CN109067710A - A kind of authentication method and system based on location information - Google Patents

A kind of authentication method and system based on location information Download PDF

Info

Publication number
CN109067710A
CN109067710A CN201810745586.2A CN201810745586A CN109067710A CN 109067710 A CN109067710 A CN 109067710A CN 201810745586 A CN201810745586 A CN 201810745586A CN 109067710 A CN109067710 A CN 109067710A
Authority
CN
China
Prior art keywords
password
module
authentication
user
central control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810745586.2A
Other languages
Chinese (zh)
Inventor
崔可
陆道如
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Hengbao Intelligent System Technology Co Ltd
Original Assignee
Jiangsu Hengbao Intelligent System Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Hengbao Intelligent System Technology Co Ltd filed Critical Jiangsu Hengbao Intelligent System Technology Co Ltd
Priority to CN201810745586.2A priority Critical patent/CN109067710A/en
Publication of CN109067710A publication Critical patent/CN109067710A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00388Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method

Abstract

The present invention relates to a kind of authentication method and system based on location information, which includes that central control module, GPS module, indoor positioning module, location information management module, password integrate module, code authentication module, memory module and network interface.After GPS positioning and indoor positioning technologies are added, so that intelligent electronic lock is with better function, the effect in terms of internet security is become apparent from.In addition, by using the relevant parameter of GPS positioning and indoor positioning, but also user improves the safety of account and personal information when carrying out payment transaction using mobile terminal.

Description

A kind of authentication method and system based on location information
Technical field
The present invention relates to electronic lock authentication techniques field, in particular to a kind of authentication method based on location information and it is System.
Background technique
With the fast development of Internet technology, network-based communication mode or smart machine gradually change The behavior pattern of the mankind.Specifically, having present almost all people by inquiring data number since network is comparable universal According to, read books, purchase commodity, completes to discuss and work, social activity is added etc..Therefore, by with a variety of different networks Content and data interaction, so that people's lives are more convenient, more rapidly and make the work of people more efficient.It is common, make User's Website login, it is necessary to registration setting account and password are first passed through in advance, if user, which visits, needs to access a large amount of websites or public affairs Many numbers, it is possible to need to remember a large amount of account and password, can bring about many troubles in this way.If in order to simplify memory, entirely Portion or most of accounts use identical password, once data leak, illegal user can easily with the account with it is close Code logging in network, personation user's identity carry out commercial activity on network, make friends or state one's views, cause user not Small trouble.
In addition, in network access conventional identity identifying method generally have password, ordinary password, dynamic password etc. and The method of its correlation combiner certification.Once authenticated successfully, access is also no longer restricted, and thus brings many safety problems, Especially when user is when other places is gone on business, the safety of online environment not can guarantee;Simultaneously for accessed host, also can not Know where visitor is accessing, if legal, if having the risk of leakage.
There are more and more businessmans to print two dimension on the product or product packaging of oneself to solve the above-mentioned problems Code, having many high-end products to be fitted into RFID can use the mobile scanning terminal of end user after consumer buys product Above-mentioned medium on commodity verifies purchased product to internet by mobile phone further according to scanning and the medium information read The true and false.
In internet data interaction, such as safety chip intelligent safety equipment is one and can independently generate password and recognize Demonstrate,prove the device of password.Wherein, the inside of safety chip possesses independent processor and storage unit, and possesses simple safety Operating system.The secure operating system is not only able to as electronic product security service for storing key and characteristic, Can data interaction between the terminals or between terminal and server provide degree of safety high password and authentication mode.
In addition, it is very important, now with the operating system of various intelligent mobile terminals or other smart machines On have GPS functional module, the module can complete positioning, real time position report and mobile network communication etc. functions.To Meet demand of the user to location-based service.Also, GPS technology is the main source of customer mobile terminal geographic position data, It is also the important carrier communicated with server-side, mobile phone is made to incorporate Location Service Platform in this way.
Although GPS function is relatively more universal, GPS positioning technology and corresponding location parameter are used for mobile payment Technology in terms of the generation of the identifying code of certification or relevant information communication is less, using the confirmation for being more mainly position, The navigation of place and route or the positioning of user terminal and Related product, anti-lost etc..
Summary of the invention
The present invention provides a kind of Verification System based on location information, the system include central control module, GPS module, Indoor positioning module, location information management module, password integrate module, code authentication module, memory module and network interface, It is characterized by:
Central control module is configured to carry out data information analysis, and each by control signal coordinating based on the analysis results Work between a module;
GPS module is configured to obtain the current first position of intelligent electronic lock and corresponding mobile terminal, And it is sent to central control module;
Indoor positioning module is configured to obtain the current second position of mobile terminal, and is sent to central control Module;
Location information management module carries out parameter information extraction to the current first position got and the current second position And sort out, and send central control module for categorization results;
Password integrates module and determines degree of risk according to the relationship between current first position and the current second position, and According to the control signal of central control module, obtains corresponding password and carry out being integrally formed authentication password, be subsequently sent to close Code authentication module and central control module;
Code authentication module sends comparing result for comparing the password that user inputs with authentication password To central control module.
Further, above-mentioned parameter information includes city, region, street, specific cell name, building title.
Further, it after user is by mobile terminal and intelligent electronic lock successful authentication each time, will be deposited in memory module The corresponding authentication number of success of the particular geographic location of storage adds one.
Further, code authentication module is specifically used for obtaining cipher mark according to authentication password, and according to above-mentioned mark Module is integrated in fractionation and user inputs password, forms multiple type passwords.
Further, Verification System further includes infrared sensor, the people for occurring in a certain range around Verification System It is detected, and will test result and be sent to central control module.
A kind of authentication method based on location information, which is characterized in that this method comprises:
Step 1, phase is obtained according to the current first position and current second location information of mobile terminal and intelligent electronic lock Parameter information is closed, and is sorted out according to above-mentioned parameter information;
Step 2, corresponding control signal is generated according to the categorization results finish message received;
Step 3, after receiving control signal, corresponding instruction is obtained, and preset close according to instruction extraction user The password of extraction is then carried out processing and cipher mark corresponding with each password is integrated by code, forms authentication password;
Step 4, the password type of user's required input is determined according to the cipher mark received, and generating includes password The control signal of type, is sent to customer mobile terminal;
Step 5, the password of user's input is received by network interface, and is compared with received authentication password, is exported Comparing result.
Further, above-mentioned parameter information includes city, region, street, specific cell name, building title.
Further, between step 2 and 3 further include: user is successfully reflected by mobile terminal and intelligent electronic lock each time The corresponding authentication number of success of the particular geographic location stored in memory module is added one by Quan Hou.
Further, the above method further include: for being examined to the people occurred in a certain range around intelligent electronic lock It surveys, and will test result and be sent to central control module.
Further, which is characterized in that specific detection range is set as 1 meter around Verification System of range.
After GPS technology is added in beneficial the having the technical effect that of the present invention, so that intelligent electronic lock is with better function, Effect in terms of internet security becomes apparent from.In addition, by using the relevant parameter of GPS positioning, but also user is using shifting When dynamic terminal carries out payment transaction, the safety of account and personal information is improved.
Detailed description of the invention
Fig. 1 is the structure chart of Verification System;
Fig. 2 is the flow chart of authentication method.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts it is all its His embodiment, shall fall within the protection scope of the present invention.
As shown in Figure 1, the present invention provides a kind of Verification System based on location information, which includes center control mould Block, GPS module, indoor positioning module, location information management module, password integrate module, code authentication module, memory module And network interface.
Wherein, central control module is configured to carry out data information analysis, and passes through control signal based on the analysis results Coordinate the work between modules.
GPS module is configured to obtain the current first position of Verification System and corresponding mobile terminal, and It is sent to central control module.
Indoor positioning module is configured to obtain the current second position of mobile terminal, and is sent to central control Module.
Location information management module carries out parameter information extraction to current geographic position and sorts out, and categorization results are sent out It is sent to central control module.
Password integrates module according to the degree of risk of current location and the control signal of central control module, acquisition pair The password answered simultaneously carries out being integrally formed authentication password, is subsequently sent to code authentication module and central control module.
Code authentication module sends comparing result for comparing the password that user inputs with authentication password To central control module.
Memory module is used to store the relevant parameter information in pre-set various types of passwords and geographical location.
Network interface is used to connect by mobile Internet with external equipment.
The concrete function of Verification System is described more fully below.
User is logged in, traded using mobile terminal, accessed etc. in application, mobile terminal and corresponding Verification System It is attached, to complete corresponding operation and authentication.
Location information management module in Verification System is according to the current geographic position information of mobile terminal and Verification System Relevant parameter information is obtained, and is sorted out according to above-mentioned parameter information, and send central control module for categorization results. Above-mentioned relevant parameter information includes city, region, street, specific cell name, building title etc..Classification include user whether It often goes, densely populated place degree etc., be specifically exactly above-mentioned parameter information categorization is exactly by location information after prelocalization Judged according to above-mentioned parameter, it is determined whether the position of behaviors and the position such as often authenticate, trade for user Whether densely populated place region is belonged to.Whether user often goes specially user in the number of current geographic position successful authentication number; Densely populated place degree is whether the pre-set particular geographic location is usually the intensive place of people person.
After user is by mobile terminal and Verification System successful authentication each time, it will be stored specifically in memory module The corresponding authentication number of success in reason position adds one.Particular geographic location is corresponding with authentication number of success and densely populated place degree Binding storage.
Central control module generates corresponding control signal according to the categorization results finish message received, is sent to close Code integrates module.Specifically, as shown in Fig. 2, categorization results arrange to form four kinds of situation information: 1- is often gone and personnel are not close Collection;2- is often gone and densely populated place;3- is seldom gone and personnel are not intensive;4- is seldom gone and densely populated place.Central control module according to Above-mentioned four kinds of situations, are respectively formed corresponding control signal, such as form low-risk password for situation 1 and generate instruction;For feelings Condition 2 and 3 forms average risk cipher instruction;High risk cipher instruction is formed for situation 4.
Password is integrated after module receives control signal, obtains corresponding instruction, and mention from memory module according to instruction The preset password in family is taken, the password of extraction is then subjected to processing and cipher mark corresponding with each password carries out Integration forms authentication password, and is sent to code authentication module, while sending center control mould for the cipher mark of integration Block.Preset password includes numerical ciphers, face password, finger-print cipher and gesture password etc..Above-mentioned cipher mark instruction Integrate the password type of each cipher mark and corresponding content in password.
Central control module determines the password type of user's required input according to the cipher mark received, and generates packet Control signal containing password type, is sent to customer mobile terminal.Customer mobile terminal is according to above-mentioned control signal prompt user Corresponding password is inputted, and is sent to Verification System.
The central control module control code authentication module of Verification System receives the close of user's input by network interface Code, and compared with the received authentication password of module is integrated from password, central control module is sent by comparing result.Tool Body comparison process are as follows: code authentication module obtains cipher mark from authentication password, integrates module and use according to the fractionation of above-mentioned mark Family inputs password, forms multiple type passwords.Then, code authentication module compares the password of each type respectively, such as All comparing results of fruit are all identical, then send the authentication is passed signal;If there is the password comparison knot an of type in above-mentioned comparison Fruit is not identical, then stops current comparison process, and send authentication and do not pass through signal.The password of each type compares specifically: example Authentication password is such as split as numerical ciphers, face password and finger-print cipher, then the password of corresponding user's input also necessarily may be used To be split as numerical ciphers, face password and finger-print cipher.Then numerical ciphers are compared with corresponding numerical ciphers, with this Analogize.
Central control module generates notification information and is separately sent to customer mobile terminal according to the comparing result received With corresponding server, authentication process is completed.Meanwhile central control module sends memory module for authenticating result and counts According to updating storage.After such as authenticating successfully, central control module control memory module updates the authentication success time in this geographical location Number.
Verification System further includes infrared sensor, for examining to the people occurred in a certain range around Verification System It surveys, and will test result and be sent to central control module.
When the categorization results that central control module receives include densely populated place information, that is, current geographic position Belong to and often go and densely populated place or seldom go and when densely populated place, notice infrared sensor is opened.Then, infrared sensor Surrounding people is scanned, after detecting user, continues to scan, and is entered when being tested with other staff When in range, alarm signal is sent to mobile terminal by network mouth, and prompt the careful ambient enviroment of user.Infrared sensor Specific detection range can be set as 1 meter around Verification System of range.
It is illustrated according to workflow of the specific example to above-mentioned modules.
One of situation is to work as user to be located in the office building of office, and mobile terminal is used to carry out Account Logon When, the location information management module in Verification System is obtained according to mobile terminal and the current geographic position information of Verification System Relevant parameter information is " area B of the city the A street C D office building ", and location information management module is obtained according to above- mentioned information from storage unit Corresponding authentication number of success is that 100 and the position belong to the not intensive place of personnel, is judged as and often goes and personnel are not intensive Situation.
Central control module generates corresponding for 1 shape of situation according to often going of receiving and situation that personnel are not intensive It generates and instructs at low-risk password.Password is integrated after module receives above-metioned instruction, is extracted and is used from memory module according to instruction Numerical ciphers are then carried out processing and integrated with numerical ciphers mark p1, shape by the preset numerical ciphers in family At authentication password, and it is sent to code authentication module, while sending central control module for the cipher mark p1 of integration.
Central control module determines that the password type of user's required input is only that number is close according to the cipher mark received Code, and the control signal for needing input numerical ciphers is generated, it is sent to customer mobile terminal.Customer mobile terminal is according to above-mentioned It controls signal prompt user and inputs corresponding numerical ciphers, and be sent to Verification System.
The central control module control code authentication module of Verification System receives the number of user's input by network interface Password, and compared with the received numerical ciphers of module are integrated from password, central control module is sent by comparing result. If input numerical ciphers are correct, customer mobile terminal and corresponding server is notified to complete to log in, and control storage mould It is 101 that block, which updates " area B of the city the A street C D office building " corresponding authentication number of success,.If input is incorrect, user is prompted again Input numerical ciphers.
In addition, when user carries out payment transaction at the mall, if location information is " area B of the city the A street the E square F ", It is exactly the categorization results that receive of central control module is often to go and when densely populated place information, notice infrared sensor is opened.With Afterwards, infrared sensor is scanned surrounding people, and the personnel detected first are usually user, continues to sweep at this time It retouches, if detect that other staff enter in range, it may be possible to which person of peeping or surrounding are more by personnel, are easy to make It is revealed at password or other information, central control module sends alarm signal to mobile terminal by network mouth, at this moment moves The dialog box of display reminding " please noting that ambient enviroment safety " is also prevented from while preventing user from continuing operation on terminal screen Other people see screen main contents.
The present invention also provides a kind of method for authenticating based on GPS positioning information, as shown in Fig. 2, this method specifically:
(1) relevant parameter information is obtained according to mobile terminal and the current geographic position information of Verification System, and according to upper Parameter information is stated to be sorted out.
Above-mentioned relevant parameter information includes city, region, street, specific cell name, building title etc..Classification includes Whether user often go, densely populated place degree etc., be specifically exactly be exactly above-mentioned parameter information categorization will be after prelocalization Location information is judged according to above-mentioned parameter, it is determined whether the position of behaviors is often authenticated, traded etc. for user, with And whether the position belongs to densely populated place region.Whether user often goes specially user in current geographic position successful authentication Several numbers;Densely populated place degree is whether the pre-set particular geographic location is usually the intensive place of people person.
(2) after user is by mobile terminal and Verification System successful authentication each time, by the particular geographic location pair of storage The authentication number of success answered adds one.Particular geographic location binding corresponding with authentication number of success and densely populated place degree stores.
(3) corresponding control signal is generated according to the categorization results finish message received.Specifically, categorization results Arrange and form four kinds of situation information: 1- is often gone and personnel are not intensive;2- is often gone and densely populated place;3- is seldom gone and personnel are not close Collection;4- is seldom gone and densely populated place.According to above-mentioned four kinds of situations, it is respectively formed correspondence
(4) after receiving control signal, corresponding instruction is obtained, and the preset password of user is extracted according to instruction, The password of extraction is then subjected to processing and cipher mark corresponding with each password is integrated, authentication password is formed, will reflect Weigh the cipher mark output of password and integration.Preset password includes numerical ciphers, face password, finger-print cipher and hand Gesture password etc..The password type of each cipher mark and corresponding content in password are integrated in above-mentioned cipher mark instruction.
(5) password type of user's required input is determined according to the cipher mark received, and generating includes password type Control signal, be sent to customer mobile terminal.Customer mobile terminal inputs corresponding according to above-mentioned control signal prompt user Password, and it is sent to Verification System.
(6) password of user's input is received by network interface, and is compared with received authentication password, output pair Compare result.
Specific comparison process are as follows: cipher mark is obtained, module is integrated according to the fractionation of above-mentioned mark and user inputs password, Form multiple type passwords.Then, the password of each type is compared respectively, if all comparing results are all identical, Send the authentication is passed signal;If there is the password comparing result an of type not identical in above-mentioned comparison, stop current comparison Process, and send authentication and do not pass through signal.
The password of each type compares specifically: authentication password is for example split as numerical ciphers, face password and fingerprint Password, then the password of corresponding user's input also can necessarily be split as numerical ciphers, face password and finger-print cipher.Then Numerical ciphers are compared with corresponding numerical ciphers, and so on.
(7) it according to the comparing result received, generates notification information and is separately sent to customer mobile terminal and corresponding clothes Business device, completes authentication process.Meanwhile authenticating result progress data being updated storage.After such as authenticating successfully, this geography is updated The authentication number of success of position.
(8) when the categorization results that central control module receives include densely populated place information, that is, current geographic position It sets to belong to and often goes and densely populated place or seldom go and when densely populated place, surrounding people is scanned, when detecting user's sheet After people, continue to scan, and when being tested with other staff and entering in range, by network mouth send alarm signal to Mobile terminal, and prompt the careful ambient enviroment of user.Specific detection range can be set as 1 meter around Verification System of range.
Above-mentioned each step is illustrated according to specific example.
One of situation is when user is located in the office building of office, carries out Account Logon, according to mobile whole It is " area B of the city the A street C D office building ", subsequent basis that the current geographic position information of end and Verification System, which obtains relevant parameter information, It is that 100 and the position belong to the not intensive place of personnel that above- mentioned information, which obtain corresponding authentication number of success, be judged as it is normal go and The not intensive situation of personnel.
It is generated according to often going of receiving and situation that personnel are not intensive and corresponding forms low-risk password for situation 1 Generate instruction.Then, the preset numerical ciphers of user are extracted according to instruction, then handles numerical ciphers And integrated with numerical ciphers mark p1, authentication password is formed, while sending the cipher mark p1 of authentication password and integration.
The password type that user's required input is determined according to the cipher mark received is only numerical ciphers, and generating need to The control signal for wanting input numerical ciphers, is sent to customer mobile terminal.Customer mobile terminal is according to above-mentioned control signal prompt User inputs corresponding numerical ciphers, and is sent to Verification System.
The numerical ciphers for receiving user's input, and compare with received numerical ciphers, send comparing result to Entreat control module.If input numerical ciphers are correct, customer mobile terminal and corresponding server is notified to complete to log in, and And it is 101 that control memory module, which updates " area B of the city the A street C D office building " corresponding authentication number of success,.If input is incorrect, Then user is prompted to re-enter numerical ciphers.
In addition, when user carries out payment transaction at the mall, if location information is " area B of the city the A street the E square F ", The categorization results exactly received are often to go and when densely populated place information, are scanned to surrounding people, the personnel detected first Usually user continues to scan at this time, if detect that other staff enter in range, it may be possible to peep Person perhaps around be easy to cause password or other information to reveal by personnel are more, then it is whole to movement to send alarm signal End, at this moment the dialog box of display reminding on mobile terminal screen " please noting that ambient enviroment safety ", prevents user from continuing operation Meanwhile it being also prevented from other people and seeing screen main contents.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, appoints What those skilled in the art is in technical scope disclosed by the invention, and any changes or substitutions that can be easily thought of, all It is covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with the scope of protection of the claims Subject to.

Claims (10)

1. a kind of Verification System based on location information, the system include central control module, GPS module, indoor positioning module, Location information management module, password integrate module, code authentication module, memory module and network interface, it is characterised in that:
Central control module is configured to carry out data information analysis, and passes through the control each mould of signal coordinating based on the analysis results Work between block;
GPS module is configured to obtain the current first position of intelligent electronic lock and corresponding mobile terminal, and sends To central control module;
Indoor positioning module is configured to obtain the current second position of mobile terminal, and is sent to central control module;
Location information management module carries out parameter information extraction to the current first position got and the current second position and returns Class, and central control module is sent by categorization results;
Password integrates module and determines degree of risk according to the relationship between current first position and the current second position, and in The control signal for entreating control module, obtains corresponding password and carries out being integrally formed authentication password, be subsequently sent to code authentication Module and central control module;
Code authentication module sends center for comparing result for comparing the password that user inputs with authentication password Control module.
2. system according to claim 1, which is characterized in that above-mentioned parameter information includes city, region, street, specific Cell name, building title.
3. system according to claim 1, which is characterized in that each time user by mobile terminal and intelligent electronic lock at After function authentication, the corresponding authentication number of success of the particular geographic location stored in memory module is added one.
4. system according to claim 1, which is characterized in that code authentication module is specifically used for being obtained according to authentication password Cipher mark, and module and user's input password are integrated according to the fractionation of above-mentioned mark, form multiple type passwords.
5. system according to claim 1, which is characterized in that Verification System further includes infrared sensor, for certification The people occurred in a certain range around system detects, and will test result and be sent to central control module.
6. a kind of authentication method based on location information, which is characterized in that this method comprises:
Step 1, according to mobile terminal ginseng related to the acquisition of current second location information to the current first position of intelligent electronic lock Number information, and sorted out according to above-mentioned parameter information;
Step 2, corresponding control signal is generated according to the categorization results finish message received;
Step 3, after receiving control signal, corresponding instruction is obtained, and the preset password of user is extracted according to instruction, with The password of extraction is subjected to processing afterwards and cipher mark corresponding with each password is integrated, forms authentication password;
Step 4, the password type of user's required input is determined according to the cipher mark received, and is generated comprising password type Signal is controlled, customer mobile terminal is sent to;
Step 5, the password of user's input is received by network interface, and is compared with received authentication password, output comparison As a result.
7. according to the method described in claim 6, it is characterized in that, above-mentioned parameter information include city, it is region, street, specific Cell name, building title.
8. according to the method described in claim 6, it is characterized in that, between step 2 and 3 further include: user passes through shifting each time After dynamic terminal and intelligent electronic lock successful authentication, by the corresponding authentication number of success of the particular geographic location stored in memory module Add one.
9. according to the method described in claim 6, it is characterized in that, the above method further include: around to intelligent electronic lock The people occurred in a certain range detects, and will test result and be sent to central control module.
10. according to the method described in claim 6, it is characterized in that, specific detection range is set as around Verification System 1 meter Range.
CN201810745586.2A 2018-07-09 2018-07-09 A kind of authentication method and system based on location information Pending CN109067710A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810745586.2A CN109067710A (en) 2018-07-09 2018-07-09 A kind of authentication method and system based on location information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810745586.2A CN109067710A (en) 2018-07-09 2018-07-09 A kind of authentication method and system based on location information

Publications (1)

Publication Number Publication Date
CN109067710A true CN109067710A (en) 2018-12-21

Family

ID=64819676

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810745586.2A Pending CN109067710A (en) 2018-07-09 2018-07-09 A kind of authentication method and system based on location information

Country Status (1)

Country Link
CN (1) CN109067710A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102830932A (en) * 2012-08-17 2012-12-19 东莞宇龙通信科技有限公司 Terminal and method for automatically switching unlocking patterns of terminal
US20130298200A1 (en) * 2012-04-19 2013-11-07 Alibaba Group Holding Limited Account security protection method and system
CN104270503A (en) * 2014-09-12 2015-01-07 上海闻泰电子科技有限公司 Mobile phone unlocking method based on geographical location information
CN104703136A (en) * 2015-03-06 2015-06-10 Tcl移动通信科技(宁波)有限公司 Unlocking processing method of MT (Mobile Terminal) based on geographic position, system and MT
CN105812542A (en) * 2014-12-29 2016-07-27 富泰华工业(深圳)有限公司 Unlocking mode switching system and method
CN106251139A (en) * 2016-07-29 2016-12-21 广东小天才科技有限公司 A kind of method of payment for mobile terminal and device
CN106446624A (en) * 2015-08-06 2017-02-22 中兴通讯股份有限公司 Mobile terminal unlocking method and mobile terminal
CN106529954A (en) * 2016-09-23 2017-03-22 惠州Tcl移动通信有限公司 Mobile terminal based payment method and mobile terminal
CN107316195A (en) * 2017-06-26 2017-11-03 北京明华联盟科技有限公司 The method of payment and device of a kind of safe and convenient
CN107609388A (en) * 2017-08-02 2018-01-19 深圳市金立通信设备有限公司 A kind of unlocking method and terminal

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130298200A1 (en) * 2012-04-19 2013-11-07 Alibaba Group Holding Limited Account security protection method and system
CN102830932A (en) * 2012-08-17 2012-12-19 东莞宇龙通信科技有限公司 Terminal and method for automatically switching unlocking patterns of terminal
CN104270503A (en) * 2014-09-12 2015-01-07 上海闻泰电子科技有限公司 Mobile phone unlocking method based on geographical location information
CN105812542A (en) * 2014-12-29 2016-07-27 富泰华工业(深圳)有限公司 Unlocking mode switching system and method
CN104703136A (en) * 2015-03-06 2015-06-10 Tcl移动通信科技(宁波)有限公司 Unlocking processing method of MT (Mobile Terminal) based on geographic position, system and MT
CN106446624A (en) * 2015-08-06 2017-02-22 中兴通讯股份有限公司 Mobile terminal unlocking method and mobile terminal
CN106251139A (en) * 2016-07-29 2016-12-21 广东小天才科技有限公司 A kind of method of payment for mobile terminal and device
CN106529954A (en) * 2016-09-23 2017-03-22 惠州Tcl移动通信有限公司 Mobile terminal based payment method and mobile terminal
CN107316195A (en) * 2017-06-26 2017-11-03 北京明华联盟科技有限公司 The method of payment and device of a kind of safe and convenient
CN107609388A (en) * 2017-08-02 2018-01-19 深圳市金立通信设备有限公司 A kind of unlocking method and terminal

Similar Documents

Publication Publication Date Title
US11556668B2 (en) System and method for dynamic generation of URL by smart card
US10776464B2 (en) System and method for adaptive application of authentication policies
US8839394B2 (en) Systems and methods for authenticating a user of a computer application, network, or device using a wireless device
US7162525B2 (en) Method and system for visualizing a level of trust of network communication operations and connection of servers
US20090100168A1 (en) Automatic location detection in a computing environment
US9801063B2 (en) Systems and methods for authenticating a user of a computer application, network, or device using a wireless device
US9154952B2 (en) Systems and methods for authenticating a user of a computer application, network, or device using a wireless device
CN105229596A (en) High level of authentication technology and application
EP2492836A1 (en) Terminal management system and terminal management method
US10440572B2 (en) Systems and methods for authenticating a user of a computer application, network, or device using a wireless device
CA2752089A1 (en) System and method for authenticating a user of multiple computer applications, networks or devices using a wireless device
US11785010B2 (en) Method and system for authentication via location monitoring
US20100268778A1 (en) Apparatus and method for sharing identity in ubiquitous environment
CN107665313B (en) Sensitive information methods of exhibiting, device, storage medium and computer equipment
Alaca et al. Comparative analysis and framework evaluating mimicry-resistant and invisible web authentication schemes
CN109067710A (en) A kind of authentication method and system based on location information
CN108921994A (en) A kind of authentication mode and its intelligent electronic lock based on GPS positioning information
KR20160116660A (en) Phone number security certification apparatus using qr code and system thereof and metrhod thereof
KR101559203B1 (en) Biometric information authentication system and method
CN101938356A (en) Method and device used for certificating user identity
Neelima et al. Er. Sijo Cherian

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181221