CN109067710A - A kind of authentication method and system based on location information - Google Patents
A kind of authentication method and system based on location information Download PDFInfo
- Publication number
- CN109067710A CN109067710A CN201810745586.2A CN201810745586A CN109067710A CN 109067710 A CN109067710 A CN 109067710A CN 201810745586 A CN201810745586 A CN 201810745586A CN 109067710 A CN109067710 A CN 109067710A
- Authority
- CN
- China
- Prior art keywords
- password
- module
- authentication
- user
- central control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00388—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method
Abstract
The present invention relates to a kind of authentication method and system based on location information, which includes that central control module, GPS module, indoor positioning module, location information management module, password integrate module, code authentication module, memory module and network interface.After GPS positioning and indoor positioning technologies are added, so that intelligent electronic lock is with better function, the effect in terms of internet security is become apparent from.In addition, by using the relevant parameter of GPS positioning and indoor positioning, but also user improves the safety of account and personal information when carrying out payment transaction using mobile terminal.
Description
Technical field
The present invention relates to electronic lock authentication techniques field, in particular to a kind of authentication method based on location information and it is
System.
Background technique
With the fast development of Internet technology, network-based communication mode or smart machine gradually change
The behavior pattern of the mankind.Specifically, having present almost all people by inquiring data number since network is comparable universal
According to, read books, purchase commodity, completes to discuss and work, social activity is added etc..Therefore, by with a variety of different networks
Content and data interaction, so that people's lives are more convenient, more rapidly and make the work of people more efficient.It is common, make
User's Website login, it is necessary to registration setting account and password are first passed through in advance, if user, which visits, needs to access a large amount of websites or public affairs
Many numbers, it is possible to need to remember a large amount of account and password, can bring about many troubles in this way.If in order to simplify memory, entirely
Portion or most of accounts use identical password, once data leak, illegal user can easily with the account with it is close
Code logging in network, personation user's identity carry out commercial activity on network, make friends or state one's views, cause user not
Small trouble.
In addition, in network access conventional identity identifying method generally have password, ordinary password, dynamic password etc. and
The method of its correlation combiner certification.Once authenticated successfully, access is also no longer restricted, and thus brings many safety problems,
Especially when user is when other places is gone on business, the safety of online environment not can guarantee;Simultaneously for accessed host, also can not
Know where visitor is accessing, if legal, if having the risk of leakage.
There are more and more businessmans to print two dimension on the product or product packaging of oneself to solve the above-mentioned problems
Code, having many high-end products to be fitted into RFID can use the mobile scanning terminal of end user after consumer buys product
Above-mentioned medium on commodity verifies purchased product to internet by mobile phone further according to scanning and the medium information read
The true and false.
In internet data interaction, such as safety chip intelligent safety equipment is one and can independently generate password and recognize
Demonstrate,prove the device of password.Wherein, the inside of safety chip possesses independent processor and storage unit, and possesses simple safety
Operating system.The secure operating system is not only able to as electronic product security service for storing key and characteristic,
Can data interaction between the terminals or between terminal and server provide degree of safety high password and authentication mode.
In addition, it is very important, now with the operating system of various intelligent mobile terminals or other smart machines
On have GPS functional module, the module can complete positioning, real time position report and mobile network communication etc. functions.To
Meet demand of the user to location-based service.Also, GPS technology is the main source of customer mobile terminal geographic position data,
It is also the important carrier communicated with server-side, mobile phone is made to incorporate Location Service Platform in this way.
Although GPS function is relatively more universal, GPS positioning technology and corresponding location parameter are used for mobile payment
Technology in terms of the generation of the identifying code of certification or relevant information communication is less, using the confirmation for being more mainly position,
The navigation of place and route or the positioning of user terminal and Related product, anti-lost etc..
Summary of the invention
The present invention provides a kind of Verification System based on location information, the system include central control module, GPS module,
Indoor positioning module, location information management module, password integrate module, code authentication module, memory module and network interface,
It is characterized by:
Central control module is configured to carry out data information analysis, and each by control signal coordinating based on the analysis results
Work between a module;
GPS module is configured to obtain the current first position of intelligent electronic lock and corresponding mobile terminal,
And it is sent to central control module;
Indoor positioning module is configured to obtain the current second position of mobile terminal, and is sent to central control
Module;
Location information management module carries out parameter information extraction to the current first position got and the current second position
And sort out, and send central control module for categorization results;
Password integrates module and determines degree of risk according to the relationship between current first position and the current second position, and
According to the control signal of central control module, obtains corresponding password and carry out being integrally formed authentication password, be subsequently sent to close
Code authentication module and central control module;
Code authentication module sends comparing result for comparing the password that user inputs with authentication password
To central control module.
Further, above-mentioned parameter information includes city, region, street, specific cell name, building title.
Further, it after user is by mobile terminal and intelligent electronic lock successful authentication each time, will be deposited in memory module
The corresponding authentication number of success of the particular geographic location of storage adds one.
Further, code authentication module is specifically used for obtaining cipher mark according to authentication password, and according to above-mentioned mark
Module is integrated in fractionation and user inputs password, forms multiple type passwords.
Further, Verification System further includes infrared sensor, the people for occurring in a certain range around Verification System
It is detected, and will test result and be sent to central control module.
A kind of authentication method based on location information, which is characterized in that this method comprises:
Step 1, phase is obtained according to the current first position and current second location information of mobile terminal and intelligent electronic lock
Parameter information is closed, and is sorted out according to above-mentioned parameter information;
Step 2, corresponding control signal is generated according to the categorization results finish message received;
Step 3, after receiving control signal, corresponding instruction is obtained, and preset close according to instruction extraction user
The password of extraction is then carried out processing and cipher mark corresponding with each password is integrated by code, forms authentication password;
Step 4, the password type of user's required input is determined according to the cipher mark received, and generating includes password
The control signal of type, is sent to customer mobile terminal;
Step 5, the password of user's input is received by network interface, and is compared with received authentication password, is exported
Comparing result.
Further, above-mentioned parameter information includes city, region, street, specific cell name, building title.
Further, between step 2 and 3 further include: user is successfully reflected by mobile terminal and intelligent electronic lock each time
The corresponding authentication number of success of the particular geographic location stored in memory module is added one by Quan Hou.
Further, the above method further include: for being examined to the people occurred in a certain range around intelligent electronic lock
It surveys, and will test result and be sent to central control module.
Further, which is characterized in that specific detection range is set as 1 meter around Verification System of range.
After GPS technology is added in beneficial the having the technical effect that of the present invention, so that intelligent electronic lock is with better function,
Effect in terms of internet security becomes apparent from.In addition, by using the relevant parameter of GPS positioning, but also user is using shifting
When dynamic terminal carries out payment transaction, the safety of account and personal information is improved.
Detailed description of the invention
Fig. 1 is the structure chart of Verification System;
Fig. 2 is the flow chart of authentication method.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts it is all its
His embodiment, shall fall within the protection scope of the present invention.
As shown in Figure 1, the present invention provides a kind of Verification System based on location information, which includes center control mould
Block, GPS module, indoor positioning module, location information management module, password integrate module, code authentication module, memory module
And network interface.
Wherein, central control module is configured to carry out data information analysis, and passes through control signal based on the analysis results
Coordinate the work between modules.
GPS module is configured to obtain the current first position of Verification System and corresponding mobile terminal, and
It is sent to central control module.
Indoor positioning module is configured to obtain the current second position of mobile terminal, and is sent to central control
Module.
Location information management module carries out parameter information extraction to current geographic position and sorts out, and categorization results are sent out
It is sent to central control module.
Password integrates module according to the degree of risk of current location and the control signal of central control module, acquisition pair
The password answered simultaneously carries out being integrally formed authentication password, is subsequently sent to code authentication module and central control module.
Code authentication module sends comparing result for comparing the password that user inputs with authentication password
To central control module.
Memory module is used to store the relevant parameter information in pre-set various types of passwords and geographical location.
Network interface is used to connect by mobile Internet with external equipment.
The concrete function of Verification System is described more fully below.
User is logged in, traded using mobile terminal, accessed etc. in application, mobile terminal and corresponding Verification System
It is attached, to complete corresponding operation and authentication.
Location information management module in Verification System is according to the current geographic position information of mobile terminal and Verification System
Relevant parameter information is obtained, and is sorted out according to above-mentioned parameter information, and send central control module for categorization results.
Above-mentioned relevant parameter information includes city, region, street, specific cell name, building title etc..Classification include user whether
It often goes, densely populated place degree etc., be specifically exactly above-mentioned parameter information categorization is exactly by location information after prelocalization
Judged according to above-mentioned parameter, it is determined whether the position of behaviors and the position such as often authenticate, trade for user
Whether densely populated place region is belonged to.Whether user often goes specially user in the number of current geographic position successful authentication number;
Densely populated place degree is whether the pre-set particular geographic location is usually the intensive place of people person.
After user is by mobile terminal and Verification System successful authentication each time, it will be stored specifically in memory module
The corresponding authentication number of success in reason position adds one.Particular geographic location is corresponding with authentication number of success and densely populated place degree
Binding storage.
Central control module generates corresponding control signal according to the categorization results finish message received, is sent to close
Code integrates module.Specifically, as shown in Fig. 2, categorization results arrange to form four kinds of situation information: 1- is often gone and personnel are not close
Collection;2- is often gone and densely populated place;3- is seldom gone and personnel are not intensive;4- is seldom gone and densely populated place.Central control module according to
Above-mentioned four kinds of situations, are respectively formed corresponding control signal, such as form low-risk password for situation 1 and generate instruction;For feelings
Condition 2 and 3 forms average risk cipher instruction;High risk cipher instruction is formed for situation 4.
Password is integrated after module receives control signal, obtains corresponding instruction, and mention from memory module according to instruction
The preset password in family is taken, the password of extraction is then subjected to processing and cipher mark corresponding with each password carries out
Integration forms authentication password, and is sent to code authentication module, while sending center control mould for the cipher mark of integration
Block.Preset password includes numerical ciphers, face password, finger-print cipher and gesture password etc..Above-mentioned cipher mark instruction
Integrate the password type of each cipher mark and corresponding content in password.
Central control module determines the password type of user's required input according to the cipher mark received, and generates packet
Control signal containing password type, is sent to customer mobile terminal.Customer mobile terminal is according to above-mentioned control signal prompt user
Corresponding password is inputted, and is sent to Verification System.
The central control module control code authentication module of Verification System receives the close of user's input by network interface
Code, and compared with the received authentication password of module is integrated from password, central control module is sent by comparing result.Tool
Body comparison process are as follows: code authentication module obtains cipher mark from authentication password, integrates module and use according to the fractionation of above-mentioned mark
Family inputs password, forms multiple type passwords.Then, code authentication module compares the password of each type respectively, such as
All comparing results of fruit are all identical, then send the authentication is passed signal;If there is the password comparison knot an of type in above-mentioned comparison
Fruit is not identical, then stops current comparison process, and send authentication and do not pass through signal.The password of each type compares specifically: example
Authentication password is such as split as numerical ciphers, face password and finger-print cipher, then the password of corresponding user's input also necessarily may be used
To be split as numerical ciphers, face password and finger-print cipher.Then numerical ciphers are compared with corresponding numerical ciphers, with this
Analogize.
Central control module generates notification information and is separately sent to customer mobile terminal according to the comparing result received
With corresponding server, authentication process is completed.Meanwhile central control module sends memory module for authenticating result and counts
According to updating storage.After such as authenticating successfully, central control module control memory module updates the authentication success time in this geographical location
Number.
Verification System further includes infrared sensor, for examining to the people occurred in a certain range around Verification System
It surveys, and will test result and be sent to central control module.
When the categorization results that central control module receives include densely populated place information, that is, current geographic position
Belong to and often go and densely populated place or seldom go and when densely populated place, notice infrared sensor is opened.Then, infrared sensor
Surrounding people is scanned, after detecting user, continues to scan, and is entered when being tested with other staff
When in range, alarm signal is sent to mobile terminal by network mouth, and prompt the careful ambient enviroment of user.Infrared sensor
Specific detection range can be set as 1 meter around Verification System of range.
It is illustrated according to workflow of the specific example to above-mentioned modules.
One of situation is to work as user to be located in the office building of office, and mobile terminal is used to carry out Account Logon
When, the location information management module in Verification System is obtained according to mobile terminal and the current geographic position information of Verification System
Relevant parameter information is " area B of the city the A street C D office building ", and location information management module is obtained according to above- mentioned information from storage unit
Corresponding authentication number of success is that 100 and the position belong to the not intensive place of personnel, is judged as and often goes and personnel are not intensive
Situation.
Central control module generates corresponding for 1 shape of situation according to often going of receiving and situation that personnel are not intensive
It generates and instructs at low-risk password.Password is integrated after module receives above-metioned instruction, is extracted and is used from memory module according to instruction
Numerical ciphers are then carried out processing and integrated with numerical ciphers mark p1, shape by the preset numerical ciphers in family
At authentication password, and it is sent to code authentication module, while sending central control module for the cipher mark p1 of integration.
Central control module determines that the password type of user's required input is only that number is close according to the cipher mark received
Code, and the control signal for needing input numerical ciphers is generated, it is sent to customer mobile terminal.Customer mobile terminal is according to above-mentioned
It controls signal prompt user and inputs corresponding numerical ciphers, and be sent to Verification System.
The central control module control code authentication module of Verification System receives the number of user's input by network interface
Password, and compared with the received numerical ciphers of module are integrated from password, central control module is sent by comparing result.
If input numerical ciphers are correct, customer mobile terminal and corresponding server is notified to complete to log in, and control storage mould
It is 101 that block, which updates " area B of the city the A street C D office building " corresponding authentication number of success,.If input is incorrect, user is prompted again
Input numerical ciphers.
In addition, when user carries out payment transaction at the mall, if location information is " area B of the city the A street the E square F ",
It is exactly the categorization results that receive of central control module is often to go and when densely populated place information, notice infrared sensor is opened.With
Afterwards, infrared sensor is scanned surrounding people, and the personnel detected first are usually user, continues to sweep at this time
It retouches, if detect that other staff enter in range, it may be possible to which person of peeping or surrounding are more by personnel, are easy to make
It is revealed at password or other information, central control module sends alarm signal to mobile terminal by network mouth, at this moment moves
The dialog box of display reminding " please noting that ambient enviroment safety " is also prevented from while preventing user from continuing operation on terminal screen
Other people see screen main contents.
The present invention also provides a kind of method for authenticating based on GPS positioning information, as shown in Fig. 2, this method specifically:
(1) relevant parameter information is obtained according to mobile terminal and the current geographic position information of Verification System, and according to upper
Parameter information is stated to be sorted out.
Above-mentioned relevant parameter information includes city, region, street, specific cell name, building title etc..Classification includes
Whether user often go, densely populated place degree etc., be specifically exactly be exactly above-mentioned parameter information categorization will be after prelocalization
Location information is judged according to above-mentioned parameter, it is determined whether the position of behaviors is often authenticated, traded etc. for user, with
And whether the position belongs to densely populated place region.Whether user often goes specially user in current geographic position successful authentication
Several numbers;Densely populated place degree is whether the pre-set particular geographic location is usually the intensive place of people person.
(2) after user is by mobile terminal and Verification System successful authentication each time, by the particular geographic location pair of storage
The authentication number of success answered adds one.Particular geographic location binding corresponding with authentication number of success and densely populated place degree stores.
(3) corresponding control signal is generated according to the categorization results finish message received.Specifically, categorization results
Arrange and form four kinds of situation information: 1- is often gone and personnel are not intensive;2- is often gone and densely populated place;3- is seldom gone and personnel are not close
Collection;4- is seldom gone and densely populated place.According to above-mentioned four kinds of situations, it is respectively formed correspondence
(4) after receiving control signal, corresponding instruction is obtained, and the preset password of user is extracted according to instruction,
The password of extraction is then subjected to processing and cipher mark corresponding with each password is integrated, authentication password is formed, will reflect
Weigh the cipher mark output of password and integration.Preset password includes numerical ciphers, face password, finger-print cipher and hand
Gesture password etc..The password type of each cipher mark and corresponding content in password are integrated in above-mentioned cipher mark instruction.
(5) password type of user's required input is determined according to the cipher mark received, and generating includes password type
Control signal, be sent to customer mobile terminal.Customer mobile terminal inputs corresponding according to above-mentioned control signal prompt user
Password, and it is sent to Verification System.
(6) password of user's input is received by network interface, and is compared with received authentication password, output pair
Compare result.
Specific comparison process are as follows: cipher mark is obtained, module is integrated according to the fractionation of above-mentioned mark and user inputs password,
Form multiple type passwords.Then, the password of each type is compared respectively, if all comparing results are all identical,
Send the authentication is passed signal;If there is the password comparing result an of type not identical in above-mentioned comparison, stop current comparison
Process, and send authentication and do not pass through signal.
The password of each type compares specifically: authentication password is for example split as numerical ciphers, face password and fingerprint
Password, then the password of corresponding user's input also can necessarily be split as numerical ciphers, face password and finger-print cipher.Then
Numerical ciphers are compared with corresponding numerical ciphers, and so on.
(7) it according to the comparing result received, generates notification information and is separately sent to customer mobile terminal and corresponding clothes
Business device, completes authentication process.Meanwhile authenticating result progress data being updated storage.After such as authenticating successfully, this geography is updated
The authentication number of success of position.
(8) when the categorization results that central control module receives include densely populated place information, that is, current geographic position
It sets to belong to and often goes and densely populated place or seldom go and when densely populated place, surrounding people is scanned, when detecting user's sheet
After people, continue to scan, and when being tested with other staff and entering in range, by network mouth send alarm signal to
Mobile terminal, and prompt the careful ambient enviroment of user.Specific detection range can be set as 1 meter around Verification System of range.
Above-mentioned each step is illustrated according to specific example.
One of situation is when user is located in the office building of office, carries out Account Logon, according to mobile whole
It is " area B of the city the A street C D office building ", subsequent basis that the current geographic position information of end and Verification System, which obtains relevant parameter information,
It is that 100 and the position belong to the not intensive place of personnel that above- mentioned information, which obtain corresponding authentication number of success, be judged as it is normal go and
The not intensive situation of personnel.
It is generated according to often going of receiving and situation that personnel are not intensive and corresponding forms low-risk password for situation 1
Generate instruction.Then, the preset numerical ciphers of user are extracted according to instruction, then handles numerical ciphers
And integrated with numerical ciphers mark p1, authentication password is formed, while sending the cipher mark p1 of authentication password and integration.
The password type that user's required input is determined according to the cipher mark received is only numerical ciphers, and generating need to
The control signal for wanting input numerical ciphers, is sent to customer mobile terminal.Customer mobile terminal is according to above-mentioned control signal prompt
User inputs corresponding numerical ciphers, and is sent to Verification System.
The numerical ciphers for receiving user's input, and compare with received numerical ciphers, send comparing result to
Entreat control module.If input numerical ciphers are correct, customer mobile terminal and corresponding server is notified to complete to log in, and
And it is 101 that control memory module, which updates " area B of the city the A street C D office building " corresponding authentication number of success,.If input is incorrect,
Then user is prompted to re-enter numerical ciphers.
In addition, when user carries out payment transaction at the mall, if location information is " area B of the city the A street the E square F ",
The categorization results exactly received are often to go and when densely populated place information, are scanned to surrounding people, the personnel detected first
Usually user continues to scan at this time, if detect that other staff enter in range, it may be possible to peep
Person perhaps around be easy to cause password or other information to reveal by personnel are more, then it is whole to movement to send alarm signal
End, at this moment the dialog box of display reminding on mobile terminal screen " please noting that ambient enviroment safety ", prevents user from continuing operation
Meanwhile it being also prevented from other people and seeing screen main contents.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, appoints
What those skilled in the art is in technical scope disclosed by the invention, and any changes or substitutions that can be easily thought of, all
It is covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with the scope of protection of the claims
Subject to.
Claims (10)
1. a kind of Verification System based on location information, the system include central control module, GPS module, indoor positioning module,
Location information management module, password integrate module, code authentication module, memory module and network interface, it is characterised in that:
Central control module is configured to carry out data information analysis, and passes through the control each mould of signal coordinating based on the analysis results
Work between block;
GPS module is configured to obtain the current first position of intelligent electronic lock and corresponding mobile terminal, and sends
To central control module;
Indoor positioning module is configured to obtain the current second position of mobile terminal, and is sent to central control module;
Location information management module carries out parameter information extraction to the current first position got and the current second position and returns
Class, and central control module is sent by categorization results;
Password integrates module and determines degree of risk according to the relationship between current first position and the current second position, and in
The control signal for entreating control module, obtains corresponding password and carries out being integrally formed authentication password, be subsequently sent to code authentication
Module and central control module;
Code authentication module sends center for comparing result for comparing the password that user inputs with authentication password
Control module.
2. system according to claim 1, which is characterized in that above-mentioned parameter information includes city, region, street, specific
Cell name, building title.
3. system according to claim 1, which is characterized in that each time user by mobile terminal and intelligent electronic lock at
After function authentication, the corresponding authentication number of success of the particular geographic location stored in memory module is added one.
4. system according to claim 1, which is characterized in that code authentication module is specifically used for being obtained according to authentication password
Cipher mark, and module and user's input password are integrated according to the fractionation of above-mentioned mark, form multiple type passwords.
5. system according to claim 1, which is characterized in that Verification System further includes infrared sensor, for certification
The people occurred in a certain range around system detects, and will test result and be sent to central control module.
6. a kind of authentication method based on location information, which is characterized in that this method comprises:
Step 1, according to mobile terminal ginseng related to the acquisition of current second location information to the current first position of intelligent electronic lock
Number information, and sorted out according to above-mentioned parameter information;
Step 2, corresponding control signal is generated according to the categorization results finish message received;
Step 3, after receiving control signal, corresponding instruction is obtained, and the preset password of user is extracted according to instruction, with
The password of extraction is subjected to processing afterwards and cipher mark corresponding with each password is integrated, forms authentication password;
Step 4, the password type of user's required input is determined according to the cipher mark received, and is generated comprising password type
Signal is controlled, customer mobile terminal is sent to;
Step 5, the password of user's input is received by network interface, and is compared with received authentication password, output comparison
As a result.
7. according to the method described in claim 6, it is characterized in that, above-mentioned parameter information include city, it is region, street, specific
Cell name, building title.
8. according to the method described in claim 6, it is characterized in that, between step 2 and 3 further include: user passes through shifting each time
After dynamic terminal and intelligent electronic lock successful authentication, by the corresponding authentication number of success of the particular geographic location stored in memory module
Add one.
9. according to the method described in claim 6, it is characterized in that, the above method further include: around to intelligent electronic lock
The people occurred in a certain range detects, and will test result and be sent to central control module.
10. according to the method described in claim 6, it is characterized in that, specific detection range is set as around Verification System 1 meter
Range.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810745586.2A CN109067710A (en) | 2018-07-09 | 2018-07-09 | A kind of authentication method and system based on location information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810745586.2A CN109067710A (en) | 2018-07-09 | 2018-07-09 | A kind of authentication method and system based on location information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109067710A true CN109067710A (en) | 2018-12-21 |
Family
ID=64819676
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810745586.2A Pending CN109067710A (en) | 2018-07-09 | 2018-07-09 | A kind of authentication method and system based on location information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109067710A (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102830932A (en) * | 2012-08-17 | 2012-12-19 | 东莞宇龙通信科技有限公司 | Terminal and method for automatically switching unlocking patterns of terminal |
US20130298200A1 (en) * | 2012-04-19 | 2013-11-07 | Alibaba Group Holding Limited | Account security protection method and system |
CN104270503A (en) * | 2014-09-12 | 2015-01-07 | 上海闻泰电子科技有限公司 | Mobile phone unlocking method based on geographical location information |
CN104703136A (en) * | 2015-03-06 | 2015-06-10 | Tcl移动通信科技(宁波)有限公司 | Unlocking processing method of MT (Mobile Terminal) based on geographic position, system and MT |
CN105812542A (en) * | 2014-12-29 | 2016-07-27 | 富泰华工业(深圳)有限公司 | Unlocking mode switching system and method |
CN106251139A (en) * | 2016-07-29 | 2016-12-21 | 广东小天才科技有限公司 | A kind of method of payment for mobile terminal and device |
CN106446624A (en) * | 2015-08-06 | 2017-02-22 | 中兴通讯股份有限公司 | Mobile terminal unlocking method and mobile terminal |
CN106529954A (en) * | 2016-09-23 | 2017-03-22 | 惠州Tcl移动通信有限公司 | Mobile terminal based payment method and mobile terminal |
CN107316195A (en) * | 2017-06-26 | 2017-11-03 | 北京明华联盟科技有限公司 | The method of payment and device of a kind of safe and convenient |
CN107609388A (en) * | 2017-08-02 | 2018-01-19 | 深圳市金立通信设备有限公司 | A kind of unlocking method and terminal |
-
2018
- 2018-07-09 CN CN201810745586.2A patent/CN109067710A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130298200A1 (en) * | 2012-04-19 | 2013-11-07 | Alibaba Group Holding Limited | Account security protection method and system |
CN102830932A (en) * | 2012-08-17 | 2012-12-19 | 东莞宇龙通信科技有限公司 | Terminal and method for automatically switching unlocking patterns of terminal |
CN104270503A (en) * | 2014-09-12 | 2015-01-07 | 上海闻泰电子科技有限公司 | Mobile phone unlocking method based on geographical location information |
CN105812542A (en) * | 2014-12-29 | 2016-07-27 | 富泰华工业(深圳)有限公司 | Unlocking mode switching system and method |
CN104703136A (en) * | 2015-03-06 | 2015-06-10 | Tcl移动通信科技(宁波)有限公司 | Unlocking processing method of MT (Mobile Terminal) based on geographic position, system and MT |
CN106446624A (en) * | 2015-08-06 | 2017-02-22 | 中兴通讯股份有限公司 | Mobile terminal unlocking method and mobile terminal |
CN106251139A (en) * | 2016-07-29 | 2016-12-21 | 广东小天才科技有限公司 | A kind of method of payment for mobile terminal and device |
CN106529954A (en) * | 2016-09-23 | 2017-03-22 | 惠州Tcl移动通信有限公司 | Mobile terminal based payment method and mobile terminal |
CN107316195A (en) * | 2017-06-26 | 2017-11-03 | 北京明华联盟科技有限公司 | The method of payment and device of a kind of safe and convenient |
CN107609388A (en) * | 2017-08-02 | 2018-01-19 | 深圳市金立通信设备有限公司 | A kind of unlocking method and terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11556668B2 (en) | System and method for dynamic generation of URL by smart card | |
US10776464B2 (en) | System and method for adaptive application of authentication policies | |
US8839394B2 (en) | Systems and methods for authenticating a user of a computer application, network, or device using a wireless device | |
US7162525B2 (en) | Method and system for visualizing a level of trust of network communication operations and connection of servers | |
US20090100168A1 (en) | Automatic location detection in a computing environment | |
US9801063B2 (en) | Systems and methods for authenticating a user of a computer application, network, or device using a wireless device | |
US9154952B2 (en) | Systems and methods for authenticating a user of a computer application, network, or device using a wireless device | |
CN105229596A (en) | High level of authentication technology and application | |
EP2492836A1 (en) | Terminal management system and terminal management method | |
US10440572B2 (en) | Systems and methods for authenticating a user of a computer application, network, or device using a wireless device | |
CA2752089A1 (en) | System and method for authenticating a user of multiple computer applications, networks or devices using a wireless device | |
US11785010B2 (en) | Method and system for authentication via location monitoring | |
US20100268778A1 (en) | Apparatus and method for sharing identity in ubiquitous environment | |
CN107665313B (en) | Sensitive information methods of exhibiting, device, storage medium and computer equipment | |
Alaca et al. | Comparative analysis and framework evaluating mimicry-resistant and invisible web authentication schemes | |
CN109067710A (en) | A kind of authentication method and system based on location information | |
CN108921994A (en) | A kind of authentication mode and its intelligent electronic lock based on GPS positioning information | |
KR20160116660A (en) | Phone number security certification apparatus using qr code and system thereof and metrhod thereof | |
KR101559203B1 (en) | Biometric information authentication system and method | |
CN101938356A (en) | Method and device used for certificating user identity | |
Neelima et al. | Er. Sijo Cherian |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181221 |