CN111865913A - Authentication method, electronic device and computer-readable storage medium - Google Patents

Authentication method, electronic device and computer-readable storage medium Download PDF

Info

Publication number
CN111865913A
CN111865913A CN202010537682.5A CN202010537682A CN111865913A CN 111865913 A CN111865913 A CN 111865913A CN 202010537682 A CN202010537682 A CN 202010537682A CN 111865913 A CN111865913 A CN 111865913A
Authority
CN
China
Prior art keywords
user
information
terminal
user information
platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010537682.5A
Other languages
Chinese (zh)
Inventor
彭程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Jiaochuang Rongdong Technology Co ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010537682.5A priority Critical patent/CN111865913A/en
Publication of CN111865913A publication Critical patent/CN111865913A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education
    • G06Q50/205Education administration or guidance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Educational Administration (AREA)
  • Educational Technology (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Physics & Mathematics (AREA)
  • Primary Health Care (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the application provides an authentication method, electronic equipment and a computer readable storage medium, wherein the method comprises the following steps: acquiring an identification code of a platform terminal; sending an authentication application instruction to an external network server, wherein the authentication application instruction comprises an identification code and user information corresponding to a user terminal, and the authentication application instruction is used for indicating the external network server to judge whether the user information is legal or not and feeding back platform data information corresponding to the identification code when the user information is legal; when receiving the platform data information, initiating a pairing request to a platform terminal according to pairing information in the platform data information; and when the pairing with the platform terminal is successful, sending the user information and a starting instruction to the platform terminal, wherein the starting instruction is used for indicating the platform terminal to log in a teaching system of the platform terminal according to the user information. According to the method and the system, the user terminal can complete system login only by acquiring the identification code, and compared with the prior art, the legality of the user identity is verified, and the manual operation amount is reduced.

Description

Authentication method, electronic device and computer-readable storage medium
Technical Field
The present application relates to the field of education technologies, and in particular, to an authentication method, an electronic device, and a computer readable storage medium.
Background
Along with the popularization of multimedia teaching, the intelligent platform is greatly popularized by schools. In the prior art, for the use of managing intelligent podium, adopt mechanical type mode of unblanking usually to open after the podium terminal is uncapped, supply the user to use teaching system, as long as the user possess the mechanical key that corresponds just can start the computer system of intelligent podium. The mechanical unlocking mode has the defect of not in-place supervision on the identity of a user, and the safety is low.
Content of application
The embodiment of the application provides an authentication method and electronic equipment, and aims to solve the problem that the intelligent platform is not in place to be supervised by using an identity in the prior art.
In order to achieve the above object, a first aspect of the embodiments of the present application provides an authentication method, applied to a user terminal, including:
acquiring an identification code of a platform terminal;
sending an authentication application instruction to an extranet server, wherein the authentication application instruction comprises the identification code and user information corresponding to the user terminal, and the authentication application instruction is used for indicating the extranet server to judge whether the user information is legal or not and feeding back platform data information corresponding to the identification code when the user information is legal;
When the platform data information is received, initiating a pairing request to the platform terminal according to pairing information in the platform data information;
and when the pairing with the platform terminal is successful, sending the user information and a starting instruction to the platform terminal, wherein the starting instruction is used for indicating the platform terminal to log in a teaching system of the platform terminal according to the user information.
A second aspect of the present application provides an authentication method, applied to a platform terminal, including:
when successful pairing with a user terminal is detected, receiving user information and a starting instruction sent by the user terminal, wherein the starting instruction and the user information are sent out after the user terminal is successfully paired with the platform terminal according to pairing information in platform data information corresponding to the platform terminal, the platform data information is platform data information which is sent out by the external network server when the user information in an authentication application instruction sent by the user terminal is combined and corresponds to an identification code in the authentication application instruction, the authentication application instruction is sent out after the user terminal obtains the identification code of the platform terminal, and the authentication application instruction comprises the user information and the identification code;
Responding to the starting instruction, and logging in a teaching system loaded on the platform terminal according to the user information.
A third aspect of embodiments of the present application provides an electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the method provided in the first aspect or the method provided in the second aspect when executing the computer program.
A fourth aspect of embodiments of the present application provides a readable storage medium, which stores a computer program that, when executed by a processor, implements the steps of the method provided in the first aspect or the method provided in the second aspect of the present application.
In the embodiment of the application, when the user uses the platform terminal, the user terminal is only required to obtain the identification code of the platform terminal and initiate an authentication application instruction to the external network so as to verify the identity information of the user. And when the user identity is qualified, the user terminal establishes connection with the platform terminal according to the pairing information in the platform data information, and the platform terminal automatically completes the login of the user information. The whole process only needs to utilize the user terminal to obtain the identification code to complete the login of the teaching system, compared with the prior art, the legality of the user identity can be effectively verified, the safety of teaching data is effectively improved, and the manual operation amount is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the structures shown in the drawings without any creative efforts.
Fig. 1 is a schematic diagram of an authentication system according to an embodiment of the present application;
fig. 2 is a schematic flowchart of an authentication method according to a second embodiment of the present application;
fig. 3 is a schematic flowchart of an authentication method according to a third embodiment of the present application;
fig. 4 is a schematic flowchart of an authentication method according to a fourth embodiment of the present application;
fig. 5 is a schematic flowchart of an authentication method according to a fifth embodiment of the present application;
fig. 6 is a schematic diagram of a user terminal according to a sixth embodiment of the present application;
fig. 7 is a schematic view of a podium terminal according to a seventh embodiment of the present application;
fig. 8 is a schematic hardware structure diagram of an electronic device according to an eighth embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
Referring to fig. 1, a schematic diagram of an authentication system provided in an embodiment of the present application includes a user terminal 200, a platform terminal 100, an extranet server 300, and an intranet server 400, where the user terminal 200 is connected to the extranet server 300 based on 4G, 5G, GPRS, a campus extranet gateway interface, and the like, and the platform terminal 100 is in communication connection with the intranet server 400 through the campus intranet gateway interface.
The user terminal 200 may be a mobile phone, a tablet computer, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, a Personal Digital Assistant (PDA), and other terminal devices with a bluetooth function, the podium terminal 100 is an intelligent podium loaded with a teaching system, and the teaching system may be a commonly used operating system such as Windows 10 or Windows 7, and may also be other teaching application programs based on Windows 10 or Windows 7.
It is understood that the number of the platform terminals 100 may be plural, and each platform terminal 100 is connected to the intranet server 400.
It is to be understood that the lecture station terminal 100 may also be connected with the extranet server 300.
When the user uses the teaching system of the platform terminal 100, the authentication method provided by the embodiment of the application is executed by the user terminal 200 and the platform terminal 100 to achieve the authentication of the user identity.
The authentication method performed by the user terminal 200 and the platform terminal 100 is described below.
Referring to fig. 2, a flowchart of an authentication method provided in the second embodiment of the present application is applied to a user terminal 200, and includes:
s101, acquiring an identification code of the platform terminal 100;
in this embodiment, a label is attached to the platform terminal 100. The label may be a bar code label, a two-dimensional code label, or a digital label. When the user terminal 200 scans and identifies the tag, the identification code recorded in the tag, which is the identification code of the platform terminal 100, is obtained. For example, when the tag is a two-dimensional code tag, the user terminal 200 scans a two-dimensional code graph of the two-dimensional code tag to obtain a character string composed of a number and a character, where the character string is an identification code of the platform terminal 100. The identification code should uniquely correspond to the lecture station terminal 100.
In another embodiment, the identification code of the platform terminal 100 is attached to the platform terminal 100, the user terminal 200 has an input box, and the user terminal 200 acquires the identification code of the platform terminal 100 when the user inputs the identification code into the input box.
S102, sending an authentication application instruction to an external network server 300, wherein the authentication application instruction comprises the identification code and user information corresponding to the user terminal 200, and the authentication application instruction is used for indicating the external network server 300 to judge whether the user information is legal or not and feeding back podium data information corresponding to the identification code when the user information is legal;
the user terminal 200 acquires the identification code of the platform terminal 100, and then transmits an authentication application command to the foreign network server 300. The authentication application instruction includes an identification code of the platform terminal 100 that needs to be authenticated, that is, an identification code acquired by the user terminal 200.
Illustratively, the user terminal 200 acquires the identification code, and encapsulates the user information, the unique identification code, and the instruction content of the login user terminal 200 to form the authentication application instruction. The instruction content may be instruction type information or instruction operation information. When the instruction content is instruction type information, the extranet server 300 executes a corresponding operation according to the operation content indicated by the instruction type. For example, if the instruction type a indicates an authentication operation, the external network server 300 verifies the user information according to the preset operation content (authentication) of the instruction type a after receiving the authentication application instruction.
The user information may include a user ID. The user ID may be a user name, a mobile phone number, an identity card number, or a number automatically assigned when the user registers. It is understood that the user information of the user terminal 200 can log in the tutorial system of the lecture station terminal 100.
The extranet server 300 prestores user information and platform data information stored in association with the identification code of the platform terminal 100, and when receiving an authentication application instruction, analyzes the user information and the identification code in the authentication application instruction. And when the user information in the authentication application instruction is matched with the pre-stored user information, the user information in the authentication application instruction is legal. Further, the extranet server 300 searches for the lecture data information stored in association with the identification code and transmits the lecture data information to the user terminal 200.
S103, when receiving the platform data information, initiating a pairing request to the platform terminal 100 according to pairing information in the platform data information;
the platform terminal 100 is provided with a pairing module, and the user terminal 200 and the platform terminal 100 can be paired to realize data interaction. Preferably, the pairing module is a bluetooth module. It can be understood that the bluetooth module of the lecture station terminal 100 is set to the invisible mode by default, that is, the user terminal 200 cannot automatically search the bluetooth module of the lecture station terminal 100 without the pairing information, and can only search the bluetooth module of the lecture station terminal 100 according to the pairing information in the lecture station data information. The pairing information includes bluetooth address information.
When the pairing module is an infrared communication module, a CDMA module, etc., the pairing module is a short-distance communication module.
Alternatively, when the user terminal 200 receives the lecture data information, pairing information in the lecture data information is automatically recognized, and when the pairing information is recognized, the lecture terminal 100 is searched out according to the pairing information and a selection operation icon is displayed to the user. Illustratively, the selection operation icon is "find bluetooth device, connect it" or "find bluetooth device, do not connect it" displayed on the screen of the user terminal 200. When the user clicks the "find bluetooth device, connect it" icon, the user terminal 200 transmits a pairing request to the lecture station terminal 100.
And S104, when the platform terminal 100 is successfully paired, sending the user information and a starting-up instruction to the platform terminal 100, wherein the starting-up instruction is used for indicating the platform terminal 100 to log in the loaded teaching system according to the user information.
In the present embodiment, when the lecture station terminal 100 receives the pairing request, the pairing is passed by default.
Optionally, the platform data information further includes a pairing key, the pairing key is simultaneously transmitted when the user terminal 200 initiates a pairing request, and when the pairing key transmitted by the user terminal 200 matches with the pairing key stored or cached in the platform terminal 100, the user terminal 200 and the platform terminal 100 are successfully paired. The setting of the pairing key increases a security barrier for the use of the platform terminal 100, which helps to prevent an unidentified person from directly connecting the platform terminal 100 under the condition of knowing or cracking the pairing information of the platform terminal 100. It is to be understood that the mating key may be a static key or a dynamic key. When the pairing key is a dynamic key, the extranet server 300 transmits the platform data information to the user terminal 200, and simultaneously transmits the dynamic key to the platform terminal 100, and at this time, the key in the platform data information is the same as the dynamic key received by the platform terminal 100.
When the pairing with the platform terminal 100 is successful, the user terminal 200 transmits user information and a power-on instruction to the platform terminal 100. The user information includes a user ID and a user password, and the power-on instruction is used to instruct the platform terminal 100 to log in the correspondingly loaded teaching system. The teaching system can be a common operating system such as Windows 10, Windows 7 or android system, or other teaching application programs based on Windows 10, Windows 7 or android system. When the teaching system is a teaching application program, the platform terminal 100 starts up in response to the power-on instruction and logs in the operating system according to the user information, and after starting up in response to the power-on instruction and logging in the operating system, starts the teaching application program and logs in the teaching application program according to the user information. For example, the teaching application program is "XX high school teaching system", after the operating system is started, a login interface is automatically popped up and information in the login interface is filled to realize login, and at this time, the user can use the teaching system to perform teaching work.
Optionally, when the user clicks a power-on key on the user terminal 200, the user terminal 200 is triggered to generate and send a power-on instruction. The power-on command may also be automatically generated and transmitted by the user terminal 200 after the pairing with the platform terminal 100 is successful.
In this embodiment, when the user uses the platform terminal 100, the user terminal 200 is only required to obtain the identification code of the platform terminal 100 and send an authentication application instruction to the external network to verify the user identity information. And when the user identity is qualified, the user terminal 200 establishes a connection with the platform terminal 100 according to the pairing information in the platform data information, and the platform terminal 100 automatically completes the login of the user information. The whole process only needs to utilize the user terminal 200 to obtain the identification code to complete the login of the teaching system, compared with the prior art, the validity of the user identity is effectively verified, the safety of teaching data is ensured, the step of logging in the teaching system by the user is greatly simplified, and the step of inputting the user information and the password by the user at the platform terminal 100 by self is omitted.
In another embodiment, after receiving the podium data information, the method further includes: the locally associating the stored identification code and the platform data information correspondingly includes, after step S101: locally searching the platform data information stored in association with the identification code, and when the platform data information corresponding to the identification code is searched, executing: and initiating a pairing request to the platform terminal according to the pairing information in the platform data information, and executing the step S102 when the platform data information corresponding to the identification code is not found. The user terminal 200 locally stores, using the user information as a group, a correspondence between the identification code of the lecture station terminal 100 used by each user information and the lecture station data information. The embodiment is beneficial to accelerating the whole login process and simplifying the authentication process.
In addition, after the user terminal acquires the identification code of the platform terminal, when the user terminal is not paired with the platform terminal and cannot be connected with an external network, namely the user terminal is communicated with the external network server and does not locally find platform data information stored in association with the identification code, the user terminal is communicated with the internal network server. The user terminal inquires a local area network nearby, such as a school intranet, applies for adding the local area network, and is connected with an intranet server through local area network communication.
The user terminal sends an authentication application instruction to the intranet server, and the intranet server judges whether the user information in the authentication application instruction is legal or not and feeds back the data information of the interphone corresponding to the identification code when the user information is legal.
According to the embodiment, the user information verification mode is expanded, so that the verification is more flexible.
Referring to fig. 3, a schematic flowchart of an authentication method provided in the third embodiment of the present application is applied to the platform terminal 100, and includes:
s201, when detecting that the pairing with the user terminal 200 is successful, receiving user information and a power-on instruction sent by the user terminal 200, where the power-on instruction and the user information are sent after the user terminal 200 successfully pairs with the podium terminal 100 according to pairing information in podium data information corresponding to the podium terminal 100, the podium data information is podium data information corresponding to an identification code in an authentication application instruction sent by the foreign network server 300 when the user information in the authentication application instruction sent by the user terminal 200 is legal, and the application authentication instruction is sent after the user terminal 200 acquires the identification code of the podium terminal 100, and the authentication application instruction includes the user information and the identification code;
S202, responding to the starting-up instruction, and logging in a teaching system loaded on the platform terminal according to the user information.
In this embodiment, when the platform terminal 100 detects that the pairing with the user terminal 200 is successful, the user information and the power-on instruction sent by the user terminal 200 are received. The user information includes a user ID and a user password, and the power-on instruction is used to instruct the platform terminal 100 to log in the correspondingly loaded teaching system. The teaching system can be a common operating system such as Windows 10, Windows 7 or android system, or other teaching application programs based on Windows 10, Windows 7 or android system. When the teaching system is a teaching application program, the platform terminal 100 starts up in response to the power-on instruction and logs in the operating system according to the user information, and after starting up in response to the power-on instruction and logging in the operating system, starts the teaching application program and logs in the teaching application program according to the user information. For example, the teaching application program is "XX high school teaching system", after the operating system is started, the login interface is automatically popped up and information in the login interface is filled to realize login, and at this time, the user can use the teaching system to perform teaching work.
Wherein, the power-on instruction with the user information do the user terminal 200 according to with pairing information in the podium data information that podium terminal 100 corresponds with the podium terminal 100 pairs and sends after succeeding in, the podium data information does extranet server 300 is in user information in the authentication application instruction that user terminal 200 sent is legal send with the podium data information that the identification code in the authentication application instruction corresponds, the authentication application instruction does user terminal 200 acquires and sends behind the identification code of podium terminal 100, apply for the authentication instruction include with user information with the identification code. Please refer to the content recorded in the first embodiment for the steps performed by the user terminal 200 before sending the power-on command and the user information, which are not described herein.
Optionally, when the user clicks a power-on key on the user terminal 200, the user terminal 200 is triggered to generate and send a power-on instruction.
In this embodiment, when the user uses the platform terminal 100, the user terminal 200 is only required to obtain the identification code of the platform terminal 100 and send an authentication application instruction to the external network to verify the user identity information. And when the user identity is qualified, the user terminal 200 establishes a connection with the platform terminal 100 according to the pairing information in the platform data information, and the platform terminal 100 automatically completes the login of the user information. The whole process only needs to utilize the user terminal 200 to obtain the identification code to complete the login of the teaching system, compared with the prior art, the validity of the user identity is effectively verified, the safety of teaching data is ensured, the step of logging in the teaching system by the user is greatly simplified, and the step of inputting the user information and the password by the user at the platform terminal 100 by self is omitted.
In another embodiment, the authentication method further comprises: and receiving user information input by a user based on a login interface, and logging in a teaching system loaded on a platform terminal according to the user information when the level corresponding to the user information is a preset level. In this embodiment, direct login to the lecture station terminal is allowed for a specific type of user without authentication through the user terminal. For example, a particular type of user may be an administrative account of the entire school teaching system, or the like. The user information itself may include level information, or the platform terminal locally stores the user information satisfying a preset level, and determines whether the level of the user information is a preset level by matching the user information input by the user with the user information of the preset level.
Referring to fig. 4, a schematic flow chart of an authentication method provided in the fourth embodiment of the present application specifically includes the following steps:
s301, when it is detected that the pairing with the user terminal 200 is successful, receiving user information and a power-on instruction sent by the user terminal 200, where the power-on instruction and the user information are sent after the pairing with the podium terminal 100 is successful by the user terminal 200 according to pairing information in podium data information corresponding to the podium terminal 100, the podium data information is podium data information corresponding to an identification code in an authentication application instruction sent by the extranet server 300 when the user information in the authentication application instruction sent by the user terminal 200 is legal, and the application authentication instruction is sent after the identification code of the podium terminal 100 is obtained by the user terminal 200, and the authentication application instruction includes the user information and the identification code;
S302, locally storing the intranet authentication key in the starting instruction;
s303, responding to the starting-up instruction, and logging in a teaching system loaded on the platform terminal according to the user information;
s304, responding to an intranet connection instruction triggered by the user based on the teaching system, and locally acquiring an intranet authentication key corresponding to the user information.
S305, sending a first authentication request to the intranet server 400, where the first authentication request includes the intranet authentication key and the user information, the first authentication request is used to instruct the intranet server 400 to verify the validity of the intranet authentication key and the user information, and the intranet server 400 establishes a communication connection with the podium terminal 100 when verifying that the intranet authentication key and the user information are valid.
Step S301 is the same as step S201, and step S303 is the same as step S202, which are not described herein again.
In this embodiment, the power-on instruction generated by the user terminal 200 includes an intranet authentication key, where the intranet authentication key is used for verifying the identity when the platform terminal 100 performs data interaction with the intranet server 400, and the intranet authentication key is provided to help protect resource data of the campus intranet from being stolen.
Optionally, the intranet authentication key and the user information are associated and stored in the cache. When the teaching system is restarted, the intranet authentication key in the cache is automatically erased, so that the stealing of resources on the intranet server 400 during abnormal login of the teaching system is avoided.
When a user uses the teaching system, when the user needs to acquire data in the intranet server 400 or upload local data to the intranet server 400 for storage, the intranet connection instruction is triggered through an intranet connection key on an operation interface. In response to the intranet connection command, the podium terminal 100 first obtains an intranet authentication key corresponding to the user information from the local. It will be appreciated that the intranet authentication key is stored in association with the user information.
Wherein, the first identity authentication request comprises user information and an intranet authentication key. The intranet server 400 prestores user information and an intranet authentication key stored in association with the user information. After receiving the first authentication request, the intranet server 400 first verifies whether the user information matches the pre-stored user information, and when the user information matches and the intranet authentication key of the matched user information matches, the intranet server 400 verifies that the intranet authentication key and the user information in the first authentication request are legal, and then the intranet server 400 establishes a communication connection with the platform terminal 100.
When the intranet server 400 verifies that the intranet authentication key and the user information in the first authentication request are legal, the connection request is passed, so that the communication connection with the intercom terminal 100 is established.
When the user information in the first authentication request is not matched with the pre-stored user information or the intranet authentication key is not consistent, the intranet server 400 verifies that the intranet authentication key and the user information in the first authentication request are illegal. At this time, intranet server 400 feeds back that podium terminal 100 has failed to connect.
Referring to fig. 5, a schematic flow chart of an authentication method provided in the fifth embodiment of the present application is specifically as follows:
step S401, when successful pairing with the user terminal 200 is detected, receiving user information and a power-on instruction sent by the user terminal 200, wherein the power-on instruction and the user information are sent after the user terminal 200 successfully pairs with the platform terminal 100 according to pairing information in platform data information corresponding to the platform terminal 100, the platform data information is platform data information which is sent by the external network server 300 when the user information in an authentication application instruction sent by the user terminal 200 is legal and corresponds to an identification code in the authentication application instruction, the application authentication instruction is sent after the user terminal 200 obtains the identification code of the platform terminal 100, and the authentication application instruction comprises the user information and the identification code; similar to step S201, the description is omitted here;
S402, storing the user information and the identification information of the user terminal 200 in a local way in a related way.
The identification information of the user terminal 200 may be device identification information of the user terminal 200. For example the IMEI code of the mobile terminal.
It is understood that the user terminal 200 may be used to log in a plurality of user information. For example, an application is installed on the mobile phone terminal, the user information is used to log in the application, and the user terminal 200 executes the steps in the above embodiment when the user operates the application.
After the user terminal 200 pairs the platform terminal 100, when the platform terminal 100 obtains the user information, the corresponding user information may be searched according to the identification information of the user terminal 200 that is being paired and connected, so as to log in the teaching system.
Step S403, responding to the starting instruction, logging in a teaching system loaded on the platform terminal according to the user information, which is the same as step S202 and is not repeated here;
optionally, step S402 includes:
when there is no pairing record with the user terminal 200, storing the user information and the identification information of the user terminal 200 in a local manner in an associated manner;
and when the pairing record with the user terminal 200 exists and the user terminal 200 does not exist in the identification information association storage record of the user information, storing the user information and the identification information of the user terminal 200 in a local association manner.
In this alternative, when the user terminal 200 is paired with the lecture terminal 100 for the first time, the user information is stored in association with the identification information of the user terminal 200. When the user terminal 200 is paired with the lecture station terminal 100 again and the user information registered by the user terminal 200 is not identical to the user information registered in the history, the user information is stored in association with the identification information of the user terminal 200.
Further, the storing, when there is a pairing record with the user terminal 200 and there is no identification information association storage record of the user terminal 200 and the user information, the associating the user information and the identification information of the user terminal 200 locally includes:
when there is a pairing record with the user terminal 200 and there is no storage record in which the user terminal 200 is associated with the identification information of the user information, sending a second authentication request to the extranet server 300; the second authentication request is used to instruct the extranet server 300 to verify the validity of the user information in the second authentication request and feed back an authentication result;
receiving the identity verification result;
and when the identity authentication result shows that the user information is legal, storing the user information and the identification information of the user terminal 200 to the local in a correlation manner.
In this alternative, when there is a pairing record with the user terminal 200 and there is no storage record in which the user terminal 200 is associated with the identification information of the user information, there is a case where the user information is not verified by the extranet server 300. Accordingly, the lecture station terminal 100 transmits the second identity authentication request to the extranet server 300.
The second authentication request includes user information and device information of the lecture station terminal 100. The device information of the platform terminal 100 may be an identification code of the platform terminal 100. After verifying the validity of the user information, the extranet server 300 feeds back the authentication result to the platform terminal 100 corresponding to the device information of the platform terminal 100.
When the authentication result fed back by the extranet server 300 indicates that the user is legal, the following steps are executed: and storing the user information and the identification information of the user terminal 200 in a local manner in a related manner.
It is to be understood that when the authentication result fed back by the extranet server 300 indicates that the user is illegal, step S403 is not performed.
Further optionally, after step S402, the method further includes:
and marking the user information as first user information.
Correspondingly, the step S403 of logging in the loaded teaching system according to the user information includes:
And logging in the loaded teaching system according to the first user information.
In this alternative, the current user information is marked as the first user information, and the platform terminal 100 logs in the teaching system according to the first user information, which helps to avoid the situation that the user information for logging in the teaching system is wrong when the user terminal 200 corresponds to a plurality of user information.
Optionally, the platform terminal 100 is prestored with a first user information table, and the first user information table associates the identification information of the recording user terminal 200 with the first user information. The marking of the user information as the first user information may be to overlay the user information in the first user information table with the current first user information corresponding to the identification information of the user terminal 200.
Referring to fig. 6, which is a schematic diagram of a user terminal 200 according to a sixth embodiment of the present application, the user terminal 200 includes units for executing steps in the embodiment corresponding to fig. 2. Please refer to fig. 2 for a related description of an embodiment. The user terminal 200 includes:
a first obtaining module 61, configured to obtain an identification code of the platform terminal 100;
a first communication module 62, configured to send an authentication application instruction to an extranet server 300, where the authentication application instruction includes the identification code and user information corresponding to the user terminal 200, and the authentication application instruction is used to instruct the extranet server 300 to determine whether the user information is legal, and when the user information is legal, feed back platform data information corresponding to the identification code;
A second communication module 63, which initiates a pairing request to the platform terminal 100 according to pairing information in the platform data information when receiving the platform data information; and is further configured to send the user information and a power-on instruction to the platform terminal 100 when the platform terminal 100 is successfully paired, where the power-on instruction is used to instruct the platform terminal 100 to log in the loaded teaching system according to the user information.
The function implementation of each module in the user terminal 200 corresponds to each step in the above-mentioned authentication method embodiment, and the function and implementation process thereof are not described in detail here.
Referring to fig. 7, which is a schematic diagram of a podium terminal 100 according to a seventh embodiment of the present application, the podium terminal 100 includes units for executing steps in the embodiment corresponding to fig. 3. Please refer to the related description of the embodiment corresponding to fig. 3. The platform terminal 100 includes:
the third communication module 71, when detecting that the pairing with the user terminal 200 is successful, receives the user information and the power-on instruction sent by the user terminal 200;
and the display module 72 is used for responding to the starting instruction and logging in the loaded teaching system according to the user information.
Further comprises a storage module, a second acquisition module and a fourth communication module,
the storage module is used for locally storing the intranet authentication key in the starting instruction;
the second acquisition module is used for responding to an intranet connection instruction triggered by the user based on the teaching system and locally acquiring an intranet authentication key corresponding to the user information;
a fourth communication module, configured to send a first authentication request to an intranet server 400, where the first authentication request includes the intranet authentication key and the user information, the first authentication request is used to instruct the intranet server 400 to verify the validity of the intranet authentication key and the user information, and the intranet server 400 establishes a communication connection with the platform terminal 100 when verifying that the intranet authentication key and the user information are valid.
Further, the storage module is further configured to store the user information and the identification information of the user terminal 200 in a local association manner.
The function implementation of each module in the platform terminal 100 corresponds to each step in the above-mentioned authentication method embodiment, and the function and implementation process thereof are not described in detail here.
Referring to fig. 8, fig. 8 is a schematic diagram of a hardware structure of an electronic device 8 according to an eighth embodiment of the present application. As shown in fig. 8, the electronic device 8 of this embodiment includes: a processor 100, a memory 101 and a computer program 102, such as an authentication program, stored in said memory 101 and operable on said processor 100. The processor 100 executes the computer program 102 to implement the steps in the above-mentioned embodiments of the authentication method, such as the steps S101 to S104 shown in fig. 2 or the steps S201 to 202 shown in fig. 3. Alternatively, the processor 100, when executing the computer program 102, implements the functions of each module/unit in the above device embodiments, such as the functions of the modules 61 to 63 shown in fig. 6 or the functions of the modules 71 to 72 shown in fig. 7.
Illustratively, the computer program 102 may be partitioned into one or more modules/units that are stored in the memory 101 and executed by the processor 100 to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 102 in the electronic device 8. For example, the computer program 102 may be divided into a third communication module and a display module (which is a module in a virtual device), and the specific functions of each module are as follows:
The third communication module receives the user information and the startup instruction sent by the user terminal 200 when detecting that the pairing with the user terminal 200 is successful;
and the display module is used for responding to the starting instruction and logging in the loaded teaching system according to the user information.
The electronic device 8 may be a desktop computer, a notebook, a palm computer, a cloud transaction management platform, or other computing devices. The electronic device 8 may include, but is not limited to, a processor 100, a memory 101. Those skilled in the art will appreciate that fig. 8 is merely an example of an electronic device 8 and does not constitute a limitation of the electronic device 8 and may include more or fewer components than shown, or combine certain components, or different components, for example, the electronic device 8 may also include input-output devices, network access devices, buses, etc.
The electronic device 8 may be a desktop computer, a notebook, a mobile phone, an intelligent platform, a palm computer, a cloud transaction management platform, or other computing devices. The electronic device 8 may include, but is not limited to, a processor 100, a memory 101. Those skilled in the art will appreciate that fig. 8 is merely an example of an electronic device 8 and does not constitute a limitation of the electronic device 8 and may include more or fewer components than shown, or some components may be combined, or different components, e.g., the electronic device 8 may also include input-output devices, network access devices, buses, etc.
The Processor 100 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 101 may be an internal storage unit of the electronic device 8, such as a hard disk or a memory of the electronic device 8. The memory 101 may also be an external storage device of the electronic device 8, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the terminal device. Further, the memory 101 may also include both an internal storage unit and an external storage device of the electronic device 8. The memory 101 is used for storing the computer program and other programs and data required by the terminal device. The memory 101 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned functional units and modules are illustrated as being divided, and in practical applications, the above-mentioned functions may be distributed as different functional units and modules according to needs, that is, the internal structure of the apparatus may be divided into different functional units or modules to complete all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit, and the integrated unit may be implemented in the form of a hardware or a software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. For the specific working processes of the units and modules in the system, reference may be made to the corresponding processes in the foregoing method embodiments, which are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described or recited in detail in a certain embodiment, reference may be made to the descriptions of other embodiments.
Those of ordinary skill in the art would appreciate that the elements and algorithm steps of the various embodiments described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the modules or units is only one logical division, and other divisions may be realized in practice, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed coupling or direct coupling or communication connection between each other may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the processes in the methods of the embodiments described above may be implemented by instructing related hardware through a computer program, which may be stored in a readable storage medium, and when the computer program is executed by a processor, the steps of the embodiments of the methods described above may be implemented. . Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, and software distribution medium, etc. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media may not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application, and are intended to be included within the scope of the present application.

Claims (10)

1. An authentication method applied to a user terminal, comprising:
acquiring an identification code of a platform terminal;
sending an authentication application instruction to an external network server, wherein the authentication application instruction comprises the identification code and user information corresponding to the user terminal, and the authentication application instruction is used for indicating the external network server to judge whether the user information is legal or not and feeding back platform data information corresponding to the identification code when the user information is legal;
when the platform data information is received, initiating a pairing request to the platform terminal according to pairing information in the platform data information;
And when the pairing with the platform terminal is successful, sending the user information and a starting instruction to the platform terminal, wherein the starting instruction is used for indicating the platform terminal to log in the loaded teaching system according to the user information.
2. The authentication method of claim 1, upon receiving the podium data message, further comprising:
locally and associatively storing the identification code and the platform data information;
correspondingly, after the identification code of the platform terminal is obtained, before the platform data information is received and a pairing request is initiated to the platform terminal according to the pairing information in the platform data information, the method includes:
when communication interruption with the extranet server is detected and the podium data information corresponding to the identification code is not found, the communication is connected with an intranet server;
and sending the authentication application instruction to the intranet server, wherein the authentication application instruction is used for indicating the intranet server to judge whether the user information is legal or not, and feeding back the platform data information corresponding to the identification code when the user information is legal.
3. An authentication method is applied to a platform terminal, and is characterized by comprising the following steps:
When successful pairing with a user terminal is detected, receiving user information and a starting instruction sent by the user terminal, wherein the starting instruction and the user information are sent by the user terminal after the user terminal successfully pairs with the platform terminal according to pairing information in platform data information corresponding to the platform terminal, the platform data information is platform data information which is sent by an external network server when the user information in an authentication application instruction sent by the user terminal is legal and corresponds to an identification code in the authentication application instruction, and the authentication application instruction is sent by the user terminal after the identification code of the platform terminal is obtained, and comprises the user information and the identification code;
responding to the starting instruction, and logging in a teaching system loaded on the platform terminal according to the user information.
4. The authentication method according to claim 3, wherein the power-on command includes an intranet authentication key, and after receiving the user information and the power-on command sent by the user terminal, the method further comprises:
locally storing the intranet authentication key;
correspondingly, after logging in the loaded teaching system according to the user information, the method further comprises the following steps:
Responding to an intranet connection instruction triggered by the user based on the teaching system, and locally acquiring an intranet authentication key corresponding to the user information;
sending a first identity verification request to an intranet server, wherein the first identity verification request comprises the intranet authentication key and the user information, the first identity verification request is used for indicating the intranet server to verify the legality of the intranet authentication key and the user information, and the intranet server establishes communication connection with the platform terminal when verifying that the intranet authentication key and the user information are legal.
5. The authentication method as claimed in claim 3 or 4, wherein after receiving the user information and the power-on command sent by the user terminal, the method comprises:
and storing the user information and the identification information of the user terminal to the local in a correlation manner.
6. The authentication method as claimed in claim 5, wherein said storing the user information locally in association with the identification information of the user terminal comprises:
when the pairing record with the user terminal does not exist, the user information and the identification information of the user terminal are stored to the local in a correlation mode;
And when the pairing record with the user terminal exists and the identification information association storage record of the user terminal and the user information does not exist, the user information and the identification information of the user terminal are stored locally in an association manner.
7. The authentication method according to claim 6, wherein the storing the user information and the identification information of the user terminal locally in association when there is a pairing record with the user terminal and there is no identification information association storage record of the user terminal and the user information, comprises:
when the pairing record with the user terminal exists and the storage record of the user terminal and the identification information of the user information in association does not exist, sending a second identity authentication request to an external network server; the second authentication request is used for indicating the external network server to verify the validity of the user information in the second authentication request and feeding back an authentication result;
receiving the identity verification result;
and when the identity authentication result shows that the user information is legal, the user information and the identification information of the user terminal are stored locally in a correlation manner.
8. The authentication method as claimed in claim 5, wherein after storing the user information and the identification information of the user terminal in association to a local, further comprising:
marking the user information as first user information;
correspondingly, the logging in the loaded teaching system according to the user information comprises the following steps:
and logging in the loaded teaching system according to the first user information.
9. An electronic device comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the method of claim 1 or 2, or implements the method of any one of claims 3 to 8, when the computer program is executed by the processor.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to claim 1 or 2, or carries out the method according to any one of claims 3 to 8.
CN202010537682.5A 2020-06-12 2020-06-12 Authentication method, electronic device and computer-readable storage medium Pending CN111865913A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010537682.5A CN111865913A (en) 2020-06-12 2020-06-12 Authentication method, electronic device and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010537682.5A CN111865913A (en) 2020-06-12 2020-06-12 Authentication method, electronic device and computer-readable storage medium

Publications (1)

Publication Number Publication Date
CN111865913A true CN111865913A (en) 2020-10-30

Family

ID=72987888

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010537682.5A Pending CN111865913A (en) 2020-06-12 2020-06-12 Authentication method, electronic device and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN111865913A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150371215A1 (en) * 2002-10-01 2015-12-24 Andrew H B Zhou Systems and methods for mobile application, wearable application, transactional messaging, calling, digital multimedia capture and payment transactions
CN109583163A (en) * 2018-12-21 2019-04-05 四川变体科技有限公司 A kind of Intelligent platform unlocking method and device
CN109726536A (en) * 2017-10-31 2019-05-07 百度(美国)有限责任公司 Method for authenticating, electronic equipment and computer-readable program medium
CN110290525A (en) * 2019-06-21 2019-09-27 湖北亿咖通科技有限公司 A kind of sharing method and system, mobile terminal of vehicle number key
CN111194028A (en) * 2019-11-05 2020-05-22 储长青 Safety control method based on vehicle

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150371215A1 (en) * 2002-10-01 2015-12-24 Andrew H B Zhou Systems and methods for mobile application, wearable application, transactional messaging, calling, digital multimedia capture and payment transactions
CN109726536A (en) * 2017-10-31 2019-05-07 百度(美国)有限责任公司 Method for authenticating, electronic equipment and computer-readable program medium
CN109583163A (en) * 2018-12-21 2019-04-05 四川变体科技有限公司 A kind of Intelligent platform unlocking method and device
CN110290525A (en) * 2019-06-21 2019-09-27 湖北亿咖通科技有限公司 A kind of sharing method and system, mobile terminal of vehicle number key
CN111194028A (en) * 2019-11-05 2020-05-22 储长青 Safety control method based on vehicle

Similar Documents

Publication Publication Date Title
CN112771826B (en) Application program login method, application program login device and mobile terminal
CN108989291B (en) Login verification method, automatic login verification method, server side and client side
CN111831563A (en) Automatic interface test method and device and storage medium
CN112039826B (en) Login method and device applied to applet end, electronic equipment and readable medium
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
CN106326718A (en) Unlocking method, unlocking device and terminal equipment
EP3176719B1 (en) Methods and devices for acquiring certification document
US10831816B2 (en) Method for controlling electronic picture frame, electronic picture frame, electronic picture frame cloud platform and mobile terminal
US20230269103A1 (en) Blockchain-based user information processing method and system
CN111433770A (en) User-selected key authentication
CN104426659A (en) Dynamic password generating method, authentication method, authentication system and corresponding equipment
CN104717224A (en) Login method and device
CN113630253A (en) Login method, device, computer system and readable storage medium
CN112738046A (en) One-key login method, terminal and system server
CN107835162B (en) Software digital permit server gives the method and software digital permit server that permission is signed and issued in the license of software developer's software digital
CN107580002A (en) Double factor authentication safety management machine login system and method
CN114040411A (en) Equipment binding method and device, electronic equipment and storage medium
CN109858235B (en) Portable equipment and password obtaining method and device thereof
CN110602700B (en) Seed key processing method and device and electronic equipment
US20170195425A1 (en) Method and Electronic Device for Remotely Locking a Mobile Terminal
CN104331649A (en) Identity recognition system and method based on network connection
CN111865913A (en) Authentication method, electronic device and computer-readable storage medium
CN112165706B (en) Equipment connection management method and device and Bluetooth equipment
EP4367832A1 (en) User authentication
CN114065142A (en) Application two-dimensional code activation method and device, activation equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220325

Address after: 412000 1601 (10-12) (16-17), Xingfu building, 272 Huanghe North Road, Songshan road street, Tianyuan District, Zhuzhou City, Hunan Province

Applicant after: Hunan Jiaochuang Rongdong Technology Co.,Ltd.

Address before: No. 202, building 26, Swan Garden, Hetang District, Zhuzhou City, Hunan Province, 412000

Applicant before: Peng Cheng

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201030