CN110266642A - Identity identifying method and server, electronic equipment - Google Patents

Identity identifying method and server, electronic equipment Download PDF

Info

Publication number
CN110266642A
CN110266642A CN201910402717.1A CN201910402717A CN110266642A CN 110266642 A CN110266642 A CN 110266642A CN 201910402717 A CN201910402717 A CN 201910402717A CN 110266642 A CN110266642 A CN 110266642A
Authority
CN
China
Prior art keywords
token
client
server
verifying
identity identifying
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910402717.1A
Other languages
Chinese (zh)
Inventor
刘志文
王鹭雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wangsu Science and Technology Co Ltd
Original Assignee
Wangsu Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wangsu Science and Technology Co Ltd filed Critical Wangsu Science and Technology Co Ltd
Priority to CN201910402717.1A priority Critical patent/CN110266642A/en
Publication of CN110266642A publication Critical patent/CN110266642A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The present embodiments relate to field of communication technology, a kind of identity identifying method and server, electronic equipment are disclosed.In the present invention, a kind of identity identifying method is provided, is applied to server, comprising the following steps: in response to the certification request of client, requesting client sends the verifying token generated with preset algorithm;Judge to verify whether token matches with server according to the local token that the preset algorithm generates, if matching, determines to authenticate successfully, otherwise determines that certification is unsuccessful;Wherein, the calculating parameter for verifying token includes timestamp and is handed down to the key of client in advance;The calculating parameter of local token includes timestamp and is handed down to the key of client in advance.Identity identifying method of the invention is safe and at low cost.

Description

Identity identifying method and server, electronic equipment
Technical field
The present embodiments relate to fields of communication technology, in particular to identity identifying method and server, electronic equipment.
Background technique
As network environment increasingly standardizes, user requires to carry out safety certification when logging in many applications, currently, most Common identity authentication method is the certification of short message verification code system.During carrying out authentication, user terminal is needed To server requests authentication code, server is after receiving the identifying code request of user's transmission, and to short message verification code, provider is asked Short message verification code is sought, short message verification code provider sends short message verification code to user terminal by operator, and user terminal is receiving The short message verification code is submitted into server after short message verification code, server again mentions the identifying code received with short message verification code The identifying code provided for quotient is compared, if can match, is verified, user can log in, and otherwise verify and do not pass through.
At least there are the following problems in the related technology for inventor's discovery:
Short message verification code higher cost and be easy it is intercepted, it cannot be guaranteed that information is centainly sent to.
Summary of the invention
Embodiment of the present invention is designed to provide a kind of new identity identifying method, safe and at low cost.
In order to solve the above technical problems, embodiments of the present invention provide a kind of identity identifying method, it is applied to service Device, comprising the following steps: in response to the certification request of client, requesting client is sent to be enabled with the verifying that preset algorithm generates Board;Judge verify token whether matched with server according to the local token that preset algorithm generates, if matching, determine authenticate at Otherwise function determines that certification is unsuccessful;Wherein, the calculating parameter for verifying token includes timestamp and is handed down to client in advance Key;The calculating parameter of local token includes timestamp and is handed down to the key of client in advance.
Embodiments of the present invention additionally provide a kind of server, comprising: at least one processor;And at least one The memory of a processor communication connection;Wherein, memory is stored with the instruction that can be executed by least one processor, instructs quilt At least one processor executes, so that at least one processor is able to carry out the above-mentioned identity identifying method applied to server.
Embodiments of the present invention additionally provide a kind of identity identifying method, are applied to client, comprising: send out to server Send certification request;In response to the verifying token request that server is sent, sends to server and enabled with the verifying that preset algorithm generates Board judges whether verify token matches with server according to the local token that preset algorithm generates for server, if matching, sentences It authenticates successfully calmly, otherwise determines that certification is unsuccessful;Wherein, the calculating parameter for verifying token includes timestamp and is handed down in advance The key of client, the calculating parameter of local token include timestamp and are handed down to the key of client in advance.
Embodiments of the present invention additionally provide electronic equipment, comprising: at least one processor;And at least one The memory of processor communication connection;Wherein, memory is stored with the instruction that can be executed by least one processor, instructs by extremely A few processor executes, so that at least one processor is able to carry out the above-mentioned identity identifying method applied to client.
Embodiment of the present invention in terms of existing technologies, is sent by requesting client and is tested with what preset algorithm generated Token is demonstrate,proved, and judges that verifying token and the server that client is sent generate the whether matched method of local token with preset algorithm Authentication is carried out, the calculating parameter of the verifying token sent due to client includes timestamp and server issue in advance Key, and the local token computation parameter that server generates includes timestamp and is handed down to the key of the client in advance, and And verifying token is identical with the local generating algorithm of token, so, when what the verifying token that client is sent was from a locally generated tests Demonstrate,prove token matched, so that it may think current time user log in environment be it is safe, judgement authenticate successfully, due to server with it is objective The interaction by way of network communication, for the mode of short-message verification, is not easily susceptible to information intercepting, more between the end of family Safety, without being related to third-party short-message verification platform, therefore certification cost is also lower.
In addition, the calculating parameter of above-mentioned verifying token further includes the telephone number of user's input, the meter of above-mentioned local token Calculating parameter further includes the telephone number with key bindings.Telephone number is added in the calculating parameter of token, guarantees user's input Telephone number client corresponding with the telephone number it is consistent, i.e. the current user for carrying out register of confirmation is phone number Owner, guarantee that the logging device of user is without exception, thus further ensure user secure log.
In addition, before requesting client sends the verifying token generated with preset algorithm, further includes: whether judge local It preserves and the matched user information of the SIM card information of client, and if it exists, then execute requesting client again and send to impute in advance Otherwise the verifying token that method generates determines that certification does not pass through.Judgement verify token before, first to the SIM card information of user into Row verifying may filter that part without the user by real-name authentication and the user not registered.
In addition, in the algorithmic rule of preset algorithm, if the timestamp of the timestamp of verifying token and local token when Difference is more than preset threshold, then the calculated result of the calculated result and local token of verifying token mismatches.Setting is only when verifying The time difference of the timestamp of the timestamp of token and local token can just make verifying token can be with local token in a certain range Match, so that the timeliness of verifying token is controllable, it is highly-safe.
Detailed description of the invention
One or more embodiments are illustrated by the picture in corresponding attached drawing, these exemplary theorys The bright restriction not constituted to embodiment, the element in attached drawing with same reference numbers label are expressed as similar element, remove Non- to have special statement, composition does not limit the figure in attached drawing.
Fig. 1 is the identity identifying method flow chart that first embodiment provides according to the present invention;
Fig. 2 is the identity identifying method flow chart that second embodiment provides according to the present invention;
Fig. 3 is the identity identifying method flow chart that third embodiment provides according to the present invention;
Fig. 4 is the server architecture schematic diagram that the 4th embodiment provides according to the present invention;
Fig. 5 is the electronic devices structure schematic diagram that the 5th embodiment provides according to the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention Each embodiment be explained in detail.However, it will be understood by those skilled in the art that in each embodiment party of the present invention In formula, in order to make the reader understand this application better, many technical details are proposed.But even if without these technical details And various changes and modifications based on the following respective embodiments, the application technical solution claimed also may be implemented.With Under the division of each embodiment be for convenience, any restriction should not to be constituted to specific implementation of the invention, it is each Embodiment can be combined with each other mutual reference under the premise of reconcilable.
The first embodiment of the present invention is related to a kind of identity identifying method, it is applied to server, in present embodiment, clothes Certification request of the business device in response to client, the verifying token that requesting client transmission is generated with preset algorithm;Judgement verifying enables Whether board matches with the local token that server generates, if matching, determines to authenticate successfully, otherwise determines that certification is unsuccessful, this Ground token is generated according to preset algorithm;Wherein, the calculating parameter for verifying token includes timestamp and is handed down to client in advance Key;The calculating parameter of local token includes timestamp and is handed down to the key of client in advance.Present embodiment provides Identity identifying method safety, interaction it is fast and at low cost.One of present embodiment identity identifying method as shown in Figure 1, under Realization details in face of the identity identifying method of present embodiment is specifically described, and the following contents only provides for convenience of understanding Realization details, not implement this programme it is necessary.
Step 101, in response to the certification request of client, requesting client is sent to be enabled with the verifying that preset algorithm generates Board.
Specifically, server can issue the key of an encryption when user installs client on the terminal device It gives this client, and will in this terminal device SIM card corresponding phone number and the key bindings that issue, in server Locally save the corresponding relationship of this phone number with the key issued.When user wants to log in application, needing in client Input telephone number and the button for triggering authentication are sent after client detects that authentication button is triggered to server Checking request may include the telephone number of user's input in this checking request;Server is after detecting Environmental security, response This checking request, and to the message of client one requests verification token of transmission, notice client is raw according to preset algorithm At verifying token, wherein the calculating parameter for verifying token includes timestamp and is handed down to the key of client in advance.
In actual implementation, this preset algorithm can be a hash algorithm, be also possible to be selected according to security requirement Other algorithms selected, herein with no restrictions, in this preset algorithm, if generating the timestamp of verifying token and generating this The time of ground token presses the time difference of stamp more than preset threshold, such as 60 seconds, then, even if verifying the key in token and locally enabling Key in board is identical, and the calculated result of the two tokens will not be identical, that is to say, that is being more than client after preset threshold The verifying token that end is sent is bound to authentication failed, and in actual implementation, this settable preset threshold is less than verifying token quilt Intercept or be cracked the required time, in this way, even if during information exchange, some verifying token by hack, What hacker obtained is also failed verifying token, and therefore, the auth method safety of present embodiment is higher.
It is noted that in the present embodiment, can be led between server and client using https or socket etc. The agreement for crossing network transmitting message communication interacts, compared with traditional short message verification code information exchange, present embodiment Information exchange faster, moreover, compared to short message be easy by packet capturings such as wooden horse, base stations the problem of, the communication mode of present embodiment It is much more secure.
In the identity identifying method of present embodiment, verifying token is actively initiated by client, rather than verifying every time When all passively operator is waited to issue verifying message, so that the main body that interaction starts is changed by operator and uses householder Body avoids the case where client can not receive the verification information of server transmission, therefore, compares with short message verification code system, The identity identifying method of present embodiment can also ensure that verification information is sent to.
Step 102, judge to verify whether token matches with the local token that server generates, if matching, thens follow the steps 103, it is no to then follow the steps 104.
Specifically, server local also can be according to same pre- imputation after the verifying token for receiving client transmission Method generates a local token, and this local token is compared with verifying token, if the two tokens are identical, then, It is considered as local token to match with verifying token, executes step 103, otherwise it is assumed that local token and verifying token mismatch, Execute step 104.Wherein, the calculating parameter for the local token that server generates include timestamp and local record it is preparatory under Issue the key of this client.
Step 103, determine to authenticate successfully.
Specifically, determining user's at this time if local token and verifying token matched, show user terminal Environmental security Authentication success, receives the register of user.
Step 104, determine that certification is unsuccessful.
Specifically, if local token and verifying token mismatch, shows user terminal environment and dangerous, determine at this time The authentication of user is unsuccessful, refuses the register of user.
In actual implementation, the calculating parameter of above-mentioned verifying token further includes the telephone number of user's input, above-mentioned local The calculating parameter of token further includes the telephone number with key bindings.Telephone number is added in the calculating parameter of token, guarantees The telephone number client corresponding with the telephone number of user's input is consistent, i.e. the current user for carrying out register of confirmation is The owner of phone number guarantees that the logging device of user is without exception, to further ensure the secure log of user.
Present embodiment compared with the prior art for, by requesting client send with preset algorithm generate verifying enable Board, and judge verifying token and the server that client is sent with preset algorithm generate the local whether matched method of token come into The calculating parameter of row authentication, the verifying token sent due to client includes timestamp and server issue in advance it is close Key, and the local token computation parameter that server generates includes timestamp and is handed down to the key of the client in advance, and It is identical with the local generating algorithm of token to verify token, so, when the verifying that the verifying token that client is sent is from a locally generated Token matched, so that it may think current time user log in environment be it is safe, judgement authenticate successfully, due to server and client The interaction by way of network communication, for the mode of short-message verification, is not easily susceptible to information intercepting, more pacifies between end Entirely, without being related to third-party short-message verification platform, therefore certification cost is also lower.
Second embodiment of the present invention is related to a kind of identity identifying method.Second embodiment is big with first embodiment It causes identical, is in place of the main distinction: in second embodiment of the invention, before requesting client sends certification request first User information is verified.The flow chart of present embodiment is as shown in Fig. 2, specifically described below.
Step 201, in response to the certification request of client, judge the local SIM card information whether preserved with client Matched user information, and if it exists, then follow the steps 202, it is no to then follow the steps 205.
Specifically, the identity identifying method of the present embodiment is a kind of method of re-authentication, that is, user is servicing It was registered on device, the user information of registered user is preserved in server.Client can be obtained by Operator interface And SIM card information is saved, inside this SIM card information, including address name and registered telephone number etc..It is real to carry out Name certification, server can obtain the SIM card information of the client, judge the local SIM card information whether preserved and got Matched user information, further, server can first obtain the telephone number in SIM card information, according to this telephone number It searches in the user information locally saved with the presence or absence of the corresponding user information of this telephone number, and if it exists, then judge this again Whether the other information in user information matches with the information in SIM card information, if matching, then step 202 is executed, otherwise Step 205 is directly executed, determines that certification is unsuccessful.
Step 202, requesting client sends the verifying token generated with preset algorithm.
Step 203, judge to verify whether token matches with the local token that server generates, if matching, thens follow the steps 204, it is no to then follow the steps 205.
Step 204, determine to authenticate successfully.
Step 205, determine that certification is unsuccessful.
Step 202 is roughly the same to step 104 with the step 101 in first embodiment of the invention to step 205, to keep away Exempt to repeat, no longer repeat one by one here.
In a specific example, after user inputs telephone number and triggers the button of authentication, client meeting Certification request is sent to server, server responds this and authenticated request, calls the interface of operator, obtains client place The SIM card information of terminal device judges that the SIM card information for whether having and getting in the user information locally saved is matched, If so, then the first factor authentication passes through, then carry out the certification of the second factor, that is, server sends verifying token to client and asks It asks, the telephone number and timestamp of key, user's input that client issues in advance according to server are raw according to preset algorithm It is sent to server at verifying token, and by this verifying token, after server receives this verifying token, foundation issues in advance Generate local token to the key of client, with the telephone numbers of the key bindings and timestamp, and judge to verify token with Whether local token matches, if matching, determines to authenticate successfully, user is allowed to log in, otherwise determine that certification is unsuccessful, refusal is used Family logs in.
Present embodiment compared with the prior art for, before token is verified in judgement, first the SIM card information of user is carried out Verifying may filter that part without the user by real-name authentication and the user not registered.
The step of various methods divide above, be intended merely to describe it is clear, when realization can be merged into a step or Certain steps are split, multiple steps are decomposed into, as long as including identical logical relation, all in the protection scope of this patent It is interior;To adding inessential modification in algorithm or in process or introducing inessential design, but its algorithm is not changed Core design with process is all in the protection scope of the patent.
Third embodiment of the invention is related to a kind of identity identifying method, be applied to client, with first embodiment or It is corresponding applied to the identity identifying method of server in second embodiment.The flow chart of present embodiment is as shown in figure 3, packet It includes:
Step 301, certification request is sent to server.
Specifically, server can issue the key of an encryption when user installs client on the terminal device It gives this client, and will in this client SIM card corresponding phone number and the key bindings that issue, in server sheet Ground saves the corresponding relationship of this phone number with the key issued.When user wants to log in application, inputting electricity in client Words number and the button for triggering authentication are sent after client, which receives, detects that authentication button is triggered to server Checking request may include the telephone number of user's input in this checking request.
Step 302, it is requested in response to the verifying token that the server is sent, Xiang Suoshu server is sent with preset algorithm The verifying token of generation judges what the verifying token and the server were generated according to the preset algorithm for the server Whether local token matches, if matching, determines to authenticate successfully, otherwise determines that certification is unsuccessful.
Specifically, when server is after detecting Environmental security, the checking request that customer in response end is sent, and to client End sends the message of a requests verification token, and client is generated according to preset algorithm and verified after receiving this request Token, wherein the calculating parameter for verifying token includes timestamp and is handed down to the key of client in advance.
It is not difficult to find that present embodiment is embodiment corresponding with first embodiment or second embodiment, this reality The mode of applying can work in coordination implementation with first embodiment or second embodiment.In first embodiment or second embodiment The relevant technical details mentioned are still effective in the present embodiment, and in order to reduce repetition, which is not described herein again.Correspondingly, originally The relevant technical details mentioned in embodiment are also applicable in first embodiment or second embodiment.
Present embodiment compared with the prior art for, by requesting client send with preset algorithm generate verifying enable Board, and judge verifying token and the server that client is sent with preset algorithm generate the local whether matched method of token come into The calculating parameter of row authentication, the verifying token sent due to client includes timestamp and server issue in advance it is close Key, and the local token computation parameter that server generates includes timestamp and is handed down to the key of the client in advance, and It is identical with the local generating algorithm of token to verify token, so, when the verifying that the verifying token that client is sent is from a locally generated Token matched, so that it may think current time user log in environment be it is safe, judgement authenticate successfully, due to server and client The interaction by way of network communication between end, for the mode of short-message verification, interaction is very fast and is not easily susceptible to information It intercepts, safer, without being related to third-party short-message verification platform, therefore certification cost is also lower.
Four embodiment of the invention is related to a kind of server, as shown in figure 4, server 400 includes at least one processing Device 401;And the memory 402 with the communication connection of at least one processor 401;Wherein, be stored with can be by extremely for memory 402 The instruction that a few processor 401 executes, instruction is executed by least one processor 401, so that at least one 401 energy of processor Enough execute the above-mentioned identity identifying method applied to server.
Wherein, memory 402 is connected with processor 401 using bus mode, and bus may include any number of interconnection Bus and bridge, bus is by one or more processors 401 together with the various circuit connections of memory 402.Bus may be used also With by such as peripheral equipment, voltage-stablizer, together with various other circuit connections of management circuit or the like, these are all It is known in the art, therefore, it will not be further described herein.Bus interface provides between bus and transceiver Interface.Transceiver can be an element, be also possible to multiple element, such as multiple receivers and transmitter, provide for The unit communicated on transmission medium with various other devices.The data handled through processor 401 pass through antenna on the radio medium It is transmitted, further, antenna also receives data and transfers data to processor 401.
Processor 401 is responsible for management bus and common processing, can also provide various functions, including timing, periphery connects Mouthful, voltage adjusting, power management and other control functions.And memory 402 can be used for storage processor 401 and execute Used data when operation.
Fifth embodiment of the invention is related to a kind of electronic equipment, as shown in figure 5, electronic equipment 500 includes at least one Processor 501;And the memory 502 with the communication connection of at least one processor 501;Wherein, be stored with can for memory 502 The instruction executed by least one processor 501, instruction is executed by least one processor 501, so that at least one processor 501 are able to carry out the above-mentioned identity identifying method applied to client.
Wherein, memory 502 is connected with processor 501 using bus mode, and bus may include any number of interconnection Bus and bridge, bus is by one or more processors 501 together with the various circuit connections of memory 502.Bus may be used also With by such as peripheral equipment, voltage-stablizer, together with various other circuit connections of management circuit or the like, these are all It is known in the art, therefore, it will not be further described herein.Bus interface provides between bus and transceiver Interface.Transceiver can be an element, be also possible to multiple element, such as multiple receivers and transmitter, provide for The unit communicated on transmission medium with various other devices.The data handled through processor 501 pass through antenna on the radio medium It is transmitted, further, antenna also receives data and transfers data to processor 501.
Processor 501 is responsible for management bus and common processing, can also provide various functions, including timing, periphery connects Mouthful, voltage adjusting, power management and other control functions.And memory 502 can be used for storage processor 501 and execute Used data when operation.
Sixth embodiment of the invention is related to a kind of computer readable storage medium, is stored with computer program.Computer Above method embodiment is realized when program is executed by processor.
That is, it will be understood by those skilled in the art that implement the method for the above embodiments be can be with Relevant hardware is instructed to complete by program, which is stored in a storage medium, including some instructions are to make It obtains an equipment (can be single-chip microcontroller, chip etc.) or processor (processor) executes each embodiment method of the application All or part of the steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey The medium of sequence code.
It will be understood by those skilled in the art that the respective embodiments described above are to realize specific embodiments of the present invention, And in practical applications, can to it, various changes can be made in the form and details, without departing from the spirit and scope of the present invention.

Claims (12)

1. a kind of identity identifying method, which is characterized in that be applied to server, comprising:
In response to the certification request of client, the client is requested to send the verifying token generated with preset algorithm;
Judge whether the verifying token matches with the server according to the local token that the preset algorithm generates, if Match, then determine to authenticate successfully, otherwise determines that certification is unsuccessful;
Wherein, the calculating parameter of the verifying token includes timestamp and is handed down to the key of the client in advance;
The calculating parameter of the local token includes timestamp and the key for being handed down to the client in advance.
2. identity identifying method according to claim 1, which is characterized in that
The calculating parameter of the verifying token further includes the telephone number of user's input, and the calculating parameter of the local token is also wrapped Include the telephone number with the key bindings.
3. identity identifying method according to claim 1, which is characterized in that send in the request client with pre- Before the verifying token that imputation method generates, further includes:
Local whether preserve and the matched user information of the SIM card information of the client judged, and if it exists, then execute institute again It states and the client is requested to send the verifying token generated with preset algorithm, otherwise determine that certification does not pass through.
4. identity identifying method according to claim 3, which is characterized in that
The SIM card information of the client is obtained by the interface for calling operator to provide.
5. identity identifying method according to claim 1, which is characterized in that
In the algorithmic rule of the preset algorithm, if the timestamp of the timestamp of the verifying token and the local token The time difference is more than preset threshold, then the calculated result of the verifying token and the calculated result of the local token mismatch.
6. a kind of server characterized by comprising
At least one processor;And
The memory being connect at least one described processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one described processor, and described instruction is by described at least one It manages device to execute, so that at least one described processor is able to carry out the authentication side as described in any in claim 1 to 5 Method.
7. a kind of identity identifying method, which is characterized in that be applied to client, comprising:
Certification request is sent to server;
In response to the verifying token request that the server is sent, Xiang Suoshu server is sent to be enabled with the verifying that preset algorithm generates Board judges whether is local token that the verifying token and the server are generated according to the preset algorithm for the server Otherwise matching determines that certification is unsuccessful if matching, determines to authenticate successfully;
Wherein, the calculating parameter of the verifying token includes timestamp and is handed down to the key of the client in advance, described The calculating parameter of local token includes timestamp and the key for being handed down to the client in advance.
8. identity identifying method according to claim 7, which is characterized in that
The calculating parameter of the verifying token further includes the telephone number of user's input, and the calculating parameter of the local token is also wrapped Include the telephone number with the key bindings.
9. identity identifying method according to claim 7, which is characterized in that
The verifying token request is locally preserved for the server in judgement matched with the SIM card information of the client After user information, requested with the verifying token that the preset algorithm generates.
10. identity identifying method according to claim 9, which is characterized in that
The SIM card information of the client is obtained by the interface for calling operator to provide.
11. identity identifying method according to claim 7, which is characterized in that
In the algorithmic rule of the preset algorithm, if the timestamp of the timestamp of the verifying token and the local token The time difference is more than preset threshold, then the calculated result of the verifying token and the calculated result of the local token mismatch.
12. a kind of electronic equipment characterized by comprising
At least one processor;And
The memory being connect at least one described processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one described processor, and described instruction is by described at least one It manages device to execute, so that at least one described processor is able to carry out the authentication side as described in any in claim 7 to 11 Method.
CN201910402717.1A 2019-05-15 2019-05-15 Identity identifying method and server, electronic equipment Pending CN110266642A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910402717.1A CN110266642A (en) 2019-05-15 2019-05-15 Identity identifying method and server, electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910402717.1A CN110266642A (en) 2019-05-15 2019-05-15 Identity identifying method and server, electronic equipment

Publications (1)

Publication Number Publication Date
CN110266642A true CN110266642A (en) 2019-09-20

Family

ID=67913199

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910402717.1A Pending CN110266642A (en) 2019-05-15 2019-05-15 Identity identifying method and server, electronic equipment

Country Status (1)

Country Link
CN (1) CN110266642A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110830471A (en) * 2019-11-06 2020-02-21 北京一砂信息技术有限公司 OTP (one time password) verification method, server, client and computer-readable storage medium
CN111432405A (en) * 2020-03-31 2020-07-17 中电四川数据服务有限公司 Authorization authentication method and system for electronic medical record
CN111444499A (en) * 2020-03-31 2020-07-24 中国人民解放军海军潜艇学院 User identity authentication method and system
CN111491064A (en) * 2020-04-01 2020-08-04 支付宝(杭州)信息技术有限公司 Voice service identity authentication method and system
CN111654379A (en) * 2020-06-08 2020-09-11 杭州安恒信息技术股份有限公司 Multi-server unified token generation method and authentication method
CN112788033A (en) * 2021-01-13 2021-05-11 京东方科技集团股份有限公司 Authentication method and authentication system
CN112953719A (en) * 2019-11-26 2021-06-11 北京京东尚科信息技术有限公司 Token authentication method and device
CN113132317A (en) * 2019-12-31 2021-07-16 中移互联网有限公司 Identity authentication method, system and device
CN113536250A (en) * 2021-06-02 2021-10-22 上海硬通网络科技有限公司 Token generation method, login verification method and related equipment
CN115713339A (en) * 2023-01-09 2023-02-24 量子科技长三角产业创新中心 Data quantum computing management and control method, device, equipment and computer medium
WO2023236925A1 (en) * 2022-06-08 2023-12-14 华为技术有限公司 Authentication method and communication device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188229A (en) * 2011-12-30 2013-07-03 上海贝尔股份有限公司 Method and equipment for secure content access
CN104821937A (en) * 2015-03-26 2015-08-05 腾讯科技(北京)有限公司 Token acquisition method, device and system
CN104967597A (en) * 2014-11-04 2015-10-07 深圳市腾讯计算机系统有限公司 Third-party application message authentication method and system based on secure channel
CN105592065A (en) * 2015-11-05 2016-05-18 中国银联股份有限公司 Method and system for website registration on the basis of mobile phone message
CN105827577A (en) * 2015-01-08 2016-08-03 阿里巴巴集团控股有限公司 Method and device for information verification
CN106790274A (en) * 2017-02-20 2017-05-31 中国科学院信息工程研究所 A kind of method that disposal password logs in WLAN
CN109413650A (en) * 2018-11-28 2019-03-01 亚信科技(南京)有限公司 A kind of identity identifying method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188229A (en) * 2011-12-30 2013-07-03 上海贝尔股份有限公司 Method and equipment for secure content access
CN104967597A (en) * 2014-11-04 2015-10-07 深圳市腾讯计算机系统有限公司 Third-party application message authentication method and system based on secure channel
CN105827577A (en) * 2015-01-08 2016-08-03 阿里巴巴集团控股有限公司 Method and device for information verification
CN104821937A (en) * 2015-03-26 2015-08-05 腾讯科技(北京)有限公司 Token acquisition method, device and system
CN105592065A (en) * 2015-11-05 2016-05-18 中国银联股份有限公司 Method and system for website registration on the basis of mobile phone message
CN106790274A (en) * 2017-02-20 2017-05-31 中国科学院信息工程研究所 A kind of method that disposal password logs in WLAN
CN109413650A (en) * 2018-11-28 2019-03-01 亚信科技(南京)有限公司 A kind of identity identifying method and system

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110830471A (en) * 2019-11-06 2020-02-21 北京一砂信息技术有限公司 OTP (one time password) verification method, server, client and computer-readable storage medium
CN110830471B (en) * 2019-11-06 2022-05-24 北京一砂信息技术有限公司 OTP (one time password) verification method, server, client and computer-readable storage medium
CN112953719A (en) * 2019-11-26 2021-06-11 北京京东尚科信息技术有限公司 Token authentication method and device
CN112953719B (en) * 2019-11-26 2023-03-07 北京京东尚科信息技术有限公司 Token authentication method and device
CN113132317A (en) * 2019-12-31 2021-07-16 中移互联网有限公司 Identity authentication method, system and device
CN113132317B (en) * 2019-12-31 2023-03-21 中移互联网有限公司 Identity authentication method, system and device
CN111444499A (en) * 2020-03-31 2020-07-24 中国人民解放军海军潜艇学院 User identity authentication method and system
CN111432405A (en) * 2020-03-31 2020-07-17 中电四川数据服务有限公司 Authorization authentication method and system for electronic medical record
CN111444499B (en) * 2020-03-31 2022-12-06 中国人民解放军海军潜艇学院 User identity authentication method and system
CN111491064A (en) * 2020-04-01 2020-08-04 支付宝(杭州)信息技术有限公司 Voice service identity authentication method and system
CN111654379A (en) * 2020-06-08 2020-09-11 杭州安恒信息技术股份有限公司 Multi-server unified token generation method and authentication method
CN112788033A (en) * 2021-01-13 2021-05-11 京东方科技集团股份有限公司 Authentication method and authentication system
CN112788033B (en) * 2021-01-13 2022-09-20 京东方科技集团股份有限公司 Authentication method and authentication system
CN113536250A (en) * 2021-06-02 2021-10-22 上海硬通网络科技有限公司 Token generation method, login verification method and related equipment
CN113536250B (en) * 2021-06-02 2023-07-04 上海硬通网络科技有限公司 Token generation method, login verification method and related equipment
WO2023236925A1 (en) * 2022-06-08 2023-12-14 华为技术有限公司 Authentication method and communication device
CN115713339A (en) * 2023-01-09 2023-02-24 量子科技长三角产业创新中心 Data quantum computing management and control method, device, equipment and computer medium

Similar Documents

Publication Publication Date Title
CN110266642A (en) Identity identifying method and server, electronic equipment
CN104144163B (en) Auth method, apparatus and system
US10237072B2 (en) Signatures for near field communications
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
CN103249045A (en) Identification method, device and system
CN103905194B (en) Identity traceability authentication method and system
KR20130109322A (en) Apparatus and method to enable a user authentication in a communication system
CN110278084B (en) eID establishing method, related device and system
CN111800377B (en) Mobile terminal identity authentication system based on safe multi-party calculation
CN111371725A (en) Method for improving security of session mechanism, terminal equipment and storage medium
CN104426659A (en) Dynamic password generating method, authentication method, authentication system and corresponding equipment
CN109729000B (en) Instant messaging method and device
CN109583154A (en) A kind of system and method based on Web middleware access intelligent code key
CN103401686B (en) A kind of user's OTP WEB Authentication System and application process thereof
CN106203021A (en) The application login method of a kind of many certification modes integration and system
CN109587683B (en) Method and system for preventing short message from being monitored, application program and terminal information database
CN111737681A (en) Resource acquisition method and device, storage medium and electronic device
CN107645474B (en) Method and device for logging in open platform
CN107835162A (en) The method that software digital permit server signs and issues software digital permissions
CN112039857B (en) Calling method and device of public basic module
KR101133167B1 (en) Method and apparatus for user verifing process with enhanced security
CN108123918A (en) A kind of account authentication login method and device
CN105848148A (en) WIFI connection method, terminal and router
CN115086090A (en) Network login authentication method and device based on UKey
CN113591053A (en) Method and system for identifying general mobile equipment based on biological information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190920