CN109933974A - Cryptographic initialization method, apparatus, computer equipment and storage medium - Google Patents

Cryptographic initialization method, apparatus, computer equipment and storage medium Download PDF

Info

Publication number
CN109933974A
CN109933974A CN201910115057.9A CN201910115057A CN109933974A CN 109933974 A CN109933974 A CN 109933974A CN 201910115057 A CN201910115057 A CN 201910115057A CN 109933974 A CN109933974 A CN 109933974A
Authority
CN
China
Prior art keywords
identity
information
cryptographic initialization
mobile terminal
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910115057.9A
Other languages
Chinese (zh)
Other versions
CN109933974B (en
Inventor
张朵
黄晓宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910115057.9A priority Critical patent/CN109933974B/en
Publication of CN109933974A publication Critical patent/CN109933974A/en
Application granted granted Critical
Publication of CN109933974B publication Critical patent/CN109933974B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of cryptographic initialization method, apparatus, computer equipment and storage mediums, which comprises receives the cryptographic initialization request that mobile terminal is sent, wherein cryptographic initialization request includes identity type and identity;Daily record data table corresponding with identity is obtained, and judges whether the behavioural information of identity is normal according to daily record data table;If the behavioural information of identity is normal, the corresponding verification condition of identity type is obtained, and send mobile terminal for verification condition;Receive the authentication information that mobile terminal is sent according to verification condition;Authentication information is authenticated, authentication result is obtained;If authentication result is to authenticate successfully, the corresponding initial password of identity is obtained.Above-mentioned kind of cryptographic initialization method improves the efficiency and safety of cryptographic initialization.

Description

Cryptographic initialization method, apparatus, computer equipment and storage medium
Technical field
The present invention relates to art of cryptography more particularly to a kind of cryptographic initialization method, apparatus, computer equipment and deposit Storage media.
Background technique
With the fast development of network technology, internet has entered into the work and life of more and more people.People exist During daily use network, such as office computer booting, mailbox certification or intra-company's platform, it usually needs carry out identity Certification may require that employee is every generally for the safety for improving internal platform especially for the login etc. of intra-company's platform A password is updated every a period of time, this will lead to usually have employee because of office account number cipher problem (such as lock, forget) It dallies over one's work, also, when account locks, the case where employee can not open office computer, and under mobile office background, without The user's situation that forgets Password for often logging in the end PC happens occasionally, and influences the working efficiency of employee.
Traditionally, employee carries out cryptographic initialization, the method meeting of this artificial cryptographic initialization by dialing service calls The insecurity for increasing worker's information, influences the efficiency of cryptographic initialization.
Summary of the invention
The embodiment of the present invention provides a kind of cryptographic initialization method, apparatus, computer equipment and storage medium, to solve people The problem that the method for work cryptographic initialization is inefficient and safety is not high.
A kind of cryptographic initialization method, comprising:
Receive the cryptographic initialization request that mobile terminal is sent, wherein cryptographic initialization request include identity type and Identity;
Daily record data table corresponding with the identity is obtained, and the identity mark is judged according to the daily record data table Whether the behavioural information of knowledge is normal;
If the behavioural information of the identity is normal, the corresponding verification condition of the identity type is obtained, and The mobile terminal is sent by the verification condition;
Receive the authentication information that the mobile terminal is sent according to the verification condition;
The authentication information is authenticated, authentication result is obtained;
If the authentication result is to authenticate successfully, the corresponding initial password of the identity is obtained.
A kind of cryptographic initialization device, comprising:
Cryptographic initialization request module, for receiving the cryptographic initialization request of mobile terminal transmission, wherein described close Code initialization requests include identity type and identity;
Behavioural information judgment module, for obtaining daily record data table corresponding with the identity, and according to the day Will tables of data judges whether the behavioural information of the identity is normal;
Verification condition obtains module, for when the behavioural information of the identity is normal, then obtaining the body The corresponding verification condition of part type, and the mobile terminal is sent by the verification condition;
Authentication information receiving module is believed for receiving the mobile terminal according to the authentication that the verification condition is sent Breath;
Authentication result obtains module, authenticates to the authentication information, obtains authentication result;
Initial password obtains module, for when the authentication result is to authenticate successfully, then obtaining the identity pair The initial password answered.
A kind of computer equipment, including memory, processor and storage are in the memory and can be in the processing The computer program run on device, the processor realize above-mentioned cryptographic initialization method when executing the computer program.
A kind of computer readable storage medium, the computer-readable recording medium storage have computer program, the meter Calculation machine program realizes above-mentioned cryptographic initialization method when being executed by processor.
In above-mentioned cryptographic initialization method, apparatus, computer equipment and storage medium, firstly, receiving what mobile terminal was sent Cryptographic initialization request, wherein cryptographic initialization request includes identity type and identity;Then, acquisition and identity Corresponding daily record data table, and judge whether the behavioural information of identity is normal according to daily record data table;If identity Behavioural information is normal, then obtains the corresponding verification condition of identity type, and send mobile terminal for verification condition;Receive mobile terminal The authentication information sent according to verification condition;Then, authentication information is authenticated, obtains authentication result;Finally, If authentication result is to authenticate successfully, the corresponding initial password of identity is obtained, which is self-service process, section Human-saving, and safety is more reliable, avoids the multiple interaction between leakage of personal information and client and user, simplifies The authentication process of mobile terminal, and then effectively improve the efficiency of cryptographic initialization.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is the application environment schematic diagram of cryptographic initialization method provided in an embodiment of the present invention;
Fig. 2 is one exemplary diagram of cryptographic initialization method provided in an embodiment of the present invention;
Fig. 3 is another exemplary diagram of cryptographic initialization method provided in an embodiment of the present invention;
Fig. 4 is another exemplary diagram of cryptographic initialization method provided in an embodiment of the present invention;
Fig. 5 is another exemplary diagram of cryptographic initialization method provided in an embodiment of the present invention;
Fig. 6 is another exemplary diagram of cryptographic initialization method provided in an embodiment of the present invention;
Fig. 7 is another exemplary diagram of cryptographic initialization method provided in an embodiment of the present invention;
Fig. 8 is a functional block diagram of cryptographic initialization device provided in an embodiment of the present invention;
Fig. 9 is a schematic diagram of computer equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
Cryptographic initialization method provided by the present application, can be applicable in the application environment such as Fig. 1, which includes moving Moved end and server-side.Wherein, mobile terminal is communicated by network with server-side.At the beginning of server-side receives the password that mobile terminal is sent Beginningization request, then obtains daily record data table corresponding with identity, and the row of identity is judged according to daily record data table It is whether normal for information, when the behavioural information of identity is normal, the corresponding verification condition of identity type is obtained, and will Verification condition is sent to mobile terminal, receives the authentication information that mobile terminal is sent according to verification condition;Then to authentication Information is authenticated, and authentication result is obtained;Finally when authentication result is to authenticate successfully, then it is corresponding initial to obtain identity Password.Wherein, mobile terminal can be, but not limited to be various personal computers, laptop, smart phone, tablet computer and just Take formula wearable device.Server-side can be with the server cluster of the either multiple server compositions of independent server come real It is existing.
In one embodiment, as shown in Fig. 2, being applied to be illustrated for the server-side in Fig. 1 in this way, including Following steps:
S10: receive mobile terminal send cryptographic initialization request, wherein cryptographic initialization request include identity type and Identity.
Wherein, cryptographic initialization request is the request that initialization process is carried out to user password that mobile terminal is initiated.This is close Code initialization requests include identity and identity type.Identity type refers to that is stored in client is used for the identity to user The typonym that authentication mode distinguishes.Optionally, identity type type may include administrator's type, customer type and interior Portion's employee's type etc..
Wherein, identity refers to the mark for distinguishing different user.In one embodiment, identity can be User's work number, user's work number are the identiflication numbers that a platform, application program or system are identity distribution, optionally, should User's work number can be made of at least one such as Chinese, number, letter or symbols.It should be noted that due to authentication It also include sensitive information (such as password) in journey, therefore, server-side is after the certification request for receiving mobile terminal transmission, according to every The corresponding each operation (such as identity information typing) of one identity increases log recording, forms each identity corresponding day Will tables of data improves the safety of authentication information, and data are further processed according to daily record data table so as to subsequent, improves Safety and accuracy to authentication information operation.
Specifically, user inputs corresponding instruction or information by mobile terminal to trigger cryptographic initialization request.It is mobile Cryptographic initialization request is sent to server-side by end, and server-side gets cryptographic initialization request.Or from transmission configuration The transmission port for establishing transmission connection with server-side is extracted in file;Transmission port is monitored, the monitoring of transmission port is passed through Transmission connection is established with mobile terminal;It is connected by the transmission of foundation to server-side and sends cryptographic initialization request.
S20: obtaining daily record data table corresponding with identity, and the behavior of identity is judged according to daily record data table Whether information is normal.
Wherein, daily record data table refers to the number of record user behavior information (such as password modification or account number log in behavior) According to the table of formation.The corresponding daily record data table of each identity, identity-based mark, in pre-recorded daily record data table In set, daily record data table corresponding with identity can be inquired, which reflects the behavior of identity Information such as replaces the time interval of password, last time carries out the time of authentication, carries out the location information of authentication every time Deng.Specifically, the behavioural information in daily record data table is compared server-side with preset specification information, if identity Behavioural information is consistent with preset specification information, it is determined that the behavioural information of identity is normal, otherwise determines identity Behavioural information is abnormal.Illustratively, an enterprise platform is in order to improve the safety that worker authenticates, by its preset specification Information setting are as follows: it updates within 3 months a password and the number of password modification is not more than 3 times in one day, if daily record data table With the behavioural information of identity are as follows: continuous 4 months not more new passwords, it is determined that the behavioural information of the identity is abnormal; If the behavioural information with identity of daily record data table are as follows: 3 password modifications have been carried out in the same day, it is determined that the identity mark The behavioural information of knowledge is abnormal;If the behavioural information with identity of daily record data table are as follows: the more new password in 3 months, then Determine that the behavioural information of the identity is normal.
S30: if the behavioural information of identity is normal, the corresponding verification condition of identity type is obtained, and item will be verified Part is sent to mobile terminal.
Wherein, verification condition refers to the necessary condition that user identity is verified, and as account number must be consistent with password, or tests It is consistent etc. to demonstrate,prove code, for guaranteeing the condition of subscriber identity information correctness setting.Verification condition in this step refers to and identity The corresponding condition of type, i.e. identity type have several classes, then verification condition also has several classes.In a specific embodiment, different Identity type and different verification conditions are corresponding, i.e., the verification condition of corresponding types can be quickly found according to identity type.Example Such as: record has this 4 kinds of identity types of interior employee, outsourcing employee, temporary workers and foreign employee in server-side, interior employee this The corresponding verification condition of one identity type is the information one stored in employee's account number, name, type of credential and server database It causes, and outsourcing, management account, casual user this corresponding verification condition of 3 kinds of identity types are as follows: employee's account number, name, cell-phone number Code is consistent with the information stored in server database, and needs identifying code also consistent.Specifically, server-side obtains identity class After type, that is, it can extract verification condition corresponding with identity type, movement sent by the network transmission protocol by the verification condition End.Wherein, the network transmission protocol includes but is not limited to: Internet Control Message agreement (Internet Control Message Protocol, ICMP), address resolution protocol (ARP Address Resolution Protocol, ARP) and file transmission association Discuss (File Transfer Protocol, FTP) etc..
S40: the authentication information that mobile terminal is sent according to verification condition is received.
Wherein, authentication information refers to the information relevant to authentication that user fills in, such as account number, password and verifying Code etc..For example, entrance provides an input dialogue frame in the page by mobile terminal, when user fills in the input dialogue frame When authentication information, mobile terminal will be correspondingly made available authentication information according to filling in for user.Wherein, it fills in as user The operation triggered to submit authentication information in the entrance.
Specifically, when receiving the verification condition of server-side transmission, mobile terminal shows the verification condition, thus User can carry out authentication information according to the verification condition of display and fill in, and server-side gets the body of mobile terminal transmission in turn Part authentication information.After showing verification condition on the Verify Your Identity page of server-side, user is i.e. on this page according to verifying Condition fills in (input) oneself authentication information.In a specific embodiment, user clicks login page and chooses identity Type is interior employee, and the verification condition for receiving server-side transmission is employee's account number, name, type of credential and service end data The information stored in library is consistent, and then fills in employee's account, name and card in the corresponding control in identity page face (such as text box) Part type etc..
S50: authenticating authentication information, obtains authentication result.
Wherein, authentication refers in the pre-stored identity information database of server-side, according to authentication information Matched and searched is carried out, if there is the identity information being mutually matched with authentication information, then authentication success, conversely, such as The identity information being mutually matched with authentication information is not present in fruit, then authentication fails.Wherein authentication result refers to service Hold to authentication information carry out authentication as a result, as authenticated successfully or the authentication result of authentification failure.
It should be noted that after server-side authenticates authentication information, in order to guarantee response rate, no matter server-side Whether find the authentication information to match with authentication information, will all return to the authentication result of form of message to movement End, so as to subsequent raising authentication efficiency.Message therein refers to server-side by receiving the request of client and sending out to client Http response data, the data that the authentication result namely server-side of form of message are sent are sent, if authentication result is to authenticate successfully, The message is the data that confirms user and can log in, such as startup password, if authentication result is authentification failure, which is The reason of to prompt user authentication failure, such as account number are locked.
S60: if authentication result is to authenticate successfully, the corresponding initial password of identity is obtained.
Wherein, initial password refers to after authentication passes through, the login password of client corresponding with identity, into One step, the initial password be randomly assigned by server-side namely initial password be random code, for promoting safety Property.Client therein refers to the client managed by server-side corresponding with identity, can pass through the initial password pair It is managed by the client of service end pipe control, such as booting, monitoring or audit operation.Specifically, when the certification of server-side As a result for when authenticating successfully, after authenticating successful message, server-side obtains the corresponding initial password of identity.Further, After the mobile-terminated certification for receiving server-side transmission successful message, extracted from the successful message of the certification initial close Code.Authentication can be directly carried out by initial password, the intelligent identity identification to user in mobile terminal is realized, is conducive to Improve the working efficiency of user.Meanwhile the cryptographic initialization is self-service process, saves manpower, and safety is more reliable, avoids Multiple interaction between leakage of personal information and client and user, simplifies the authentication process of mobile terminal, in turn Effectively improve the efficiency of cryptographic initialization.
In the present embodiment, firstly, receiving the cryptographic initialization request that mobile terminal is sent, wherein cryptographic initialization request packet Include identity type and identity;Then, daily record data table corresponding with identity is obtained, and is judged according to daily record data table Whether the behavioural information of identity is normal;If the behavioural information of identity is normal, the corresponding verifying of identity type is obtained Condition, and mobile terminal is sent by verification condition;Receive the authentication information that mobile terminal is sent according to verification condition;Then, Authentication information is authenticated, authentication result is obtained;Finally, obtaining identity if authentication result is to authenticate successfully Corresponding initial password, the cryptographic initialization are self-service processes, save manpower, and safety is more reliable, avoids personal letter Breath leakage and the multiple interaction between client and user, simplify the authentication process of mobile terminal, and then effectively mention The high efficiency of cryptographic initialization.
In one embodiment, as shown in figure 3, after step S20, i.e., identity is being judged according to daily record data table After whether behavioural information is normal, the cryptographic initialization method further include:
S81: it if the behavioural information of identity is abnormal, obtains cryptographic initialization and requests corresponding location information, sentence Whether disconnected location information has reasonability.
Wherein, location information refers to locating address information of the user when cryptographic initialization request is initiated in mobile terminal, packet Include but be not limited to the IP address etc. of geographical location or mobile terminal.Specifically, when corresponding position letter is requested in cryptographic initialization When ceasing within a preset range, then confirm that the location information has reasonability, otherwise, confirms that the location information does not have reasonability.
S82: if location information has reasonability, the corresponding user of identity is carried out by the way of pattern-recognition Certification.
Wherein, the mode of pattern-recognition refer to exactly by computer with mathematical technique method come the automatic place of research mode The mode of reason and interpretation, for carrying out secondary verification to behavioural information and then enhancing safety.Including but not limited to gesture identification, Iris recognition, recognition of face and fingerprint recognition etc..It is to be appreciated that it is by mobile terminal that the mode of pattern-recognition, which carries out certification, The identity characteristic of user is acquired, and collection result is sent to server-side, server-side receives the identity characteristic, and with it is pre- If each identity characteristic information stored in database compares verifying, determine whether user identity feature is legal.Pass through this Kind method, may be implemented the re-authentication to the corresponding user of identity, promotes the security performance of verification process, save simultaneously Authentication operation.
S83: it if the certification of pattern-recognition passes through, returns to execution and obtains the corresponding verification condition of identity type, and will test The step of card condition is sent to mobile terminal.
Specifically, when the corresponding user of identity is carried out by the way of pattern-recognition when certification passes through namely password The corresponding location information of initialization requests has reasonability, and therefore the certification by way of pattern-recognition continues The operation of step S30, namely return to execute and obtain the corresponding verification condition of identity type, and send mobile terminal for verification condition The step of.It ensures the response of the request to authentication, reduces period of reservation of number (such as 3 seconds), and sufficiently ensure The safety of user password initialization.
In the present embodiment, when the behavioural information of identity is abnormal, then obtains cryptographic initialization and request corresponding position Confidence breath, judges whether location information has reasonability;When location information has reasonability, then to the corresponding use of identity Family is authenticated by the way of pattern-recognition, and the re-authentication to the corresponding user of identity may be implemented, and promotes certification The security performance of process, while saving authentication operation;If the certification of pattern-recognition passes through, returns to execution and obtain identity type Corresponding verification condition, and the step of sending mobile terminal for verification condition, it is ensured that the response to the request of authentication, and And the safety of user password initialization is sufficiently ensured.
In one embodiment, after step S60, after obtaining the corresponding initial password of identity, password is initial Change method further include:
It is encrypted using preset key pair initial password, obtains service password, service password is sent to mobile terminal, Key is sent to corresponding target audit end.
Wherein, preset key refers to the preset parameter for being encrypted to sensitive information, is one kind to original There are data to be modified to the parameter of assuring data security, key acquisition modes therein include but is not limited to algorithm for encryption, The modes such as digital certificate encryption, digital signature encryption, can according to practical application scene to security requirement it is different neatly Setting, is not limited thereto.For example, server-side, which can use data summarization algorithm, calculates initial password initial data abstract, and Base64 code conversion is carried out, the data summarization namely key of initial password are formed.It is encrypted using key provided by server-side Initial data summarization generates the digital signature of initial password, and the encryption of initial password is completed with this.Server-side is to initial password It is encrypted, guarantees the safety of password, avoid authentication information by the attack from internet, while ensure that just The transmission security of beginning password.
Wherein, service password refers to the initial password after having carried out encryption, can be startup password, is also possible to cloud Desktop password, specifically with no restriction.
Wherein, audit end is for secondary audit in turn to be decrypted to service password, and audit end passes through network and service End is communicated.Audit end can be, but not limited to be various personal computers, laptop, smart phone, tablet computer and Portable wearable device.Target audit end is the association end of mobile terminal, for example, it may be the client being closer with mobile terminal End perhaps has permission the client audited to mobile terminal and facilitates the personnel of target audit end or mobile terminal that can quickly pacify Password after obtaining decryption entirely.Specifically, service password is sent to mobile terminal, sends audit end for key, audits end It is sent to mobile terminal after mobile terminal progress identity validation, then by key, mobile terminal receives the key, and uses default script With the key, service password is decrypted.Optionally, audit end, which can be the identity validation of mobile terminal, passes through password authentification Or the mode to confirm password, it is also possible to audit end and video link is first established in mobile terminal, audits end again by establishing video Video image after connection to carry out identity validation to mobile terminal, passes through the body to the corresponding user in mobile terminal in video image Part is confirmed.Alternatively, matching an audit end being closer for mobile terminal, audit end is facilitated to carry out mobile terminal face-to-face Audit, better ensure that safety.Further, identity is also sent to audit end by server-side, facilitates audit end true Surely corresponding mobile terminal is arrived.Mobile terminal receives the key that audit end is sent, then root after the identity validation by audit end It is decrypted according to the key pair service password, the initial password after being decrypted.It is obtained after being decrypted by key initial close Code, realizes intelligent identity identification, ensure that the safety of cryptographic initialization.
In the present embodiment, is encrypted using preset key pair initial password, obtain service password, service password is sent out It send to mobile terminal, key is sent to corresponding target and audits end, realizes cryptographic initialization, which is self-service mistake Journey simplifies the cryptographic initialization of mobile terminal, and by the multiple interaction between mobile terminal, avoids personal information and let out Dew, so that safety is higher, and then effectively improves cryptographic initialization efficiency and safety.
In one embodiment, as shown in figure 4, in step S70, key is sent to corresponding target and audits end, it is specific to wrap Include following steps:
S71: it obtains cryptographic initialization and requests corresponding location information, target area is determined according to location information.
Wherein, target area refers to the region for needing to carry out password where the audit end of initialization process.Specifically, base Corresponding location information is requested in cryptographic initialization, it will be where the location information that preset range met with location information regional scope Region is as target area.The preset range can be preset according to actual needs.For example, cryptographic initialization is requested Corresponding location information is the center of circle, is determined as target area by the region of radius of pre-determined distance.Specifically, which can With the positioning tool (for example, GPS) by mobile terminal come automatically obtain or mobile terminal send cryptographic initialization request when master The current position of dynamic input is as location information.Further, the current position that mobile terminal is actively entered includes floor, room Number or the details such as office.
S72: the corresponding location information in each default audit end in target area is obtained.
It specifically, in the target area, include multiple default audit ends, each corresponding location information in default audit end.
Optionally, it presets audit end to be pre-existing in the preset database with corresponding location information, passes through step S71 Determining target area obtains the location information at each default audit end for including in the target area.
Optionally, it to determine the current location information in audit end, and can also be obtained by obtaining each IP address for auditing end Current location information is taken to be in each audit end in target area.It specifically, can be corresponding with pre-recorded each IP address Substantive location information.For example, the IP address for getting an audit end is 219.134.237.237, inquired according to third party IP Interface or pre-set IP address correspond to table and inquire, and the corresponding physical address of the IP address is Eight Diagrams ridge Futian District Eight Diagrams Ridge belongs to target area range, thus, the location information at the corresponding audit end the IP is obtained, as one in target area It is default to audit the corresponding location information in end.
S73: calculate between the corresponding location information in each default audit end location information corresponding with identity away from From.
Wherein, distance is to reflect the index of the distance of two location informations.Specifically, first by the corresponding movement of identity The location information at end is converted to reference coordinate information (such as origin (0,0)), then respectively by the corresponding position in each default audit end Confidence manner of breathing location information corresponding for identity is converted into relative co-ordinate information, each pre- if any N number of default audit end If the relative co-ordinate information for auditing end is respectively (x1,y1)、(x2,y2)…(xn,yn).Then, each default audit is directly calculated Hold the distance value of the relative co-ordinate information of corresponding location informationN number of distance Value is the distance between the location information of the corresponding location information in each default audit end mobile terminal corresponding with identity.
S74: the corresponding default audit end of preset threshold distance will be less than or equal in as target and audits end.
Wherein, preset threshold distance refers to preset for choosing the default audit end being closer with server-side Apart from critical value.For example, if preset threshold distance is 500 meters (m), when the corresponding location information in default audit end and identity Identifying the distance between corresponding location information is 300m, then end is audited as target in the default audit end.It should be noted that When there are multiple default audit ends corresponding less than or equal to preset threshold distance, it is default that any one can be randomly selected End is audited as target and audits end, can also will audit end as target apart from the smallest corresponding default audit end.
S75: key is sent to target audit end.
Specifically, key is sent to target audit end, it can be fast to audit end with the closer target of server-side distance Speed is decrypted according to key, to improve the efficiency of cryptographic initialization.
In the present embodiment, firstly, obtaining cryptographic initialization requests corresponding location information, target is determined according to location information Region;Then, the corresponding location information in each default audit end in target area is obtained;Then, each default audit is calculated Hold the distance between corresponding location information location information corresponding with identity;Next, will be less than or wait in End is audited as target in the corresponding default audit end of preset threshold distance;Finally, key is sent to target audit end, with Just it quick obtaining key and can be decrypted according to key with the target audit closer mobile terminal of end distance, to improve close The efficiency of code initialization.
In one embodiment, as shown in figure 5, in step S70, by key be sent to target audit end, specifically include as Lower step:
S71 ': it obtains cryptographic initialization and requests corresponding location information, target area, target area are determined according to location information Domain includes interior zone and perimeter.In a specific embodiment, target area includes interior zone and perimeter. Wherein, interior zone, which is represented, requests the corresponding closer region of location information, specific regional scope from cryptographic initialization It can be set according to actual needs.And perimeter represents the farther region in relative interior region.Illustratively, if Target area is a circle, then interior zone can be requests corresponding location information as the center of circle using cryptographic initialization, with the One pre-determined distance is a round region of radius, and perimeter is then one and requests corresponding position letter with cryptographic initialization Breath is the center of circle, and an annulus of interior zone is subtracted using the second pre-determined distance bigger than the first pre-determined distance as the circle of radius Domain.
S72 ': the corresponding location information in each default audit end in target area is obtained.
Specifically, each default method for auditing the corresponding location information in end obtained in target area in the present embodiment Consistent with the method in step S72, details are not described herein again.
S73 ': if default audit end in interior zone, obtains the corresponding detailed location information in default audit end.
Wherein, detailed location information is further more specific location information, it may for example comprise floor, office or room Between number equal details, detailed location information can be bound according to the IP address at each default audit end in advance. In this embodiment, it is mobile terminal active when sending cryptographic initialization request that corresponding location information is requested in cryptographic initialization Current position is inputted as location information, guarantees the accuracy of the location information of mobile terminal, preferably to audit end with default Detailed location information matched.In this way, the corresponding position in each default audit end can be calculated in more detail in step S73 Confidence ceases the distance between location information corresponding with identity, to better ensure that the accuracy of distance between the two.
S74 ': it calculates between the corresponding detailed location information in each default audit end location information corresponding with identity Distance.
Specifically, the coordinate points on vertical direction can be constructed according to specific floor information, in the basis of step S73 On calculate the corresponding location information in each default audit end position corresponding with identity by building space coordinates again The distance between information.
S75 ': the corresponding default audit end of preset threshold distance will be less than or equal in and will be audited as target End.
Specifically, each default method for auditing the corresponding location information in end obtained in target area in the present embodiment Consistent with the method in step S74, details are not described herein again.
S76 ': key is sent to target audit end.
Specifically, after getting target audit end according to distance, key is sent to audit end by server-side, is not only guaranteed The accuracy of the location information of mobile terminal also adds the safety of key transmission.
In the present embodiment, firstly, obtaining cryptographic initialization requests corresponding location information, target is determined according to location information Region, target area include interior zone and perimeter;Then, each default audit end obtained in target area is corresponding Location information;When default audit end is in interior zone, then the corresponding detailed location information in default audit end, Jin Erji are obtained Calculate the distance between the corresponding detailed location information in each default audit end location information corresponding with the identity; Next, will be less than or equal to the corresponding default audit end of preset threshold distance in as target audits end;Finally, The key is sent to target audit end, the accuracy of the location information of mobile terminal is not only ensure that, also adds key biography The safety sent.
In one embodiment, as shown in fig. 6, authenticating in step S50 to authentication information, authentication result is obtained, Specifically comprise the following steps:
S51: employee is obtained from authentication information and registers cell-phone number information and identifying code.
Wherein, employee's registration cell-phone number information refers to the letters such as the phone number used when employee's registration and corresponding name Breath, identifying code is referred to by being registered the phone number in cell-phone number information based on employee, is used by what operator returned for verifying The identifying code of family information.Specifically, employee can be got in the authentication information tables of data of the background data base of system Register cell-phone number information and identifying code.
S52: employee is searched in preset database and registers cell-phone number information, if there are employee's notes in preset database Volume cell-phone number information, then verify identifying code by third party's interface, obtain authentication result.
Wherein, third party's interface is for registering the interface that cell-phone number information is verified to employee, and such as mobile verifying connects Mouth or telecommunications verifying interface etc..It is readily appreciated that ground, employee is searched in preset database and registers cell-phone number information, if default Database in there is no employees to register cell-phone number information, illustrate there is no the authentication information, and then termination is to the identity The certification of authentication information improves the safety of authentication information to reduce subsequent authentication process.Therefore, to preset data Employee present in library registers cell-phone number information and is verified by third party's interface to identifying code, obtains authentication result, this is recognized Card result may include authenticating successfully or authentification failure.
In the present embodiment, employee is obtained from authentication information and registers cell-phone number information and identifying code;In preset number Cell-phone number information is registered according to employee is searched in library, if there are employees to register cell-phone number information in preset database, passes through the Tripartite's interface verifies identifying code, obtains authentication result.So that verification process more highly effective and safe.
In one embodiment, it as shown in fig. 7, being authenticated to authentication information after step S50, obtains After authentication result, the cryptographic initialization method further include:
S91: if authentication result is authentification failure, the number of authentification failure is counted, if the number of authentification failure is not up to Preset frequency threshold value then returns and executes the step of receiving the authentication information that mobile terminal is sent according to verification condition.
Wherein, preset frequency threshold value refers to the critical of the authentification failure number for judging authentication information correctness Value.Specifically, the number that authentication result is authentification failure is counted, when the number of authentification failure is not up to preset number When threshold value, then returns and execute the step of receiving the authentication information that mobile terminal is sent according to verification condition, mobile terminal is according to testing Card condition sends new authentication information, and continues the authentication operation of authentication information, and server-side is weighed Authentication information newly new to user authenticates, and realizes the intelligent authentication to authentication information.
S92: if the number of authentification failure reaches preset frequency threshold value, identity is locked.
Specifically, when the number of authentification failure reaches preset frequency threshold value, identity is locked, that is, is terminated Operation of the user to authentication, to sufficiently ensure the safety of cryptographic initialization.
In the present embodiment, if authentication result is authentification failure, the number of authentification failure is counted, if the number of authentification failure Not up to preset frequency threshold value then returns to the step for executing and receiving the authentication information that mobile terminal is sent according to verification condition Suddenly, enabling server-side, the authentication information new to user authenticates again, realizes the intelligence to authentication information It can certification;If the number of authentification failure reaches preset frequency threshold value, identity is locked, to sufficiently ensure close The safety of code initialization.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
In one embodiment, a kind of cryptographic initialization device is provided, the cryptographic initialization device with it is close in above-described embodiment Code initial method corresponds.As shown in figure 8, the cryptographic initialization device include cryptographic initialization request module 10, Behavioural information judgment module 20, verification condition obtain module 30, authentication information receiving module 40, authentication result and obtain 50 and of module Initial password obtains module 60.Detailed description are as follows for each functional module:
Cryptographic initialization request module 10, for receiving the cryptographic initialization request of mobile terminal transmission, wherein password Initialization requests include identity type and identity;
Behavioural information judgment module 20, for obtaining daily record data table corresponding with identity, and according to daily record data Table judges whether the behavioural information of identity is normal;
Verification condition obtains module 30, corresponding for when the behavioural information of identity is normal, then obtaining identity type Verification condition, and send mobile terminal for verification condition;
Authentication information receiving module 40, the authentication information sent for receiving mobile terminal according to verification condition;
Authentication result obtains module 50 and obtains authentication result for authenticating to authentication information;
Initial password obtains module 60, for when authentication result is to authenticate successfully, then it is corresponding just to obtain identity Beginning password.
Preferably, which further includes location information judgment module, pattern-recognition authentication module and identity Authentication module.
Location information judgment module is asked for when the behavioural information of identity is abnormal, then obtaining cryptographic initialization Corresponding location information is sought, judges whether location information has reasonability;
Pattern-recognition authentication module, for when location information has reasonability, then being adopted to the corresponding user of identity It is authenticated with the mode of pattern-recognition;
Authentication module, it is corresponding for when the certification of pattern-recognition passes through, then returning to execution acquisition identity type Verification condition, and the step of sending mobile terminal for verification condition.
Preferably, which further includes password sending module, for initially close using preset key pair Code is encrypted, and obtains service password, service password is sent to mobile terminal, and key is sent to corresponding target and audits end.
Preferably, password sending module includes target area determination unit, audit end position information acquisition unit, distance meter Calculate unit, target audit end determination unit and password transmission unit.
Target area determination unit requests corresponding location information for obtaining cryptographic initialization, true according to location information Set the goal region;
End position information acquisition unit is audited, the corresponding position in each default audit end for obtaining in target area is believed Breath;
Metrics calculation unit, for calculating the corresponding location information in each default audit end position corresponding with identity The distance between information;
Target audits end determination unit, corresponding default careful for that will be less than or equal to preset threshold distance in End is audited as target in core end;
Password transmission unit, for key to be sent to target audit end.
Preferably, password sending module further includes target area acquiring unit, location information acquiring unit, detail location letter Cease acquiring unit, location information metrics calculation unit, target audit end acquiring unit and password acquiring unit.
Target area acquiring unit requests corresponding location information for obtaining cryptographic initialization, true according to location information Set the goal region, and target area includes interior zone and perimeter;
Location information acquiring unit, for obtaining the corresponding location information in each default audit end in target area;
Detailed location information acquiring unit, for when default audit end is in interior zone, then obtaining default audit end Corresponding detailed location information;
Location information metrics calculation unit, for calculating the corresponding detailed location information in each default audit end and identity mark Know the distance between corresponding location information;
Target audits end acquiring unit, corresponding default careful for that will be less than or equal to preset threshold distance in End is audited as target in core end;
Password acquiring unit, for key to be sent to target audit end.
Preferably, it includes registration information acquiring unit and authentication result acquiring unit that authentication result, which obtains module,.
Registration information acquiring unit registers cell-phone number information and identifying code for obtaining employee from authentication information;
Authentication result acquiring unit registers cell-phone number information for searching employee in preset database, if preset There are employees to register cell-phone number information in database, then is verified by third party's interface to identifying code, obtain authentication result.
Preferably, which further includes authentification failure processing module and certification locking module
Authentification failure processing module, for when authentication result is authentification failure, then the number of authentification failure being counted, if recognizing The number of card failure is not up to preset frequency threshold value, then returns to execution reception mobile terminal and recognized according to the identity that verification condition is sent The step of demonstrate,proving information;
Authenticate locking module, for when the number of authentification failure reaches preset frequency threshold value, then to identity into Row locking.
Specific about cryptographic initialization device limits the restriction that may refer to above for cryptographic initialization method, This is repeated no more.The above-mentioned modules based in cryptographic initialization device can be fully or partially through software, hardware and its group It closes to realize.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be with Software form is stored in the memory in computer equipment, executes the corresponding behaviour of the above modules in order to which processor calls Make.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 9.The computer equipment include by system bus connect processor, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The database of machine equipment is for storing the data that cryptographic initialization method uses.The network interface of the computer equipment is used for It is communicated with external terminal by network connection.To realize a kind of cryptographic initialization side when the computer program is executed by processor Method.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory And the computer program that can be run on a processor, processor realizes the password in above-described embodiment when executing computer program at the beginning of Beginning method.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program realizes the cryptographic initialization method in above-described embodiment when being executed by processor.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;These modification or Person's replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all wrap Containing within protection scope of the present invention.

Claims (10)

1. a kind of cryptographic initialization method characterized by comprising
Receive the cryptographic initialization request that mobile terminal is sent, wherein the cryptographic initialization request includes identity type and identity Mark;
Daily record data table corresponding with the identity is obtained, and the identity is judged according to the daily record data table Whether behavioural information is normal;
If the behavioural information of the identity is normal, the corresponding verification condition of the identity type is obtained, and by institute It states verification condition and is sent to the mobile terminal;
Receive the authentication information that the mobile terminal is sent according to the verification condition;
The authentication information is authenticated, authentication result is obtained;
If the authentication result is to authenticate successfully, the corresponding initial password of the identity is obtained.
2. cryptographic initialization method as described in claim 1 judges the identity mark according to the daily record data table described After whether the behavioural information of knowledge is normal, the cryptographic initialization method further include:
If the behavioural information of the identity is abnormal, obtains the cryptographic initialization and request corresponding position letter Breath, judges whether the location information has reasonability;
If the location information has reasonability, the corresponding user of the identity is carried out by the way of pattern-recognition Certification;
If the certification of the pattern-recognition passes through, returns and execute the corresponding verification condition of the acquisition identity type, and The step of sending the mobile terminal for the verification condition.
3. cryptographic initialization method as described in claim 1, it is described obtain the corresponding initial password of the identity it Afterwards, the cryptographic initialization method further include:
It is encrypted using initial password described in preset key pair, obtains service password, the service password is sent to shifting The key is sent to corresponding target and audits end by moved end.
4. cryptographic initialization method as claimed in claim 3, which is characterized in that described that the key is sent to corresponding mesh Mark audit end, comprising:
It obtains the cryptographic initialization and requests corresponding location information, determine target area according to the positional information;
Obtain the corresponding location information in each default audit end in the target area;
Calculate between the corresponding location information in each default audit end location information corresponding with the identity away from From;
End is audited using the corresponding default audit end of preset threshold distance is less than or equal in the distance as target;
The key is sent to target audit end.
5. cryptographic initialization method as claimed in claim 3, which is characterized in that it is described that key is sent to target audit end, Include:
It obtains the cryptographic initialization and requests corresponding location information, determine target area, the mesh according to the positional information Marking region includes interior zone and perimeter;
Obtain the corresponding location information in each default audit end in the target area;
If the default audit end in the interior zone, obtains the corresponding detailed location information in default audit end;
It calculates between the corresponding detailed location information in each default audit end location information corresponding with the identity Distance;
End is audited using the corresponding default audit end of preset threshold distance is less than or equal in the distance as target;
The key is sent to target audit end.
6. cryptographic initialization method as described in claim 1, which is characterized in that described to recognize the authentication information Card, obtains authentication result, comprising:
The employee is obtained from the authentication information registers cell-phone number information and identifying code;
The employee is searched in preset database and registers cell-phone number information, if there are employee notes in preset database Volume cell-phone number information, then verify the identifying code by third party's interface, obtain the authentication result.
7. cryptographic initialization method as described in claim 1, which is characterized in that carried out described to the authentication information Certification, after obtaining authentication result, the cryptographic initialization method further include:
If the authentication result is authentification failure, the number of authentification failure is counted, if the number of the authentification failure is not up to Preset frequency threshold value then returns and executes the authentication information for receiving the mobile terminal and sending according to the verification condition The step of;
If the number of the authentification failure reaches preset frequency threshold value, the identity is locked.
8. a kind of cryptographic initialization device, which is characterized in that the cryptographic initialization device includes:
Cryptographic initialization request module, for receiving the cryptographic initialization request of mobile terminal transmission, wherein at the beginning of the password Beginningization request includes identity type and identity;
Behavioural information judgment module, for obtaining daily record data table corresponding with the identity, and according to the log number Judge whether the behavioural information of the identity is normal according to table;
Verification condition obtains module, for when the behavioural information of the identity is normal, then obtaining the identity class The corresponding verification condition of type, and the mobile terminal is sent by the verification condition;
Authentication information receiving module, the authentication information sent for receiving the mobile terminal according to the verification condition;
Authentication result obtains module, authenticates to the authentication information, obtains authentication result;
Initial password obtains module, for when the authentication result is to authenticate successfully, then it is corresponding to obtain the identity Initial password.
9. a kind of computer equipment, including memory, processor and storage are in the memory and can be in the processor The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 1 to Any one of 7 cryptographic initialization methods.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In realization cryptographic initialization method as described in any one of claim 1 to 7 when the computer program is executed by processor.
CN201910115057.9A 2019-02-14 2019-02-14 Password initialization method, device, computer equipment and storage medium Active CN109933974B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910115057.9A CN109933974B (en) 2019-02-14 2019-02-14 Password initialization method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910115057.9A CN109933974B (en) 2019-02-14 2019-02-14 Password initialization method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109933974A true CN109933974A (en) 2019-06-25
CN109933974B CN109933974B (en) 2024-06-18

Family

ID=66985569

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910115057.9A Active CN109933974B (en) 2019-02-14 2019-02-14 Password initialization method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109933974B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110807181A (en) * 2019-11-14 2020-02-18 北京融易做科技有限公司 Method, device and system for logging in and verifying database in enterprise
CN115033297A (en) * 2022-05-16 2022-09-09 阿里巴巴(中国)有限公司 Method and device for realizing startup and logging in cloud desktop based on one-time fingerprint touch

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011239123A (en) * 2010-05-10 2011-11-24 Mitsubishi Electric Corp Information processing device and encryption key management method and program
CN104219664A (en) * 2013-05-31 2014-12-17 上海一键通信科技有限公司 Identity verification method based on geographic-location coordinate information of equipment
KR20150123672A (en) * 2014-04-25 2015-11-04 삼성전자주식회사 Method of encrypting/decrypting content
US20160080154A1 (en) * 2014-09-11 2016-03-17 Seung-ho Lee Method of controlling electronic device using wearable device and method of operating electronic device
US20160352605A1 (en) * 2015-05-29 2016-12-01 Qualcomm Incorporated Systems and methods for distance bounding to an authenticated device
CN107124420A (en) * 2017-05-10 2017-09-01 北京潘达互娱科技有限公司 Auth method and device
CN107682336A (en) * 2017-09-30 2018-02-09 北京梆梆安全科技有限公司 A kind of auth method and device based on geographical position
CN107864144A (en) * 2017-11-20 2018-03-30 珠海市魅族科技有限公司 Obtain method and device, computer installation and the storage medium of dynamic password
CN107872433A (en) * 2016-09-27 2018-04-03 腾讯科技(深圳)有限公司 A kind of auth method and its equipment
CN107895239A (en) * 2017-12-08 2018-04-10 平安科技(深圳)有限公司 Video face dispatch work method, apparatus, equipment and readable storage medium storing program for executing
CN108076018A (en) * 2016-11-16 2018-05-25 阿里巴巴集团控股有限公司 Identity authorization system, method, apparatus and account authentication method
CN108492429A (en) * 2018-05-23 2018-09-04 上海弘目智能科技有限公司 Double mode personal identity authentication process and system

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011239123A (en) * 2010-05-10 2011-11-24 Mitsubishi Electric Corp Information processing device and encryption key management method and program
CN104219664A (en) * 2013-05-31 2014-12-17 上海一键通信科技有限公司 Identity verification method based on geographic-location coordinate information of equipment
KR20150123672A (en) * 2014-04-25 2015-11-04 삼성전자주식회사 Method of encrypting/decrypting content
US20160080154A1 (en) * 2014-09-11 2016-03-17 Seung-ho Lee Method of controlling electronic device using wearable device and method of operating electronic device
US20160352605A1 (en) * 2015-05-29 2016-12-01 Qualcomm Incorporated Systems and methods for distance bounding to an authenticated device
CN107872433A (en) * 2016-09-27 2018-04-03 腾讯科技(深圳)有限公司 A kind of auth method and its equipment
CN108076018A (en) * 2016-11-16 2018-05-25 阿里巴巴集团控股有限公司 Identity authorization system, method, apparatus and account authentication method
CN107124420A (en) * 2017-05-10 2017-09-01 北京潘达互娱科技有限公司 Auth method and device
CN107682336A (en) * 2017-09-30 2018-02-09 北京梆梆安全科技有限公司 A kind of auth method and device based on geographical position
CN107864144A (en) * 2017-11-20 2018-03-30 珠海市魅族科技有限公司 Obtain method and device, computer installation and the storage medium of dynamic password
CN107895239A (en) * 2017-12-08 2018-04-10 平安科技(深圳)有限公司 Video face dispatch work method, apparatus, equipment and readable storage medium storing program for executing
CN108492429A (en) * 2018-05-23 2018-09-04 上海弘目智能科技有限公司 Double mode personal identity authentication process and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110807181A (en) * 2019-11-14 2020-02-18 北京融易做科技有限公司 Method, device and system for logging in and verifying database in enterprise
CN115033297A (en) * 2022-05-16 2022-09-09 阿里巴巴(中国)有限公司 Method and device for realizing startup and logging in cloud desktop based on one-time fingerprint touch

Also Published As

Publication number Publication date
CN109933974B (en) 2024-06-18

Similar Documents

Publication Publication Date Title
CN108989346B (en) Third-party valid identity escrow agile authentication access method based on account hiding
US8041954B2 (en) Method and system for providing a secure login solution using one-time passwords
US10491588B2 (en) Local and remote access apparatus and system for password storage and management
KR101589192B1 (en) Identity authentication and management device and method thereof
US20170109751A1 (en) System and method for carrying strong authentication events over different channels
CN110401655A (en) Access control right management system based on user and role
US20080184349A1 (en) System and method for identity consolidation
CN109325342A (en) Identity information management method, apparatus, computer equipment and storage medium
CN107733861A (en) It is a kind of based on enterprise-level intranet and extranet environment without password login implementation method
CN102664903A (en) Network user identifying method and system
WO2014135409A1 (en) Computer implemented multi-factor authentication
CN101714918A (en) Safety system for logging in VPN and safety method for logging in VPN
SG178726A1 (en) Method and system for generating digital fingerprint
CN109034816A (en) User information verification method, device, computer equipment and storage medium
CN104469736B (en) A kind of data processing method, server and terminal
CN109831310A (en) A kind of auth method, system and relevant apparatus
CN110995661B (en) Network card platform
US20120066750A1 (en) User authentication and provisioning method and system
CN109933974A (en) Cryptographic initialization method, apparatus, computer equipment and storage medium
CN111161454A (en) Intelligent lock safety networking and control method
KR101996317B1 (en) Block chain based user authentication system using authentication variable and method thereof
JP4643313B2 (en) Relief method when biometric authentication is impossible for client / server system with biometric authentication function
CN117376000A (en) Block chain-based data processing method, device, equipment and storage medium
CA2611549C (en) Method and system for providing a secure login solution using one-time passwords
KR20160116660A (en) Phone number security certification apparatus using qr code and system thereof and metrhod thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant