CN110266642A - Identity identifying method and server, electronic equipment - Google Patents
Identity identifying method and server, electronic equipment Download PDFInfo
- Publication number
- CN110266642A CN110266642A CN201910402717.1A CN201910402717A CN110266642A CN 110266642 A CN110266642 A CN 110266642A CN 201910402717 A CN201910402717 A CN 201910402717A CN 110266642 A CN110266642 A CN 110266642A
- Authority
- CN
- China
- Prior art keywords
- token
- client
- server
- verifying
- identity identifying
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Abstract
The present embodiments relate to field of communication technology, a kind of identity identifying method and server, electronic equipment are disclosed.In the present invention, a kind of identity identifying method is provided, is applied to server, comprising the following steps: in response to the certification request of client, requesting client sends the verifying token generated with preset algorithm;Judge to verify whether token matches with server according to the local token that the preset algorithm generates, if matching, determines to authenticate successfully, otherwise determines that certification is unsuccessful;Wherein, the calculating parameter for verifying token includes timestamp and is handed down to the key of client in advance;The calculating parameter of local token includes timestamp and is handed down to the key of client in advance.Identity identifying method of the invention is safe and at low cost.
Description
Technical field
The present embodiments relate to fields of communication technology, in particular to identity identifying method and server, electronic equipment.
Background technique
As network environment increasingly standardizes, user requires to carry out safety certification when logging in many applications, currently, most
Common identity authentication method is the certification of short message verification code system.During carrying out authentication, user terminal is needed
To server requests authentication code, server is after receiving the identifying code request of user's transmission, and to short message verification code, provider is asked
Short message verification code is sought, short message verification code provider sends short message verification code to user terminal by operator, and user terminal is receiving
The short message verification code is submitted into server after short message verification code, server again mentions the identifying code received with short message verification code
The identifying code provided for quotient is compared, if can match, is verified, user can log in, and otherwise verify and do not pass through.
At least there are the following problems in the related technology for inventor's discovery:
Short message verification code higher cost and be easy it is intercepted, it cannot be guaranteed that information is centainly sent to.
Summary of the invention
Embodiment of the present invention is designed to provide a kind of new identity identifying method, safe and at low cost.
In order to solve the above technical problems, embodiments of the present invention provide a kind of identity identifying method, it is applied to service
Device, comprising the following steps: in response to the certification request of client, requesting client is sent to be enabled with the verifying that preset algorithm generates
Board;Judge verify token whether matched with server according to the local token that preset algorithm generates, if matching, determine authenticate at
Otherwise function determines that certification is unsuccessful;Wherein, the calculating parameter for verifying token includes timestamp and is handed down to client in advance
Key;The calculating parameter of local token includes timestamp and is handed down to the key of client in advance.
Embodiments of the present invention additionally provide a kind of server, comprising: at least one processor;And at least one
The memory of a processor communication connection;Wherein, memory is stored with the instruction that can be executed by least one processor, instructs quilt
At least one processor executes, so that at least one processor is able to carry out the above-mentioned identity identifying method applied to server.
Embodiments of the present invention additionally provide a kind of identity identifying method, are applied to client, comprising: send out to server
Send certification request;In response to the verifying token request that server is sent, sends to server and enabled with the verifying that preset algorithm generates
Board judges whether verify token matches with server according to the local token that preset algorithm generates for server, if matching, sentences
It authenticates successfully calmly, otherwise determines that certification is unsuccessful;Wherein, the calculating parameter for verifying token includes timestamp and is handed down in advance
The key of client, the calculating parameter of local token include timestamp and are handed down to the key of client in advance.
Embodiments of the present invention additionally provide electronic equipment, comprising: at least one processor;And at least one
The memory of processor communication connection;Wherein, memory is stored with the instruction that can be executed by least one processor, instructs by extremely
A few processor executes, so that at least one processor is able to carry out the above-mentioned identity identifying method applied to client.
Embodiment of the present invention in terms of existing technologies, is sent by requesting client and is tested with what preset algorithm generated
Token is demonstrate,proved, and judges that verifying token and the server that client is sent generate the whether matched method of local token with preset algorithm
Authentication is carried out, the calculating parameter of the verifying token sent due to client includes timestamp and server issue in advance
Key, and the local token computation parameter that server generates includes timestamp and is handed down to the key of the client in advance, and
And verifying token is identical with the local generating algorithm of token, so, when what the verifying token that client is sent was from a locally generated tests
Demonstrate,prove token matched, so that it may think current time user log in environment be it is safe, judgement authenticate successfully, due to server with it is objective
The interaction by way of network communication, for the mode of short-message verification, is not easily susceptible to information intercepting, more between the end of family
Safety, without being related to third-party short-message verification platform, therefore certification cost is also lower.
In addition, the calculating parameter of above-mentioned verifying token further includes the telephone number of user's input, the meter of above-mentioned local token
Calculating parameter further includes the telephone number with key bindings.Telephone number is added in the calculating parameter of token, guarantees user's input
Telephone number client corresponding with the telephone number it is consistent, i.e. the current user for carrying out register of confirmation is phone number
Owner, guarantee that the logging device of user is without exception, thus further ensure user secure log.
In addition, before requesting client sends the verifying token generated with preset algorithm, further includes: whether judge local
It preserves and the matched user information of the SIM card information of client, and if it exists, then execute requesting client again and send to impute in advance
Otherwise the verifying token that method generates determines that certification does not pass through.Judgement verify token before, first to the SIM card information of user into
Row verifying may filter that part without the user by real-name authentication and the user not registered.
In addition, in the algorithmic rule of preset algorithm, if the timestamp of the timestamp of verifying token and local token when
Difference is more than preset threshold, then the calculated result of the calculated result and local token of verifying token mismatches.Setting is only when verifying
The time difference of the timestamp of the timestamp of token and local token can just make verifying token can be with local token in a certain range
Match, so that the timeliness of verifying token is controllable, it is highly-safe.
Detailed description of the invention
One or more embodiments are illustrated by the picture in corresponding attached drawing, these exemplary theorys
The bright restriction not constituted to embodiment, the element in attached drawing with same reference numbers label are expressed as similar element, remove
Non- to have special statement, composition does not limit the figure in attached drawing.
Fig. 1 is the identity identifying method flow chart that first embodiment provides according to the present invention;
Fig. 2 is the identity identifying method flow chart that second embodiment provides according to the present invention;
Fig. 3 is the identity identifying method flow chart that third embodiment provides according to the present invention;
Fig. 4 is the server architecture schematic diagram that the 4th embodiment provides according to the present invention;
Fig. 5 is the electronic devices structure schematic diagram that the 5th embodiment provides according to the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention
Each embodiment be explained in detail.However, it will be understood by those skilled in the art that in each embodiment party of the present invention
In formula, in order to make the reader understand this application better, many technical details are proposed.But even if without these technical details
And various changes and modifications based on the following respective embodiments, the application technical solution claimed also may be implemented.With
Under the division of each embodiment be for convenience, any restriction should not to be constituted to specific implementation of the invention, it is each
Embodiment can be combined with each other mutual reference under the premise of reconcilable.
The first embodiment of the present invention is related to a kind of identity identifying method, it is applied to server, in present embodiment, clothes
Certification request of the business device in response to client, the verifying token that requesting client transmission is generated with preset algorithm;Judgement verifying enables
Whether board matches with the local token that server generates, if matching, determines to authenticate successfully, otherwise determines that certification is unsuccessful, this
Ground token is generated according to preset algorithm;Wherein, the calculating parameter for verifying token includes timestamp and is handed down to client in advance
Key;The calculating parameter of local token includes timestamp and is handed down to the key of client in advance.Present embodiment provides
Identity identifying method safety, interaction it is fast and at low cost.One of present embodiment identity identifying method as shown in Figure 1, under
Realization details in face of the identity identifying method of present embodiment is specifically described, and the following contents only provides for convenience of understanding
Realization details, not implement this programme it is necessary.
Step 101, in response to the certification request of client, requesting client is sent to be enabled with the verifying that preset algorithm generates
Board.
Specifically, server can issue the key of an encryption when user installs client on the terminal device
It gives this client, and will in this terminal device SIM card corresponding phone number and the key bindings that issue, in server
Locally save the corresponding relationship of this phone number with the key issued.When user wants to log in application, needing in client
Input telephone number and the button for triggering authentication are sent after client detects that authentication button is triggered to server
Checking request may include the telephone number of user's input in this checking request;Server is after detecting Environmental security, response
This checking request, and to the message of client one requests verification token of transmission, notice client is raw according to preset algorithm
At verifying token, wherein the calculating parameter for verifying token includes timestamp and is handed down to the key of client in advance.
In actual implementation, this preset algorithm can be a hash algorithm, be also possible to be selected according to security requirement
Other algorithms selected, herein with no restrictions, in this preset algorithm, if generating the timestamp of verifying token and generating this
The time of ground token presses the time difference of stamp more than preset threshold, such as 60 seconds, then, even if verifying the key in token and locally enabling
Key in board is identical, and the calculated result of the two tokens will not be identical, that is to say, that is being more than client after preset threshold
The verifying token that end is sent is bound to authentication failed, and in actual implementation, this settable preset threshold is less than verifying token quilt
Intercept or be cracked the required time, in this way, even if during information exchange, some verifying token by hack,
What hacker obtained is also failed verifying token, and therefore, the auth method safety of present embodiment is higher.
It is noted that in the present embodiment, can be led between server and client using https or socket etc.
The agreement for crossing network transmitting message communication interacts, compared with traditional short message verification code information exchange, present embodiment
Information exchange faster, moreover, compared to short message be easy by packet capturings such as wooden horse, base stations the problem of, the communication mode of present embodiment
It is much more secure.
In the identity identifying method of present embodiment, verifying token is actively initiated by client, rather than verifying every time
When all passively operator is waited to issue verifying message, so that the main body that interaction starts is changed by operator and uses householder
Body avoids the case where client can not receive the verification information of server transmission, therefore, compares with short message verification code system,
The identity identifying method of present embodiment can also ensure that verification information is sent to.
Step 102, judge to verify whether token matches with the local token that server generates, if matching, thens follow the steps
103, it is no to then follow the steps 104.
Specifically, server local also can be according to same pre- imputation after the verifying token for receiving client transmission
Method generates a local token, and this local token is compared with verifying token, if the two tokens are identical, then,
It is considered as local token to match with verifying token, executes step 103, otherwise it is assumed that local token and verifying token mismatch,
Execute step 104.Wherein, the calculating parameter for the local token that server generates include timestamp and local record it is preparatory under
Issue the key of this client.
Step 103, determine to authenticate successfully.
Specifically, determining user's at this time if local token and verifying token matched, show user terminal Environmental security
Authentication success, receives the register of user.
Step 104, determine that certification is unsuccessful.
Specifically, if local token and verifying token mismatch, shows user terminal environment and dangerous, determine at this time
The authentication of user is unsuccessful, refuses the register of user.
In actual implementation, the calculating parameter of above-mentioned verifying token further includes the telephone number of user's input, above-mentioned local
The calculating parameter of token further includes the telephone number with key bindings.Telephone number is added in the calculating parameter of token, guarantees
The telephone number client corresponding with the telephone number of user's input is consistent, i.e. the current user for carrying out register of confirmation is
The owner of phone number guarantees that the logging device of user is without exception, to further ensure the secure log of user.
Present embodiment compared with the prior art for, by requesting client send with preset algorithm generate verifying enable
Board, and judge verifying token and the server that client is sent with preset algorithm generate the local whether matched method of token come into
The calculating parameter of row authentication, the verifying token sent due to client includes timestamp and server issue in advance it is close
Key, and the local token computation parameter that server generates includes timestamp and is handed down to the key of the client in advance, and
It is identical with the local generating algorithm of token to verify token, so, when the verifying that the verifying token that client is sent is from a locally generated
Token matched, so that it may think current time user log in environment be it is safe, judgement authenticate successfully, due to server and client
The interaction by way of network communication, for the mode of short-message verification, is not easily susceptible to information intercepting, more pacifies between end
Entirely, without being related to third-party short-message verification platform, therefore certification cost is also lower.
Second embodiment of the present invention is related to a kind of identity identifying method.Second embodiment is big with first embodiment
It causes identical, is in place of the main distinction: in second embodiment of the invention, before requesting client sends certification request first
User information is verified.The flow chart of present embodiment is as shown in Fig. 2, specifically described below.
Step 201, in response to the certification request of client, judge the local SIM card information whether preserved with client
Matched user information, and if it exists, then follow the steps 202, it is no to then follow the steps 205.
Specifically, the identity identifying method of the present embodiment is a kind of method of re-authentication, that is, user is servicing
It was registered on device, the user information of registered user is preserved in server.Client can be obtained by Operator interface
And SIM card information is saved, inside this SIM card information, including address name and registered telephone number etc..It is real to carry out
Name certification, server can obtain the SIM card information of the client, judge the local SIM card information whether preserved and got
Matched user information, further, server can first obtain the telephone number in SIM card information, according to this telephone number
It searches in the user information locally saved with the presence or absence of the corresponding user information of this telephone number, and if it exists, then judge this again
Whether the other information in user information matches with the information in SIM card information, if matching, then step 202 is executed, otherwise
Step 205 is directly executed, determines that certification is unsuccessful.
Step 202, requesting client sends the verifying token generated with preset algorithm.
Step 203, judge to verify whether token matches with the local token that server generates, if matching, thens follow the steps
204, it is no to then follow the steps 205.
Step 204, determine to authenticate successfully.
Step 205, determine that certification is unsuccessful.
Step 202 is roughly the same to step 104 with the step 101 in first embodiment of the invention to step 205, to keep away
Exempt to repeat, no longer repeat one by one here.
In a specific example, after user inputs telephone number and triggers the button of authentication, client meeting
Certification request is sent to server, server responds this and authenticated request, calls the interface of operator, obtains client place
The SIM card information of terminal device judges that the SIM card information for whether having and getting in the user information locally saved is matched,
If so, then the first factor authentication passes through, then carry out the certification of the second factor, that is, server sends verifying token to client and asks
It asks, the telephone number and timestamp of key, user's input that client issues in advance according to server are raw according to preset algorithm
It is sent to server at verifying token, and by this verifying token, after server receives this verifying token, foundation issues in advance
Generate local token to the key of client, with the telephone numbers of the key bindings and timestamp, and judge to verify token with
Whether local token matches, if matching, determines to authenticate successfully, user is allowed to log in, otherwise determine that certification is unsuccessful, refusal is used
Family logs in.
Present embodiment compared with the prior art for, before token is verified in judgement, first the SIM card information of user is carried out
Verifying may filter that part without the user by real-name authentication and the user not registered.
The step of various methods divide above, be intended merely to describe it is clear, when realization can be merged into a step or
Certain steps are split, multiple steps are decomposed into, as long as including identical logical relation, all in the protection scope of this patent
It is interior;To adding inessential modification in algorithm or in process or introducing inessential design, but its algorithm is not changed
Core design with process is all in the protection scope of the patent.
Third embodiment of the invention is related to a kind of identity identifying method, be applied to client, with first embodiment or
It is corresponding applied to the identity identifying method of server in second embodiment.The flow chart of present embodiment is as shown in figure 3, packet
It includes:
Step 301, certification request is sent to server.
Specifically, server can issue the key of an encryption when user installs client on the terminal device
It gives this client, and will in this client SIM card corresponding phone number and the key bindings that issue, in server sheet
Ground saves the corresponding relationship of this phone number with the key issued.When user wants to log in application, inputting electricity in client
Words number and the button for triggering authentication are sent after client, which receives, detects that authentication button is triggered to server
Checking request may include the telephone number of user's input in this checking request.
Step 302, it is requested in response to the verifying token that the server is sent, Xiang Suoshu server is sent with preset algorithm
The verifying token of generation judges what the verifying token and the server were generated according to the preset algorithm for the server
Whether local token matches, if matching, determines to authenticate successfully, otherwise determines that certification is unsuccessful.
Specifically, when server is after detecting Environmental security, the checking request that customer in response end is sent, and to client
End sends the message of a requests verification token, and client is generated according to preset algorithm and verified after receiving this request
Token, wherein the calculating parameter for verifying token includes timestamp and is handed down to the key of client in advance.
It is not difficult to find that present embodiment is embodiment corresponding with first embodiment or second embodiment, this reality
The mode of applying can work in coordination implementation with first embodiment or second embodiment.In first embodiment or second embodiment
The relevant technical details mentioned are still effective in the present embodiment, and in order to reduce repetition, which is not described herein again.Correspondingly, originally
The relevant technical details mentioned in embodiment are also applicable in first embodiment or second embodiment.
Present embodiment compared with the prior art for, by requesting client send with preset algorithm generate verifying enable
Board, and judge verifying token and the server that client is sent with preset algorithm generate the local whether matched method of token come into
The calculating parameter of row authentication, the verifying token sent due to client includes timestamp and server issue in advance it is close
Key, and the local token computation parameter that server generates includes timestamp and is handed down to the key of the client in advance, and
It is identical with the local generating algorithm of token to verify token, so, when the verifying that the verifying token that client is sent is from a locally generated
Token matched, so that it may think current time user log in environment be it is safe, judgement authenticate successfully, due to server and client
The interaction by way of network communication between end, for the mode of short-message verification, interaction is very fast and is not easily susceptible to information
It intercepts, safer, without being related to third-party short-message verification platform, therefore certification cost is also lower.
Four embodiment of the invention is related to a kind of server, as shown in figure 4, server 400 includes at least one processing
Device 401;And the memory 402 with the communication connection of at least one processor 401;Wherein, be stored with can be by extremely for memory 402
The instruction that a few processor 401 executes, instruction is executed by least one processor 401, so that at least one 401 energy of processor
Enough execute the above-mentioned identity identifying method applied to server.
Wherein, memory 402 is connected with processor 401 using bus mode, and bus may include any number of interconnection
Bus and bridge, bus is by one or more processors 401 together with the various circuit connections of memory 402.Bus may be used also
With by such as peripheral equipment, voltage-stablizer, together with various other circuit connections of management circuit or the like, these are all
It is known in the art, therefore, it will not be further described herein.Bus interface provides between bus and transceiver
Interface.Transceiver can be an element, be also possible to multiple element, such as multiple receivers and transmitter, provide for
The unit communicated on transmission medium with various other devices.The data handled through processor 401 pass through antenna on the radio medium
It is transmitted, further, antenna also receives data and transfers data to processor 401.
Processor 401 is responsible for management bus and common processing, can also provide various functions, including timing, periphery connects
Mouthful, voltage adjusting, power management and other control functions.And memory 402 can be used for storage processor 401 and execute
Used data when operation.
Fifth embodiment of the invention is related to a kind of electronic equipment, as shown in figure 5, electronic equipment 500 includes at least one
Processor 501;And the memory 502 with the communication connection of at least one processor 501;Wherein, be stored with can for memory 502
The instruction executed by least one processor 501, instruction is executed by least one processor 501, so that at least one processor
501 are able to carry out the above-mentioned identity identifying method applied to client.
Wherein, memory 502 is connected with processor 501 using bus mode, and bus may include any number of interconnection
Bus and bridge, bus is by one or more processors 501 together with the various circuit connections of memory 502.Bus may be used also
With by such as peripheral equipment, voltage-stablizer, together with various other circuit connections of management circuit or the like, these are all
It is known in the art, therefore, it will not be further described herein.Bus interface provides between bus and transceiver
Interface.Transceiver can be an element, be also possible to multiple element, such as multiple receivers and transmitter, provide for
The unit communicated on transmission medium with various other devices.The data handled through processor 501 pass through antenna on the radio medium
It is transmitted, further, antenna also receives data and transfers data to processor 501.
Processor 501 is responsible for management bus and common processing, can also provide various functions, including timing, periphery connects
Mouthful, voltage adjusting, power management and other control functions.And memory 502 can be used for storage processor 501 and execute
Used data when operation.
Sixth embodiment of the invention is related to a kind of computer readable storage medium, is stored with computer program.Computer
Above method embodiment is realized when program is executed by processor.
That is, it will be understood by those skilled in the art that implement the method for the above embodiments be can be with
Relevant hardware is instructed to complete by program, which is stored in a storage medium, including some instructions are to make
It obtains an equipment (can be single-chip microcontroller, chip etc.) or processor (processor) executes each embodiment method of the application
All or part of the steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey
The medium of sequence code.
It will be understood by those skilled in the art that the respective embodiments described above are to realize specific embodiments of the present invention,
And in practical applications, can to it, various changes can be made in the form and details, without departing from the spirit and scope of the present invention.
Claims (12)
1. a kind of identity identifying method, which is characterized in that be applied to server, comprising:
In response to the certification request of client, the client is requested to send the verifying token generated with preset algorithm;
Judge whether the verifying token matches with the server according to the local token that the preset algorithm generates, if
Match, then determine to authenticate successfully, otherwise determines that certification is unsuccessful;
Wherein, the calculating parameter of the verifying token includes timestamp and is handed down to the key of the client in advance;
The calculating parameter of the local token includes timestamp and the key for being handed down to the client in advance.
2. identity identifying method according to claim 1, which is characterized in that
The calculating parameter of the verifying token further includes the telephone number of user's input, and the calculating parameter of the local token is also wrapped
Include the telephone number with the key bindings.
3. identity identifying method according to claim 1, which is characterized in that send in the request client with pre-
Before the verifying token that imputation method generates, further includes:
Local whether preserve and the matched user information of the SIM card information of the client judged, and if it exists, then execute institute again
It states and the client is requested to send the verifying token generated with preset algorithm, otherwise determine that certification does not pass through.
4. identity identifying method according to claim 3, which is characterized in that
The SIM card information of the client is obtained by the interface for calling operator to provide.
5. identity identifying method according to claim 1, which is characterized in that
In the algorithmic rule of the preset algorithm, if the timestamp of the timestamp of the verifying token and the local token
The time difference is more than preset threshold, then the calculated result of the verifying token and the calculated result of the local token mismatch.
6. a kind of server characterized by comprising
At least one processor;And
The memory being connect at least one described processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one described processor, and described instruction is by described at least one
It manages device to execute, so that at least one described processor is able to carry out the authentication side as described in any in claim 1 to 5
Method.
7. a kind of identity identifying method, which is characterized in that be applied to client, comprising:
Certification request is sent to server;
In response to the verifying token request that the server is sent, Xiang Suoshu server is sent to be enabled with the verifying that preset algorithm generates
Board judges whether is local token that the verifying token and the server are generated according to the preset algorithm for the server
Otherwise matching determines that certification is unsuccessful if matching, determines to authenticate successfully;
Wherein, the calculating parameter of the verifying token includes timestamp and is handed down to the key of the client in advance, described
The calculating parameter of local token includes timestamp and the key for being handed down to the client in advance.
8. identity identifying method according to claim 7, which is characterized in that
The calculating parameter of the verifying token further includes the telephone number of user's input, and the calculating parameter of the local token is also wrapped
Include the telephone number with the key bindings.
9. identity identifying method according to claim 7, which is characterized in that
The verifying token request is locally preserved for the server in judgement matched with the SIM card information of the client
After user information, requested with the verifying token that the preset algorithm generates.
10. identity identifying method according to claim 9, which is characterized in that
The SIM card information of the client is obtained by the interface for calling operator to provide.
11. identity identifying method according to claim 7, which is characterized in that
In the algorithmic rule of the preset algorithm, if the timestamp of the timestamp of the verifying token and the local token
The time difference is more than preset threshold, then the calculated result of the verifying token and the calculated result of the local token mismatch.
12. a kind of electronic equipment characterized by comprising
At least one processor;And
The memory being connect at least one described processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one described processor, and described instruction is by described at least one
It manages device to execute, so that at least one described processor is able to carry out the authentication side as described in any in claim 7 to 11
Method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910402717.1A CN110266642A (en) | 2019-05-15 | 2019-05-15 | Identity identifying method and server, electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910402717.1A CN110266642A (en) | 2019-05-15 | 2019-05-15 | Identity identifying method and server, electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110266642A true CN110266642A (en) | 2019-09-20 |
Family
ID=67913199
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910402717.1A Pending CN110266642A (en) | 2019-05-15 | 2019-05-15 | Identity identifying method and server, electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110266642A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110830471A (en) * | 2019-11-06 | 2020-02-21 | 北京一砂信息技术有限公司 | OTP (one time password) verification method, server, client and computer-readable storage medium |
CN111432405A (en) * | 2020-03-31 | 2020-07-17 | 中电四川数据服务有限公司 | Authorization authentication method and system for electronic medical record |
CN111444499A (en) * | 2020-03-31 | 2020-07-24 | 中国人民解放军海军潜艇学院 | User identity authentication method and system |
CN111491064A (en) * | 2020-04-01 | 2020-08-04 | 支付宝(杭州)信息技术有限公司 | Voice service identity authentication method and system |
CN111654379A (en) * | 2020-06-08 | 2020-09-11 | 杭州安恒信息技术股份有限公司 | Multi-server unified token generation method and authentication method |
CN112788033A (en) * | 2021-01-13 | 2021-05-11 | 京东方科技集团股份有限公司 | Authentication method and authentication system |
CN112953719A (en) * | 2019-11-26 | 2021-06-11 | 北京京东尚科信息技术有限公司 | Token authentication method and device |
CN113132317A (en) * | 2019-12-31 | 2021-07-16 | 中移互联网有限公司 | Identity authentication method, system and device |
CN113536250A (en) * | 2021-06-02 | 2021-10-22 | 上海硬通网络科技有限公司 | Token generation method, login verification method and related equipment |
CN115713339A (en) * | 2023-01-09 | 2023-02-24 | 量子科技长三角产业创新中心 | Data quantum computing management and control method, device, equipment and computer medium |
WO2023236925A1 (en) * | 2022-06-08 | 2023-12-14 | 华为技术有限公司 | Authentication method and communication device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103188229A (en) * | 2011-12-30 | 2013-07-03 | 上海贝尔股份有限公司 | Method and equipment for secure content access |
CN104821937A (en) * | 2015-03-26 | 2015-08-05 | 腾讯科技(北京)有限公司 | Token acquisition method, device and system |
CN104967597A (en) * | 2014-11-04 | 2015-10-07 | 深圳市腾讯计算机系统有限公司 | Third-party application message authentication method and system based on secure channel |
CN105592065A (en) * | 2015-11-05 | 2016-05-18 | 中国银联股份有限公司 | Method and system for website registration on the basis of mobile phone message |
CN105827577A (en) * | 2015-01-08 | 2016-08-03 | 阿里巴巴集团控股有限公司 | Method and device for information verification |
CN106790274A (en) * | 2017-02-20 | 2017-05-31 | 中国科学院信息工程研究所 | A kind of method that disposal password logs in WLAN |
CN109413650A (en) * | 2018-11-28 | 2019-03-01 | 亚信科技(南京)有限公司 | A kind of identity identifying method and system |
-
2019
- 2019-05-15 CN CN201910402717.1A patent/CN110266642A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103188229A (en) * | 2011-12-30 | 2013-07-03 | 上海贝尔股份有限公司 | Method and equipment for secure content access |
CN104967597A (en) * | 2014-11-04 | 2015-10-07 | 深圳市腾讯计算机系统有限公司 | Third-party application message authentication method and system based on secure channel |
CN105827577A (en) * | 2015-01-08 | 2016-08-03 | 阿里巴巴集团控股有限公司 | Method and device for information verification |
CN104821937A (en) * | 2015-03-26 | 2015-08-05 | 腾讯科技(北京)有限公司 | Token acquisition method, device and system |
CN105592065A (en) * | 2015-11-05 | 2016-05-18 | 中国银联股份有限公司 | Method and system for website registration on the basis of mobile phone message |
CN106790274A (en) * | 2017-02-20 | 2017-05-31 | 中国科学院信息工程研究所 | A kind of method that disposal password logs in WLAN |
CN109413650A (en) * | 2018-11-28 | 2019-03-01 | 亚信科技(南京)有限公司 | A kind of identity identifying method and system |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110830471A (en) * | 2019-11-06 | 2020-02-21 | 北京一砂信息技术有限公司 | OTP (one time password) verification method, server, client and computer-readable storage medium |
CN110830471B (en) * | 2019-11-06 | 2022-05-24 | 北京一砂信息技术有限公司 | OTP (one time password) verification method, server, client and computer-readable storage medium |
CN112953719A (en) * | 2019-11-26 | 2021-06-11 | 北京京东尚科信息技术有限公司 | Token authentication method and device |
CN112953719B (en) * | 2019-11-26 | 2023-03-07 | 北京京东尚科信息技术有限公司 | Token authentication method and device |
CN113132317A (en) * | 2019-12-31 | 2021-07-16 | 中移互联网有限公司 | Identity authentication method, system and device |
CN113132317B (en) * | 2019-12-31 | 2023-03-21 | 中移互联网有限公司 | Identity authentication method, system and device |
CN111444499A (en) * | 2020-03-31 | 2020-07-24 | 中国人民解放军海军潜艇学院 | User identity authentication method and system |
CN111432405A (en) * | 2020-03-31 | 2020-07-17 | 中电四川数据服务有限公司 | Authorization authentication method and system for electronic medical record |
CN111444499B (en) * | 2020-03-31 | 2022-12-06 | 中国人民解放军海军潜艇学院 | User identity authentication method and system |
CN111491064A (en) * | 2020-04-01 | 2020-08-04 | 支付宝(杭州)信息技术有限公司 | Voice service identity authentication method and system |
CN111654379A (en) * | 2020-06-08 | 2020-09-11 | 杭州安恒信息技术股份有限公司 | Multi-server unified token generation method and authentication method |
CN112788033A (en) * | 2021-01-13 | 2021-05-11 | 京东方科技集团股份有限公司 | Authentication method and authentication system |
CN112788033B (en) * | 2021-01-13 | 2022-09-20 | 京东方科技集团股份有限公司 | Authentication method and authentication system |
CN113536250A (en) * | 2021-06-02 | 2021-10-22 | 上海硬通网络科技有限公司 | Token generation method, login verification method and related equipment |
CN113536250B (en) * | 2021-06-02 | 2023-07-04 | 上海硬通网络科技有限公司 | Token generation method, login verification method and related equipment |
WO2023236925A1 (en) * | 2022-06-08 | 2023-12-14 | 华为技术有限公司 | Authentication method and communication device |
CN115713339A (en) * | 2023-01-09 | 2023-02-24 | 量子科技长三角产业创新中心 | Data quantum computing management and control method, device, equipment and computer medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110266642A (en) | Identity identifying method and server, electronic equipment | |
CN104144163B (en) | Auth method, apparatus and system | |
US10237072B2 (en) | Signatures for near field communications | |
CN107113613B (en) | Server, mobile terminal, network real-name authentication system and method | |
CN103249045A (en) | Identification method, device and system | |
CN103905194B (en) | Identity traceability authentication method and system | |
KR20130109322A (en) | Apparatus and method to enable a user authentication in a communication system | |
CN110278084B (en) | eID establishing method, related device and system | |
CN111800377B (en) | Mobile terminal identity authentication system based on safe multi-party calculation | |
CN111371725A (en) | Method for improving security of session mechanism, terminal equipment and storage medium | |
CN104426659A (en) | Dynamic password generating method, authentication method, authentication system and corresponding equipment | |
CN109729000B (en) | Instant messaging method and device | |
CN109583154A (en) | A kind of system and method based on Web middleware access intelligent code key | |
CN103401686B (en) | A kind of user's OTP WEB Authentication System and application process thereof | |
CN106203021A (en) | The application login method of a kind of many certification modes integration and system | |
CN109587683B (en) | Method and system for preventing short message from being monitored, application program and terminal information database | |
CN111737681A (en) | Resource acquisition method and device, storage medium and electronic device | |
CN107645474B (en) | Method and device for logging in open platform | |
CN107835162A (en) | The method that software digital permit server signs and issues software digital permissions | |
CN112039857B (en) | Calling method and device of public basic module | |
KR101133167B1 (en) | Method and apparatus for user verifing process with enhanced security | |
CN108123918A (en) | A kind of account authentication login method and device | |
CN105848148A (en) | WIFI connection method, terminal and router | |
CN115086090A (en) | Network login authentication method and device based on UKey | |
CN113591053A (en) | Method and system for identifying general mobile equipment based on biological information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190920 |