Terminal Equipment Identifier List.
S103:If it is determined that there is no target terminal device identifications in the Terminal Equipment Identifier to prestore, then target account is obtained The corresponding subscriber identity information of information.
In the present embodiment, target account information includes the log-on message of individual subscriber and account use information.For example, with The post information at family is responsible for shops, place of checking card, late or information record of not checking card, position promotion, sale awards etc..
S104:Authentication prompt message is generated according to subscriber identity information.
In the present embodiment, authentication prompt message includes but not limited to select just from the subscriber identity information of offer True option, is ranked up the subscriber identity information of offer the option that mistake is selected from the subscriber identity information of offer.
S105:Authentication prompt message is sent to target terminal.
In the present embodiment, authentication prompt message is sent to target terminal, authentication prompt message is used Family such as is selected or is sorted the operation processings.
S106:The authentication information that target terminal returns is received, and judges whether are authentication information and identity information Matching.
In the present embodiment, the authentication information that target terminal returns is used for for user according to authentication prompt message User such as is selected or is sorted the operation processings generation.
S107:If it is determined that authentication information is matched with identity information, then allow target terminal login service device.
In the present embodiment, judging that authentication information is matched with identity information can include:Authentication information and body The content of part information is identical or substantially identical or authentication information is consistent with the content logic of identity information.
In one embodiment of the invention, if it is determined that authentication information is mismatched with identity information, then forbid target Terminal login service device, and send and log in abnormal prompt to target terminal.
From above-described embodiment it is found that the logging request sent by receiving target terminal, target account is carried in logging request Family information and target terminal device identification;Judge in the Terminal Equipment Identifier to prestore with the presence or absence of target terminal device identification;If Judge that there is no target terminal device identifications in the Terminal Equipment Identifier to prestore, then obtain the corresponding user's body of target account information Part information;Authentication prompt message is generated according to subscriber identity information;Authentication prompt message is sent to target terminal;It connects The authentication information that target terminal returns is received, and judges whether authentication information matches with identity information;If it is determined that identity Verification information is matched with identity information, then allows target terminal login service device.Login authentication side provided in an embodiment of the present invention Method and terminal device due to needing that repeatedly effective login authentication is carried out to logging device, ensure that the safety of logon account, drop The risk that low login account is stolen.
With reference to figure 2, Fig. 2 is the flow diagram of a kind of login authentication that another embodiment of the present invention provides.In this implementation In example, above-described embodiment can also be including the step of being verified by other-end, and details are as follows:
S201:Login authentication prompt message is sent to target terminal.
In the present embodiment, login authentication prompt message can be mobile phone verification tip information or mailbox verification tip letter Breath.For example, mobile phone verification tip information can be acquisition request identifying code prompt message.Mailbox verification tip information can be please It asks and obtains mailbox verification page prompts information etc..
S202:The login authentication request that target terminal is sent is received, and the first verification letter is requested to generate according to login authentication Breath.
In the present embodiment, login authentication request can obtain identifying code request or obtain mailbox to verify page It requests in person and asks.First verification information can be identifying code or the mailbox verification page.
S203:The account number of terminal is verified according to target account acquisition of information, and sends the first verification information to account Corresponding verification terminal is identified, so that user obtains the first verification information.
In the present embodiment, in the present embodiment, verification terminal can be target terminal or other terminal is set It is standby.Such as verification terminal can be a mobile phone, tablet computer (Personal DigitalAssistant, PDA) or personal electricity Brain (Personal Computer, PC).
S204:The second verification information that target terminal is sent is received, and judges the second verification information and the first verification information It is whether identical.
In the present embodiment, in the present embodiment, the second verification information is tested for user according to verification terminal first is sent to Demonstrate,prove the second verification information of information input.
S205:If it is determined that the second verification information is identical with the first verification information, then performs and obtain target account information correspondence Subscriber identity information the step of.
In the present embodiment, if logging device is logged in for legal account, user can be by verifying that terminal obtains the first verification Information, then user will input second verification information identical with the first verification information;If logging device is logged in for appropriating account, use Family will not learn the first verification information of verification terminal, then will be unable to the input second verification letter identical with the first verification information Breath.
From above-described embodiment it is found that by sending the first verification information to verification terminal, the second verification information of judgement and the One verification information is identical, then obtains the corresponding subscriber identity information of target account information, can be into one by verifying the verification of terminal Step ensures the safety of logon account.
With reference to figure 3, Fig. 3 is the flow diagram of a kind of login authentication that further embodiment of this invention provides.In this implementation In example, the process of authentication prompt message is generated according to subscriber identity information in above-mentioned steps S104, is specifically included:
S301:The second verification of a correct first verification sub-information and at least one mistake is generated according to identity information Sub-information.
S302:According to the second verification sub-information generation body of a correct first verification sub-information and at least one mistake Part verification tip information.
In the present embodiment, authentication prompt message can be prompting selection one it is correct first verification sub-information and The correct option or correct first verification of prompting selection one in second verification sub-information of at least one mistake Wrong option in second verification sub-information of information and at least one mistake.
Correspondingly, the authentication information that target terminal returns is received in above-mentioned steps S106, and judges that authentication is believed Breath and the whether matched process of identity information, specifically include:
S303:The authentication information that target terminal returns is received, authentication information is correct from one for sale user The first verification sub-information and at least one mistake the second verification sub-information at least one verification sub-information to be measured for selecting.
S304:If it is determined that verification sub-information to be measured is correct, then judge that authentication information is matched with identity information.
In the present embodiment, judging verification sub-information to be measured can be for the correct first verification sub-information:When part is verified Prompt message is in the second verification sub-information of the correct first verification sub-information of prompting selection one and at least one mistake During the correct option, if verification sub-information to be measured is the correct option, judge that verification sub-information to be measured is correct.When part verification tip is believed Breath is the mistake choosing in the second verification sub-information of the correct first verification sub-information of prompting selection one and at least one mistake Xiang Shi if verification sub-information to be measured includes all wrong options, judges that verification sub-information to be measured is correct.
If from above-described embodiment it is found that by generating a correct first verification sub-information and multiple by identity information Second verification sub-information of mistake, and according to the second verification of a correct first verification sub-information and at least one mistake Information generate authentication prompt message, authentication information for sale user from one it is correct first verification sub-information and to The verification sub-information to be measured selected in few one the second wrong verification sub-information, if it is determined that verification sub-information to be measured is just Really, then judge that authentication information is matched with identity information, can further ensure the sale user of the account logged in to close Method registered user ensures the safe to use of account.
In another embodiment of the present invention, identity information includes the post information of sale user, is responsible for shops, checks card Information, step S301 generate the second verification of a correct first verification sub-information and at least one mistake according to identity information The process of sub-information, specifically includes:
The post Information Authentication that a correct post Information Authentication information and several mistakes are generated according to post information is believed Breath;
One correctly responsible shops verification letter of responsible shops's verification information and several mistakes is generated according to responsible shops Breath;
The Information Authentication letter of checking card of correctly check card place verification information and a several mistakes is generated according to information of checking card Breath;
Determine that correct post Information Authentication information, correctly responsible shops's verification information or place of correctly checking card are verified Any one in information is the first verification sub-information;
Determine the post Information Authentication information of several mistakes, responsible shops's verification information of several mistakes or several mistakes Multiple in Information Authentication information of checking card are the second verification sub-information;
According to the first verification sub-information and the second verification sub-information generation authentication prompt message.
In the present embodiment, post information can be the post promotion information of user.Responsible shops can be each user Corresponding at least one shops, such as user are that when selling user, actually can carry out sale in multiple shops.It checks card Information can be place of checking card, wherein place of checking card can be the location information uploaded in shops position user's work hours;It beats Card information can also be the time of checking card, the late time that includes but not limited to check card, continuously late date;Information of checking card may be used also To be shops or the shops never to check card that user often checks card.
From above-described embodiment it is found that by the post information of user, being responsible for shops, the second verification that information of checking card generates Information and the personal information close association of user, the illegal registrant with account not usurped can not possibly obtain detailed sale and use The post information at family is responsible for shops, information of checking card, and cannot complete account login.
In one embodiment of the invention, above-mentioned steps S104 can also include:
Multiple verification sub-informations are generated according to subscriber identity information, multiple verification sub-informations have to be carried out according to preset rules The attribute of sequence;
According to it is multiple verification sub-informations generation authentication prompt messages, authentication prompt message for prompting user to Multiple verification sub-informations of machine arrangement sort according to preset rules.
In the present embodiment, subscriber identity information includes but not limited to the position promotion information of user, sale awards information (sales company's ranking etc.), shops's azimuth mark or shops's access frequency etc..
Correspondingly, above-mentioned steps S106 receives the authentication information that target terminal returns, and judges authentication information Whether matched with identity information, including:
The authentication information that target terminal returns is received, authentication information is multiple verifications of the user to random alignment Verification information to be measured after sub-information sequence;
If it is determined that the sequence of verification information to be measured has the sequence one carried out according to preset rules with multiple verification sub-informations It causes, then judges whether authentication information matches with identity information.
In the present embodiment, judge the sequence of verification information to be measured and multiple verification sub-informations have according to preset rules into Capable sequence is consistent, can include:The post promotion sequence and true post for selecting user are transferred and promoted sequence unanimously;Can also be The sequence (from high to low or from low to high) of shops's access frequency of selection is consistent with true shops's access frequency.
From above-described embodiment it is found that by verifying that user selects the sequence of multiple verification sub-informations and multiple verification sub-informations It is consistent with the sequence carried out according to preset rules, ensure the legitimacy of logon account user.
With reference to figure 4, Fig. 4 is the flow diagram of a kind of login authentication that further embodiment of this invention provides.In this implementation Example in, the location information of logging request also carried terminal equipment, step S101 receive target terminal send logging request it Afterwards, it further includes:
S401:The location information that target account information corresponds to the affiliated shops of user is obtained, shops is at least one.
In the present embodiment, target account information correspond to the location information of the affiliated shops of user can be by the data that prestore It directly reads in library, and is marked on the electronic map.
S402:According to the location information of target terminal and the location information of all shops, determine that distance objective terminal is nearest Shops be target shops.
In the present embodiment, the location information of target terminal can be address or satellite positioning coordinate.Wherein, satellite Position coordinate can be the Big Dipper elements of a fix or global location (Global Positioning System, GPS) elements of a fix.
S403:Judge whether target terminal and the distance value of target shops have exceeded pre-determined distance threshold range.
In the present embodiment, in the present embodiment, pre-determined distance threshold range is judges terminal device whether in shops Neighbouring standard value according to management user can be configured.For example, pre-determined distance threshold range is 5~10m.
S404:If it is determined that distance value has exceeded pre-determined distance threshold range, then send and log in abnormal prompt to target terminal.
From above-described embodiment it is found that by judge terminal device and shops distance value whether pre-determined distance threshold range, It can ensure that login position is consistent with shops position, prevent different-place login, ensure the safety of sale user's login account.
In another embodiment of the present invention, if it is determined that the authentication information is mismatched with the identity information, Authentication error prompt message is then sent to the terminal device.If within the first preset period, carried if sending authentication error The number for showing information is more than preset verification frequency threshold value, then the target account is identified corresponding account blocks, with It is further ensured that the safety of account, reduces the loss after account is stolen
In another embodiment of the present invention, within the second preset period, if sending time for logging in abnormal prompt Number is more than preset prompting frequency threshold value, then the target account is identified corresponding account blocks.Ensure the peace of account Entirely, the loss after account is stolen is reduced.
Corresponding to the login validation method of foregoing embodiments, Fig. 5 is a kind of login authentication that one embodiment of the invention provides The structure diagram of device for convenience of description, illustrates only and the relevant part of the embodiment of the present invention.With reference to Fig. 5, the device packet It includes:First receiving module 501, the first judgment module 502, the first acquisition module 503, the first generation module 504, first send mould Block 505, the second judgment module 506 and login process module 507.
For receiving the logging request of target terminal transmission, target is carried in the logging request for first receiving module 501 Account information and target terminal device identification;
First judgment module 502, for judging in the Terminal Equipment Identifier to prestore with the presence or absence of the target terminal equipment Mark;
First acquisition module 503, for if it is determined that the target terminal is not present in the Terminal Equipment Identifier to prestore Device identification then obtains the corresponding subscriber identity information of the target account information;
First generation module 504, for generating authentication prompt message according to the subscriber identity information;
First sending module 505, for sending the authentication prompt message to the target terminal;
Second judgment module 506 for receiving the authentication information that the target terminal returns, and judges the identity Whether verification information matches with the identity information;
Login process module 507, for if it is determined that the authentication information is matched with the identity information, then allowing institute It states target terminal and logs in the server.
From above-described embodiment it is found that the logging request sent by receiving target terminal, target account is carried in logging request Family information and target terminal device identification;Judge in the Terminal Equipment Identifier to prestore with the presence or absence of target terminal device identification;If Judge that there is no target terminal device identifications in the Terminal Equipment Identifier to prestore, then obtain the corresponding user's body of target account information Part information;Authentication prompt message is generated according to subscriber identity information;Authentication prompt message is sent to target terminal;It connects The authentication information that target terminal returns is received, and judges whether authentication information matches with identity information;If it is determined that identity Verification information is matched with identity information, then allows target terminal login service device.Login authentication side provided in an embodiment of the present invention Method and terminal device due to needing that repeatedly effective login authentication is carried out to logging device, ensure that the safety of logon account, drop The risk that low login account is stolen.
With reference to figure 5, in one embodiment of the invention, described device further includes:
Second sending module 508, for sending login authentication prompt message to the target terminal;
Second generation module 509, for receiving the login authentication request that the target terminal is sent, and according to the login Checking request generates the first verification information;
Third sending module 510 for verifying the account number of terminal according to the target account acquisition of information, and is sent First verification information is to the corresponding verification terminal of the account number, so that user obtains the first verification information;
Third judgment module 511 for receiving the second verification information of target terminal transmission, and judges second verification Whether information and first verification information are identical;
First acquisition module 503 is additionally operable to if it is determined that the second verification information is identical with the first verification information, then perform The step of obtaining the target account information corresponding subscriber identity information.
With reference to figure 5, in one embodiment of the invention, first generation module 504, including:
Sub-information generation unit 5041 is verified, for generating a correct first verification son letter according to the identity information Second verification sub-information of breath and at least one mistake;
Authentication prompt message generation unit 5042, for according to one correct first verification sub-information and extremely Few one the second wrong verification sub-information generates the authentication prompt message;
Second judgment module 506, including:
Authentication information receiving unit 5061, it is described for receiving the authentication information that the target terminal returns Authentication information is the second verification son letter for selling user from a correct first verification sub-information and at least one mistake At least one verification sub-information to be measured selected in breath;
Authentication information identifying unit 5062, for if it is determined that the verification sub-information to be measured is correct, then described in judgement Authentication information is matched with the identity information.
With reference to figure 5, in one embodiment of the invention,
The verification sub-information generation unit 5041 is additionally operable to according to the multiple verification letters of subscriber identity information generation Breath, the multiple verification sub-information have the attribute being ranked up according to preset rules;
The authentication prompt message generation unit 5042 is additionally operable to according to the multiple verification sub-information generation Authentication prompt message, the authentication prompt message be prompt user to multiple verification sub-informations of random alignment according to Preset rules sort;
The authentication information receiving unit 5061 is additionally operable to receive the authentication letter that the target terminal returns Breath, the authentication information are user to verification information to be measured after multiple verification sub-informations sequence of random alignment;
The authentication information identifying unit 5062, be additionally operable to if it is determined that the sequence of the verification information to be measured with it is described Multiple verification sub-informations are consistent with the sequence carried out according to preset rules, then judge the authentication information and the identity Whether information matches.
With reference to figure 5, in one embodiment of the invention, described device further includes:
Second acquisition module 512, for obtaining the location information that the target account information corresponds to the affiliated shops of user, institute It is at least one to state shops;
Determining module 513, for the location information according to the target terminal and the location information of all shops, determine away from The shops nearest from the target terminal is target shops;
4th judgment module 514, for judging whether the target terminal and the distance value of the target shops have exceeded Pre-determined distance threshold range;
The login process module 507 is additionally operable to if it is determined that the distance value has exceeded pre-determined distance threshold range, then send out It send and logs in abnormal prompt to the target terminal.
In another embodiment of the present invention, login process module 507, for if it is determined that the authentication information with The identity information mismatches, then sends authentication error prompt message to the terminal device.If in the first preset period It is interior, if the number for sending authentication error prompt message is more than preset verification frequency threshold value, by target account mark pair The account answered is blocked, and to be further ensured that the safety of account, reduces the loss after account is stolen
In another embodiment of the present invention, login process module 507, within the second preset period, if It is more than preset prompting frequency threshold value to send and log in the number of abnormal prompt, then by the target account identify corresponding account into Row block.Ensure the safety of account, reduce the loss after account is stolen.
Referring to Fig. 6, Fig. 6 is the schematic block diagram of one embodiment of the invention login authentication terminal device.This reality as shown in Figure 6 The terminal 600 applied in example can include:One or more processors 601, one or more input equipments 602, one or more Then output equipment 603 and one or more memories 604.Above-mentioned processor 601, input equipment 602, then output equipment 603 and Memory 604 completes mutual communication by communication bus 605.Memory 604 is used to store computer program, the calculating Machine program includes program instruction.Processor 601 is used to perform the program instruction of the storage of memory 604.Wherein, 601 quilt of processor The function that described program instruction is called to perform each module/unit in the following above-mentioned each device embodiment of operation is configured to, such as The function of module 501 to 513 shown in Fig. 5.
It should be appreciated that in embodiments of the present invention, alleged processor 601 can be central processing unit (Central Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (Application SpecificIntegrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at It can also be any conventional processor etc. to manage device.
Input equipment 602 can include Trackpad, fingerprint and adopt sensor (for acquiring the finger print information of user and fingerprint Directional information), microphone etc., output equipment 603 can include display (LCD etc.), loud speaker etc..
The memory 604 can include read-only memory and random access memory, and to processor 601 provide instruction and Data.The a part of of memory 604 can also include nonvolatile RAM.For example, memory 604 can also be deposited Store up the information of device type.
In the specific implementation, processor 601, input equipment 602, the output equipment 603 described in the embodiment of the present invention can The realization method described in the first embodiment and second embodiment of service request method provided in an embodiment of the present invention is performed, Also the realization method of the described terminal of the embodiment of the present invention is can perform, details are not described herein.
A kind of computer readable storage medium, the computer-readable storage medium are provided in another embodiment of the invention Matter is stored with computer program, and the computer program includes program instruction, and described program instruction is realized when being executed by processor All or part of flow in above-described embodiment method can also instruct relevant hardware to complete by computer program, The computer program can be stored in a computer readable storage medium, the computer program when being executed by processor, The step of above-mentioned each embodiment of the method can be achieved..Wherein, the computer program includes computer program code, the meter Calculation machine program code can be source code form, object identification code form, executable file or certain intermediate forms etc..The calculating Machine readable medium can include:Any entity of the computer program code or device, recording medium, USB flash disk, shifting can be carried Dynamic hard disk, magnetic disc, CD, computer storage, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), electric carrier signal, telecommunication signal and software distribution medium etc..Need what is illustrated It is that the content that the computer-readable medium includes can be fitted according to legislation in jurisdiction and the requirement of patent practice When increase and decrease, such as in certain jurisdictions, according to legislation and patent practice, it is electric carrier wave that computer-readable medium, which does not include, Signal and telecommunication signal.
The computer readable storage medium can be the internal storage unit of the terminal described in aforementioned any embodiment, example Such as the hard disk or memory of terminal.The computer readable storage medium can also be the External memory equipment of the terminal, such as The plug-in type hard disk being equipped in the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (SD, Secure Digital) card, flash card (Flash Card) etc..Further, the computer readable storage medium can be with Both the internal storage unit of the terminal had been included or including External memory equipment.The computer readable storage medium is used to store Other programs and data needed for the computer program and the terminal.The computer readable storage medium can be also used for Temporarily store the data that has exported or will export.
Those of ordinary skill in the art may realize that each exemplary lists described with reference to the embodiments described herein Member and algorithm steps can be realized with the combination of electronic hardware, computer software or the two, in order to clearly demonstrate hardware With the interchangeability of software, each exemplary composition and step are generally described according to function in the above description.This A little functions are performed actually with hardware or software mode, specific application and design constraint depending on technical solution.Specially Industry technical staff can realize described function to each specific application using distinct methods, but this realization is not It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, the end of foregoing description End and the specific work process of unit can refer to the corresponding process in preceding method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed terminal and method can pass through it Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only Only a kind of division of logic function can have other dividing mode in actual implementation, such as multiple units or component can be tied It closes or is desirably integrated into another system or some features can be ignored or does not perform.In addition, shown or discussed phase Coupling, direct-coupling or communication connection between mutually can be INDIRECT COUPLING or the communication by some interfaces, device or unit Connection or electricity, the connection of mechanical or other forms.
The unit illustrated as separating component may or may not be physically separate, be shown as unit The component shown may or may not be physical unit, you can be located at a place or can also be distributed to multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the embodiment of the present invention Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that each unit is individually physically present or two or more units integrate in a unit.It is above-mentioned integrated The form that hardware had both may be used in unit is realized, can also be realized in the form of SFU software functional unit.
The above description is merely a specific embodiment, but protection scope of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or replace It changes, these modifications or substitutions should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with right It is required that protection domain subject to.

Claims (10)

1. a kind of login validation method, which is characterized in that the method is applied to server, including:
The logging request that target terminal is sent is received, target account information and target terminal equipment mark are carried in the logging request Know;
Judge in the Terminal Equipment Identifier to prestore with the presence or absence of the target terminal device identification;
If it is determined that there is no the target terminal device identifications in the Terminal Equipment Identifier to prestore, then the target account is obtained The corresponding subscriber identity information of family information;
Authentication prompt message is generated according to the subscriber identity information;
The authentication prompt message is sent to the target terminal;
The authentication information that the target terminal returns is received, and judges that the authentication information is with the identity information No matching;
If it is determined that the authentication information is matched with the identity information, then the target terminal is allowed to log in the service Device.
2. login validation method according to claim 1, which is characterized in that further include:
Login authentication prompt message is sent to the target terminal;
The login authentication request that the target terminal is sent is received, and the first verification letter is requested to generate according to the login authentication Breath;
The account number of terminal is verified according to the target account acquisition of information, and sends the first verification information to the account mark Corresponding verification terminal is known, so that user obtains the first verification information;
The second verification information that target terminal is sent is received, and judges that second verification information is with first verification information It is no identical;
If it is determined that the second verification information is identical with the first verification information, then performs and obtain the corresponding user of the target account information The step of identity information.
3. login validation method according to claim 1, which is characterized in that described to be generated according to the subscriber identity information Authentication prompt message, including:
The second verification son letter of a correct first verification sub-information and at least one mistake is generated according to the identity information Breath;
The body is generated according to the second verification sub-information of one correct first verification sub-information and at least one mistake Part verification tip information;
Correspondingly, the authentication information for receiving the target terminal and returning, and judge the authentication information and institute State whether identity information matches, including:
The authentication information that the target terminal returns is received, the authentication information is correct from one for sale user At least one verification sub-information to be measured selected in second verification sub-information of the first verification sub-information and at least one mistake;
If it is determined that the verification sub-information to be measured is correct, then judge that the authentication information is matched with the identity information.
4. login validation method according to claim 1, which is characterized in that described to be generated according to the subscriber identity information Authentication prompt message, including:
Multiple verification sub-informations are generated according to the subscriber identity information, the multiple verification sub-information has according to preset rules The attribute being ranked up;
The authentication prompt message is generated according to the multiple verification sub-information, the authentication prompt message is prompting User sorts to multiple verification sub-informations of random alignment according to preset rules;
Correspondingly, the authentication information for receiving the target terminal and returning, and judge the authentication information and institute State whether identity information matches, including:
The authentication information that the target terminal returns is received, the authentication information is user to the multiple of random alignment Verification information to be measured after verification sub-information sequence;
If it is determined that the sequence of the verification information to be measured has the row carried out according to preset rules with the multiple verification sub-information Sequence is consistent, then judges whether the authentication information matches with the identity information.
5. login validation method according to claim 1, which is characterized in that it is whole that the logging request also carries the target The location information at end;
After the logging request for receiving target terminal and sending, further include:
The location information that the target account information corresponds to the affiliated shops of user is obtained, the shops is at least one;
According to the location information of the target terminal and the location information of all shops, determine nearest apart from the target terminal Shops is target shops;
Judge whether the target terminal and the distance value of the target shops have exceeded pre-determined distance threshold range;
If it is determined that the distance value has exceeded pre-determined distance threshold range, then send and log in abnormal prompt to the target terminal.
6. a kind of login authentication device, which is characterized in that including:
First receiving module for receiving the logging request of target terminal transmission, carries target account letter in the logging request Breath and target terminal device identification;
First judgment module, for judging in the Terminal Equipment Identifier to prestore with the presence or absence of the target terminal device identification;
First acquisition module, for if it is determined that the target terminal equipment mark is not present in the Terminal Equipment Identifier to prestore Know, then obtain the corresponding subscriber identity information of the target account information;
First generation module, for generating authentication prompt message according to the subscriber identity information;
First sending module, for sending the authentication prompt message to the target terminal;
Second judgment module for receiving the authentication information that the target terminal returns, and judges the authentication letter Whether breath matches with the identity information;
Login process module, for if it is determined that the authentication information is matched with the identity information, then allowing the target Terminal logs in the server.
7. login authentication device according to claim 6, which is characterized in that further include:
Second sending module, for sending login authentication prompt message to the target terminal;
Second generation module, for receiving the login authentication request that the target terminal is sent, and please according to the login authentication Seek survival into the first verification information;
Third sending module for verifying the account number of terminal according to the target account acquisition of information, and sends first and tests Information is demonstrate,proved to the corresponding verification terminal of the account number, so that user obtains the first verification information;
Third judgment module, for receive target terminal transmission the second verification information, and judge second verification information with Whether first verification information is identical;
First acquisition module is additionally operable to if it is determined that the second verification information is identical with the first verification information, then performs and obtain institute The step of stating target account information corresponding subscriber identity information.
8. login authentication device according to claim 6, which is characterized in that first generation module, including:
Sub-information generation unit is verified, for according to one correct first verification sub-information of identity information generation and at least One the second wrong verification sub-information;
Authentication prompt message generation unit, for according to one correct first verification sub-information and at least one mistake The second verification sub-information accidentally generates the authentication prompt message;
Second judgment module, including:
Authentication information receiving unit, for receiving the authentication information that the target terminal returns, the authentication Information is to sell user to select from the second verification sub-information of a correct first verification sub-information and at least one mistake At least one verification sub-information to be measured;
Authentication information identifying unit, for if it is determined that it is described it is to be measured verification sub-information it is correct, then judge the authentication Information is matched with the identity information.
9. a kind of login authentication terminal device, including memory, processor and it is stored in the memory and can be described The computer program run on processor, which is characterized in that the processor realizes such as right when performing the computer program It is required that the step of any one of 1 to 5 the method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In when the computer program is executed by processor the step of realization such as any one of claim 1 to 5 the method.
CN201810170984.6A 2018-03-01 2018-03-01 A kind of login validation method and terminal device Pending CN108183924A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810170984.6A CN108183924A (en) 2018-03-01 2018-03-01 A kind of login validation method and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810170984.6A CN108183924A (en) 2018-03-01 2018-03-01 A kind of login validation method and terminal device

Publications (1)

Publication Number Publication Date
CN108183924A true CN108183924A (en) 2018-06-19

Family

ID=62553063

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810170984.6A Pending CN108183924A (en) 2018-03-01 2018-03-01 A kind of login validation method and terminal device

Country Status (1)

Country Link
CN (1) CN108183924A (en)

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109150880A (en) * 2018-08-22 2019-01-04 深圳市人民政府金融发展服务办公室 Datagram delivery method, device and computer readable storage medium
CN109471620A (en) * 2018-10-19 2019-03-15 深圳思为科技有限公司 A kind of automatic generation method of APP, device, terminal device and readable storage medium storing program for executing
CN109951604A (en) * 2019-02-27 2019-06-28 维沃移动通信有限公司 A kind of message treatment method, mobile terminal and user identification module
CN110147664A (en) * 2019-04-19 2019-08-20 深圳壹账通智能科技有限公司 The method and relevant device of authentication based on centralization database
CN110166948A (en) * 2019-07-02 2019-08-23 中国联合网络通信集团有限公司 A kind of vice card terminal monitoring method, management server and block chain network system
CN110198322A (en) * 2019-06-17 2019-09-03 国家电网有限公司 Data communication network cut-in method
CN110222483A (en) * 2019-04-18 2019-09-10 深圳壹账通智能科技有限公司 Data processing method, data processing equipment, terminal and storage medium
CN110245475A (en) * 2019-05-30 2019-09-17 阿里巴巴集团控股有限公司 Auth method and device
CN110266658A (en) * 2019-05-31 2019-09-20 苏州达家迎信息技术有限公司 A kind of information updating method, device, electronic equipment and storage medium
CN110445769A (en) * 2019-07-18 2019-11-12 阿里巴巴集团控股有限公司 The access method and device of operation system
CN110751129A (en) * 2019-10-30 2020-02-04 深圳市丰巢科技有限公司 Express delivery service identity verification method, device, equipment and storage medium
CN110855709A (en) * 2019-11-26 2020-02-28 中国建设银行股份有限公司 Access control method, device, equipment and medium for security access gateway
CN111177674A (en) * 2019-12-31 2020-05-19 中国联合网络通信集团有限公司 Device verification method and device
CN111951019A (en) * 2020-08-28 2020-11-17 浪潮软件股份有限公司 Identity verification method and device
CN112182546A (en) * 2020-09-15 2021-01-05 珠海格力电器股份有限公司 Account number protection method and device, terminal equipment and storage medium
CN112200983A (en) * 2020-09-25 2021-01-08 建信金融科技有限责任公司 Remote self-service card supplementing method, device, server, terminal and storage medium
CN113037682A (en) * 2019-12-09 2021-06-25 西安诺瓦星云科技股份有限公司 Encrypted communication method, encrypted communication device, and encrypted communication system
CN113098737A (en) * 2019-12-23 2021-07-09 北京神经元网络技术有限公司 User node admission control method and device and electronic equipment
CN113452584A (en) * 2021-04-28 2021-09-28 珠海格力电器股份有限公司 Binding control method and device of electric appliance, storage medium, mobile terminal and electric appliance
CN113536266A (en) * 2021-06-25 2021-10-22 北京达佳互联信息技术有限公司 Identity authentication method and device, electronic equipment and storage medium
CN113556400A (en) * 2021-07-21 2021-10-26 杭州华橙软件技术有限公司 Login method and login device of Internet of things platform and Internet of things system
CN113630253A (en) * 2021-08-11 2021-11-09 中国工商银行股份有限公司 Login method, device, computer system and readable storage medium
CN113657906A (en) * 2021-07-13 2021-11-16 广东丸美生物技术股份有限公司 Product management method and system based on identification code
CN113688369A (en) * 2021-07-28 2021-11-23 支付宝(杭州)信息技术有限公司 Method, device and equipment for recommending login mode after application program is uninstalled and reinstalled
CN114071201A (en) * 2020-07-30 2022-02-18 华为技术有限公司 Equipment control method and device
CN114928840A (en) * 2022-06-16 2022-08-19 中国联合网络通信集团有限公司 Identity authentication method, device and storage medium
CN115022004A (en) * 2022-05-27 2022-09-06 中国银行股份有限公司 Data processing method and device and server
CN115474194A (en) * 2022-09-19 2022-12-13 天翼数字生活科技有限公司 Security authentication method, device, equipment and storage medium
CN115618308A (en) * 2022-12-01 2023-01-17 杭州美创科技股份有限公司 Abnormal behavior detection method and device based on zero trust identity
US11652818B2 (en) 2019-07-18 2023-05-16 Advanced New Technologies Co., Ltd. Method and apparatus for accessing service system
CN116800544A (en) * 2023-08-21 2023-09-22 成都数智创新精益科技有限公司 User authentication method, system and device and medium
CN117278201A (en) * 2022-05-27 2023-12-22 河北雄安三千科技有限责任公司 Information processing method and device
CN117272275A (en) * 2023-09-19 2023-12-22 赛力斯汽车有限公司 Verification method and device based on user operation result and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102143482A (en) * 2011-04-13 2011-08-03 中国工商银行股份有限公司 Method and system for authenticating mobile banking client information, and mobile terminal
CN102801717A (en) * 2012-08-03 2012-11-28 苏州迈科网络安全技术股份有限公司 Login verifying method and system
CN104348822A (en) * 2013-08-09 2015-02-11 深圳市腾讯计算机系统有限公司 Method and device for authentication of Internet account number and server
CN105323073A (en) * 2015-11-16 2016-02-10 腾讯科技(深圳)有限公司 Identity authentication method, identity authentication device and identity authentication system
CN105847245A (en) * 2016-03-21 2016-08-10 杭州朗和科技有限公司 Electronic mail box login authentication method and device
CN106453327A (en) * 2016-10-18 2017-02-22 北京深思数盾科技股份有限公司 Method and mobile terminal for logging in computer application with demand for identity authentication
CN106506459A (en) * 2016-10-17 2017-03-15 北京小米移动软件有限公司 Identity information verification method and device
US20170078882A1 (en) * 2015-09-14 2017-03-16 Yi-Chou Chen User verification system and its implementing method
CN107241336A (en) * 2017-06-19 2017-10-10 广州市百果园信息技术有限公司 Auth method and device
CN107733852A (en) * 2017-08-24 2018-02-23 北京三快在线科技有限公司 A kind of auth method and device, electronic equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102143482A (en) * 2011-04-13 2011-08-03 中国工商银行股份有限公司 Method and system for authenticating mobile banking client information, and mobile terminal
CN102801717A (en) * 2012-08-03 2012-11-28 苏州迈科网络安全技术股份有限公司 Login verifying method and system
CN104348822A (en) * 2013-08-09 2015-02-11 深圳市腾讯计算机系统有限公司 Method and device for authentication of Internet account number and server
US20170078882A1 (en) * 2015-09-14 2017-03-16 Yi-Chou Chen User verification system and its implementing method
CN105323073A (en) * 2015-11-16 2016-02-10 腾讯科技(深圳)有限公司 Identity authentication method, identity authentication device and identity authentication system
CN105847245A (en) * 2016-03-21 2016-08-10 杭州朗和科技有限公司 Electronic mail box login authentication method and device
CN106506459A (en) * 2016-10-17 2017-03-15 北京小米移动软件有限公司 Identity information verification method and device
CN106453327A (en) * 2016-10-18 2017-02-22 北京深思数盾科技股份有限公司 Method and mobile terminal for logging in computer application with demand for identity authentication
CN107241336A (en) * 2017-06-19 2017-10-10 广州市百果园信息技术有限公司 Auth method and device
CN107733852A (en) * 2017-08-24 2018-02-23 北京三快在线科技有限公司 A kind of auth method and device, electronic equipment

Cited By (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109150880A (en) * 2018-08-22 2019-01-04 深圳市人民政府金融发展服务办公室 Datagram delivery method, device and computer readable storage medium
CN109471620A (en) * 2018-10-19 2019-03-15 深圳思为科技有限公司 A kind of automatic generation method of APP, device, terminal device and readable storage medium storing program for executing
CN109951604A (en) * 2019-02-27 2019-06-28 维沃移动通信有限公司 A kind of message treatment method, mobile terminal and user identification module
CN110222483A (en) * 2019-04-18 2019-09-10 深圳壹账通智能科技有限公司 Data processing method, data processing equipment, terminal and storage medium
CN110147664A (en) * 2019-04-19 2019-08-20 深圳壹账通智能科技有限公司 The method and relevant device of authentication based on centralization database
CN110245475A (en) * 2019-05-30 2019-09-17 阿里巴巴集团控股有限公司 Auth method and device
CN110245475B (en) * 2019-05-30 2023-08-22 创新先进技术有限公司 Identity verification method and device
CN110266658B (en) * 2019-05-31 2022-02-18 苏州达家迎信息技术有限公司 Information updating method and device, electronic equipment and storage medium
CN110266658A (en) * 2019-05-31 2019-09-20 苏州达家迎信息技术有限公司 A kind of information updating method, device, electronic equipment and storage medium
CN110198322B (en) * 2019-06-17 2021-07-13 国家电网有限公司 Data communication network access method
CN110198322A (en) * 2019-06-17 2019-09-03 国家电网有限公司 Data communication network cut-in method
CN110166948B (en) * 2019-07-02 2020-08-28 中国联合网络通信集团有限公司 Secondary card terminal monitoring method, management server and block chain network system
CN110166948A (en) * 2019-07-02 2019-08-23 中国联合网络通信集团有限公司 A kind of vice card terminal monitoring method, management server and block chain network system
CN110445769A (en) * 2019-07-18 2019-11-12 阿里巴巴集团控股有限公司 The access method and device of operation system
US11652818B2 (en) 2019-07-18 2023-05-16 Advanced New Technologies Co., Ltd. Method and apparatus for accessing service system
CN110445769B (en) * 2019-07-18 2021-03-26 创新先进技术有限公司 Access method and device of business system
CN110751129A (en) * 2019-10-30 2020-02-04 深圳市丰巢科技有限公司 Express delivery service identity verification method, device, equipment and storage medium
CN110751129B (en) * 2019-10-30 2023-05-30 深圳市丰巢科技有限公司 Identity verification method, device and equipment for express service and storage medium
CN110855709A (en) * 2019-11-26 2020-02-28 中国建设银行股份有限公司 Access control method, device, equipment and medium for security access gateway
CN113037682A (en) * 2019-12-09 2021-06-25 西安诺瓦星云科技股份有限公司 Encrypted communication method, encrypted communication device, and encrypted communication system
CN113098737A (en) * 2019-12-23 2021-07-09 北京神经元网络技术有限公司 User node admission control method and device and electronic equipment
CN111177674A (en) * 2019-12-31 2020-05-19 中国联合网络通信集团有限公司 Device verification method and device
CN114071201A (en) * 2020-07-30 2022-02-18 华为技术有限公司 Equipment control method and device
CN111951019A (en) * 2020-08-28 2020-11-17 浪潮软件股份有限公司 Identity verification method and device
CN112182546A (en) * 2020-09-15 2021-01-05 珠海格力电器股份有限公司 Account number protection method and device, terminal equipment and storage medium
CN112200983A (en) * 2020-09-25 2021-01-08 建信金融科技有限责任公司 Remote self-service card supplementing method, device, server, terminal and storage medium
CN113452584B (en) * 2021-04-28 2023-01-31 珠海格力电器股份有限公司 Binding control method and device of electric appliance, storage medium, mobile terminal and electric appliance
CN113452584A (en) * 2021-04-28 2021-09-28 珠海格力电器股份有限公司 Binding control method and device of electric appliance, storage medium, mobile terminal and electric appliance
CN113536266A (en) * 2021-06-25 2021-10-22 北京达佳互联信息技术有限公司 Identity authentication method and device, electronic equipment and storage medium
CN113536266B (en) * 2021-06-25 2024-03-01 北京达佳互联信息技术有限公司 Identity verification method, device, electronic equipment and storage medium
CN113657906A (en) * 2021-07-13 2021-11-16 广东丸美生物技术股份有限公司 Product management method and system based on identification code
CN113556400B (en) * 2021-07-21 2023-09-26 杭州华橙软件技术有限公司 Login method and login device of Internet of things platform and Internet of things system
CN113556400A (en) * 2021-07-21 2021-10-26 杭州华橙软件技术有限公司 Login method and login device of Internet of things platform and Internet of things system
CN113688369B (en) * 2021-07-28 2024-02-02 支付宝(杭州)信息技术有限公司 Login mode recommending method, device and equipment after unloading and reloading of application program
CN113688369A (en) * 2021-07-28 2021-11-23 支付宝(杭州)信息技术有限公司 Method, device and equipment for recommending login mode after application program is uninstalled and reinstalled
CN113630253A (en) * 2021-08-11 2021-11-09 中国工商银行股份有限公司 Login method, device, computer system and readable storage medium
CN117278201A (en) * 2022-05-27 2023-12-22 河北雄安三千科技有限责任公司 Information processing method and device
CN115022004A (en) * 2022-05-27 2022-09-06 中国银行股份有限公司 Data processing method and device and server
CN115022004B (en) * 2022-05-27 2024-04-16 中国银行股份有限公司 Data processing method, device and server
CN114928840B (en) * 2022-06-16 2023-10-13 中国联合网络通信集团有限公司 Identity verification method, device and storage medium
CN114928840A (en) * 2022-06-16 2022-08-19 中国联合网络通信集团有限公司 Identity authentication method, device and storage medium
CN115474194A (en) * 2022-09-19 2022-12-13 天翼数字生活科技有限公司 Security authentication method, device, equipment and storage medium
CN115618308B (en) * 2022-12-01 2023-05-09 杭州美创科技股份有限公司 Abnormal behavior detection method and device based on zero trust identity
CN115618308A (en) * 2022-12-01 2023-01-17 杭州美创科技股份有限公司 Abnormal behavior detection method and device based on zero trust identity
CN116800544A (en) * 2023-08-21 2023-09-22 成都数智创新精益科技有限公司 User authentication method, system and device and medium
CN116800544B (en) * 2023-08-21 2023-11-24 成都数智创新精益科技有限公司 User authentication method, system and device and medium
CN117272275A (en) * 2023-09-19 2023-12-22 赛力斯汽车有限公司 Verification method and device based on user operation result and storage medium

Similar Documents

Publication Publication Date Title
CN108183924A (en) A kind of login validation method and terminal device
CN103929402B (en) Sensitive operation verification method, terminal unit, server and checking system
CN105262779B (en) Identity authentication method, device and system
CN104917749B (en) account registration method and device
US7801961B2 (en) E-mail message authentication and marking extending standards complaint techniques
US20090144308A1 (en) Phishing redirect for consumer education: fraud detection
CN106372940A (en) Identity authentication method based on block chain network, server and terminal device
CN106357640A (en) Method, system and server for authenticating identities on basis of block chain networks
CN108009825A (en) A kind of identity management system and method based on block chain technology
US20060020816A1 (en) Method and system for managing authentication attempts
EP1696626A1 (en) Method and System for Enhanced Security Using Location Based Wireless Authentication
CN106453234A (en) Identity authentication method, relevant server and client
CN104822145B (en) A kind of methods, devices and systems identifying pseudo-base station note
CN104980393B (en) Method of calibration, system, server and terminal
CN107154919B (en) Safe login method and device
CN105939362A (en) User account management method and device
CN110084011A (en) A kind of method and device of the verifying of user's operation
CN110378695A (en) Bank card payment method, device, equipment and computer storage medium
CN109639724A (en) Password method for retrieving, password device for retrieving, computer equipment and storage medium
CN106911725A (en) A kind of multiple-factor authentication method and device
CN105897663A (en) Method for determining access authority, device and equipment
CN111431908B (en) Access processing method and device, management server and readable storage medium
CN109493087A (en) A kind of method, computer installation and computer readable storage medium based on two dimensional code examination Immovable Property Registration information
CN107645471A (en) A kind of method and system for mobile terminal user identity certification
CN106464502A (en) Methods and systems for authentication of a communication device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Room 201, Building A, No. 1 Qianwan Road, Qianhai Shenzhen-Hong Kong Cooperation Zone, Shenzhen, Guangdong 518000:No. 1701, 1702B, A, New Hao one town, No. 7018 Cai Tian Road, Futian, Shenzhen 518000 Room 201, No. 1 A (Qianhai business secretary, Shenzhen, Shenzhen City, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen City, Guangdong)

Applicant after: Shenzhen Rongyimai Information Technology Co., Ltd.

Address before: Room 201, Building A, No. 1 Qianwan Road, Qianhai Shenzhen-Hong Kong Cooperation Zone, Shenzhen, Guangdong 518000:No. 1701, 1702B, A, New Hao one town, No. 7018 Cai Tian Road, Futian, Shenzhen 518000 Room 201, No. 1 A (Qianhai business secretary, Shenzhen, Shenzhen City, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen City, Guangdong)

Applicant before: Maimaiti Mdt InfoTech Ltd, Shenzhen

WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180619