CN109600340A - Authorization method, apparatus, terminal and server - Google Patents
Authorization method, apparatus, terminal and server Download PDFInfo
- Publication number
- CN109600340A CN109600340A CN201710920117.5A CN201710920117A CN109600340A CN 109600340 A CN109600340 A CN 109600340A CN 201710920117 A CN201710920117 A CN 201710920117A CN 109600340 A CN109600340 A CN 109600340A
- Authority
- CN
- China
- Prior art keywords
- terminal
- server
- authorization
- identification information
- additional identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of authorization method, providing method and equipment, belong to network technique field.The present invention is when second terminal request first terminal authorizes its specified operation, provided additional identification information in second terminal can be obtained before duly authorized, since the acquisition of additional identification information is carried out based on Near Field Communication mode, it is limited by distance between terminal, therefore it is able to verify that two terminals in physical space are in close distance, and since additional identification information is that server temporarily provides, it can not forge in advance, therefore, it can guarantee the safety logged in by way of this additional identification.
Description
Technical field
The present invention relates to network technique field, in particular to a kind of authorization method, apparatus, terminal and server.
Background technique
With the development of network technology, authorization process is directed under many application scenarios, for example, to log in scene
For, if user wants the client that access of instant communicating is applied in some terminal, it can trigger and sweep on the terminal
Code login function so that can show the two dimensional code for login in the terminal, then opens corresponding client on oneself mobile phone
The scanning function at end is scanned the two dimensional code, logs in so that user account etc. is licensed to terminal, to complete whole
A login process.The process of authorization is related to for other, it can also be with the above process similarly.
However, the safety of existing authorization scheme, is the authorization that confirmed sth. oneself near logging device based on user, i.e.,
" being scanned the two-dimensional code by mobile phone " then assumes " user is just near logging device ".And a kind of common steal-number means are to steal at present
Number person obtains the login two dimensional code on the logging device of oneself by means such as duplication, screenshotss, and it is soft then to pass through instant messaging
Part is sent to victim, then inveigles victim to scan the two dimensional code and authorizes.After user confirms authorization, steal-number person
Just the account number of victim is logged in the equipment of oneself, therefore, the method for actually existing authorization, account number safety compared with
Difference.
Summary of the invention
In order to solve problems in the prior art, the embodiment of the invention provides a kind of authorization method, apparatus, terminal with
And server.The technical solution is as follows:
In a first aspect, providing a kind of authorization method, it is applied to first terminal, which comprises
The authorization requests that second terminal offer is provided by the first Near Field Communication mode, by the terminal of the first terminal
Information is sent to server;
Based on the secondary checking request obtained from the server, described second is obtained by the second Near Field Communication mode
The additional identification information that terminal provides, is sent to the server for the additional identification information;
Show the license confirmation page obtained from the server, and whole to described second based on the license confirmation page
End is authorized;
Wherein, the first Near Field Communication mode and the second Near Field Communication mode are same way or non-Tongfang
Formula.
In a first aspect, providing a kind of authorization method, it is applied to second terminal, which comprises
When receiving specified operational order, authorization requests are provided by the first Near Field Communication mode;
Based on the additional identification information got from server, described add is provided by the second Near Field Communication mode and is tested
Demonstrate,prove information;
When getting authorized certificate from the server, specified operation is carried out based on the authorized certificate.
In a first aspect, providing a kind of authorization method, it is applied to server, which comprises
Request based on second terminal, Xiang Suoshu second terminal send authorization requests, and the authorization requests are provided as the
One Near Field Communication mode;
In the end message for receiving first terminal, additional identification information is obtained;
The additional identification information is sent to the second terminal;
When receiving the information to be verified that the first terminal is sent, and the information to be verified and the additional identification
When information matches, the license confirmation page is sent to the first terminal;
When receiving the confirmation message of first terminal, Xiang Suoshu second terminal sends authorized certificate.
On the one hand, a kind of authorization device is provided, first terminal is applied to, described device includes:
Module is obtained, for obtaining the authorization requests of second terminal offer by the first Near Field Communication mode;
Sending module, for the end message of the first terminal to be sent to server;
The acquisition module is also used to based on the secondary checking request obtained from the server, closely logical by second
News mode obtains the additional identification information that the second terminal provides;
The sending module is also used to the additional identification information being sent to the server;
Display module, for showing the license confirmation page obtained from the server;
Authorization module, for being authorized based on the license confirmation page to the second terminal;
Wherein, the first Near Field Communication mode and the second Near Field Communication mode are same way or non-Tongfang
Formula.
On the one hand, a kind of authorization device is provided, second terminal is applied to, described device includes:
Module is provided, for authorization being provided by the first Near Field Communication mode and being asked when receiving specified operational order
It asks;
The offer module is also used to pass through the second Near Field Communication based on the additional identification information got from server
Mode provides the additional identification information;
Operation module, for being specified based on the authorized certificate when getting authorized certificate from the server
Operation.
On the one hand, a kind of authorization device is provided, which is applied to server, which includes:
Sending module, for the request based on second terminal, Xiang Suoshu second terminal sends authorization requests, and the authorization is asked
It asks and is provided as the first Near Field Communication mode;
Receiving module, for receiving the end message of first terminal;
Module is obtained, for obtaining additional identification information in the end message for receiving first terminal;
The sending module is also used to send the additional identification information to the second terminal;
The receiving module is also used to receive the information to be verified of first terminal transmission;
The sending module is also used to when receiving the information to be verified that the first terminal is sent, and the letter to be verified
When breath is with the additional identification information matches, the license confirmation page is sent to the first terminal;
The sending module is also used to when receiving the confirmation message of first terminal, Xiang Suoshu second terminal send authorization with
Card.
On the one hand, a kind of terminal, including processor and memory are provided, wherein the memory is calculated for storing
Machine program;The processor realizes that first aspect and second aspect are any described for executing the program stored on memory
Method and step.
On the one hand, a kind of server, including processor and memory are provided, wherein the memory, based on storing
Calculation machine program;The processor realizes third aspect method and step for executing the program stored on memory.
In any of the above-described aspect, specified operation all can be register, that is to say, when second terminal want log in it is a certain
It is a in application, can more have the login of safety assurance by additional authentication process, Lai Shixian.
Method provided in an embodiment of the present invention, when second terminal request first terminal authorizes its specified operation,
Provided additional identification information in second terminal can be obtained before duly authorized, since the acquisition of additional identification information is base
It carries out in Near Field Communication mode, is limited by distance between terminal, therefore be able to verify that two terminals are in physical space
In close distance, and since additional identification information is that server temporarily provides, can not forge in advance, therefore, Ke Yitong
The mode of this additional identification is crossed to guarantee the safety logged in.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other
Attached drawing.
Fig. 1 is a kind of implementation environment schematic diagram of authorization method provided in an embodiment of the present invention;
Fig. 2 is a kind of flow chart of authorization method provided in an embodiment of the present invention;
Fig. 3 is the schematic diagram at first terminal and second terminal shown interface during authorization;
Fig. 4 is a kind of schematic diagram of additional identification information provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of authorization device provided in an embodiment of the present invention;
Fig. 6 is a kind of structural schematic diagram of authorization device provided in an embodiment of the present invention;
Fig. 7 is a kind of structural schematic diagram of authorization device provided in an embodiment of the present invention;
Fig. 8 is a kind of block diagram of terminal 800 shown according to an exemplary embodiment;
Fig. 9 is a kind of block diagram of server 900 shown according to an exemplary embodiment.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention
Formula is described in further detail.
Fig. 1 is a kind of implementation environment schematic diagram of authorization method provided in an embodiment of the present invention.In the implementation environment
In include first terminal 101, second terminal 102 and server 103.
Wherein, first terminal 101 can be equipped with the first client of application, and second terminal 102 can also be equipped with this
Second client of application, the first client and the second client can be the client of identical version, or different
The client of version, for example, the first client can be mobile phone version client, and the second client can be PC editions clients,
When user wants based on the user information that the first client has logged on to log in second terminal 102, Ke Yitong
It crosses and opens scanning function in the first client, the graphic code of login shown in the second client is realized.In addition,
Second terminal can also open the portal website of server using browser client, to be logged in, concrete operations side
Similarly, this will not be repeated here for formula and the above-mentioned login based on two clients.Certainly, above-mentioned terminal can also have sound wave transmitting-receiving
And the functions such as NFC function.Wherein, sound wave transmitting-receiving can refer to the transmitting-receiving of voice signal or the transmitting-receiving of electromagnetic wave signal.Its
In, voice signal can be the voice signal for any frequency that terminal can acquire, such as ultrasonic wave etc..For voice signal
Broadcasting can be carried out by the loudspeaker of terminal, and acquired and can be carried out by the microphone of terminal to it, and for electromagnetic wave
The acquisition and transmitting of signal can be carried out by the antenna of terminal.
The server 103, which can be, provides the server of service, and the service for the first client and the second client
Device 103 can also have corresponding portal website, so that terminal carries out web page access.
In inventive embodiments, when server provides authorization requests (such as logging request) for second terminal, it can be based on
First Near Field Communication mode provides, at this point, first terminal can be using the first Near Field Communication mode come whole to second
Authorization requests provided by holding are obtained.And when server provides additional identification information for second terminal, it can be based on
Second Near Field Communication mode provides, at this point, first terminal can propose second terminal using the second Near Field Communication mode
The additional identification information of confession is obtained, and the first Near Field Communication mode and the second Near Field Communication mode can be phase Tongfang
Formula is also possible to different modes.Specifically, the first Near Field Communication mode and the second Near Field Communication mode are figure
One of shape code scanning, sound wave or near-field communication NFC or a variety of combinations.
Authorization to specified operation referred to for authorization provided in an embodiment of the present invention, such as register is awarded
Any authorization for needing to carry out based on certain information such as power, the authorization of delivery operation, the authorization of transfer operation.To step on
For the authorization for recording operation, authorization message is user account and password, or is added based on what user account and password generated
The information such as confidential information or characteristic value, by taking delivery operation and the authorization transferred accounts as an example, authorization message can be card number or account mark
Knowledge and password, or the information such as the encryption information based on account identification and password generation or characteristic value etc., the present invention is implemented
Example is not specifically limited in this embodiment.
Fig. 2 is a kind of flow chart of authorization method provided in an embodiment of the present invention.In embodiments of the present invention, only with
Specified operation be register, the first Near Field Communication mode and the second Near Field Communication mode be for graphic code scanning into
Row explanation, the implementation of this method can be carried out based on the implementation environment in Fig. 1, referring to fig. 2, this method comprises:
201, second terminal sends logging request to server, which logs in clothes for requesting in second terminal
Business device.
For second terminal, when second terminal user wants login service device, it can send and log in server
Request, the logging request carry the end message of second terminal.For example, the end message can be terminal iidentification, to inform clothes
Business device is which terminal is wanted to be logged in, and certainly, which can also include network address (the i.e. IP of terminal
(Internet Protocol, network protocol), geographical location information (such as latitude and longitude information) and the wireless network connected letter
It ceases any one of (SSID (Service Set Identifier, service set) of such as wireless network) or multinomial.
In actual scene, server can provide a variety of login modes, such as the login mode based on user information is (such as
Account number cipher logs in), the login mode (such as short-message verification login) based on short message verification code or the login based on other terminals
The login mode (such as scanning the two-dimensional code login) of user information.If second terminal user selects the login side based on other terminals
Formula is logged in, then can also carry the identification information of the selected login mode of the second terminal in logging request, make
Obtaining server can be handled based on the identification information.
It should be noted that the second terminal, which can be, carries out aforesaid operations by the corresponding client of server, may be used also
To be to carry out aforesaid operations by the portal website of server, it is not limited in the embodiment of the present invention.
202, server receives the logging request, generates the graphic code of the logging request, which at least can be used for
Request the end message of the first terminal.
The graphic code, which can be bar code, such as one-dimension code, two dimensional code etc., can carry the bar code of information.Server exists
When generating the graphic code, can be generated based on appointment codes information, the appointment codes information can be one section for request this
The code information of the end message of one terminal.In a kind of possible implementation, which be may be used to indicate that
First terminal uploads its account information (for example, account and password).
203, the graphic code is sent to the second terminal by the server.
204, when second terminal receives the graphic code, the graphic code is shown.
Second terminal can show the graphic code in the specified region of second terminal when receiving the graphic code, aobvious
While showing the graphic code, it can be can be with display operation prompt information, the operation prompt information for prompting the user on how
The information operated.For example, can show that the operation prompt information " please open cell phone client to carry out in the lower section of graphic code
Scanning " etc..
Referring to (a) figure in Fig. 3, shown by be that second terminal is wanted to be scanned when two dimensional code logs in by servicing
Two dimensional code provided by device.
205, the first terminal is scanned graphic code provided by second terminal, at least by the terminal of the first terminal
Information is sent to server.
When first terminal is scanned graphic code shown in second terminal, entrained by the available graphic code
Appointment codes information, the end message of first terminal is transferred by executing the appointment codes information.Further, first terminal
After scanning, the authorization message of first terminal can also be obtained, which can refer to specified operation information needed, such as use
The account and password at family;Or, the account name and payment cipher etc. of user.
Referring to (c) figure in Fig. 3, shown by be to be shown on screen when first terminal opens two-dimensional code scanning function
The scanning area shown.
Certainly, in above-mentioned steps 202 to 205, server is based on graphic code when providing authorization requests for second terminal
It provides, and in actual scene, which is also based on sound wave or NFC to provide the authorization requests, is based on acoustic wave form
Formula is come when providing, above-mentioned steps 202 to 205 be may alternatively be: server generates the authorization requests of sound wave form, the server
The authorization requests of the sound wave form are sent to the second terminal.When second terminal receives the authorization requests of the sound wave form
When, play the authorization requests.The authorization requests that the first terminal plays second terminal are acquired, and are awarded to get this
Power is requested, and sends the end message of first terminal to server based on the authorization requests.And based on NFC form come when providing,
Above-mentioned steps 202 to 205 may alternatively be: server generates authorization requests, the server by authorization requests be sent to this
Two terminals.When second terminal receives the authorization requests, the authorization requests are provided by NFC chip.The first terminal passes through
Be configured at the NFC chip of first terminal and be configured at second terminal NFC chip between interaction, get the authorization requests,
And the end message of first terminal is sent to server based on the authorization requests.In addition, above-mentioned based on graphic code scanning, sound wave side
The offer of the progress such as formula and NFC can be combined at least two Near Field Communication modes and carry out, and be based on the second low coverage with subsequent
Additional identification information is provided similarly from communication modes, and this will not be repeated here.
Certainly, it if necessary to send authorization message when sending end message, then in above-mentioned replacement step, can also use
Mode similarly sends the authorization message of first terminal when sending end message to server.
206, server receives the end message of the first terminal, according to the end message of the first terminal and second
The end message of terminal, verifies logging request.
If the end message of first terminal and the end message of second terminal include the letter that can indicate geographical location
Breath, such as network address or geographical location information or the radio network information having connected, then server can pass through following verifyings
Process (1), according to the end message of two terminals, tentatively to judge that the logging request logs in risk with the presence or absence of authorization.
(1) judge whether the geographical location relationship between first terminal and second terminal meets preset requirement.
If it is determined that the opposite geographical location of two terminals is less than pre-determined distance, then it is assumed that there is no authorizations to log in risk,
Additional identification process can not be executed, and if it is determined that the opposite geographical location of two terminals is greater than or equal to pre-determined distance, then
Think that there is authorization logs in risk, can execute subsequent step 207.
In a kind of possible implementation, first terminal, can also be by described the when sending the end message of the first terminal
The authorization message of one terminal is sent to server, then server can authorization message, terminal based on the first terminal received
The end message of information and second terminal should when determining tentatively to judge that the logging request logs in risk with the presence or absence of authorization
When logging request has authorization login risk, step 207 is executed.
Specific verification process may include at least one verification process in following (2)-(3):
(2) second terminal is the common registration terminal of this user.
According to the authorization message of first terminal, the terminal iidentification of the common registration terminal of the user information is obtained, if should
The terminal iidentification of second terminal is different from the common terminal iidentification of registration terminal, then can determine the second terminal not is the use
Risk is logged in and there is authorization in the common registration terminal at family, and if identical, it can determine that the second terminal is the normal of the user
Use registration terminal.
(3) whether second terminal belongs to blacklist equipment.
According to the terminal iidentification of second terminal and/or network address inquiry blacklist, if the terminal iidentification is in blacklist
In or the network address in blacklist, then can determine that the second terminal belongs to blacklist equipment, exist authorization log in risk.
For above-mentioned (1) to (3) verification process, a verification process can be based only upon and carry out preliminary identification, it can be with base
Preliminary identification is carried out in two or more verification process, is carried out tentatively based on two or more verification process
When verifying, it can be executed subsequent based on additional when the verification result of any one verification process determines that there is authorization logs in risk
The process that verification information is verified.The embodiment of the present invention to specific verifying sequence without limitation.
Certainly, the preliminary identification can also include login time verifying, for example, the login time based on first terminal and
The historical log of first terminal is accustomed to the time, judge the login time whether within the period of historical log habit time, such as
Fruit does not exist, it is determined that there is authorization and logs in risk, execute step 207, if during this period of time, can be omitted this and additional test
Card.Wherein, the historical log habit time can be when being logged in historical time according to user, and login times are greater than default
Number or login frequency are greater than the period of predeterminated frequency.
Specifically, if first terminal supports GPS positioning, which can be obtained by GPS positioning system
Geographical location information (such as latitude and longitude information), and the geographical location information is sent to server, and if first terminal can
To get the radio network information connected at this time, then the radio network information can also be sent to server.It needs to illustrate
, specifically obtain and send which kind of information can be determined according to the ability of terminal itself, that is to say, first terminal is available
At least one of in the radio network information that geographical location information and terminal are connected, and accessed information is sent to clothes
Business device.
It should be noted that can be and sent together with end message when sending authorization message, can also be and whole
Client information is sent respectively, the embodiment of the present invention to specific sending method without limitation.
In a kind of possible implementation, when verifying determines that current operation is suspicious, server can be sent to first terminal refer to
Show information, which is used to indicate first terminal and keeps scanning mode, so as to attached received by subsequent second terminal
Verification information is added to be scanned.
Certainly, server has carried out preliminary identification to the logging request in above-mentioned steps 206, testing based on preliminary identification
Card result determines whether to execute step 207, can also be but straight without the preliminary identification of step 206 and in actual scene
It connects and executes step 207 to increase additional authentication process, to reduce authorization risk.
207, when verifying, determining current operation is suspicious, then server obtains additional identification information.
When server receives the end message of first terminal transmission, then it can know that second terminal is wanted based on the
The user information of one terminal is logged in, in order to achieve the purpose that further ensure log in safety, it is available for carry out into
The additional identification information of one step card.
In a kind of possible implementation, when first terminal has sent the end message and authorization message of first terminal, the clothes
Business device can obtain additional identification information at random, can also be obtained based on the authorization message of first terminal and/or end message
Additional identification information.The acquisition process can specifically include following either steps or appoint the combination of several steps:
Step 1: obtaining image relevant to the authorization message.Being somebody's turn to do image relevant to authorization message can be user's head portrait
Any image etc. that image, user upload.By taking user's head portrait image as an example, server can be believed according to the authorization received
Breath, obtains the corresponding user's head portrait image of the authorization message from user's registration information.
Step 2: obtaining character information relevant to the authorization message.Being somebody's turn to do character information relevant to authorization message can be
Any one of user's pet name, user's registration information.By taking user's pet name as an example, server can according to the authorization message received,
The corresponding user's pet name of the authorization message is obtained from user's registration information.
Step 3: obtaining random data information.Server can also be believed the character information generated at random as additional identification
Breath.The specific random algorithm can use any random algorithm, and character information can be used for referring to text, number, letter,
Any sorts such as symbol or classes of combination.For example, random data information can be the two dimensional code of verification information, watermark texture or
Identifying code.
Step 4: obtaining specific audio frequency segment.Server can also generate a segment of audio, which can be passage
Information can also be a Duan Yinle or song.
It should be noted is that in actual scene, when obtaining additional identification information, above-mentioned steps 1- can be combined
Any of step 4 appoints several steps to carry out, and that is to say, the additional identification information got may include and the authorization message
One in relevant image, character information relevant to the authorization message, random data information and specific audio frequency segment or
It is multinomial.For example, the additional identification information may include user's head portrait image, in another example, which may include
User's head portrait image and user's pet name, for another example as shown in Figure 4, which can also include user's head portrait figure
Picture, user's pet name and random data information.
In a kind of possible implementation, when only having sent the end message of first terminal when first terminal, which can
To obtain additional identification information at random, or additional identification information is obtained based on the end message of first terminal.For example, by
Each character in the terminal iidentification of one terminal carries out out-of-order processing or scrambling code is added, to obtain additional identification information.
208, the additional identification information is sent to the second terminal by the server.
209, second terminal shows the additional identification information when receiving additional identification information.
Second terminal can refresh display interface when receiving additional identification information, to show the additional identification information,
Operation prompt information can also be shown in the additional identification information, is operated to prompt the user on how.It is tested when this is additional
When further including specific audio frequency segment in card information, second terminal can also show the other information in the additional identification information
When, play the specific audio frequency segment.
Referring to (b) figure in Fig. 3, shown by be additional identification information received by second terminal signal
Figure.
210, first terminal sweeps image shown in the second terminal under the situation for keeping former scanning mode
It retouches, obtains the additional identification information.Wherein, first terminal provides second terminal in the former scanning mode, that is, step 205
The state that is scanned of graphic code.
For first terminal, scanning mode can be kept after sending user information and log-on message, it can be with
It is the instruction information that server feedback is received after receiving transmission user information and log-on message, based on instruction information
Instruction, keeps scanning mode, and the embodiment of the present invention is not specifically limited in this embodiment.Certainly, which can also close scanning shape
State simultaneously obtains additional identification information using other any Near Field Communication modes.
And if the Near Field Communication mode taken in step 205 be graphic code scanning other than mode when, the holding
Original state can refer to the state for keeping the Near Field Communication mode taken in step 205 to open, certainly, step 205 and 210
Identical Near Field Communication mode is necessarily taken, therefore, which can also switch to other than former Near Field Communication mode
Near Field Communication mode obtain additional identification information.For example, if what is taken in step 205 is sound wave mode, the step
Rapid 210 can also switch to graphic code scanning with continuous collecting sound wave.
Specifically, which can be with are as follows: additional is tested by the shooting mould group to shown this on the first terminal
Card information is shot, and obtains shooting picture, which includes the additional identification information.At this point it is possible to which picture will be shot
Directly as additional identification information, can also parsing by first terminal to shooting picture, to obtain additional identification information.
In another embodiment, which can be with are as follows: by the shooting mould group to institute on the first terminal
The image of display is scanned, and obtains the additional identification information.Scanning process in the scanning and step 205 similarly can be
Image analysis is carried out when acquiring image, to obtain additional identification information.
Since first terminal keeps scanning mode and is persistently scanned to the display interface of second terminal, thus second
When showing the additional identification information in terminal, the additional identification information can be obtained by scanning.
Certainly, when additional identification information further includes specific audio frequency segment, by the microphone of the first terminal to sound
Signal is acquired, and obtains first terminal specific audio frequency segment being played on.It is this to be tested using sound collection come what is carried out
Card, can enrich verification mode, and since sound propagation distance itself is limited, the can be confirmed by sound collection
One terminal and second terminal are located in certain distance, further validation operation user be it is same, improve the guarantee of its safety.
Referring to (d) figure in Fig. 3, shown by be first terminal when keeping scanning mode after scanning through two dimensional code
Shown scanning area on screen.
The step 209 and 210 be by the additional identification information be second terminal get provided in a manner of graphic code should
Additional identification information, and first terminal is obtained by graphic code scanning mode and is illustrated for the additional identification information,
And in actual scene, above-mentioned steps 209 and 210 may be replaced by following steps: second terminal is receiving additional identification
When information, additional identification information is converted into sound wave form, and the additional identification information is played by loudspeaker;Or, second is whole
End plays the additional identification information in the additional identification information for receiving sound wave form, and through loudspeaker.First terminal is logical
It crosses microphone to be acquired the additional identification information for the sound wave form that the second terminal is issued, obtains additional identification letter
Breath.Alternatively, above-mentioned steps 209 and 210 may be replaced by following steps: second terminal when receiving additional identification information,
The additional identification information is provided by NFC chip.First terminal is by being configured at the NFC chip of first terminal and being configured at the
Interaction between the NFC chip of two terminals obtains the additional identification information.
Certainly, the above-mentioned offer based on progress such as graphic code scanning, sound wave mode and NFC can be combined at least two
Near Field Communication mode carries out, for example, the second terminal when receiving additional identification information, is played and shown by loudspeaker
Show that the form of screen display graphic code provides additional identification information.What first terminal issued the second terminal by microphone
The additional identification information of sound wave form is acquired, and is scanned to image shown in the second terminal, is somebody's turn to do
Additional identification information.It should be noted that when carrying out the offer of additional identification information using at least two Near Field Communication modes,
Identical additional identification information can be provided based on every kind of Near Field Communication mode, so as to test by finally obtained add
Card information verifies mutually, guarantees that the additional identification information got is accurate, or has the place of inaccuracy that can mend leakage detection mutually
It lacks.It is, of course, also possible to provide a part of additional identification information based on every kind of Near Field Communication mode, so as to respectively obtain it is attached
When adding a part of verification information, multiple portions can be spliced, to obtain complete additional identification information, can guarantee two
The distance between a terminal is close enough, close to the requirement that can satisfy at least two Near Field Communication mode and adjust the distance, can
Further increase safety.
In actual scene, server be second terminal provide authorization requests when involved Near Field Communication mode
And server when providing additional identification information for second terminal related Near Field Communication mode can be identical communication side
Formula is also possible to different communication modes, and it is not limited in the embodiment of the present invention.
211, additional identification information is sent to the server by first terminal.
Optionally, the other content of specific audio frequency segment and additional identification information can be sent to service by first terminal
Device can also parse the specific audio frequency segment got, obtain the text verification information of the specific audio frequency segment;It should
Text verification information is added into the additional identification information, and the additional identification information is sent to the server.
212, when the server receives the information to be verified of first terminal transmission, and the information to be verified is attached with this
When verification information being added to match, the license confirmation page is sent to the first terminal, which was used at first end
The specified operation is authorized on end.
Server is when receiving the information to be verified of first terminal transmission, it can be determined that the information to be verified and server
Whether the additional identification information got before matches, which can refer to that two information are identical, may also mean that letter
Similarity between breath is greater than default similarity, and when determining matching, then illustrate that the login of second terminal at this time is legal.Due to
The additional identification information temporarily generates, and therefore, attacker can not get in advance, so that additional authentication process is better able to
The relationship between first terminal and second terminal is embodied, better security purpose is reached.
213, first terminal shows the license confirmation page when receiving the license confirmation page.
The license confirmation page can be provided with authorization details and license confirmation key, which can be login
Authorization, payment authorization etc. are confirmed whether the authorization to second terminal according to the use demand of itself by first terminal user
Item is authorized.The first terminal of the embodiment of the present invention scan and passed through at least twice verifying at least twice
Later, it just shows the license confirmation page, the safety of entire login process can be greatly improved.Referring to (e) figure in Fig. 3,
Shown is the display schematic diagram that first terminal receives the license confirmation page.
214, when detecting the confirmation operation to the license confirmation page on first terminal, first terminal is to the server
Send license confirmation instruction.
The confirmation operation can be the trigger action of the license confirmation key progress to the license confirmation page, the trigger action
It can be operation indicated by clicking operation or other license confirmation pages, the embodiment of the present invention is not specifically limited in this embodiment.
Above-mentioned steps 213 to 214 are that first terminal shows the license confirmation page obtained from the server, and is based on institute
State the process that the license confirmation page authorizes the second terminal.If first terminal send end message when, not to
Server sends authorization message, then first terminal can be when sending license confirmation instruction to server, by the first terminal
Authorization message be sent to the server, to realize subsequent authorization process.
215, it when the server receives license confirmation instruction, is sent to second terminal and logs in authorized certificate, which awards
Power voucher, which is used to indicate the second terminal and has been based on the user information of first terminal on the server, to be logined successfully.
216, second terminal receives the login authorized certificate, and carries out data friendship with server based on authorized certificate is logged in
Mutually.
For second terminal, after receiving login authorized certificate, when sending operation requests to server, then may be used
With carry the login authorized certificate with prove oneself be in logging state, and server receive carry the login authorization with
When the operation requests of card, then it can be serviced for the second terminal based on user information indicated by the login authorized certificate.
It should be noted that the embodiment illustrated in fig. 2 be illustrated by taking register as an example, and in actual scene to
Authorization specified operation can also have other types, at this point, server provided can be other kinds of authorized certificate, such as
For delivery operation, authorized certificate can be payment authorization voucher, and the specified operation of other types similarly, is not done superfluous herein
It states.Any specified operation can follow the process of above-mentioned steps 201 to 216 to carry out, and certainly, allow different specified operations
Authorization flow have the variation in details, such as have newly-increased or reduce the step of some is in addition to additional identification process, the present invention
Embodiment is not particularly limited this.
Method provided in an embodiment of the present invention, when second terminal request first terminal authorizes its specified operation,
Provided additional identification information in second terminal can be obtained before duly authorized, since the acquisition of additional identification information is base
It carries out in Near Field Communication mode, is limited by distance between terminal, therefore be able to verify that two terminals are in physical space
In close distance, and since additional identification information is that server temporarily provides, can not forge in advance, therefore, Ke Yitong
The mode of this additional identification is crossed to guarantee the safety logged in.Further, a variety of Near Field Communication modes are provided, so that
Scene applicatory is more abundant, substantially increases practicability functionally and reliability.
Fig. 5 is a kind of structural schematic diagram of authorization device provided in an embodiment of the present invention.The device is applied to first
Terminal, the device include:
Module 501 is obtained, for obtaining the authorization requests of second terminal offer by the first Near Field Communication mode;
Sending module 502, for the end message of the first terminal to be sent to server;
The acquisition module 501 is also used to pass through the second low coverage based on the secondary checking request obtained from the server
The additional identification information that the second terminal provides is obtained from communication modes;
The sending module 502 is also used to the additional identification information being sent to the server;
Display module 503, for showing the license confirmation page obtained from the server;
Authorization module 504, for being authorized based on the license confirmation page to the second terminal;
Wherein, the first Near Field Communication mode and the second Near Field Communication mode are same way or non-Tongfang
Formula.
In a kind of possible implementation, the first Near Field Communication mode and the second Near Field Communication mode are equal
For one of graphic code scanning, sound wave or near-field communication NFC or a variety of combinations.
In a kind of possible implementation, which is also used in the end message for sending the first terminal
When, the authorization message of the first terminal is sent to the server.
In a kind of possible implementation, which is used to work as to receive and award to the license confirmation page
When power confirmation instruction, the authorization message of the first terminal is sent to the server.
In a kind of possible implementation, the additional identification information include: user's head portrait image, user's pet name and with
One or more combination in machine character.
In a kind of possible implementation, the specified operation is register.
Fig. 6 is a kind of structural schematic diagram of authorization device provided in an embodiment of the present invention.The device is applied to second
Terminal, the device include:
Module 601 is provided, for providing authorization by the first Near Field Communication mode when receiving specified operational order
Request;
The offer module 601 is also used to based on the additional identification information got from server, closely by second
Communication modes provide the additional identification information;
Operation module 602, for being referred to based on the authorized certificate when getting authorized certificate from the server
Fixed operation.
In a kind of possible implementation, which is used for when receiving specified operational order, by described the
The end message of two terminals is sent to server;The authorization requests are obtained from the server, and pass through first low coverage
The authorization requests are provided from communication modes.
Fig. 7 is a kind of structural schematic diagram of authorization device provided in an embodiment of the present invention.The device is applied to service
Device, the device include:
Sending module 701, for the request based on second terminal, Xiang Suoshu second terminal sends authorization requests, described to award
Power request is provided as the first Near Field Communication mode;
Receiving module 702, for receiving the end message of first terminal;
Module 703 is obtained, for obtaining additional identification information in the end message for receiving first terminal;
The sending module 701 is also used to send the additional identification information to the second terminal;
The receiving module 702 is also used to receive the information to be verified of first terminal transmission;
The sending module 701 is also used to when receiving the information to be verified that the first terminal is sent, and described to be tested
When demonstrate,proving information and the additional identification information matches, the license confirmation page is sent to the first terminal;
The sending module 701 is also used to when receiving the confirmation message of first terminal, and the transmission of Xiang Suoshu second terminal is awarded
Weigh voucher.
In a kind of possible mode, the module 703 that obtains is used to have authorization when the request for determining the second terminal
When risk, the additional identification information is obtained.
It should be understood that authorization device provided by the above embodiment is in authorization, only with above-mentioned each function
The division progress of module can according to need and for example, in practical application by above-mentioned function distribution by different function moulds
Block is completed, i.e., the internal structure of equipment is divided into different functional modules, to complete all or part of function described above
Energy.In addition, authorization device provided by the above embodiment and authorization embodiment of the method belong to same design, it is specific real
Existing process is detailed in embodiment of the method, and which is not described herein again.
A kind of terminal is present embodiments provided, which can be used for executing the operation provided in above-mentioned each embodiment and award
Power method.Referring to Fig. 8, which includes:
Terminal 800 may include RF (Radio Frequency, radio frequency) circuit 110, include one or more meter
The memory 120 of calculation machine readable storage medium storing program for executing, input unit 130, display unit 140, sensor 150, voicefrequency circuit 160,
WiFi (Wireless Fidelity, Wireless Fidelity) module 170, the processing for including one or more than one processing core
The components such as device 180 and power supply 190.It will be understood by those skilled in the art that terminal structure shown in Fig. 8 is not constituted pair
The restriction of terminal may include perhaps combining certain components or different component cloth than illustrating more or fewer components
It sets.Wherein:
RF circuit 110 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station
After downlink information receives, one or the processing of more than one processor 180 are transferred to;In addition, the data for being related to uplink are sent to
Base station.In general, RF circuit 110 includes but is not limited to antenna, at least one amplifier, tuner, one or more oscillators, uses
Family identity module (SIM) card, transceiver, coupler, LNA (Low Noise Amplifier, low-noise amplifier), duplex
Device etc..In addition, RF circuit 110 can also be communicated with network and other equipment by wireless communication.The wireless communication can make
With any communication standard or agreement, and including but not limited to GSM (Global System of Mobile communication, entirely
Ball mobile communcations system), GPRS (General Packet Radio Service, general packet radio service), CDMA (Code
Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple
Access, wideband code division multiple access), LTE (Long Term Evolution, long term evolution), Email, SMS (Short
MessagingService, short message service) etc..
Memory 120 can be used for storing software program and module, and processor 180 is stored in memory 120 by operation
Software program and module, thereby executing various function application and data processing.Memory 120 can mainly include storage journey
Sequence area and storage data area, wherein storing program area can the (ratio of application program needed for storage program area, at least one function
Such as sound-playing function, image player function) etc.;Storage data area, which can be stored, uses created number according to terminal 800
According to (such as audio data, phone directory etc.) etc..In addition, memory 120 may include high-speed random access memory, can also wrap
Include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Correspondingly, memory 120 can also include Memory Controller, to provide processor 180 and input unit 130 to memory
120 access.
Input unit 130 can be used for receiving the number or character information of input, and generate and user setting and function
Control related keyboard, mouse, operating stick, optics or trackball signal input.Specifically, input unit 130 may include touching
Sensitive surfaces 131 and other input equipments 132.Touch sensitive surface 131, also referred to as touch display screen or Trackpad are collected and are used
Family on it or nearby touch operation (such as user using any suitable object or attachment such as finger, stylus in touch-sensitive table
Operation on face 131 or near touch sensitive surface 131), and corresponding attachment device is driven according to preset formula.It is optional
, touch sensitive surface 131 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detection is used
The touch orientation at family, and touch operation bring signal is detected, transmit a signal to touch controller;Touch controller is from touch
Touch information is received in detection device, and is converted into contact coordinate, then gives processor 180, and can receive processor 180
The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves
Realize touch sensitive surface 131.In addition to touch sensitive surface 131, input unit 130 can also include other input equipments 132.Specifically,
Other input equipments 132 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.),
One of trace ball, mouse, operating stick etc. are a variety of.
Display unit 140 can be used for showing information input by user or the information and terminal 800 that are supplied to user
Various graphical user interface, these graphical user interface can be made of figure, text, icon, video and any combination thereof.
Display unit 140 may include display panel 141, optionally, can use LCD (Liquid Crystal Display, liquid crystal
Show device), the forms such as OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) configure display panel
141.Further, touch sensitive surface 131 can cover display panel 141, when touch sensitive surface 131 detects touching on it or nearby
After touching operation, processor 180 is sent to determine the type of touch event, is followed by subsequent processing device 180 according to the type of touch event
Corresponding visual output is provided on display panel 141.Although in fig. 8, touch sensitive surface 131 and display panel 141 are conducts
Two independent components realize input and input function, but in some embodiments it is possible to by touch sensitive surface 131 and display
Panel 141 is integrated and realizes and outputs and inputs function.
Terminal 800 may also include at least one sensor 150, such as optical sensor, motion sensor and other sensings
Device.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 141, and proximity sensor can close display when terminal 800 is moved in one's ear
Panel 141 and/or backlight.As a kind of motion sensor, gravity accelerometer can detect in all directions (generally
Three axis) acceleration size, can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Extremely
In other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared sensors that terminal 800 can also configure, herein
It repeats no more.
Voicefrequency circuit 160, loudspeaker 161, microphone 162 can provide the audio interface between user and terminal 800.Audio
Electric signal after the audio data received conversion can be transferred to loudspeaker 161, be converted to sound by loudspeaker 161 by circuit 160
Sound signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 162, after being received by voicefrequency circuit 160
Audio data is converted to, then by after the processing of audio data output processor 180, such as another end is sent to through RF circuit 110
End, or audio data is exported to memory 120 to be further processed.Voicefrequency circuit 160 is also possible that earphone jack,
To provide the communication of peripheral hardware earphone Yu terminal 800.
WiFi belongs to short range wireless transmission technology, and terminal 800 can help user's transceiver electronics by WiFi module 170
Mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 8 is shown
WiFi module 170, but it is understood that, and it is not belonging to must be configured into for terminal 800, it can according to need completely
Do not change in the range of the essence of invention and omits.
Processor 180 is the control centre of terminal 800, utilizes each portion of various interfaces and connection whole mobile phone
Point, by running or execute the software program and/or module that are stored in memory 120, and calls and be stored in memory 120
Interior data execute the various functions and processing data of terminal 800, to carry out integral monitoring to mobile phone.Optionally, processor
180 may include one or more processing cores;Preferably, processor 180 can integrate application processor and modem processor,
Wherein, the main processing operation system of application processor, user interface and application program etc., modem processor mainly handles nothing
Line communication.It is understood that above-mentioned modem processor can not also be integrated into processor 180.
Terminal 800 further includes the power supply 190 (such as battery) powered to all parts, it is preferred that power supply can pass through electricity
Management system and processor 180 are logically contiguous, to realize management charging, electric discharge and power consumption by power-supply management system
The functions such as management.Power supply 190 can also include one or more direct current or AC power source, recharging system, power supply event
Hinder the random components such as detection circuit, power adapter or inverter, power supply status indicator.
Although being not shown, terminal 800 can also include camera, bluetooth module etc., and details are not described herein.Specifically in this reality
It applies in example, the display unit of terminal is touch-screen display, and terminal further includes having memory, and the memory is for storing computer
Program, and be configured the program for being executed by a processor and being stored on memory, with realize in above-described embodiment first terminal or
The method and step of second terminal.
Fig. 9 is a kind of block diagram of server 900 shown according to an exemplary embodiment.Referring to Fig. 9, server 900 is wrapped
Processor 922, and the memory resource as representated by memory 932 are included, it can be by the execution of processing component 922 for storing
Instruction, such as computer program is in addition, processor 922 is configured as executing the program stored on the memory, on executing
State the method and step of server side in authorization method.
Server 900 can also include that a power supply module 926 be configured as the power management of execute server 900, and one
A wired or wireless network interface 950 is configured as server 900 being connected to network and input and output (I/O) interface
958.Server 900 can be operated based on the operating system for being stored in memory 932, such as Windows ServerTM, Mac OS
XTM, UnixTM,LinuxTM, FreeBSDTMOr it is similar.
The embodiment of the invention also provides a kind of computer readable storage medium, computer is stored in the storage medium
Program, the computer program realize the authorization of above-mentioned first terminal or second terminal or server when being executed by processor
The step of method.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware
It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and
Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (15)
1. a kind of authorization method, which is characterized in that be applied to first terminal, which comprises
The authorization requests that second terminal offer is provided by the first Near Field Communication mode, by the end message of the first terminal
It is sent to server;
Based on the secondary checking request obtained from the server, the second terminal is obtained by the second Near Field Communication mode
The additional identification information is sent to the server by the additional identification information of offer;
Show the license confirmation page that obtains from the server, and be based on the license confirmation page to the second terminal into
Row authorization;
Wherein, the first Near Field Communication mode and the second Near Field Communication mode are same way or different modes.
2. the method according to claim 1, wherein the first Near Field Communication mode and second low coverage
It is one of graphic code scanning, sound wave or near-field communication NFC or a variety of combinations from communication modes.
3. the method according to claim 1, wherein the method also includes: sending the first terminal
When end message, the authorization message of the first terminal is sent to the server.
4. the method according to claim 1, wherein described whole to described second based on the license confirmation page
End carries out authorization
When receiving the license confirmation instruction to the license confirmation page, the authorization message of the first terminal is sent to
The server.
5. the method according to claim 1, wherein the additional identification information includes: user's head portrait image, uses
One or more combination in the family pet name and random character.
6. the method according to claim 1, wherein the specified operation is register.
7. a kind of authorization method, which is characterized in that be applied to second terminal, which comprises
When receiving specified operational order, authorization requests are provided by the first Near Field Communication mode;
Based on the additional identification information got from server, the additional identification is provided by the second Near Field Communication mode and is believed
Breath;
When getting authorized certificate from the server, specified operation is carried out based on the authorized certificate.
8. passing through first the method according to the description of claim 7 is characterized in that described when receiving specified operational order
Near Field Communication mode provides authorization requests
When receiving specified operational order, the end message of the second terminal is sent to server;
The authorization requests are obtained from the server, and provides the authorization by the first Near Field Communication mode and asks
It asks.
9. a kind of authorization method, which is characterized in that be applied to server, which comprises
Request based on second terminal, Xiang Suoshu second terminal send authorization requests, and it is close that the authorization requests are provided as first
Distance communication mode;
In the end message for receiving first terminal, additional identification information is obtained;
The additional identification information is sent to the second terminal;
When receiving the information to be verified that the first terminal is sent, and the information to be verified and the additional identification information
When matching, the license confirmation page is sent to the first terminal;
When receiving the confirmation message of first terminal, Xiang Suoshu second terminal sends authorized certificate.
10. according to the method described in claim 9, obtaining it is characterized in that, described in the end message for receiving first terminal
The additional identification information is taken to include:
When the request for determining the second terminal has authorization risk, the additional identification information is obtained.
11. a kind of authorization device, which is characterized in that be applied to first terminal, described device includes:
Module is obtained, for obtaining the authorization requests of second terminal offer by the first Near Field Communication mode;
Sending module, for the end message of the first terminal to be sent to server;
The acquisition module is also used to pass through the second Near Field Communication side based on the secondary checking request obtained from the server
Formula obtains the additional identification information that the second terminal provides;
The sending module is also used to the additional identification information being sent to the server;
Display module, for showing the license confirmation page obtained from the server;
Authorization module, for being authorized based on the license confirmation page to the second terminal;
Wherein, the first Near Field Communication mode and the second Near Field Communication mode are same way or different modes.
12. a kind of authorization device, which is characterized in that be applied to second terminal, described device includes:
Module is provided, for providing authorization requests by the first Near Field Communication mode when receiving specified operational order;
The offer module is also used to pass through the second Near Field Communication mode based on the additional identification information got from server
The additional identification information is provided;
Operation module, for carrying out specified operation based on the authorized certificate when getting authorized certificate from the server.
13. a kind of authorization device, which is characterized in that described device is applied to server, and described device includes:
Sending module, for the request based on second terminal, Xiang Suoshu second terminal sends authorization requests, the authorization requests quilt
It is provided as the first Near Field Communication mode;
Receiving module, for receiving the end message of first terminal;
Module is obtained, for obtaining additional identification information in the end message for receiving first terminal;
The sending module is also used to send the additional identification information to the second terminal;
The receiving module is also used to receive the information to be verified of first terminal transmission;
The sending module is also used to when receiving the information to be verified that the first terminal is sent, and the information to be verified
When with the additional identification information matches, the license confirmation page is sent to the first terminal;
The sending module is also used to when receiving the confirmation message of first terminal, Xiang Suoshu second terminal send authorization with
Card.
14. a kind of terminal, which is characterized in that including processor and memory, wherein the memory, for storing computer
Program;The processor realizes that claim 1 is any described to claim 8 for executing the program stored on memory
Method and step.
15. a kind of server, which is characterized in that including processor and memory, wherein the memory is calculated for storing
Machine program;The processor realizes that claim 9 is any to claim 10 for executing the program stored on memory
The method and step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710920117.5A CN109600340B (en) | 2017-09-30 | 2017-09-30 | Operation authorization method, device, terminal and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710920117.5A CN109600340B (en) | 2017-09-30 | 2017-09-30 | Operation authorization method, device, terminal and server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109600340A true CN109600340A (en) | 2019-04-09 |
CN109600340B CN109600340B (en) | 2021-04-16 |
Family
ID=65956555
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710920117.5A Active CN109600340B (en) | 2017-09-30 | 2017-09-30 | Operation authorization method, device, terminal and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109600340B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113407161A (en) * | 2021-06-04 | 2021-09-17 | 中船重工奥蓝托无锡软件技术有限公司 | Complex equipment-oriented collaborative research and development management system |
CN113938283A (en) * | 2021-10-14 | 2022-01-14 | 南京大全电气研究院有限公司 | Code scanning login method, system, device, electronic equipment and storage medium |
CN115102771A (en) * | 2022-06-25 | 2022-09-23 | 平安银行股份有限公司 | Data processing method, terminal device, system, device and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102571803A (en) * | 2012-01-19 | 2012-07-11 | 时代亿宝(北京)科技有限公司 | Method and system for protecting account, preventing order from being tampered and preventing fishing attack based on graphical two-dimensional code |
CN103685311A (en) * | 2013-12-27 | 2014-03-26 | 网易(杭州)网络有限公司 | Log-in validation method and device |
CN104378344A (en) * | 2014-05-26 | 2015-02-25 | 腾讯科技(深圳)有限公司 | Log-in information transmission method, code scanning method and device and background server |
CN104869127A (en) * | 2015-06-24 | 2015-08-26 | 郑州悉知信息技术有限公司 | Website login method, code-scanning client and server |
CN105306202A (en) * | 2014-06-24 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Identity verification method and device, server |
CN106209763A (en) * | 2016-05-27 | 2016-12-07 | 北京畅游天下网络技术有限公司 | A kind of login method and system |
-
2017
- 2017-09-30 CN CN201710920117.5A patent/CN109600340B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102571803A (en) * | 2012-01-19 | 2012-07-11 | 时代亿宝(北京)科技有限公司 | Method and system for protecting account, preventing order from being tampered and preventing fishing attack based on graphical two-dimensional code |
CN103685311A (en) * | 2013-12-27 | 2014-03-26 | 网易(杭州)网络有限公司 | Log-in validation method and device |
CN104378344A (en) * | 2014-05-26 | 2015-02-25 | 腾讯科技(深圳)有限公司 | Log-in information transmission method, code scanning method and device and background server |
CN105306202A (en) * | 2014-06-24 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Identity verification method and device, server |
CN104869127A (en) * | 2015-06-24 | 2015-08-26 | 郑州悉知信息技术有限公司 | Website login method, code-scanning client and server |
CN106209763A (en) * | 2016-05-27 | 2016-12-07 | 北京畅游天下网络技术有限公司 | A kind of login method and system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113407161A (en) * | 2021-06-04 | 2021-09-17 | 中船重工奥蓝托无锡软件技术有限公司 | Complex equipment-oriented collaborative research and development management system |
CN113407161B (en) * | 2021-06-04 | 2023-12-22 | 中船奥蓝托无锡软件技术有限公司 | Collaborative research and development management system for complex equipment |
CN113938283A (en) * | 2021-10-14 | 2022-01-14 | 南京大全电气研究院有限公司 | Code scanning login method, system, device, electronic equipment and storage medium |
CN113938283B (en) * | 2021-10-14 | 2023-12-12 | 南京大全电气研究院有限公司 | Code scanning login method, system, device, electronic equipment and storage medium |
CN115102771A (en) * | 2022-06-25 | 2022-09-23 | 平安银行股份有限公司 | Data processing method, terminal device, system, device and storage medium |
CN115102771B (en) * | 2022-06-25 | 2023-08-22 | 平安银行股份有限公司 | Data processing method, terminal device, system, device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109600340B (en) | 2021-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103634109B (en) | Operation right authentication method and device | |
US9703971B2 (en) | Sensitive operation verification method, terminal device, server, and verification system | |
WO2017118412A1 (en) | Method, apparatus and system for updating key | |
CN104796385B (en) | Terminal binding method, apparatus and system | |
CN103634294B (en) | Information verifying method and device | |
CN104836664B (en) | A kind of methods, devices and systems executing business processing | |
CN104518875B (en) | A kind of method that authentication and account obtain, mobile terminal | |
WO2017041599A1 (en) | Service processing method and electronic device | |
CN104376353B (en) | The generation of Quick Response Code, read method, terminal and server | |
CN104468463B (en) | Verification method, device and system | |
CN110198301B (en) | Service data acquisition method, device and equipment | |
WO2016082194A1 (en) | Message processing method and apparatus | |
CN104735657B (en) | Security terminal verification method, wireless access point binding method, apparatus and system | |
CN108234124B (en) | Identity verification method, device and system | |
CN111478849B (en) | Service access method, device and storage medium | |
CN104539571B (en) | Information interacting method, identification authentication method, server and terminal | |
CN104573437B (en) | Information authentication method, device and terminal | |
CN109039989B (en) | Address resolution protocol spoofing detection method, host and computer-readable storage medium | |
CN107786569A (en) | A kind of identifying code sending method, method of reseptance and relevant device | |
CN109600340A (en) | Authorization method, apparatus, terminal and server | |
CN104899488B (en) | Numeric value transfer and device | |
CN110418311A (en) | A kind of interconnected method based on multiple terminals, device and terminal | |
CN111209031A (en) | Data acquisition method and device, terminal equipment and storage medium | |
CN105721282B (en) | Message display method and device | |
CN104426848B (en) | The method and system of log-on webpage application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |