CN109600340A - Authorization method, apparatus, terminal and server - Google Patents

Authorization method, apparatus, terminal and server Download PDF

Info

Publication number
CN109600340A
CN109600340A CN201710920117.5A CN201710920117A CN109600340A CN 109600340 A CN109600340 A CN 109600340A CN 201710920117 A CN201710920117 A CN 201710920117A CN 109600340 A CN109600340 A CN 109600340A
Authority
CN
China
Prior art keywords
terminal
server
authorization
identification information
additional identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710920117.5A
Other languages
Chinese (zh)
Other versions
CN109600340B (en
Inventor
黎可人
刘思凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201710920117.5A priority Critical patent/CN109600340B/en
Publication of CN109600340A publication Critical patent/CN109600340A/en
Application granted granted Critical
Publication of CN109600340B publication Critical patent/CN109600340B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of authorization method, providing method and equipment, belong to network technique field.The present invention is when second terminal request first terminal authorizes its specified operation, provided additional identification information in second terminal can be obtained before duly authorized, since the acquisition of additional identification information is carried out based on Near Field Communication mode, it is limited by distance between terminal, therefore it is able to verify that two terminals in physical space are in close distance, and since additional identification information is that server temporarily provides, it can not forge in advance, therefore, it can guarantee the safety logged in by way of this additional identification.

Description

Authorization method, apparatus, terminal and server
Technical field
The present invention relates to network technique field, in particular to a kind of authorization method, apparatus, terminal and server.
Background technique
With the development of network technology, authorization process is directed under many application scenarios, for example, to log in scene For, if user wants the client that access of instant communicating is applied in some terminal, it can trigger and sweep on the terminal Code login function so that can show the two dimensional code for login in the terminal, then opens corresponding client on oneself mobile phone The scanning function at end is scanned the two dimensional code, logs in so that user account etc. is licensed to terminal, to complete whole A login process.The process of authorization is related to for other, it can also be with the above process similarly.
However, the safety of existing authorization scheme, is the authorization that confirmed sth. oneself near logging device based on user, i.e., " being scanned the two-dimensional code by mobile phone " then assumes " user is just near logging device ".And a kind of common steal-number means are to steal at present Number person obtains the login two dimensional code on the logging device of oneself by means such as duplication, screenshotss, and it is soft then to pass through instant messaging Part is sent to victim, then inveigles victim to scan the two dimensional code and authorizes.After user confirms authorization, steal-number person Just the account number of victim is logged in the equipment of oneself, therefore, the method for actually existing authorization, account number safety compared with Difference.
Summary of the invention
In order to solve problems in the prior art, the embodiment of the invention provides a kind of authorization method, apparatus, terminal with And server.The technical solution is as follows:
In a first aspect, providing a kind of authorization method, it is applied to first terminal, which comprises
The authorization requests that second terminal offer is provided by the first Near Field Communication mode, by the terminal of the first terminal Information is sent to server;
Based on the secondary checking request obtained from the server, described second is obtained by the second Near Field Communication mode The additional identification information that terminal provides, is sent to the server for the additional identification information;
Show the license confirmation page obtained from the server, and whole to described second based on the license confirmation page End is authorized;
Wherein, the first Near Field Communication mode and the second Near Field Communication mode are same way or non-Tongfang Formula.
In a first aspect, providing a kind of authorization method, it is applied to second terminal, which comprises
When receiving specified operational order, authorization requests are provided by the first Near Field Communication mode;
Based on the additional identification information got from server, described add is provided by the second Near Field Communication mode and is tested Demonstrate,prove information;
When getting authorized certificate from the server, specified operation is carried out based on the authorized certificate.
In a first aspect, providing a kind of authorization method, it is applied to server, which comprises
Request based on second terminal, Xiang Suoshu second terminal send authorization requests, and the authorization requests are provided as the One Near Field Communication mode;
In the end message for receiving first terminal, additional identification information is obtained;
The additional identification information is sent to the second terminal;
When receiving the information to be verified that the first terminal is sent, and the information to be verified and the additional identification When information matches, the license confirmation page is sent to the first terminal;
When receiving the confirmation message of first terminal, Xiang Suoshu second terminal sends authorized certificate.
On the one hand, a kind of authorization device is provided, first terminal is applied to, described device includes:
Module is obtained, for obtaining the authorization requests of second terminal offer by the first Near Field Communication mode;
Sending module, for the end message of the first terminal to be sent to server;
The acquisition module is also used to based on the secondary checking request obtained from the server, closely logical by second News mode obtains the additional identification information that the second terminal provides;
The sending module is also used to the additional identification information being sent to the server;
Display module, for showing the license confirmation page obtained from the server;
Authorization module, for being authorized based on the license confirmation page to the second terminal;
Wherein, the first Near Field Communication mode and the second Near Field Communication mode are same way or non-Tongfang Formula.
On the one hand, a kind of authorization device is provided, second terminal is applied to, described device includes:
Module is provided, for authorization being provided by the first Near Field Communication mode and being asked when receiving specified operational order It asks;
The offer module is also used to pass through the second Near Field Communication based on the additional identification information got from server Mode provides the additional identification information;
Operation module, for being specified based on the authorized certificate when getting authorized certificate from the server Operation.
On the one hand, a kind of authorization device is provided, which is applied to server, which includes:
Sending module, for the request based on second terminal, Xiang Suoshu second terminal sends authorization requests, and the authorization is asked It asks and is provided as the first Near Field Communication mode;
Receiving module, for receiving the end message of first terminal;
Module is obtained, for obtaining additional identification information in the end message for receiving first terminal;
The sending module is also used to send the additional identification information to the second terminal;
The receiving module is also used to receive the information to be verified of first terminal transmission;
The sending module is also used to when receiving the information to be verified that the first terminal is sent, and the letter to be verified When breath is with the additional identification information matches, the license confirmation page is sent to the first terminal;
The sending module is also used to when receiving the confirmation message of first terminal, Xiang Suoshu second terminal send authorization with Card.
On the one hand, a kind of terminal, including processor and memory are provided, wherein the memory is calculated for storing Machine program;The processor realizes that first aspect and second aspect are any described for executing the program stored on memory Method and step.
On the one hand, a kind of server, including processor and memory are provided, wherein the memory, based on storing Calculation machine program;The processor realizes third aspect method and step for executing the program stored on memory.
In any of the above-described aspect, specified operation all can be register, that is to say, when second terminal want log in it is a certain It is a in application, can more have the login of safety assurance by additional authentication process, Lai Shixian.
Method provided in an embodiment of the present invention, when second terminal request first terminal authorizes its specified operation, Provided additional identification information in second terminal can be obtained before duly authorized, since the acquisition of additional identification information is base It carries out in Near Field Communication mode, is limited by distance between terminal, therefore be able to verify that two terminals are in physical space In close distance, and since additional identification information is that server temporarily provides, can not forge in advance, therefore, Ke Yitong The mode of this additional identification is crossed to guarantee the safety logged in.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is a kind of implementation environment schematic diagram of authorization method provided in an embodiment of the present invention;
Fig. 2 is a kind of flow chart of authorization method provided in an embodiment of the present invention;
Fig. 3 is the schematic diagram at first terminal and second terminal shown interface during authorization;
Fig. 4 is a kind of schematic diagram of additional identification information provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of authorization device provided in an embodiment of the present invention;
Fig. 6 is a kind of structural schematic diagram of authorization device provided in an embodiment of the present invention;
Fig. 7 is a kind of structural schematic diagram of authorization device provided in an embodiment of the present invention;
Fig. 8 is a kind of block diagram of terminal 800 shown according to an exemplary embodiment;
Fig. 9 is a kind of block diagram of server 900 shown according to an exemplary embodiment.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention Formula is described in further detail.
Fig. 1 is a kind of implementation environment schematic diagram of authorization method provided in an embodiment of the present invention.In the implementation environment In include first terminal 101, second terminal 102 and server 103.
Wherein, first terminal 101 can be equipped with the first client of application, and second terminal 102 can also be equipped with this Second client of application, the first client and the second client can be the client of identical version, or different The client of version, for example, the first client can be mobile phone version client, and the second client can be PC editions clients, When user wants based on the user information that the first client has logged on to log in second terminal 102, Ke Yitong It crosses and opens scanning function in the first client, the graphic code of login shown in the second client is realized.In addition, Second terminal can also open the portal website of server using browser client, to be logged in, concrete operations side Similarly, this will not be repeated here for formula and the above-mentioned login based on two clients.Certainly, above-mentioned terminal can also have sound wave transmitting-receiving And the functions such as NFC function.Wherein, sound wave transmitting-receiving can refer to the transmitting-receiving of voice signal or the transmitting-receiving of electromagnetic wave signal.Its In, voice signal can be the voice signal for any frequency that terminal can acquire, such as ultrasonic wave etc..For voice signal Broadcasting can be carried out by the loudspeaker of terminal, and acquired and can be carried out by the microphone of terminal to it, and for electromagnetic wave The acquisition and transmitting of signal can be carried out by the antenna of terminal.
The server 103, which can be, provides the server of service, and the service for the first client and the second client Device 103 can also have corresponding portal website, so that terminal carries out web page access.
In inventive embodiments, when server provides authorization requests (such as logging request) for second terminal, it can be based on First Near Field Communication mode provides, at this point, first terminal can be using the first Near Field Communication mode come whole to second Authorization requests provided by holding are obtained.And when server provides additional identification information for second terminal, it can be based on Second Near Field Communication mode provides, at this point, first terminal can propose second terminal using the second Near Field Communication mode The additional identification information of confession is obtained, and the first Near Field Communication mode and the second Near Field Communication mode can be phase Tongfang Formula is also possible to different modes.Specifically, the first Near Field Communication mode and the second Near Field Communication mode are figure One of shape code scanning, sound wave or near-field communication NFC or a variety of combinations.
Authorization to specified operation referred to for authorization provided in an embodiment of the present invention, such as register is awarded Any authorization for needing to carry out based on certain information such as power, the authorization of delivery operation, the authorization of transfer operation.To step on For the authorization for recording operation, authorization message is user account and password, or is added based on what user account and password generated The information such as confidential information or characteristic value, by taking delivery operation and the authorization transferred accounts as an example, authorization message can be card number or account mark Knowledge and password, or the information such as the encryption information based on account identification and password generation or characteristic value etc., the present invention is implemented Example is not specifically limited in this embodiment.
Fig. 2 is a kind of flow chart of authorization method provided in an embodiment of the present invention.In embodiments of the present invention, only with Specified operation be register, the first Near Field Communication mode and the second Near Field Communication mode be for graphic code scanning into Row explanation, the implementation of this method can be carried out based on the implementation environment in Fig. 1, referring to fig. 2, this method comprises:
201, second terminal sends logging request to server, which logs in clothes for requesting in second terminal Business device.
For second terminal, when second terminal user wants login service device, it can send and log in server Request, the logging request carry the end message of second terminal.For example, the end message can be terminal iidentification, to inform clothes Business device is which terminal is wanted to be logged in, and certainly, which can also include network address (the i.e. IP of terminal (Internet Protocol, network protocol), geographical location information (such as latitude and longitude information) and the wireless network connected letter It ceases any one of (SSID (Service Set Identifier, service set) of such as wireless network) or multinomial.
In actual scene, server can provide a variety of login modes, such as the login mode based on user information is (such as Account number cipher logs in), the login mode (such as short-message verification login) based on short message verification code or the login based on other terminals The login mode (such as scanning the two-dimensional code login) of user information.If second terminal user selects the login side based on other terminals Formula is logged in, then can also carry the identification information of the selected login mode of the second terminal in logging request, make Obtaining server can be handled based on the identification information.
It should be noted that the second terminal, which can be, carries out aforesaid operations by the corresponding client of server, may be used also To be to carry out aforesaid operations by the portal website of server, it is not limited in the embodiment of the present invention.
202, server receives the logging request, generates the graphic code of the logging request, which at least can be used for Request the end message of the first terminal.
The graphic code, which can be bar code, such as one-dimension code, two dimensional code etc., can carry the bar code of information.Server exists When generating the graphic code, can be generated based on appointment codes information, the appointment codes information can be one section for request this The code information of the end message of one terminal.In a kind of possible implementation, which be may be used to indicate that First terminal uploads its account information (for example, account and password).
203, the graphic code is sent to the second terminal by the server.
204, when second terminal receives the graphic code, the graphic code is shown.
Second terminal can show the graphic code in the specified region of second terminal when receiving the graphic code, aobvious While showing the graphic code, it can be can be with display operation prompt information, the operation prompt information for prompting the user on how The information operated.For example, can show that the operation prompt information " please open cell phone client to carry out in the lower section of graphic code Scanning " etc..
Referring to (a) figure in Fig. 3, shown by be that second terminal is wanted to be scanned when two dimensional code logs in by servicing Two dimensional code provided by device.
205, the first terminal is scanned graphic code provided by second terminal, at least by the terminal of the first terminal Information is sent to server.
When first terminal is scanned graphic code shown in second terminal, entrained by the available graphic code Appointment codes information, the end message of first terminal is transferred by executing the appointment codes information.Further, first terminal After scanning, the authorization message of first terminal can also be obtained, which can refer to specified operation information needed, such as use The account and password at family;Or, the account name and payment cipher etc. of user.
Referring to (c) figure in Fig. 3, shown by be to be shown on screen when first terminal opens two-dimensional code scanning function The scanning area shown.
Certainly, in above-mentioned steps 202 to 205, server is based on graphic code when providing authorization requests for second terminal It provides, and in actual scene, which is also based on sound wave or NFC to provide the authorization requests, is based on acoustic wave form Formula is come when providing, above-mentioned steps 202 to 205 be may alternatively be: server generates the authorization requests of sound wave form, the server The authorization requests of the sound wave form are sent to the second terminal.When second terminal receives the authorization requests of the sound wave form When, play the authorization requests.The authorization requests that the first terminal plays second terminal are acquired, and are awarded to get this Power is requested, and sends the end message of first terminal to server based on the authorization requests.And based on NFC form come when providing, Above-mentioned steps 202 to 205 may alternatively be: server generates authorization requests, the server by authorization requests be sent to this Two terminals.When second terminal receives the authorization requests, the authorization requests are provided by NFC chip.The first terminal passes through Be configured at the NFC chip of first terminal and be configured at second terminal NFC chip between interaction, get the authorization requests, And the end message of first terminal is sent to server based on the authorization requests.In addition, above-mentioned based on graphic code scanning, sound wave side The offer of the progress such as formula and NFC can be combined at least two Near Field Communication modes and carry out, and be based on the second low coverage with subsequent Additional identification information is provided similarly from communication modes, and this will not be repeated here.
Certainly, it if necessary to send authorization message when sending end message, then in above-mentioned replacement step, can also use Mode similarly sends the authorization message of first terminal when sending end message to server.
206, server receives the end message of the first terminal, according to the end message of the first terminal and second The end message of terminal, verifies logging request.
If the end message of first terminal and the end message of second terminal include the letter that can indicate geographical location Breath, such as network address or geographical location information or the radio network information having connected, then server can pass through following verifyings Process (1), according to the end message of two terminals, tentatively to judge that the logging request logs in risk with the presence or absence of authorization.
(1) judge whether the geographical location relationship between first terminal and second terminal meets preset requirement.
If it is determined that the opposite geographical location of two terminals is less than pre-determined distance, then it is assumed that there is no authorizations to log in risk, Additional identification process can not be executed, and if it is determined that the opposite geographical location of two terminals is greater than or equal to pre-determined distance, then Think that there is authorization logs in risk, can execute subsequent step 207.
In a kind of possible implementation, first terminal, can also be by described the when sending the end message of the first terminal The authorization message of one terminal is sent to server, then server can authorization message, terminal based on the first terminal received The end message of information and second terminal should when determining tentatively to judge that the logging request logs in risk with the presence or absence of authorization When logging request has authorization login risk, step 207 is executed.
Specific verification process may include at least one verification process in following (2)-(3):
(2) second terminal is the common registration terminal of this user.
According to the authorization message of first terminal, the terminal iidentification of the common registration terminal of the user information is obtained, if should The terminal iidentification of second terminal is different from the common terminal iidentification of registration terminal, then can determine the second terminal not is the use Risk is logged in and there is authorization in the common registration terminal at family, and if identical, it can determine that the second terminal is the normal of the user Use registration terminal.
(3) whether second terminal belongs to blacklist equipment.
According to the terminal iidentification of second terminal and/or network address inquiry blacklist, if the terminal iidentification is in blacklist In or the network address in blacklist, then can determine that the second terminal belongs to blacklist equipment, exist authorization log in risk.
For above-mentioned (1) to (3) verification process, a verification process can be based only upon and carry out preliminary identification, it can be with base Preliminary identification is carried out in two or more verification process, is carried out tentatively based on two or more verification process When verifying, it can be executed subsequent based on additional when the verification result of any one verification process determines that there is authorization logs in risk The process that verification information is verified.The embodiment of the present invention to specific verifying sequence without limitation.
Certainly, the preliminary identification can also include login time verifying, for example, the login time based on first terminal and The historical log of first terminal is accustomed to the time, judge the login time whether within the period of historical log habit time, such as Fruit does not exist, it is determined that there is authorization and logs in risk, execute step 207, if during this period of time, can be omitted this and additional test Card.Wherein, the historical log habit time can be when being logged in historical time according to user, and login times are greater than default Number or login frequency are greater than the period of predeterminated frequency.
Specifically, if first terminal supports GPS positioning, which can be obtained by GPS positioning system Geographical location information (such as latitude and longitude information), and the geographical location information is sent to server, and if first terminal can To get the radio network information connected at this time, then the radio network information can also be sent to server.It needs to illustrate , specifically obtain and send which kind of information can be determined according to the ability of terminal itself, that is to say, first terminal is available At least one of in the radio network information that geographical location information and terminal are connected, and accessed information is sent to clothes Business device.
It should be noted that can be and sent together with end message when sending authorization message, can also be and whole Client information is sent respectively, the embodiment of the present invention to specific sending method without limitation.
In a kind of possible implementation, when verifying determines that current operation is suspicious, server can be sent to first terminal refer to Show information, which is used to indicate first terminal and keeps scanning mode, so as to attached received by subsequent second terminal Verification information is added to be scanned.
Certainly, server has carried out preliminary identification to the logging request in above-mentioned steps 206, testing based on preliminary identification Card result determines whether to execute step 207, can also be but straight without the preliminary identification of step 206 and in actual scene It connects and executes step 207 to increase additional authentication process, to reduce authorization risk.
207, when verifying, determining current operation is suspicious, then server obtains additional identification information.
When server receives the end message of first terminal transmission, then it can know that second terminal is wanted based on the The user information of one terminal is logged in, in order to achieve the purpose that further ensure log in safety, it is available for carry out into The additional identification information of one step card.
In a kind of possible implementation, when first terminal has sent the end message and authorization message of first terminal, the clothes Business device can obtain additional identification information at random, can also be obtained based on the authorization message of first terminal and/or end message Additional identification information.The acquisition process can specifically include following either steps or appoint the combination of several steps:
Step 1: obtaining image relevant to the authorization message.Being somebody's turn to do image relevant to authorization message can be user's head portrait Any image etc. that image, user upload.By taking user's head portrait image as an example, server can be believed according to the authorization received Breath, obtains the corresponding user's head portrait image of the authorization message from user's registration information.
Step 2: obtaining character information relevant to the authorization message.Being somebody's turn to do character information relevant to authorization message can be Any one of user's pet name, user's registration information.By taking user's pet name as an example, server can according to the authorization message received, The corresponding user's pet name of the authorization message is obtained from user's registration information.
Step 3: obtaining random data information.Server can also be believed the character information generated at random as additional identification Breath.The specific random algorithm can use any random algorithm, and character information can be used for referring to text, number, letter, Any sorts such as symbol or classes of combination.For example, random data information can be the two dimensional code of verification information, watermark texture or Identifying code.
Step 4: obtaining specific audio frequency segment.Server can also generate a segment of audio, which can be passage Information can also be a Duan Yinle or song.
It should be noted is that in actual scene, when obtaining additional identification information, above-mentioned steps 1- can be combined Any of step 4 appoints several steps to carry out, and that is to say, the additional identification information got may include and the authorization message One in relevant image, character information relevant to the authorization message, random data information and specific audio frequency segment or It is multinomial.For example, the additional identification information may include user's head portrait image, in another example, which may include User's head portrait image and user's pet name, for another example as shown in Figure 4, which can also include user's head portrait figure Picture, user's pet name and random data information.
In a kind of possible implementation, when only having sent the end message of first terminal when first terminal, which can To obtain additional identification information at random, or additional identification information is obtained based on the end message of first terminal.For example, by Each character in the terminal iidentification of one terminal carries out out-of-order processing or scrambling code is added, to obtain additional identification information.
208, the additional identification information is sent to the second terminal by the server.
209, second terminal shows the additional identification information when receiving additional identification information.
Second terminal can refresh display interface when receiving additional identification information, to show the additional identification information, Operation prompt information can also be shown in the additional identification information, is operated to prompt the user on how.It is tested when this is additional When further including specific audio frequency segment in card information, second terminal can also show the other information in the additional identification information When, play the specific audio frequency segment.
Referring to (b) figure in Fig. 3, shown by be additional identification information received by second terminal signal Figure.
210, first terminal sweeps image shown in the second terminal under the situation for keeping former scanning mode It retouches, obtains the additional identification information.Wherein, first terminal provides second terminal in the former scanning mode, that is, step 205 The state that is scanned of graphic code.
For first terminal, scanning mode can be kept after sending user information and log-on message, it can be with It is the instruction information that server feedback is received after receiving transmission user information and log-on message, based on instruction information Instruction, keeps scanning mode, and the embodiment of the present invention is not specifically limited in this embodiment.Certainly, which can also close scanning shape State simultaneously obtains additional identification information using other any Near Field Communication modes.
And if the Near Field Communication mode taken in step 205 be graphic code scanning other than mode when, the holding Original state can refer to the state for keeping the Near Field Communication mode taken in step 205 to open, certainly, step 205 and 210 Identical Near Field Communication mode is necessarily taken, therefore, which can also switch to other than former Near Field Communication mode Near Field Communication mode obtain additional identification information.For example, if what is taken in step 205 is sound wave mode, the step Rapid 210 can also switch to graphic code scanning with continuous collecting sound wave.
Specifically, which can be with are as follows: additional is tested by the shooting mould group to shown this on the first terminal Card information is shot, and obtains shooting picture, which includes the additional identification information.At this point it is possible to which picture will be shot Directly as additional identification information, can also parsing by first terminal to shooting picture, to obtain additional identification information.
In another embodiment, which can be with are as follows: by the shooting mould group to institute on the first terminal The image of display is scanned, and obtains the additional identification information.Scanning process in the scanning and step 205 similarly can be Image analysis is carried out when acquiring image, to obtain additional identification information.
Since first terminal keeps scanning mode and is persistently scanned to the display interface of second terminal, thus second When showing the additional identification information in terminal, the additional identification information can be obtained by scanning.
Certainly, when additional identification information further includes specific audio frequency segment, by the microphone of the first terminal to sound Signal is acquired, and obtains first terminal specific audio frequency segment being played on.It is this to be tested using sound collection come what is carried out Card, can enrich verification mode, and since sound propagation distance itself is limited, the can be confirmed by sound collection One terminal and second terminal are located in certain distance, further validation operation user be it is same, improve the guarantee of its safety.
Referring to (d) figure in Fig. 3, shown by be first terminal when keeping scanning mode after scanning through two dimensional code Shown scanning area on screen.
The step 209 and 210 be by the additional identification information be second terminal get provided in a manner of graphic code should Additional identification information, and first terminal is obtained by graphic code scanning mode and is illustrated for the additional identification information, And in actual scene, above-mentioned steps 209 and 210 may be replaced by following steps: second terminal is receiving additional identification When information, additional identification information is converted into sound wave form, and the additional identification information is played by loudspeaker;Or, second is whole End plays the additional identification information in the additional identification information for receiving sound wave form, and through loudspeaker.First terminal is logical It crosses microphone to be acquired the additional identification information for the sound wave form that the second terminal is issued, obtains additional identification letter Breath.Alternatively, above-mentioned steps 209 and 210 may be replaced by following steps: second terminal when receiving additional identification information, The additional identification information is provided by NFC chip.First terminal is by being configured at the NFC chip of first terminal and being configured at the Interaction between the NFC chip of two terminals obtains the additional identification information.
Certainly, the above-mentioned offer based on progress such as graphic code scanning, sound wave mode and NFC can be combined at least two Near Field Communication mode carries out, for example, the second terminal when receiving additional identification information, is played and shown by loudspeaker Show that the form of screen display graphic code provides additional identification information.What first terminal issued the second terminal by microphone The additional identification information of sound wave form is acquired, and is scanned to image shown in the second terminal, is somebody's turn to do Additional identification information.It should be noted that when carrying out the offer of additional identification information using at least two Near Field Communication modes, Identical additional identification information can be provided based on every kind of Near Field Communication mode, so as to test by finally obtained add Card information verifies mutually, guarantees that the additional identification information got is accurate, or has the place of inaccuracy that can mend leakage detection mutually It lacks.It is, of course, also possible to provide a part of additional identification information based on every kind of Near Field Communication mode, so as to respectively obtain it is attached When adding a part of verification information, multiple portions can be spliced, to obtain complete additional identification information, can guarantee two The distance between a terminal is close enough, close to the requirement that can satisfy at least two Near Field Communication mode and adjust the distance, can Further increase safety.
In actual scene, server be second terminal provide authorization requests when involved Near Field Communication mode And server when providing additional identification information for second terminal related Near Field Communication mode can be identical communication side Formula is also possible to different communication modes, and it is not limited in the embodiment of the present invention.
211, additional identification information is sent to the server by first terminal.
Optionally, the other content of specific audio frequency segment and additional identification information can be sent to service by first terminal Device can also parse the specific audio frequency segment got, obtain the text verification information of the specific audio frequency segment;It should Text verification information is added into the additional identification information, and the additional identification information is sent to the server.
212, when the server receives the information to be verified of first terminal transmission, and the information to be verified is attached with this When verification information being added to match, the license confirmation page is sent to the first terminal, which was used at first end The specified operation is authorized on end.
Server is when receiving the information to be verified of first terminal transmission, it can be determined that the information to be verified and server Whether the additional identification information got before matches, which can refer to that two information are identical, may also mean that letter Similarity between breath is greater than default similarity, and when determining matching, then illustrate that the login of second terminal at this time is legal.Due to The additional identification information temporarily generates, and therefore, attacker can not get in advance, so that additional authentication process is better able to The relationship between first terminal and second terminal is embodied, better security purpose is reached.
213, first terminal shows the license confirmation page when receiving the license confirmation page.
The license confirmation page can be provided with authorization details and license confirmation key, which can be login Authorization, payment authorization etc. are confirmed whether the authorization to second terminal according to the use demand of itself by first terminal user Item is authorized.The first terminal of the embodiment of the present invention scan and passed through at least twice verifying at least twice Later, it just shows the license confirmation page, the safety of entire login process can be greatly improved.Referring to (e) figure in Fig. 3, Shown is the display schematic diagram that first terminal receives the license confirmation page.
214, when detecting the confirmation operation to the license confirmation page on first terminal, first terminal is to the server Send license confirmation instruction.
The confirmation operation can be the trigger action of the license confirmation key progress to the license confirmation page, the trigger action It can be operation indicated by clicking operation or other license confirmation pages, the embodiment of the present invention is not specifically limited in this embodiment.
Above-mentioned steps 213 to 214 are that first terminal shows the license confirmation page obtained from the server, and is based on institute State the process that the license confirmation page authorizes the second terminal.If first terminal send end message when, not to Server sends authorization message, then first terminal can be when sending license confirmation instruction to server, by the first terminal Authorization message be sent to the server, to realize subsequent authorization process.
215, it when the server receives license confirmation instruction, is sent to second terminal and logs in authorized certificate, which awards Power voucher, which is used to indicate the second terminal and has been based on the user information of first terminal on the server, to be logined successfully.
216, second terminal receives the login authorized certificate, and carries out data friendship with server based on authorized certificate is logged in Mutually.
For second terminal, after receiving login authorized certificate, when sending operation requests to server, then may be used With carry the login authorized certificate with prove oneself be in logging state, and server receive carry the login authorization with When the operation requests of card, then it can be serviced for the second terminal based on user information indicated by the login authorized certificate.
It should be noted that the embodiment illustrated in fig. 2 be illustrated by taking register as an example, and in actual scene to Authorization specified operation can also have other types, at this point, server provided can be other kinds of authorized certificate, such as For delivery operation, authorized certificate can be payment authorization voucher, and the specified operation of other types similarly, is not done superfluous herein It states.Any specified operation can follow the process of above-mentioned steps 201 to 216 to carry out, and certainly, allow different specified operations Authorization flow have the variation in details, such as have newly-increased or reduce the step of some is in addition to additional identification process, the present invention Embodiment is not particularly limited this.
Method provided in an embodiment of the present invention, when second terminal request first terminal authorizes its specified operation, Provided additional identification information in second terminal can be obtained before duly authorized, since the acquisition of additional identification information is base It carries out in Near Field Communication mode, is limited by distance between terminal, therefore be able to verify that two terminals are in physical space In close distance, and since additional identification information is that server temporarily provides, can not forge in advance, therefore, Ke Yitong The mode of this additional identification is crossed to guarantee the safety logged in.Further, a variety of Near Field Communication modes are provided, so that Scene applicatory is more abundant, substantially increases practicability functionally and reliability.
Fig. 5 is a kind of structural schematic diagram of authorization device provided in an embodiment of the present invention.The device is applied to first Terminal, the device include:
Module 501 is obtained, for obtaining the authorization requests of second terminal offer by the first Near Field Communication mode;
Sending module 502, for the end message of the first terminal to be sent to server;
The acquisition module 501 is also used to pass through the second low coverage based on the secondary checking request obtained from the server The additional identification information that the second terminal provides is obtained from communication modes;
The sending module 502 is also used to the additional identification information being sent to the server;
Display module 503, for showing the license confirmation page obtained from the server;
Authorization module 504, for being authorized based on the license confirmation page to the second terminal;
Wherein, the first Near Field Communication mode and the second Near Field Communication mode are same way or non-Tongfang Formula.
In a kind of possible implementation, the first Near Field Communication mode and the second Near Field Communication mode are equal For one of graphic code scanning, sound wave or near-field communication NFC or a variety of combinations.
In a kind of possible implementation, which is also used in the end message for sending the first terminal When, the authorization message of the first terminal is sent to the server.
In a kind of possible implementation, which is used to work as to receive and award to the license confirmation page When power confirmation instruction, the authorization message of the first terminal is sent to the server.
In a kind of possible implementation, the additional identification information include: user's head portrait image, user's pet name and with One or more combination in machine character.
In a kind of possible implementation, the specified operation is register.
Fig. 6 is a kind of structural schematic diagram of authorization device provided in an embodiment of the present invention.The device is applied to second Terminal, the device include:
Module 601 is provided, for providing authorization by the first Near Field Communication mode when receiving specified operational order Request;
The offer module 601 is also used to based on the additional identification information got from server, closely by second Communication modes provide the additional identification information;
Operation module 602, for being referred to based on the authorized certificate when getting authorized certificate from the server Fixed operation.
In a kind of possible implementation, which is used for when receiving specified operational order, by described the The end message of two terminals is sent to server;The authorization requests are obtained from the server, and pass through first low coverage The authorization requests are provided from communication modes.
Fig. 7 is a kind of structural schematic diagram of authorization device provided in an embodiment of the present invention.The device is applied to service Device, the device include:
Sending module 701, for the request based on second terminal, Xiang Suoshu second terminal sends authorization requests, described to award Power request is provided as the first Near Field Communication mode;
Receiving module 702, for receiving the end message of first terminal;
Module 703 is obtained, for obtaining additional identification information in the end message for receiving first terminal;
The sending module 701 is also used to send the additional identification information to the second terminal;
The receiving module 702 is also used to receive the information to be verified of first terminal transmission;
The sending module 701 is also used to when receiving the information to be verified that the first terminal is sent, and described to be tested When demonstrate,proving information and the additional identification information matches, the license confirmation page is sent to the first terminal;
The sending module 701 is also used to when receiving the confirmation message of first terminal, and the transmission of Xiang Suoshu second terminal is awarded Weigh voucher.
In a kind of possible mode, the module 703 that obtains is used to have authorization when the request for determining the second terminal When risk, the additional identification information is obtained.
It should be understood that authorization device provided by the above embodiment is in authorization, only with above-mentioned each function The division progress of module can according to need and for example, in practical application by above-mentioned function distribution by different function moulds Block is completed, i.e., the internal structure of equipment is divided into different functional modules, to complete all or part of function described above Energy.In addition, authorization device provided by the above embodiment and authorization embodiment of the method belong to same design, it is specific real Existing process is detailed in embodiment of the method, and which is not described herein again.
A kind of terminal is present embodiments provided, which can be used for executing the operation provided in above-mentioned each embodiment and award Power method.Referring to Fig. 8, which includes:
Terminal 800 may include RF (Radio Frequency, radio frequency) circuit 110, include one or more meter The memory 120 of calculation machine readable storage medium storing program for executing, input unit 130, display unit 140, sensor 150, voicefrequency circuit 160, WiFi (Wireless Fidelity, Wireless Fidelity) module 170, the processing for including one or more than one processing core The components such as device 180 and power supply 190.It will be understood by those skilled in the art that terminal structure shown in Fig. 8 is not constituted pair The restriction of terminal may include perhaps combining certain components or different component cloth than illustrating more or fewer components It sets.Wherein:
RF circuit 110 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station After downlink information receives, one or the processing of more than one processor 180 are transferred to;In addition, the data for being related to uplink are sent to Base station.In general, RF circuit 110 includes but is not limited to antenna, at least one amplifier, tuner, one or more oscillators, uses Family identity module (SIM) card, transceiver, coupler, LNA (Low Noise Amplifier, low-noise amplifier), duplex Device etc..In addition, RF circuit 110 can also be communicated with network and other equipment by wireless communication.The wireless communication can make With any communication standard or agreement, and including but not limited to GSM (Global System of Mobile communication, entirely Ball mobile communcations system), GPRS (General Packet Radio Service, general packet radio service), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access), LTE (Long Term Evolution, long term evolution), Email, SMS (Short MessagingService, short message service) etc..
Memory 120 can be used for storing software program and module, and processor 180 is stored in memory 120 by operation Software program and module, thereby executing various function application and data processing.Memory 120 can mainly include storage journey Sequence area and storage data area, wherein storing program area can the (ratio of application program needed for storage program area, at least one function Such as sound-playing function, image player function) etc.;Storage data area, which can be stored, uses created number according to terminal 800 According to (such as audio data, phone directory etc.) etc..In addition, memory 120 may include high-speed random access memory, can also wrap Include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts. Correspondingly, memory 120 can also include Memory Controller, to provide processor 180 and input unit 130 to memory 120 access.
Input unit 130 can be used for receiving the number or character information of input, and generate and user setting and function Control related keyboard, mouse, operating stick, optics or trackball signal input.Specifically, input unit 130 may include touching Sensitive surfaces 131 and other input equipments 132.Touch sensitive surface 131, also referred to as touch display screen or Trackpad are collected and are used Family on it or nearby touch operation (such as user using any suitable object or attachment such as finger, stylus in touch-sensitive table Operation on face 131 or near touch sensitive surface 131), and corresponding attachment device is driven according to preset formula.It is optional , touch sensitive surface 131 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detection is used The touch orientation at family, and touch operation bring signal is detected, transmit a signal to touch controller;Touch controller is from touch Touch information is received in detection device, and is converted into contact coordinate, then gives processor 180, and can receive processor 180 The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves Realize touch sensitive surface 131.In addition to touch sensitive surface 131, input unit 130 can also include other input equipments 132.Specifically, Other input equipments 132 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), One of trace ball, mouse, operating stick etc. are a variety of.
Display unit 140 can be used for showing information input by user or the information and terminal 800 that are supplied to user Various graphical user interface, these graphical user interface can be made of figure, text, icon, video and any combination thereof. Display unit 140 may include display panel 141, optionally, can use LCD (Liquid Crystal Display, liquid crystal Show device), the forms such as OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) configure display panel 141.Further, touch sensitive surface 131 can cover display panel 141, when touch sensitive surface 131 detects touching on it or nearby After touching operation, processor 180 is sent to determine the type of touch event, is followed by subsequent processing device 180 according to the type of touch event Corresponding visual output is provided on display panel 141.Although in fig. 8, touch sensitive surface 131 and display panel 141 are conducts Two independent components realize input and input function, but in some embodiments it is possible to by touch sensitive surface 131 and display Panel 141 is integrated and realizes and outputs and inputs function.
Terminal 800 may also include at least one sensor 150, such as optical sensor, motion sensor and other sensings Device.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 141, and proximity sensor can close display when terminal 800 is moved in one's ear Panel 141 and/or backlight.As a kind of motion sensor, gravity accelerometer can detect in all directions (generally Three axis) acceleration size, can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Extremely In other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared sensors that terminal 800 can also configure, herein It repeats no more.
Voicefrequency circuit 160, loudspeaker 161, microphone 162 can provide the audio interface between user and terminal 800.Audio Electric signal after the audio data received conversion can be transferred to loudspeaker 161, be converted to sound by loudspeaker 161 by circuit 160 Sound signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 162, after being received by voicefrequency circuit 160 Audio data is converted to, then by after the processing of audio data output processor 180, such as another end is sent to through RF circuit 110 End, or audio data is exported to memory 120 to be further processed.Voicefrequency circuit 160 is also possible that earphone jack, To provide the communication of peripheral hardware earphone Yu terminal 800.
WiFi belongs to short range wireless transmission technology, and terminal 800 can help user's transceiver electronics by WiFi module 170 Mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 8 is shown WiFi module 170, but it is understood that, and it is not belonging to must be configured into for terminal 800, it can according to need completely Do not change in the range of the essence of invention and omits.
Processor 180 is the control centre of terminal 800, utilizes each portion of various interfaces and connection whole mobile phone Point, by running or execute the software program and/or module that are stored in memory 120, and calls and be stored in memory 120 Interior data execute the various functions and processing data of terminal 800, to carry out integral monitoring to mobile phone.Optionally, processor 180 may include one or more processing cores;Preferably, processor 180 can integrate application processor and modem processor, Wherein, the main processing operation system of application processor, user interface and application program etc., modem processor mainly handles nothing Line communication.It is understood that above-mentioned modem processor can not also be integrated into processor 180.
Terminal 800 further includes the power supply 190 (such as battery) powered to all parts, it is preferred that power supply can pass through electricity Management system and processor 180 are logically contiguous, to realize management charging, electric discharge and power consumption by power-supply management system The functions such as management.Power supply 190 can also include one or more direct current or AC power source, recharging system, power supply event Hinder the random components such as detection circuit, power adapter or inverter, power supply status indicator.
Although being not shown, terminal 800 can also include camera, bluetooth module etc., and details are not described herein.Specifically in this reality It applies in example, the display unit of terminal is touch-screen display, and terminal further includes having memory, and the memory is for storing computer Program, and be configured the program for being executed by a processor and being stored on memory, with realize in above-described embodiment first terminal or The method and step of second terminal.
Fig. 9 is a kind of block diagram of server 900 shown according to an exemplary embodiment.Referring to Fig. 9, server 900 is wrapped Processor 922, and the memory resource as representated by memory 932 are included, it can be by the execution of processing component 922 for storing Instruction, such as computer program is in addition, processor 922 is configured as executing the program stored on the memory, on executing State the method and step of server side in authorization method.
Server 900 can also include that a power supply module 926 be configured as the power management of execute server 900, and one A wired or wireless network interface 950 is configured as server 900 being connected to network and input and output (I/O) interface 958.Server 900 can be operated based on the operating system for being stored in memory 932, such as Windows ServerTM, Mac OS XTM, UnixTM,LinuxTM, FreeBSDTMOr it is similar.
The embodiment of the invention also provides a kind of computer readable storage medium, computer is stored in the storage medium Program, the computer program realize the authorization of above-mentioned first terminal or second terminal or server when being executed by processor The step of method.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (15)

1. a kind of authorization method, which is characterized in that be applied to first terminal, which comprises
The authorization requests that second terminal offer is provided by the first Near Field Communication mode, by the end message of the first terminal It is sent to server;
Based on the secondary checking request obtained from the server, the second terminal is obtained by the second Near Field Communication mode The additional identification information is sent to the server by the additional identification information of offer;
Show the license confirmation page that obtains from the server, and be based on the license confirmation page to the second terminal into Row authorization;
Wherein, the first Near Field Communication mode and the second Near Field Communication mode are same way or different modes.
2. the method according to claim 1, wherein the first Near Field Communication mode and second low coverage It is one of graphic code scanning, sound wave or near-field communication NFC or a variety of combinations from communication modes.
3. the method according to claim 1, wherein the method also includes: sending the first terminal When end message, the authorization message of the first terminal is sent to the server.
4. the method according to claim 1, wherein described whole to described second based on the license confirmation page End carries out authorization
When receiving the license confirmation instruction to the license confirmation page, the authorization message of the first terminal is sent to The server.
5. the method according to claim 1, wherein the additional identification information includes: user's head portrait image, uses One or more combination in the family pet name and random character.
6. the method according to claim 1, wherein the specified operation is register.
7. a kind of authorization method, which is characterized in that be applied to second terminal, which comprises
When receiving specified operational order, authorization requests are provided by the first Near Field Communication mode;
Based on the additional identification information got from server, the additional identification is provided by the second Near Field Communication mode and is believed Breath;
When getting authorized certificate from the server, specified operation is carried out based on the authorized certificate.
8. passing through first the method according to the description of claim 7 is characterized in that described when receiving specified operational order Near Field Communication mode provides authorization requests
When receiving specified operational order, the end message of the second terminal is sent to server;
The authorization requests are obtained from the server, and provides the authorization by the first Near Field Communication mode and asks It asks.
9. a kind of authorization method, which is characterized in that be applied to server, which comprises
Request based on second terminal, Xiang Suoshu second terminal send authorization requests, and it is close that the authorization requests are provided as first Distance communication mode;
In the end message for receiving first terminal, additional identification information is obtained;
The additional identification information is sent to the second terminal;
When receiving the information to be verified that the first terminal is sent, and the information to be verified and the additional identification information When matching, the license confirmation page is sent to the first terminal;
When receiving the confirmation message of first terminal, Xiang Suoshu second terminal sends authorized certificate.
10. according to the method described in claim 9, obtaining it is characterized in that, described in the end message for receiving first terminal The additional identification information is taken to include:
When the request for determining the second terminal has authorization risk, the additional identification information is obtained.
11. a kind of authorization device, which is characterized in that be applied to first terminal, described device includes:
Module is obtained, for obtaining the authorization requests of second terminal offer by the first Near Field Communication mode;
Sending module, for the end message of the first terminal to be sent to server;
The acquisition module is also used to pass through the second Near Field Communication side based on the secondary checking request obtained from the server Formula obtains the additional identification information that the second terminal provides;
The sending module is also used to the additional identification information being sent to the server;
Display module, for showing the license confirmation page obtained from the server;
Authorization module, for being authorized based on the license confirmation page to the second terminal;
Wherein, the first Near Field Communication mode and the second Near Field Communication mode are same way or different modes.
12. a kind of authorization device, which is characterized in that be applied to second terminal, described device includes:
Module is provided, for providing authorization requests by the first Near Field Communication mode when receiving specified operational order;
The offer module is also used to pass through the second Near Field Communication mode based on the additional identification information got from server The additional identification information is provided;
Operation module, for carrying out specified operation based on the authorized certificate when getting authorized certificate from the server.
13. a kind of authorization device, which is characterized in that described device is applied to server, and described device includes:
Sending module, for the request based on second terminal, Xiang Suoshu second terminal sends authorization requests, the authorization requests quilt It is provided as the first Near Field Communication mode;
Receiving module, for receiving the end message of first terminal;
Module is obtained, for obtaining additional identification information in the end message for receiving first terminal;
The sending module is also used to send the additional identification information to the second terminal;
The receiving module is also used to receive the information to be verified of first terminal transmission;
The sending module is also used to when receiving the information to be verified that the first terminal is sent, and the information to be verified When with the additional identification information matches, the license confirmation page is sent to the first terminal;
The sending module is also used to when receiving the confirmation message of first terminal, Xiang Suoshu second terminal send authorization with Card.
14. a kind of terminal, which is characterized in that including processor and memory, wherein the memory, for storing computer Program;The processor realizes that claim 1 is any described to claim 8 for executing the program stored on memory Method and step.
15. a kind of server, which is characterized in that including processor and memory, wherein the memory is calculated for storing Machine program;The processor realizes that claim 9 is any to claim 10 for executing the program stored on memory The method and step.
CN201710920117.5A 2017-09-30 2017-09-30 Operation authorization method, device, terminal and server Active CN109600340B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710920117.5A CN109600340B (en) 2017-09-30 2017-09-30 Operation authorization method, device, terminal and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710920117.5A CN109600340B (en) 2017-09-30 2017-09-30 Operation authorization method, device, terminal and server

Publications (2)

Publication Number Publication Date
CN109600340A true CN109600340A (en) 2019-04-09
CN109600340B CN109600340B (en) 2021-04-16

Family

ID=65956555

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710920117.5A Active CN109600340B (en) 2017-09-30 2017-09-30 Operation authorization method, device, terminal and server

Country Status (1)

Country Link
CN (1) CN109600340B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113407161A (en) * 2021-06-04 2021-09-17 中船重工奥蓝托无锡软件技术有限公司 Complex equipment-oriented collaborative research and development management system
CN113938283A (en) * 2021-10-14 2022-01-14 南京大全电气研究院有限公司 Code scanning login method, system, device, electronic equipment and storage medium
CN115102771A (en) * 2022-06-25 2022-09-23 平安银行股份有限公司 Data processing method, terminal device, system, device and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571803A (en) * 2012-01-19 2012-07-11 时代亿宝(北京)科技有限公司 Method and system for protecting account, preventing order from being tampered and preventing fishing attack based on graphical two-dimensional code
CN103685311A (en) * 2013-12-27 2014-03-26 网易(杭州)网络有限公司 Log-in validation method and device
CN104378344A (en) * 2014-05-26 2015-02-25 腾讯科技(深圳)有限公司 Log-in information transmission method, code scanning method and device and background server
CN104869127A (en) * 2015-06-24 2015-08-26 郑州悉知信息技术有限公司 Website login method, code-scanning client and server
CN105306202A (en) * 2014-06-24 2016-02-03 腾讯科技(深圳)有限公司 Identity verification method and device, server
CN106209763A (en) * 2016-05-27 2016-12-07 北京畅游天下网络技术有限公司 A kind of login method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571803A (en) * 2012-01-19 2012-07-11 时代亿宝(北京)科技有限公司 Method and system for protecting account, preventing order from being tampered and preventing fishing attack based on graphical two-dimensional code
CN103685311A (en) * 2013-12-27 2014-03-26 网易(杭州)网络有限公司 Log-in validation method and device
CN104378344A (en) * 2014-05-26 2015-02-25 腾讯科技(深圳)有限公司 Log-in information transmission method, code scanning method and device and background server
CN105306202A (en) * 2014-06-24 2016-02-03 腾讯科技(深圳)有限公司 Identity verification method and device, server
CN104869127A (en) * 2015-06-24 2015-08-26 郑州悉知信息技术有限公司 Website login method, code-scanning client and server
CN106209763A (en) * 2016-05-27 2016-12-07 北京畅游天下网络技术有限公司 A kind of login method and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113407161A (en) * 2021-06-04 2021-09-17 中船重工奥蓝托无锡软件技术有限公司 Complex equipment-oriented collaborative research and development management system
CN113407161B (en) * 2021-06-04 2023-12-22 中船奥蓝托无锡软件技术有限公司 Collaborative research and development management system for complex equipment
CN113938283A (en) * 2021-10-14 2022-01-14 南京大全电气研究院有限公司 Code scanning login method, system, device, electronic equipment and storage medium
CN113938283B (en) * 2021-10-14 2023-12-12 南京大全电气研究院有限公司 Code scanning login method, system, device, electronic equipment and storage medium
CN115102771A (en) * 2022-06-25 2022-09-23 平安银行股份有限公司 Data processing method, terminal device, system, device and storage medium
CN115102771B (en) * 2022-06-25 2023-08-22 平安银行股份有限公司 Data processing method, terminal device, system, device and storage medium

Also Published As

Publication number Publication date
CN109600340B (en) 2021-04-16

Similar Documents

Publication Publication Date Title
CN103634109B (en) Operation right authentication method and device
US9703971B2 (en) Sensitive operation verification method, terminal device, server, and verification system
WO2017118412A1 (en) Method, apparatus and system for updating key
CN104796385B (en) Terminal binding method, apparatus and system
CN103634294B (en) Information verifying method and device
CN104836664B (en) A kind of methods, devices and systems executing business processing
CN104518875B (en) A kind of method that authentication and account obtain, mobile terminal
WO2017041599A1 (en) Service processing method and electronic device
CN104376353B (en) The generation of Quick Response Code, read method, terminal and server
CN104468463B (en) Verification method, device and system
CN110198301B (en) Service data acquisition method, device and equipment
WO2016082194A1 (en) Message processing method and apparatus
CN104735657B (en) Security terminal verification method, wireless access point binding method, apparatus and system
CN108234124B (en) Identity verification method, device and system
CN111478849B (en) Service access method, device and storage medium
CN104539571B (en) Information interacting method, identification authentication method, server and terminal
CN104573437B (en) Information authentication method, device and terminal
CN109039989B (en) Address resolution protocol spoofing detection method, host and computer-readable storage medium
CN107786569A (en) A kind of identifying code sending method, method of reseptance and relevant device
CN109600340A (en) Authorization method, apparatus, terminal and server
CN104899488B (en) Numeric value transfer and device
CN110418311A (en) A kind of interconnected method based on multiple terminals, device and terminal
CN111209031A (en) Data acquisition method and device, terminal equipment and storage medium
CN105721282B (en) Message display method and device
CN104426848B (en) The method and system of log-on webpage application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant