CN108259436A - Authenticating user identification processing method, application server and Verification System server - Google Patents
Authenticating user identification processing method, application server and Verification System server Download PDFInfo
- Publication number
- CN108259436A CN108259436A CN201611246412.9A CN201611246412A CN108259436A CN 108259436 A CN108259436 A CN 108259436A CN 201611246412 A CN201611246412 A CN 201611246412A CN 108259436 A CN108259436 A CN 108259436A
- Authority
- CN
- China
- Prior art keywords
- user account
- identification
- terminal
- verification system
- system server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Abstract
The present invention discloses authenticating user identification processing method, application server and Verification System server.The method includes:The first user account and first password are received, and obtains the first character string;According to the first character string, the first random number and the first equipment string number, graphical three-dimensional code is generated, and be sent to first terminal;Receive the second random number, second user account, the second equipment string number and identification id;Checking request is sent, and receive and be verified message to Verification System server, generate the second character string;The first character string, the first random number and the first equipment string number are obtained, if the first character string is identical with the second character string, the first random number is identical with the second random number, and the first equipment string number is identical with the second equipment string number, then user account is legal.The application server is used to perform the above method.Authenticating user identification processing method provided by the invention, application server and Verification System server improve the safety of user's login.
Description
Technical field
The present invention relates to Internet technical fields, and in particular to authenticating user identification processing method, application server and
Verification System server.
Background technology
With the fast development of internet and mobile network, network has become the part in people's life, makes
It needs first to be registered when with some network services, then logging in could use.
At present, the logging in system by user that most of network service service provides is using static " user name+password "
Mode carries out the authentication of user, and user needs input username and password that could log in.Some websites are in order to improve user
The safety of account also requires user's input validation code, increases the operation of user.Above-mentioned user's login mode, which all exists, to be fished
The risk of fish.Especially, user logged on shared device, logged on fishing website or logging device in itself
It is infected by trojan horse, user account has very high disclosure risk.In addition, there is also by Brute Force for above-mentioned login mode
It may.Brute Force, that is, exhaustive attack, the basic thought of the method for exhaustion are the substantially models that answer is determined according to the partial condition of topic
It encloses, and all possible situation is verified one by one within this range, until the whole circumstances verify.If some situation authenticator
Synthesis purpose full terms are then a solution of this problem;If not complying with the full terms of topic after whole circumstances verification,
This subject is without solution.The method of exhaustion is also referred to as enumerative technique.
Therefore, a kind of user log-in authentication method how is proposed, can improve the safety of user's login becomes industry urgently
Important topic to be solved.
Invention content
For the defects in the prior art, the present invention provides authenticating user identification processing method, application server and recognizes
Demonstrate,prove system server.
On the one hand, the present invention proposes a kind of authenticating user identification processing method, including:
The first logging request of first terminal is received, first logging request is close including the first user account and first
Code, and the first character string is obtained according to first user account and the first password;
According to the first equipment string number of first character string, the first random number and the second terminal to prestore, figure is generated
Three-dimension code, and it is sent to the first terminal;
Receive the second logging request that the second terminal is sent, second logging request includes the second random number, the
The the second equipment string number and identification id of two user accounts, the second terminal;Wherein, the identification id is Verification System server
It is generated previously according to the second user account and the second equipment string number, second random number is the second terminal
It is obtained by scanning the graphical three-dimensional code;And send authenticating users request, institute to the Verification System server
It states authenticating users request and includes the second user account, the second equipment string number and the identification id;
Receive the Verification System server transmission is verified message, according to the institute for being verified message carrying
It states second user account and the second password generates the second character string, second password storage is in the Verification System server
It is local and corresponding with the second user account;Parse the graphical three-dimensional code that is locally stored obtain first character string,
First random number and the first equipment string number, if judging to know first character string and the second character string phase
Together, first random number is identical with second random number, and the first equipment string number and the second equipment string phase
Together, then verify that the user account is legal.
On the other hand, the present invention provides a kind of authenticating user identification processing method again, including:
Verification System server receives the authenticating users request that application server is sent, and the verification user is legal
Property request include second user account, the second equipment string number and identification id;Wherein, the second user account, the second equipment string
Number and identification id be that second terminal is carried into the second logging request that the application server is sent;The identification id is institute
State what Verification System server was generated previously according to the second user account and the second equipment string number;
If the second user account and the second equipment string number and local are known in the Verification System server judgement
The user account corresponding with the identification id and equipment string number of storage are identical, then are verified to application server transmission
Message, the message that is verified carry the second user account and the second password, and second password storage is in institute
Verification System server local and corresponding with the second user account is stated, to be based on described second close for the application server
Code verifies second logging request.
In another aspect, the present invention provides a kind of application server, including:
First receiving unit, for receiving the first logging request of first terminal, first logging request includes first
User account and first password, and the first character string is obtained according to first user account and the first password;
First generation unit, for according to first character string, the first random number and prestore the first of second terminal
Equipment string number generates graphical three-dimensional code, and is sent to the first terminal;
First processing units, for receiving the second logging request that the second terminal is sent, second logging request
Including the second random number, second user account, the second terminal the second equipment string number and identification id;Wherein, the identification
ID is Verification System server to be generated previously according to the second user account and the second equipment string number, described second with
Machine number is that the second terminal is obtained by scanning the graphical three-dimensional code;And it sends and verifies to the Verification System server
User validation is asked, authenticating users request include the second user account, the second equipment string number and
The identification id;
Authentication unit is verified message for receive that the Verification System server sends, logical according to the verification
The second user account and the second password for crossing message carrying generate the second character string, and second password storage is described
Verification System server local and corresponding with the second user account;It parses the graphical three-dimensional code being locally stored and obtains institute
State the first character string, first random number and the first equipment string number, if judge know first character string with it is described
Second character string is identical, and first random number is identical with second random number, and the first equipment string number and described the
Two equipment strings number are identical, then verify that the user account is legal.
Another aspect, the present invention provide a kind of Verification System server, including:
Third receiving unit, for receiving the authenticating users request of application server transmission, the verification user
Legitimacy request includes second user account, the second equipment string number and identification id;Wherein, the second user account, second set
Standby string number and identification id are that second terminal is carried into the second logging request that the application server is sent;The identification id
It is that the Verification System server is generated previously according to the second user account and the second equipment string number;
Authentication unit, if for judging to know the second user account and the second equipment string number and be locally stored
User account corresponding with the identification id and equipment string number are identical, then are verified message to application server transmission,
The message that is verified carries the second user account and the second password, and second password storage is in the certification
System server is local and corresponding with the second user account, so that the application server is based on second password to institute
The second logging request is stated to be verified.
Authenticating user identification processing method provided by the invention, application server and Verification System server, due to should
Graphical three-dimensional code is generated based on the first logging request that first terminal is sent with server, so that second terminal is in scanning patter three
The second logging request is sent after dimension code, user validation is verified by Verification System server and application server pair
Second logging request is verified, improves the safety of user's login.
Description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair
Some bright embodiments, for those of ordinary skill in the art, without creative efforts, can be with root
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow diagram of one embodiment of the invention authenticating user identification processing method;
Fig. 2 is the flow diagram of another embodiment of the present invention authenticating user identification processing method;
Fig. 3 is the flow diagram of further embodiment of this invention authenticating user identification processing method;
Fig. 4 is the structure diagram of one embodiment of the invention application server;
Fig. 5 is the structure diagram of another embodiment of the present invention application server;
Fig. 6 is the structure diagram of further embodiment of this invention application server;
Fig. 7 is the structure diagram of one embodiment of the invention Verification System server;
Fig. 8 is the structure diagram of another embodiment of the present invention Verification System server;
Fig. 9 is the binding flow signaling interaction diagram of one embodiment of the invention authenticating user identification processing method;
Figure 10 is the login authentication flow signaling interaction diagram of one embodiment of the invention authenticating user identification processing method;
Figure 11 is the entity structure schematic diagram of application server of the embodiment of the present invention;
Figure 12 is the entity structure schematic diagram of Verification System server of the embodiment of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached in the embodiment of the present invention
Figure, is explicitly described the technical solution in the embodiment of the present invention, it is clear that described embodiment is a part of the invention
Embodiment, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making wound
All other embodiments obtained under the premise of the property made labour, shall fall within the protection scope of the present invention.
Fig. 1 is the flow diagram of one embodiment of the invention authenticating user identification processing method, as shown in Figure 1, of the invention
The authenticating user identification processing method of offer, including:
S101, the first logging request for receiving first terminal, first logging request include the first user account and the
One password, and the first character string is obtained according to first user account and the first password;
Specifically, user is using the first account and first password when first terminal is logged in, and described first
Terminal includes the first logging request of first user account and the first password, the application to application server transmission
Server can receive first logging request, and obtain the first character according to first user account and the first password
String.Wherein, the first terminal can be desktop computer.
S102, the first equipment string number according to first character string, the first random number and the second terminal to prestore, generation
Graphical three-dimensional code, and it is sent to the first terminal;
Specifically, the first equipment string number of second terminal is prestored in the application server, the application server can
To find the first equipment string number by first user account in local, the first random number can also be generated at random;
Then, the application server is according to first character string, first random number and the first equipment string got
Number generation graphical three-dimensional code, and is sent to the first terminal by the graphical three-dimensional code of generation.Wherein, the second terminal
For mobile terminal.
S103, the second logging request that the second terminal is sent is received, it is random that second logging request includes second
The the second equipment string number and identification id of number, second user account, the second terminal;Wherein, the identification id is Verification System
Server is generated previously according to the second user account and the second equipment string number, and second random number is described the
What two terminals were obtained by scanning the graphical three-dimensional code;And it sends authenticating users to the Verification System server and asks
It asks, the authenticating users request includes the second user account, the second equipment string number and the identification id;
Specifically, second terminal sends the second logging request to the application server, and second logging request includes
The the second equipment string number and identification id of second random number, second user account and the second terminal;Wherein, described second is random
Number is that the graphical three-dimensional code that the second terminal scanning is shown on the first terminal obtains, and the identification id is to recognize
Demonstrate,prove what system server was generated previously according to the second user account and the second equipment string number.The application server meeting
Second logging request is received, then sends authenticating users request to the Verification System server, wherein, it is described
Authenticating users request includes the second user account, the second equipment string number and the identification id.
What S104, the reception Verification System server were sent is verified message, is taken according to the message that is verified
The second user account of band and the second password generate the second character string, and second password storage is in the Verification System
Server local and corresponding with the second user account;It parses the graphical three-dimensional code being locally stored and obtains first word
Symbol string, first random number and the first equipment string number, if judging to know first character string and second character
Go here and there identical, first random number is identical with second random number, and the first equipment string number and the second equipment string
It is number identical, then verify that the user account is legal.
Specifically, the Verification System server is according to the second user account, the second equipment string number and described
Identification id verifies the user validation Verification System server locally can get the identification id pair
The user account and equipment string number answered, if the corresponding user account of the identification id is identical with the second user account and institute
It is identical with the second equipment string number to state the corresponding equipment string number of identification id, then the user validation is verified;Then,
The Verification System server is locally searching the second password corresponding with the second user account.The Verification System service
Device is verified message to application server transmission, and the message that is verified includes the second user account and described
Second password.The application server is verified message, and according to the second user account and described second described in receiving
Password generates the second character string;The application server parses the locally-stored graphical three-dimensional code, described in acquisition
First character string, first random number and the first equipment string number;The application server compares first character string
With second character string, first random number and second random number and the first equipment string number and described the
Two equipment strings number, if first character string is identical with second character string, first random number with described second with
Machine number is identical and the first equipment string number is identical with the second equipment string number, then the user account is legal.It is verifying
After the user account is legal, the application server can send information to first terminal, so that first account
It is logined successfully in the first terminal.
Authenticating user identification processing method provided by the invention, due to application server sent based on first terminal first
Logging request generates graphical three-dimensional code, so that second terminal sends the second logging request after scanning patter three-dimension code, by recognizing
Card system server is verified by user validation and application server verifies the second logging request, improves use
The safety that family logs in.
Fig. 2 is the flow diagram of another embodiment of the present invention authenticating user identification processing method, as shown in Fig. 2, upper
On the basis of stating embodiment, further, before first logging request for receiving first terminal, use provided by the invention
Family authentication processing method further includes binding flow, and the binding flow includes:
S201, the bind request that the second terminal is sent is received, the bind request includes the second user account
With the second equipment string number, the second user account is locally stored if judging to know, to the Verification System service
Device sends distribution request, and the distribution request includes the second user account and the second equipment string number;
Specifically, the second terminal sends bind request to the application server, and the bind request includes described
Second user account and the second equipment string number;The application server receives the bind request, and in local data base
In the second user account is searched, if finding the second user account, then to the Verification System take
Business device sends distribution request.Wherein, the distribution request includes the second user account and the second equipment string number.
S202, the identification id that the Verification System server is sent is received;
Specifically, it after the Verification System server receives the distribution request, is used by algorithm according to described second
Family account and the second equipment string number generate the identification id, and the algorithm can be AES or SM3.The Verification System clothes
The identification id of generation is sent to the application server by business device, and the application server receives the identification id.
S203, the identification id is sent to the second terminal, and receives the binding authentication that the second terminal returns
Request, the binding authentication request include the second user account, the second equipment string number and the identification id;
Specifically, the identification id received is sent to the second terminal by the application server, and described second
After terminal receives the identification id, binding authentication request, the binding authentication request bag can be sent to the application server
The binding can be received by including the second user account, the second equipment string number and the identification id, the application server
Request.
S204, binding authentication request is transmitted to the Verification System server, and in the Verification System service
After device verifies that the second user account and the second equipment string number are legal according to the identification id, sent out to the second terminal
Send binding success message.
Specifically, the binding authentication received request is sent to the Verification System service by the application server
Device, the Verification System server is according to the second user account, the second equipment string number and the identification id to described
Second user account and the second equipment string legitimacy are verified that the Verification System server can be in local acquisition
To the corresponding user account of the identification id and equipment string number, if the corresponding user account of the identification id is used with described second
Family account is identical and the corresponding equipment string number of the identification id is identical with the second equipment string number, then the second user account
Family and the second equipment string number are legal, the second user account and the second equipment string binding success;The certification
Binding success message is sent to the application server by system server, and the application server again disappears the binding success
Breath is sent to the second terminal.
Authenticating user identification processing method provided by the invention, due to application server sent based on first terminal first
Logging request generates graphical three-dimensional code, so that second terminal sends the second logging request after scanning patter three-dimension code, by recognizing
Card system server is verified by user validation and application server verifies the second logging request, improves use
The safety that family logs in.By being bound to second terminal and second user account, tested convenient for subsequently being logged in user
Card.
On the basis of above-described embodiment, further, authenticating user identification processing method provided by the invention further includes:
Active coding is generated, and is sent to the second terminal;Correspondingly, the activation is further included in the bind request
Code, for authentication.
Specifically, the user sends the second user account to be bound to the application server using second terminal,
The application server generates active coding corresponding with the second user account, and the active coding then is sent to described the
Two terminals;Correspondingly, for the second terminal when sending the bind request, the bind request further includes the active coding;
The application server sends out the active coding corresponding with the second user account of generation and the second terminal received
The active coding sent is compared, if the two is identical, then sends distribution request to the Verification System server.
Authenticating user identification processing method provided by the invention, application server and Verification System server, due to should
Graphical three-dimensional code is generated based on the first logging request that first terminal is sent with server, so that second terminal is in scanning patter three
The second logging request is sent after dimension code, user validation is verified by Verification System server and application server pair
Second logging request is verified, improves the safety of user's login.Increase active coding in flow is bound, be conducive to improve
Bind the safety of flow.
Fig. 3 is the flow diagram of further embodiment of this invention authenticating user identification processing method, as shown in figure 3, this hair
The authenticating user identification processing method that bright embodiment provides includes:
S301, Verification System server receive the authenticating users request that application server is sent, and the verification is used
Family legitimacy request includes second user account, the second equipment string number and identification id;Wherein, the second user account, second
Equipment string number and identification id are that second terminal is carried into the second logging request that the application server is sent;The identification
ID is that the Verification System server is generated previously according to the second user account and the second equipment string number;
Specifically, application server sends authenticating users request, the verification user to Verification System server
Legitimacy request includes second user account, the second equipment string number and identification id.Wherein, the second user account, described
Two equipment strings number and the identification id are that the application server is obtained by the second logging request that second terminal is sent;Institute
It is that the Verification System server is generated in advance according to the second user account and the second equipment string number to state identification id.
The Verification System server can receive the authenticating users request.
If the judgement of S302, the Verification System server know the second user account and the second equipment string number with
The user account corresponding with the identification id and equipment string number being locally stored are identical, then send and verify to the application server
By message, the message that is verified carries the second user account and the second password, second password storage
In the Verification System server local and corresponding with the second user account, so that the application server is based on described the
Two passwords verify second logging request.
Specifically, the Verification System server according to the identification id of reception search in the local database with it is described
The corresponding user account of identification id and equipment string number, if the second user account and the corresponding user account of the identification id
Identical and described second equipment string number equipment string number corresponding with the identification id is identical, then user validation is verified;
Then, the Verification System server is searched and the second user account in the local database according to the second user account
Corresponding second password in family;The Verification System server will be verified message and be sent to the application server, described to test
Card includes the second user account and the second password by message.The application server receives the second user account
Behind family and second password, the second character string is generated according to the second user account and second password, described second
Character string is for the verification to second logging request.
Authenticating user identification processing method provided by the invention, due to application server sent based on first terminal first
Logging request generates graphical three-dimensional code, so that second terminal sends the second logging request after scanning patter three-dimension code, by recognizing
Card system server is verified by user validation and application server verifies the second logging request, improves use
The safety that family logs in.
On the basis of the various embodiments described above, further, authenticating user identification processing method provided by the invention is also wrapped
It includes:
The Verification System server receives the registration request of the second terminal, and the registration request includes described the
Two user accounts and second password;
The correspondence of second user account and second password described in the Verification System server storage.
Specifically, the second terminal sends registration request to the Verification System server, is wrapped in the registration request
Include the second user account and second password.The Verification System server receives the registration request, and by described in
Second user account and second password correspond to storage.
Authenticating user identification processing method provided by the invention, due to application server sent based on first terminal first
Logging request generates graphical three-dimensional code, so that second terminal sends the second logging request after scanning patter three-dimension code, by recognizing
Card system server is verified by user validation and application server verifies the second logging request, improves use
The safety that family logs in.Verification System server receives the registration request of second terminal, and by the second account after registration and the
Two passwords correspond to storage, convenient for subsequently being verified to the second logging request.
Fig. 4 is the structure diagram of one embodiment of the invention application server, as shown in figure 4, application provided by the invention
Server includes the first receiving unit 401, the first generation unit 402, first processing units 403 and authentication unit 404, wherein:
First receiving unit 401 is used to receiving the first logging request of first terminal, and first logging request includes the
One user account and first password, and the first character string is obtained according to first user account and the first password;First
Generation unit 402 is used for the first equipment string number according to first character string, the first random number and the second terminal to prestore, raw
Into graphical three-dimensional code, and it is sent to the first terminal;First processing units 403 are used to receiving that the second terminal to send the
Two logging requests, second logging request include the second random number, second user account, the second equipment of the second terminal
String number and identification id;Wherein, the identification id is Verification System server previously according to the second user account and described
The generation of two equipment strings number, second random number is that the second terminal is obtained by scanning the graphical three-dimensional code;And
Authenticating users request is sent to the Verification System server, the authenticating users request includes described second
User account, the second equipment string number and the identification id;Authentication unit 404 is sent out for receiving the Verification System server
That send is verified message, according to the second user account for being verified message carrying and the second password generation the
Two character strings, second password storage is in the Verification System server local and corresponding with the second user account;Solution
It analyses the graphical three-dimensional code being locally stored and obtains first character string, first random number and the first equipment string
Number, if judging to know that first character string is identical with second character string, first random number is random with described second
Number is identical, and the first equipment string number is identical with the second equipment string number, then verifies that the user account is legal.
Specifically, user is using the first account and first password when first terminal is logged in, and described first
Terminal includes the first logging request of first user account and the first password to the transmission of the first receiving unit 401, the
One receiving unit 401 can receive first logging request, and be obtained according to first user account and the first password
First character string.Wherein, the first terminal can be desktop computer.
The first equipment string number of second terminal is prestored in the application server, the first generation unit 402 can be at this
Ground finds the first equipment string number by first user account can also generate the first random number at random;Then,
One generation unit 402 is generated according to first character string, first random number and the first equipment string number got
Graphical three-dimensional code, and the graphical three-dimensional code of generation is sent to the first terminal.Wherein, the second terminal is movement
Terminal.
Second terminal to first processing units 403 send the second logging request, second logging request include second with
The the second equipment string number and identification id of machine number, second user account and the second terminal;Wherein, second random number is institute
State what the graphical three-dimensional code that second terminal scanning is shown on the first terminal obtained, the identification id is Verification System
Server is generated previously according to the second user account and the second equipment string number.First processing units 403 can receive
Then second logging request sends authenticating users request to the Verification System server, wherein, the verification
User validation request includes the second user account, the second equipment string number and the identification id.
The Verification System server is according to the second user account, the second equipment string number and the identification id pair
The user validation is verified that the Verification System server locally can get the corresponding user of the identification id
Account and equipment string number, if the corresponding user account of the identification id is identical with the second user account and the identification id
Corresponding equipment string number is identical with the second equipment string number, then the user validation is verified;Then, the certification
System server is locally searching the second password corresponding with the second user account.The Verification System server is to verification
The transmission of unit 404 is verified message, and the message that is verified includes the second user account and second password.It tests
Card unit 404 is verified message, and generate the second word according to the second user account and second password described in receiving
Symbol string;Authentication unit 404 parses the locally-stored graphical three-dimensional code, obtains first character string, described the
One random number and the first equipment string number;Authentication unit 404 compares first character string and second character string, described
First random number and second random number, the first equipment string number and the second equipment string number, if first word
Symbol goes here and there that the first random number identical with second character string, described is identical with second random number and the first equipment string number
It is identical with the second equipment string number, then the user account is legal.It is described to answer after verifying that the user account is legal
Information can be sent to first terminal with server, so that first account is logined successfully in the first terminal.
Application server provided by the invention, since the first logging request that can be sent based on first terminal generates figure
Three-dimension code, so that second terminal sends the second logging request after scanning patter three-dimension code, in Verification System server to user
Legitimate verification verifies the second logging request by rear, improves the safety of user's login.
Fig. 5 is the structure diagram of another embodiment of the present invention application server, as shown in figure 5, provided by the invention should
Judging unit 405, the second receiving unit 406, second processing unit 407 and transmitting element 408 are further included with server, wherein:
Judging unit 405 is used to receiving the bind request that the second terminal is sent, and the bind request includes described the
Two user accounts and the second equipment string number have been locally stored the second user account if judging to know, have recognized to described
It demonstrate,proves system server and sends distribution request, the distribution request includes the second user account and the second equipment string number;
Second receiving unit 406 is used to receive the identification id that the Verification System server is sent;Second processing unit 407 is used for
The identification id is sent to the second terminal, and receives the binding authentication request that the second terminal returns, the binding
Certification request includes the second user account, the second equipment string number and the identification id;Transmitting element 408 is used for institute
It states binding authentication request and is transmitted to the Verification System server, and tested according to the identification id in the Verification System server
Demonstrate,prove the second user account and the second equipment string number it is legal after, to the second terminal send binding success message.
Specifically, the second terminal sends bind request to judging unit 405, and the bind request includes described second
User account and the second equipment string number;Judging unit 405 receives the bind request, and in the local database to described
Second user account is searched, if finding the second user account, then is sent to the Verification System server
Distribution request.Wherein, the distribution request includes the second user account and the second equipment string number.
After the Verification System server receives the distribution request, by algorithm according to the second user account and
The second equipment string number generates the identification id, and the algorithm can be AES or SM3.The Verification System server will be raw
Into the identification id be sent to the second receiving unit 406, the second receiving unit 406 receives the identification id.
The identification id received is sent to the second terminal by second processing unit 407, and the second terminal connects
After receiving the identification id, binding authentication request can be sent to second processing unit 407, the binding authentication request includes described
Second user account, the second equipment string number and the identification id, second processing unit 407 can receive the bind request.
The binding authentication received request is sent to the Verification System server by transmitting element 408, described to recognize
System server is demonstrate,proved according to the second user account, the second equipment string number and the identification id to the second user account
Family and the second equipment string legitimacy are verified that the Verification System server locally can get the identification
The corresponding user accounts of ID and equipment string number, if the corresponding user account of the identification id is identical with the second user account
And the corresponding equipment string number of the identification id is identical with the second equipment string number, then the second user account and described
Two equipment strings number are legal, binding success;Binding success message is sent to transmitting element 408 by the Verification System server, hair
Send unit 408 that the binding success message is sent to the second terminal again.
Application server provided by the invention, since the first logging request that can be sent based on first terminal generates figure
Three-dimension code, so that second terminal sends the second logging request after scanning patter three-dimension code, in Verification System server to user
Legitimate verification verifies the second logging request by rear, improves the safety of user's login.By to second terminal
It is bound with second user account, is verified convenient for subsequently being logged in user.
Fig. 6 is the structure diagram of further embodiment of this invention application server, as shown in fig. 6, provided by the invention should
It is further included with server:
Second generation unit 409 is used to generate active coding, and be sent to the second terminal;Correspondingly, the binding please
The active coding is further included in asking, for authentication.
Specifically, the user sends the second user account to be bound to the application server using second terminal,
Second generation unit 409 generates active coding corresponding with the second user account, is then sent to the active coding described
Second terminal;Correspondingly, for the second terminal when sending the bind request, the bind request further includes the activation
Code;Judging unit 405 sends out the active coding corresponding with the second user account of generation and the second terminal received
The active coding sent is compared, if the two is identical, then sends distribution request to the Verification System server.
Application server provided by the invention, since the first logging request that can be sent based on first terminal generates figure
Three-dimension code, so that second terminal sends the second logging request after scanning patter three-dimension code, in Verification System server to user
Legitimate verification verifies the second logging request by rear, improves the safety of user's login.Increase in flow is bound
Add active coding, be conducive to improve the safety of binding flow.
The embodiment of application server provided by the invention specifically can be used for performing the place of above-mentioned corresponding method embodiment
Flow is managed, details are not described herein for function, is referred to the detailed description of above method embodiment.
Fig. 7 is the structure diagram of one embodiment of the invention Verification System server, as shown in fig. 7, provided by the invention
Verification System server includes third receiving unit 701 and authentication unit 702, wherein:
Third receiving unit 701 is used to receive the authenticating users request of application server transmission, and the verification is used
Family legitimacy request includes second user account, the second equipment string number and identification id;Wherein, the second user account, second
Equipment string number and identification id are that second terminal is carried into the second logging request that the application server is sent;The identification
ID is that the Verification System server is generated previously according to the second user account and the second equipment string number;Certification list
If member 702 knows the second user account and the second equipment string number with being locally stored and the identification id for judgement
Corresponding user account and equipment string number are identical, then are verified message to application server transmission, described to be verified
Message carries the second user account and the second password, and second password storage is in the Verification System server sheet
Ground and corresponding with the second user account, for the application server is based on that second password logs in described second please
It asks and is verified.
Specifically, application server sends authenticating users request, the verification user to third receiving unit 701
Legitimacy request includes second user account, the second equipment string number and identification id.Wherein, the second user account, described
Two equipment strings number and the identification id are that the application server is obtained by the second logging request that second terminal is sent;Institute
It is that the Verification System server is generated in advance according to the second user account and the second equipment string number to state identification id.
Third receiving unit 701 can receive the authenticating users request.
Authentication unit 702 searches use corresponding with the identification id in the local database according to the identification id of reception
Family account and equipment string number, if second user account user account corresponding with the identification id is identical and described second
Equipment string number equipment string number corresponding with the identification id is identical, then user validation is verified;Then, authentication unit
702 search the second password corresponding with the second user account in the local database according to the second user account;Recognize
Card unit 702 will be verified message and be sent to the application server, and the message that is verified includes the second user
Account and the second password.After the application server receives the second user account and second password, according to institute
It states second user account and second password generates the second character string, second character string is used to log in described second and ask
The verification asked.
Verification System server provided by the invention due to the information that can be sent based on application server, closes user
Method is verified, improves the safety of user's login.
Fig. 8 is the structure diagram of another embodiment of the present invention Verification System server, as shown in figure 8, the present invention provides
Verification System server further include:
4th receiving unit 703 is used to receive the registration request of the second terminal, and the registration request includes described
Second user account and second password;Storage unit 704 is used to store the second user account and second password
Correspondence.
Specifically, the second terminal sends registration request to the 4th receiving unit 703, and the registration request includes institute
State second user account and second password.4th receiving unit 703 receives the registration request, and storage unit 704 is by institute
It states second user account and second password corresponds to storage.
Verification System server provided by the invention due to the information that can be sent based on application server, closes user
Method is verified, improves the safety of user's login.Verification System server receives the registration request of second terminal, and will
The second account and the second password after registration correspond to storage, convenient for subsequently being verified to the second logging request.
The embodiment of Verification System server provided by the invention specifically can be used for performing above-mentioned corresponding method embodiment
Process flow, details are not described herein for function, is referred to the detailed description of above method embodiment.
Fig. 9 is the binding flow signaling interaction diagram of one embodiment of the invention authenticating user identification processing method, such as Fig. 9 institutes
Show, in authenticating user identification processing method provided in an embodiment of the present invention, user binds mobile terminal and user account
One embodiment flow it is as follows:
The first step, user initiate bind request using mobile terminal, and the user can be directly used in application server
The user account application binding of upper registration;
Second step, mobile terminal send bind request to the application server, and the bind request can pass through GPRS
Or the mode of short message is sent, the bind request includes the equipment string number of user account, the mobile terminal;
Third walks, and the application server receives the bind request, and the user account is verified, if institute
It states application server and finds the user account in the local database, then the user's checking passes through;
4th step, the application server send distribution request, the allocation request packet to the Verification System server
Include the user account and the equipment string number;
5th step, the Verification System server receive the user account and the equipment string number, and according to the use
Family account and the equipment string number, adopt and are generated algorithmically by unique identification id, and the algorithm can be AES or SM3;Then will
The identification id and the user account and the equipment string number is corresponding stores, can be to described in order to improve safety
Identification id is encrypted;
The identification id is sent to the application server by the 6th step, the Verification System server;
7th step, the application server receive the identification id that the Verification System server is sent, and by described in
Identification id is sent to mobile terminal;
8th step, the mobile terminal receives the identification id, and sends binding authentication request to the application server,
The binding authentication request includes the user account, the equipment string number and the identification id;
9th step, the application server receive the binding authentication request, and by the user account, the equipment string
Number and the identification id be sent to Verification System server request binding authentication;
Tenth step, the Verification System server receive the user account, the equipment string number and the identification id, and
User account corresponding with the identification id and equipment string number are searched according to the identification id in the database, if the user
The account and corresponding user account of the identification id is identical and the equipment string number equipment string phase corresponding with the identification id
Together, then binding authentication passes through, the mobile terminal and the user account binding success;
The message of binding success is sent to the application server by the 11st step, the Verification System server;
The message of binding success is sent to the mobile terminal by the 12nd step, the application server.
Figure 10 is the login authentication flow signaling interaction diagram of one embodiment of the invention authenticating user identification processing method, is such as schemed
Shown in 10, in authenticating user identification processing method provided in an embodiment of the present invention, user carries out login authentication in pc client
The flow of one embodiment is as follows:
The first step, the user are logged in using the first user account and first password in pc client;
First user account and first password are sent to the application server by second step, the pc client,
Carry out the first logging request;
Third walks, and the application server receives first user account and first password, and is used according to described first
Family account and first password generate the first character string;The application server can also generate the first random number at random;It is described to answer
Search the first equipment string number of mobile terminal corresponding with first user account in the database with server, and according to institute
It states the first character string, first random number and the first equipment string number generation graphical three-dimensional code and stores the graphical three-dimensional
Code;
The graphical three-dimensional code is sent to the pc client by the 4th step, the application server;
The graphical three-dimensional code received is shown and is waited for by the 5th step, the pc client;
6th step, graphical three-dimensional code described in the mobile scanning terminal, and parse the graphical three-dimensional code obtain second with
Machine number;
7th step, the user initiate the second logging request by the mobile terminal;
8th step, the mobile terminal send the second logging request, second logging request to the application server
Including second random number, the corresponding second user account of the mobile terminal, the second equipment string number and identification id;
9th step, the application server receives second logging request that the mobile terminal is sent, then to institute
It states Verification System server and sends authenticating users request, the authenticating users request includes the second user
Account, the second equipment string number and the identification id;
Tenth step, the Verification System server receive the second user account, the second equipment string number and described
Identification id, and user account corresponding with the identification id and equipment string are searched according to the identification id in the local database
Number;If user account corresponding with the identification id is identical with the second user account and corresponding with the identification id sets
Standby string number is identical with the second equipment string number, then user validation is verified;
11st step, the Verification System server are searched and described in the database according to the second user account
Corresponding second password of two user accounts, and message is verified to application server transmission, it is described to be verified message
Carry the second user account and second password;
12nd step, the application server described in receiving after message is verified, according to the second user
Account and second password generate the second character string, and the graphical three-dimensional code of storage is parsed, and obtain described the
One character string, first random number and the first equipment string number.If the application server judgement knows described first
Character string is identical with second character string, the first equipment string number it is identical with the second equipment string number and described first with
Machine number is identical with second random number, then second logging request passes through verification;
Second logging request is verified message and is sent to the movement eventually by the 13rd step, the application server
End and the pc client;The pc client is verified message according to second logging request, is logged in;The shifting
Dynamic terminal can show the prompt message that first user account is logined successfully in the pc client.
Figure 11 is the entity structure schematic diagram of application server of the embodiment of the present invention, as shown in figure 11, provided by the invention
Application server includes:
Processor (processor) 1101, memory (memory) 1102 and communication bus 1103;
Wherein,
The processor 1101 and memory 1102 complete mutual communication by the communication bus 1103;
The processor 1101 is used to call the program instruction in the memory 1102, is recognized with performing following user identity
Card processing method, such as including:The first logging request of first terminal is received, first logging request includes first user's account
Family and first password, and the first character string is obtained according to first user account and the first password;According to described first
First equipment string number of character string, the first random number and the second terminal to prestore generates graphical three-dimensional code, and is sent to described the
One terminal;The second logging request that the second terminal is sent is received, second logging request includes the second random number, second
The the second equipment string number and identification id of user account, the second terminal;Wherein, the identification id is that Verification System server is pre-
It is first generated according to the second user account and the second equipment string number, second random number is that the second terminal is led to
Over-scan what the graphical three-dimensional code obtained;And authenticating users request is sent to the Verification System server, it is described
Authenticating users request includes the second user account, the second equipment string number and the identification id;Described in reception
Verification System server send be verified message, according to it is described be verified message carrying the second user account with
And second password generate the second character string, second password storage is in the Verification System server local and with described second
User account corresponds to;Parse the graphical three-dimensional code that is locally stored obtain first character string, first random number and
The first equipment string number, if judging to know that first character string is identical with second character string, first random number
It is identical with second random number, and the first equipment string number is identical with the second equipment string number, then verifies the user
Account is legal.The embodiment of the present invention provides a kind of computer program product, and the computer program product includes being stored in non-temporary
Computer program on state computer readable storage medium, the computer program include program instruction, when described program instructs
When being computer-executed, computer is able to carry out the method that above-mentioned each method embodiment is provided, such as including:Obtain doubtful swindleness
It deceives the sender number of short message and confirms the keyword of the doubtful fraud text message, and according to obtaining described sender number
SMS service center access address belonging to sender number;According to the access address and the keyword described short
The short message that message service center sends described sender number is inquired, to obtain the short message number for including the keyword
Amount;If judgement knows that the short message quantity is more than threshold value, it is determined that described sender number is fraud text message number;It sends and shuts down
Processing request is to the home signature user server belonging to the fraud text message number, so that the home signature user service
Device carries out shutdown processing to the fraud text message number.
The embodiment of the present invention provides a kind of non-transient computer readable storage medium storing program for executing, the non-transient computer readable storage
Medium storing computer instructs, and the computer instruction makes the computer perform following authenticating user identification processing method, example
The first logging request of first terminal is such as received, first logging request includes the first user account and first password, and root
The first character string is obtained according to first user account and the first password;According to first character string, the first random number
With the first equipment string number of second terminal to prestore, graphical three-dimensional code is generated, and be sent to the first terminal;Receive described
The second logging request that two terminals are sent, second logging request include the second random number, second user account, described second
The the second equipment string number and identification id of terminal;Wherein, the identification id is that Verification System server is used previously according to described second
What family account and the second equipment string number generated, second random number is the second terminal by scanning the figure three
Tie up what code obtained;And authenticating users request is sent to the Verification System server, the authenticating users please
It asks including the second user account, the second equipment string number and the identification id;Receive the Verification System server hair
That send is verified message, according to the second user account for being verified message carrying and the second password generation the
Two character strings, second password storage is in the Verification System server local and corresponding with the second user account;Solution
It analyses the graphical three-dimensional code being locally stored and obtains first character string, first random number and the first equipment string
Number, if judging to know that first character string is identical with second character string, first random number is random with described second
Number is identical, and the first equipment string number is identical with the second equipment string number, then verifies that the user account is legal.
The embodiment of the present invention provides a kind of computer program product, and the computer program product includes being stored in non-transient
Computer program on computer readable storage medium, the computer program include program instruction, when described program instructs quilt
When computer performs, computer is able to carry out following authenticating user identification processing method, such as including:Receive the of first terminal
One logging request, first logging request include the first user account and first password, and according to first user account
The first character string is obtained with the first password;According to first character string, the first random number and the second terminal that prestores
First equipment string number generates graphical three-dimensional code, and is sent to the first terminal;Receive the second terminal transmission second steps on
Record request, second logging request include the second equipment string number of the second random number, second user account, the second terminal
And identification id;Wherein, the identification id is that Verification System server is set previously according to the second user account and described second
Standby string number generation, second random number is that the second terminal is obtained by scanning the graphical three-dimensional code;And to institute
It states Verification System server and sends authenticating users request, the authenticating users request includes the second user
Account, the second equipment string number and the identification id;Receive the Verification System server transmission is verified message, root
The second character string is generated according to the second user account for being verified message carrying and the second password, described second is close
Code is stored in the Verification System server local and corresponding with the second user account;Parse the figure being locally stored
Three-dimension code obtains first character string, first random number and the first equipment string number, if judging to know described first
Character string is identical with second character string, and first random number is identical with second random number, and first equipment
String number is identical with the second equipment string number, then verifies that the user account is legal.
Figure 12 is the entity structure schematic diagram of Verification System server of the embodiment of the present invention, and as shown in figure 12, the present invention carries
The Verification System server of confession includes:
Processor (processor) 1201, memory (memory) 1202 and communication bus 1203;
Wherein,
The processor 1201 and memory 1202 complete mutual communication by the communication bus 1203;
The processor 1201 is used to call the program instruction in the memory 1202, is recognized with performing following user identity
Card processing method, such as including:Receive the authenticating users request that application server is sent, the authenticating users
Request includes second user account, the second equipment string number and identification id;Wherein, the second user account, the second equipment string number
It is that second terminal is carried into the second logging request that the application server is sent with identification id;The identification id is described
Verification System server is generated previously according to the second user account and the second equipment string number;If judgement is known described
Second user account and the second equipment string number are with being locally stored user account corresponding with the identification id and equipment string
It is number identical, then message is verified to application server transmission, the message that is verified carries the second user
Account and the second password, second password storage the Verification System server local and with the second user account
It is corresponding, so that the application server verifies second logging request based on second password.
The embodiment of the present invention provides a kind of non-transient computer readable storage medium storing program for executing, the non-transient computer readable storage
Medium storing computer instructs, and the computer instruction makes the computer perform following authenticating user identification processing method, example
The authenticating users request of application server transmission is such as received, the authenticating users request includes second user account
Family, the second equipment string number and identification id;Wherein, the second user account, the second equipment string number and identification id are second terminals
It is carried in the second logging request sent to the application server;The identification id is that the Verification System server is advance
It is generated according to the second user account and the second equipment string number;If the second user account and described is known in judgement
Second equipment string number is identical with user account corresponding with the identification id and equipment string number is locally stored, then to the application
Server transmission is verified message, and the message that is verified carries the second user account and the second password, institute
The second password storage is stated in the Verification System server local and corresponding with the second user account, so that the application takes
Business device verifies second logging request based on second password.
The embodiment of the present invention provides a kind of computer program product, and the computer program product includes being stored in non-transient
Computer program on computer readable storage medium, the computer program include program instruction, when described program instructs quilt
When computer performs, computer is able to carry out following authenticating user identification processing method, such as including:Receive application server hair
The authenticating users request sent, authenticating users request include second user account, the second equipment string number and
Identification id;Wherein, the second user account, the second equipment string number and identification id are that second terminal is sent out to the application server
It is carried in the second logging request sent;The identification id is the Verification System server previously according to the second user account
What family and the second equipment string number generated;If the second user account and the second equipment string number and local are known in judgement
The user account corresponding with the identification id and equipment string number of storage are identical, then are verified to application server transmission
Message, the message that is verified carry the second user account and the second password, and second password storage is in institute
Verification System server local and corresponding with the second user account is stated, to be based on described second close for the application server
Code verifies second logging request.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above method embodiment can pass through
The relevant hardware of program instruction is completed, and aforementioned program can be stored in a computer read/write memory medium, the program
When being executed, step including the steps of the foregoing method embodiments is performed;And aforementioned storage medium includes:ROM, RAM, magnetic disc or light
The various media that can store program code such as disk.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although
The present invention is described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that:It still may be used
To modify to the technical solution recorded in foregoing embodiments or carry out equivalent replacement to which part technical characteristic;
And these modification or replace, various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution spirit and
Range.
Claims (10)
1. a kind of authenticating user identification processing method, which is characterized in that including:
The first logging request of first terminal is received, first logging request includes the first user account and first password, and
First character string is obtained according to first user account and the first password;
According to the first equipment string number of first character string, the first random number and the second terminal to prestore, graphical three-dimensional is generated
Code, and it is sent to the first terminal;
The second logging request that the second terminal is sent is received, second logging request includes the second random number, the second use
The the second equipment string number and identification id of family account, the second terminal;Wherein, the identification id is that Verification System server is advance
It is generated according to the second user account and the second equipment string number, second random number is that the second terminal passes through
Scan what the graphical three-dimensional code obtained;And authenticating users request is sent to the Verification System server, it is described to test
Card user validation request includes the second user account, the second equipment string number and the identification id;
Receive that the Verification System server sends is verified message, and described the of message carrying is verified according to described
Two user accounts and the second password generate the second character string, and second password storage is in the Verification System server local
It is and corresponding with the second user account;It parses the graphical three-dimensional code that is locally stored and obtains first character string, described
First random number and the first equipment string number, if judging to know that first character string is identical with second character string, institute
It is identical with second random number to state the first random number, and the first equipment string number is identical with the second equipment string number, then
Verify that the user account is legal.
2. according to the method described in claim 1, it is characterized in that, before first logging request for receiving first terminal
The method further includes binding flow, and the binding flow includes:
The bind request that the second terminal is sent is received, the bind request includes the second user account and described second
Equipment string number has been locally stored the second user account if judging to know, has sent and distribute to the Verification System server
Request, the distribution request include the second user account and the second equipment string number;
Receive the identification id that the Verification System server is sent;
The identification id is sent to the second terminal, and receives the binding authentication request that the second terminal returns, it is described
Binding authentication request includes the second user account, the second equipment string number and the identification id;
Binding authentication request is transmitted to the Verification System server, and in the Verification System server according to
After identification id verifies that the second user account and the second equipment string number are legal, binding success is sent to the second terminal
Message.
3. according to the method described in claim 2, it is characterized in that, the method further includes:
Active coding is generated, and is sent to the second terminal;Correspondingly, the active coding is further included in the bind request, is used
In authentication.
4. a kind of authenticating user identification processing method, which is characterized in that including:
Verification System server receives the authenticating users request that application server is sent, and the authenticating users please
It asks including second user account, the second equipment string number and identification id;Wherein, the second user account, the second equipment string number and
Identification id is that second terminal is carried into the second logging request that the application server is sent;The identification id is described to recognize
Demonstrate,prove what system server was generated previously according to the second user account and the second equipment string number;
If the Verification System server judgement knows the second user account and the second equipment string number with being locally stored
User account corresponding with the identification id and equipment string number it is identical, then be verified and disappear to application server transmission
Breath, the message that is verified carry the second user account and the second password, and second password storage is described
Verification System server local and corresponding with the second user account, so that the application server is based on second password
Second logging request is verified.
5. according to the method described in claim 4, it is characterized in that, the method further includes:
The Verification System server receives the registration request of the second terminal, and the registration request includes described second and uses
Family account and second password;
The correspondence of second user account and second password described in the Verification System server storage.
6. a kind of application server, which is characterized in that including:
First receiving unit, for receiving the first logging request of first terminal, first logging request includes the first user
Account and first password, and the first character string is obtained according to first user account and the first password;
First generation unit, for the first equipment according to first character string, the first random number and the second terminal to prestore
String number generates graphical three-dimensional code, and is sent to the first terminal;
First processing units, for receiving the second logging request that the second terminal is sent, second logging request includes
Second random number, second user account, the second terminal the second equipment string number and identification id;Wherein, the identification id is
Verification System server is generated previously according to the second user account and the second equipment string number, second random number
It is that the second terminal is obtained by scanning the graphical three-dimensional code;And send verification user to the Verification System server
Legitimacy is asked, and authenticating users request includes the second user account, the second equipment string number and described
Identification id;
Authentication unit is verified message for receive that the Verification System server sends, is disappeared according to described be verified
It ceases the second user account carried and the second password generates the second character string, second password storage is in the certification
System server is local and corresponding with the second user account;It parses the graphical three-dimensional code that is locally stored and obtains described the
One character string, first random number and the first equipment string number, if judging to know first character string and described second
Character string is identical, and first random number is identical with second random number, and the first equipment string number and described second is set
Standby string number is identical, then verifies that the user account is legal.
7. application server according to claim 6, which is characterized in that further include:
Judging unit, for receiving the bind request that the second terminal is sent, the bind request includes the second user
The second user account has been locally stored if judging to know, to the Verification System in account and the second equipment string number
Server sends distribution request, and the distribution request includes the second user account and the second equipment string number;
Second receiving unit, for receiving the identification id that the Verification System server is sent;
Second processing unit for the identification id to be sent to the second terminal, and receives what the second terminal returned
Binding authentication is asked, and the binding authentication request includes the second user account, the second equipment string number and the identification
ID;
Transmitting element, for binding authentication request to be transmitted to the Verification System server, and in the Verification System
After server verifies that the second user account and the second equipment string number are legal according to the identification id, to described second eventually
End sends binding success message.
8. application server according to claim 7, which is characterized in that further include:
Second generation unit for generating active coding, and is sent to the second terminal;Correspondingly, in the bind request also
Including the active coding, for authentication.
9. a kind of Verification System server, which is characterized in that including:
Third receiving unit, for receiving the authenticating users request of application server transmission, the verification user is legal
Property request include second user account, the second equipment string number and identification id;Wherein, the second user account, the second equipment string
Number and identification id be that second terminal is carried into the second logging request that the application server is sent;The identification id is institute
State what Verification System server was generated previously according to the second user account and the second equipment string number;
Authentication unit, if for judging to know the second user account and the second equipment string number with being locally stored and institute
It states the corresponding user account of identification id and equipment string number is identical, be then verified message to application server transmission, it is described
It is verified message and carries the second user account and the second password, second password storage is in the Verification System
Server local and corresponding with the second user account, so that the application server is based on second password to described the
Two logging requests are verified.
10. Verification System server according to claim 9, which is characterized in that further include:
4th receiving unit, for receiving the registration request of the second terminal, the registration request includes described second and uses
Family account and second password;
Storage unit, for storing the correspondence of the second user account and second password.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611246412.9A CN108259436B (en) | 2016-12-29 | 2016-12-29 | User identity authentication processing method, application server and authentication system server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611246412.9A CN108259436B (en) | 2016-12-29 | 2016-12-29 | User identity authentication processing method, application server and authentication system server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108259436A true CN108259436A (en) | 2018-07-06 |
CN108259436B CN108259436B (en) | 2021-01-01 |
Family
ID=62719969
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611246412.9A Active CN108259436B (en) | 2016-12-29 | 2016-12-29 | User identity authentication processing method, application server and authentication system server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108259436B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112464200A (en) * | 2021-02-02 | 2021-03-09 | 北京安泰伟奥信息技术有限公司 | Authentication risk detection method and system |
CN112907396A (en) * | 2021-01-27 | 2021-06-04 | 胡梁育 | Property management system and method based on wireless communication technology |
CN114257387A (en) * | 2020-09-11 | 2022-03-29 | 中移物联网有限公司 | Login authentication method and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103118022A (en) * | 2013-01-28 | 2013-05-22 | 上海巨人网络科技有限公司 | Verification method of no-password unauthenticated login |
CN103297231A (en) * | 2012-03-01 | 2013-09-11 | 盛大计算机(上海)有限公司 | Identity authentication method and system |
CN104468108A (en) * | 2013-09-18 | 2015-03-25 | 上海耕云供应链管理有限公司 | User identity authentication system and user identity authentication method based on barcode |
US9124649B1 (en) * | 2008-09-10 | 2015-09-01 | United Services Automobile Associate (USAA) | Access control center auto launch |
CN105306211A (en) * | 2014-08-01 | 2016-02-03 | 成都天钥科技有限公司 | Identity authentication method for client software |
CN105450614A (en) * | 2014-09-01 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Server account login method, apparatus and system |
CN105978688A (en) * | 2016-05-30 | 2016-09-28 | 葛峰 | Information-separation-management-based cross-domain safety authentication method |
-
2016
- 2016-12-29 CN CN201611246412.9A patent/CN108259436B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9124649B1 (en) * | 2008-09-10 | 2015-09-01 | United Services Automobile Associate (USAA) | Access control center auto launch |
CN103297231A (en) * | 2012-03-01 | 2013-09-11 | 盛大计算机(上海)有限公司 | Identity authentication method and system |
CN103118022A (en) * | 2013-01-28 | 2013-05-22 | 上海巨人网络科技有限公司 | Verification method of no-password unauthenticated login |
CN104468108A (en) * | 2013-09-18 | 2015-03-25 | 上海耕云供应链管理有限公司 | User identity authentication system and user identity authentication method based on barcode |
CN105306211A (en) * | 2014-08-01 | 2016-02-03 | 成都天钥科技有限公司 | Identity authentication method for client software |
CN105450614A (en) * | 2014-09-01 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Server account login method, apparatus and system |
CN105978688A (en) * | 2016-05-30 | 2016-09-28 | 葛峰 | Information-separation-management-based cross-domain safety authentication method |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114257387A (en) * | 2020-09-11 | 2022-03-29 | 中移物联网有限公司 | Login authentication method and device |
CN112907396A (en) * | 2021-01-27 | 2021-06-04 | 胡梁育 | Property management system and method based on wireless communication technology |
CN112464200A (en) * | 2021-02-02 | 2021-03-09 | 北京安泰伟奥信息技术有限公司 | Authentication risk detection method and system |
Also Published As
Publication number | Publication date |
---|---|
CN108259436B (en) | 2021-01-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105512881B (en) | A kind of method and terminal for completing payment based on two dimensional code | |
CN103916244B (en) | Verification method and device | |
CN104113551B (en) | A kind of platform authorization method, platform service end and applications client and system | |
CN104144163B (en) | Auth method, apparatus and system | |
CN106779716B (en) | Authentication method, device and system based on block chain account address | |
CN105099707B (en) | A kind of offline authentication method, server and system | |
CN109413096B (en) | A kind of login method and device more applied | |
CN103905194B (en) | Identity traceability authentication method and system | |
CN105227536A (en) | A kind of Quick Response Code login method and equipment | |
CN103139200A (en) | Single sign-on method of web service | |
CN108900561A (en) | The method, apparatus and system of single-sign-on | |
CN104580112B (en) | A kind of service authentication method, system and server | |
CN105162604A (en) | Feature image identification based verification method and system, and verification server | |
CN101754215A (en) | Authentication method and system | |
CN103905399A (en) | Account registration management method and apparatus | |
CN103647652B (en) | A kind of method for realizing data transfer, device and server | |
CN104837134B (en) | A kind of web authentication user login method, equipment and system | |
CN104618356B (en) | Auth method and device | |
CN108259436A (en) | Authenticating user identification processing method, application server and Verification System server | |
CN102065063A (en) | WEB authentication device, system and method | |
CN104426657A (en) | Service authentication method and system, server | |
CN111355730A (en) | Platform login method, device, equipment and computer readable storage medium | |
CN109495458A (en) | A kind of method, system and the associated component of data transmission | |
CN110166471A (en) | A kind of portal authentication method and device | |
KR20130077682A (en) | Recording medium, method and system for log-in confirmation use of smart phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |