CN112235177B - Method, device and system for sending authentication information through instant messaging - Google Patents

Method, device and system for sending authentication information through instant messaging Download PDF

Info

Publication number
CN112235177B
CN112235177B CN202010890997.8A CN202010890997A CN112235177B CN 112235177 B CN112235177 B CN 112235177B CN 202010890997 A CN202010890997 A CN 202010890997A CN 112235177 B CN112235177 B CN 112235177B
Authority
CN
China
Prior art keywords
terminal
authentication information
instant messaging
user
mobile phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010890997.8A
Other languages
Chinese (zh)
Other versions
CN112235177A (en
Inventor
马宇尘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Liangming Technology Development Co Ltd
Original Assignee
Shanghai Liangming Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Liangming Technology Development Co Ltd filed Critical Shanghai Liangming Technology Development Co Ltd
Priority to CN202010890997.8A priority Critical patent/CN112235177B/en
Priority to PCT/CN2020/112409 priority patent/WO2022041179A1/en
Publication of CN112235177A publication Critical patent/CN112235177A/en
Application granted granted Critical
Publication of CN112235177B publication Critical patent/CN112235177B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

The invention provides a method, a device and a system for sending authentication information through instant messaging, and relates to the technical field of internet. A method for sending authentication information through instant messaging comprises the following steps: the user uses the second terminal to log in the network; triggering authentication information corresponding to the network login to be sent to a first terminal associated with a second terminal; and acquiring the authentication information through the instant messaging tool on the first terminal, and sending the authentication information to a second terminal logging in the same instant messaging tool identification number. According to the invention, the authentication information is forwarded between the login terminal and the authentication information receiving terminal through the instant messaging tool, so that the convenience of authentication is improved, and the user experience is improved.

Description

Method, device and system for sending authentication information through instant messaging
Technical Field
The invention relates to the technical field of Internet.
Background
Among the five functions of network information security (Authentication, authorization, confidentiality, integrity and non-repudiation), Authentication (Authentication) is the most fundamental and most important link. The identity authentication has the function of ensuring the real intention of the user in a specific decision-making link. Generally, authentication has three elements (multi-factor authentication, MFA): knowledge, such as passwords, security issues; all, such as a mobile phone check code, a U shield; so, for example, the fingerprint, the pupil. From a cryptographic perspective, authentication performed using both of the above is called Two-factor authentication (TFA). Verification codes have been widely used as authentication information in daily life.
With the development of science and technology, mobile phones have been deeply entered into people's lives, and nowadays, many internet software or services regard mobile phones as important means for protecting user passwords.
For example, a user sets a mobile phone number in internet software or service, and the number is used for all purposes such as daily contact, information push service, password protection and the like. Therefore, when the user forgets the password, the user can choose to retrieve the password through the mobile phone number in the software or the service, and the following method can be specifically adopted: firstly, internet software or service sends a password of a user to a reserved mobile phone number through a short message; second, the internet software or service may not send the password directly, but send an authentication code or link to the reserved mobile phone number and instruct the user to recover or reset the password in steps. When the user forgets the password, the user can conveniently find the password through the mobile phone.
For another example, when the user logs in the website, the mobile phone receives the verification code to authenticate the user identity.
The authentication information needs to be operated by a user for multiple times, and particularly for the situation that a terminal for receiving the authentication information and a terminal for logging in are not the same terminal, the user often needs to switch operation between the terminal for logging in and the terminal for receiving the authentication information, the operation is complex, and the operation efficiency of the user is influenced.
Instant Messaging (IM) is the most popular communication mode in the age of mobile internet, and various Instant communication software supports Instant transmission of messages.
How to provide a more intelligent and convenient authentication information transmission mode for a user in combination with the prior art is an urgent problem to be solved.
Disclosure of Invention
The invention aims to: the defects of the prior art are overcome, and a method, a device and a system for sending the authentication information receiving terminal through instant messaging are provided. According to the invention, the authentication information is forwarded between the login terminal and the authentication information receiving terminal through the instant messaging tool, so that the convenience of authentication is improved, and the user experience is improved.
In order to achieve the above object, the present invention provides the following technical solutions:
a method for sending authentication information through instant messaging comprises the following steps: the user uses the second terminal to log in the network; triggering authentication information corresponding to the network login to be sent to a first terminal associated with a second terminal; and acquiring the authentication information through the instant messaging tool on the first terminal, and sending the authentication information to a second terminal logging in the same instant messaging tool identification number.
Further, the method also comprises the following steps: and loading the authentication information into an authentication information input field through the instant messaging tool or a third-party application associated with the instant messaging tool.
Further, the first terminal is a mobile phone, the authentication information is a short message verification code, and the authentication information is received through a short message service of the mobile phone before the instant communication tool collects the authentication information.
Further, the authentication information is a mailbox verification code, and the authentication information is received by an Email tool on the first terminal before the instant communication tool collects the authentication information.
Further, the associated first terminal and second terminal are located in the same local area network.
Further, the first terminal and the second terminal which are related synchronously perform the identity authentication of the user.
Further, collecting the geographic position information of the second terminal and the first terminal;
judging whether the first terminal is located in a preset range of the second terminal;
and if so, transmitting authentication information to the first terminal.
Further, before sending the authentication information to the second terminal which logs in the same instant messaging tool identification number, the method also comprises the step of,
inquiring whether a user needs forwarding operation at a first terminal;
and collecting the operation information of the user, and sending the authentication information to a second terminal logging in the same instant messaging tool identification number when the operation information is judged to be confirmed and forwarded correspondingly.
And further associating the second terminal with the first terminal based on a mobile phone number, an instant messaging tool identification number, an electronic mailbox number, an identity card number and/or a user name set by the user.
And further, associating the second terminal with the first terminal based on the geographic address information and/or the IP address information set by the user.
The invention also discloses a device for sending the authentication information through instant messaging, which comprises the following structure:
the authentication information sending unit is used for triggering the authentication information corresponding to the network login to be sent to the first terminal associated with the second terminal when the user utilizes the second terminal to carry out the network login;
and the authentication information processing unit is used for acquiring the authentication information through the instant messaging tool on the first terminal and sending the authentication information to a second terminal which logs in the same instant messaging tool identification number.
The invention also provides a system for sending authentication information through instant messaging, which comprises:
the second terminal is used for triggering the authentication information corresponding to the network login to be sent to the associated first terminal and receiving the authentication information sent by the first terminal when a user utilizes the second terminal to carry out network login;
the first terminal is used for receiving the authentication information sent by the second terminal, acquiring the authentication information through the instant messaging tool and sending the authentication information to the second terminal which logs in the same instant messaging tool identification number.
Due to the adoption of the technical scheme, compared with the prior art, the invention has the following advantages and positive effects as examples: according to the invention, the authentication information is forwarded between the login terminal and the authentication information receiving terminal through the instant messaging tool, so that the convenience of authentication is improved, and the user experience is improved.
Drawings
Fig. 1 is a flowchart of a method for sending authentication information through instant messaging according to an embodiment of the present invention.
Fig. 2 to fig. 6 are exemplary diagrams of transmission authentication information according to an embodiment of the present invention.
Fig. 7 is a block diagram of an apparatus for sending authentication information through instant messaging according to an embodiment of the present invention.
Fig. 8 is a block diagram of a system for sending authentication information through instant messaging according to an embodiment of the present invention.
Description of reference numerals:
the method comprises the following steps of a computer terminal 100, a mobile phone terminal 200, an ITEM 210, a contact list 220 and a user 300;
the device 400, the authentication information transmission unit 410, the authentication information processing unit 420;
system 500, first terminal 510, second terminal 520.
Detailed Description
The method, apparatus and system for sending authentication information via instant messaging according to the present invention will be described in detail with reference to the accompanying drawings and specific embodiments. It should be noted that technical features or combinations of technical features described in the following embodiments should not be considered as being isolated, and they may be combined with each other to achieve better technical effects. In the drawings of the embodiments described below, the same reference numerals appearing in the respective drawings denote the same features or components, and may be applied to different embodiments. Thus, once an item is defined in one drawing, it need not be further discussed in subsequent drawings.
It should be noted that the structures, proportions, sizes, and other dimensions shown in the drawings and described in the specification are only for the purpose of understanding and reading the present disclosure, and are not intended to limit the scope of the invention, which is defined by the claims, and any modifications of the structures, changes in the proportions and adjustments of the sizes and other dimensions, should be construed as falling within the scope of the invention unless the function and objectives of the invention are affected. The scope of the preferred embodiments of the present invention includes additional implementations in which functions may be executed out of order from that described or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the embodiments of the present invention.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate. In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
Examples
Referring to fig. 1, a method for sending authentication information through instant messaging is disclosed, comprising the following steps:
and S100, the user uses the second terminal to log in the network.
The second terminal, such as a desktop terminal of a user, is described by way of example and not limitation. The network login may be any type of network access, such as, for example and without limitation, a login of a shopping website, a login of chat software, a login of an online bank, and the like.
S200, triggering the authentication information corresponding to the network login to be sent to the first terminal associated with the second terminal.
The first terminal may be, by way of example and not limitation, various commonly used portable mobile terminals such as a mobile phone, a palm computer, a tablet computer, and various intelligent wearable electronic devices such as smart glasses and a smart watch.
The first terminal includes information content capable of identifying the user identity, for example, when the first terminal is a mobile phone, the corresponding information content is a mobile phone number (the user identity can be confirmed through the mobile phone number). In this embodiment, a mobile phone is preferably used as the first terminal.
Among the five functions of network information security (Authentication, authorization, confidentiality, integrity and non-repudiation), Authentication (Authentication) is the most fundamental and most important link. The identity authentication has the function of ensuring the real intention of the user in a specific decision-making link. Generally, authentication has three elements (multi-factor authentication, MFA): knowledge, such as passwords, security issues; all, such as a mobile phone check code, a U shield; so, for example, the fingerprint, the pupil. From a cryptographic perspective, authentication performed using both of the above is called Two-factor authentication (TFA). For example, the login is completed by using a login password as single-factor authentication; the payment is completed by using the login password and the mobile phone verification code, and the two-factor authentication (known + all) is performed; completing payment using the login password + payment password also belongs to two-factor authentication (known + known).
In this embodiment, the authentication information is generated for a network login behavior of a user, and the authentication information preferably has a time limit, and is valid within a preset time, and the authentication information is invalid after the preset time limit is exceeded.
The method for associating the second terminal with the first terminal can be based on a mobile phone number, an instant messaging tool identification number, an electronic mailbox number, an identification number and/or a user name set by a user.
The association may be established in advance, or established based on the network login operation of the user, and the association between the two may be permanent or limited (the association relationship is established temporarily, and the association relationship is released after the network login is successful). For example, but not by way of limitation, for example, a user logs in a certain webpage on a computer, receives an authentication code through a mobile phone number during the login process, establishes association between the computer and a mobile phone corresponding to the mobile phone number based on the login operation, and releases the association between the computer and the mobile phone after the user successfully logs in the authentication code.
The association between the second terminal and the first terminal may also be based on geographical address information and/or IP address (physical address) information set by the user.
By way of example and not limitation, geographic position information of the mobile phone terminal and the computer terminal is collected in real time, and the mobile phone terminal and the computer terminal which are located at the same plane position and the same height position are associated. Or acquiring local area network information accessed by the mobile phone terminal and the computer terminal, and associating the mobile phone terminal and the computer terminal in the same local area network.
And S300, acquiring the authentication information through the instant messaging tool on the first terminal, and sending the authentication information to a second terminal which logs in the same instant messaging tool identification number.
The authentication information is forwarded between the first terminal and the second terminal through the instant messaging tool of the user, so that the user can conveniently log in a webpage at the login terminal (the second terminal).
In this embodiment, the authentication information may be a short message verification code, and the authentication information is received through a Short Message Service (SMS) of a mobile phone before the instant messaging tool collects the authentication information.
Or, the authentication information is a mailbox verification code, and the authentication information is received by an Email (Email) tool on the first terminal before the instant messaging tool collects the authentication information.
By way of example, and not limitation, exemplary embodiments of the present embodiments are described in conjunction with fig. 2-5.
Referring to fig. 2, the user 300 needs to log in an account of a shopping website on the computer terminal 100.
Referring to fig. 3, a user login interface prompts that a mobile phone verification code needs to be sent for identity authentication. The handset authentication code is transmitted to the handset terminal 200 of the user 300. In the prior art, a user needs to find the mobile phone terminal 200, check the mobile phone verification code after sending the mobile phone verification code, and input the mobile phone verification code into the login page.
In this embodiment, the user does not need to operate the mobile phone terminal 200, and after receiving the mobile phone verification code, the mobile phone terminal 200 collects the mobile phone verification code through the instant messaging tool of the user 300 on the mobile phone terminal 200, and then forwards the verification code to the computer terminal 100 that logs in the same instant messaging tool identification number.
Referring to fig. 4, taking user authus as an example, the user logs in own Instant Messaging (IM) tool QQ on a personal computer and a mobile phone at the same time, so that the user receives a mobile phone verification code on mobile phone terminal 200 and can send the mobile phone verification code to the user's QQ computer through the QQ mobile phone terminal, and thus the user can directly view the mobile phone verification code on computer terminal 100 through IM tool QQ without operating the mobile phone.
Referring to fig. 5, the example is that the computer terminal 100 of the IM tool receives the mobile phone authentication code sent by the mobile phone terminal 200 of the same instant messaging tool identification number, and the user can view the mobile phone authentication code on the instant messaging client of the computer terminal 100.
Preferably, in this embodiment, the method may further include the steps of: and loading the authentication information into an authentication information input field through the instant messaging tool or a third-party application associated with the instant messaging tool. Thus, the user is not required to manually input the verification code in the authentication information input field.
The third-party application is used as a proxy application of the IM tool, and the mobile phone verification code can be directly filled into the verification code information input field, so that the manual input of a user is not needed.
Referring to fig. 6, an example in which the mobile phone authentication code is automatically filled in the authentication code information input field is illustrated.
In this embodiment, preferably, the associated first terminal and the associated second terminal are located in the same local area network. By way of example and not limitation, a computer terminal and a mobile phone terminal, for example, have access to the same router.
In this embodiment, the user identity authentication may be performed synchronously at both the associated first terminal and the associated second terminal.
The information related to the user's identity authentication may be, by way of example and not limitation, one or more of a password, a credit card, a mobile phone number, a U-shield, a fingerprint, and facial data.
In another implementation manner of this embodiment, the first terminal may be further limited according to the geographical location information of the first terminal and the second terminal.
Specifically, collecting geographic position information of a second terminal and a first terminal; judging whether the first terminal is located in a preset range of the second terminal; and if so, transmitting authentication information to the first terminal.
In another implementation of this embodiment, in consideration of user experience, the intention of the user may also be queried before forwarding the authentication information.
Specifically, before sending the authentication information to the second terminal that logs in the same instant messaging tool identification number, the method further includes the following steps: inquiring whether a user needs forwarding operation at a first terminal; and collecting the operation information of the user, and sending the authentication information to a second terminal logging in the same instant messaging tool identification number when the operation information is judged to be confirmed and forwarded correspondingly.
Referring to fig. 7, there is provided an apparatus for transmitting authentication information through instant messaging according to another embodiment of the present invention.
The apparatus 400 comprises the following structure:
the authentication information sending unit 410 is configured to trigger the authentication information corresponding to the network login to be sent to the first terminal associated with the second terminal when the user performs the network login using the second terminal.
The authentication information processing unit 420 is configured to collect the authentication information through the instant messaging tool on the first terminal, and send the authentication information to a second terminal that logs in the same instant messaging tool identification number.
Other functional modules may also be arranged in the device as needed, which is specifically referred to the foregoing embodiments and will not be described herein again.
Referring to fig. 8, a system for sending authentication information through instant messaging is provided as another embodiment of the present invention.
The system 500 includes:
the second terminal 520 is configured to trigger the authentication information corresponding to the network login to be sent to the associated first terminal and receive the authentication information sent by the first terminal when the user performs the network login using the second terminal.
The first terminal 510 is configured to receive the authentication information sent by the second terminal, collect the authentication information through an instant messaging tool, and send the authentication information to the second terminal that logs in the same instant messaging tool identification number.
The second terminal 520, such as a desktop terminal of a user, for example and without limitation. The network login may be any type of network access, such as, for example and without limitation, a login of a shopping website, a login of chat software, a login of an online bank, and the like.
The first terminal 510 may be, by way of example and not limitation, various commonly used portable mobile terminals such as a mobile phone, a palm computer, a tablet computer, and various intelligent wearable electronic devices such as smart glasses, a smart watch, and the like.
The first terminal 510 includes information content capable of identifying a user identity, for example, when the first terminal is a mobile phone, the corresponding information content is a mobile phone number (the user identity can be confirmed through the mobile phone number). In this embodiment, a mobile phone is preferably used as the first terminal.
The authentication information is generated aiming at the network login behavior of the user, the authentication information preferably has time limitation, the authentication information is effective within preset time, and the authentication information is invalid after the preset time limitation is exceeded.
The method for associating the second terminal with the first terminal can be based on a mobile phone number, an instant messaging tool identification number, an electronic mailbox number, an identification number and/or a user name set by a user.
The association may be established in advance, or established based on the network login operation of the user, and the association between the two may be permanent or limited (the association relationship is established temporarily, and the association relationship is released after the network login is successful). For example, but not by way of limitation, for example, a user logs in a certain webpage on a computer, receives an authentication code through a mobile phone number during the login process, establishes association between the computer and a mobile phone corresponding to the mobile phone number based on the login operation, and releases the association between the computer and the mobile phone after the user successfully logs in the authentication code.
The association between the second terminal and the first terminal may also be based on geographical address information and/or IP address (physical address) information set by the user.
By way of example and not limitation, geographic position information of the mobile phone terminal and the computer terminal is collected in real time, and the mobile phone terminal and the computer terminal which are located at the same plane position and the same height position are associated. Or acquiring local area network information accessed by the mobile phone terminal and the computer terminal, and associating the mobile phone terminal and the computer terminal in the same local area network.
Preferably, in this embodiment, the first terminal is a mobile phone, and the second terminal is associated with the first terminal based on a mobile phone number. The authentication information is forwarded between the first terminal and the second terminal through the instant messaging tool of the user, so that the user can conveniently log in a webpage at the login terminal (the second terminal).
In this embodiment, the authentication information may be a short message verification code, and the authentication information is received through a Short Message Service (SMS) of a mobile phone before the instant messaging tool collects the authentication information.
By way of example and not limitation, a user may need to log into an account of a shopping website on a computer terminal.
And prompting that the mobile phone verification code needs to be sent for identity authentication on a user login interface. The mobile phone verification code is sent to the mobile phone terminal of the user. After the mobile phone terminal receives the mobile phone verification code, the mobile phone verification code is collected through an instant messaging tool of a user on the mobile phone terminal, and then the verification code is forwarded to a computer terminal which logs in the same instant messaging tool identification number.
In the above description, although all components of aspects of the present disclosure may be interpreted as being assembled or operatively connected as one circuit, the present disclosure is not intended to limit itself to these aspects. Rather, the various components may be selectively and operatively combined in any number within the intended scope of the present disclosure. Each of these components may also be implemented in hardware itself, while the various components may be partially or selectively combined in general and implemented as a computer program having program modules for performing the functions of the hardware equivalents. Codes or code segments to construct such a program can be easily derived by those skilled in the art. Such a computer program may be stored in a computer readable medium, which may be executed to implement aspects of the present disclosure. The computer readable medium may include a magnetic recording medium, an optical recording medium, and a carrier wave medium.
In addition, terms like "comprising," "including," and "having" should be interpreted as inclusive or open-ended, rather than exclusive or closed-ended, by default, unless explicitly defined to the contrary. All technical, scientific, or other terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs unless defined otherwise. Common terms found in dictionaries should not be interpreted too ideally or too realistically in the context of related art documents unless the present disclosure expressly limits them to that.
While exemplary aspects of the present disclosure have been described for illustrative purposes, those skilled in the art will appreciate that the foregoing description is by way of description of the preferred embodiments of the present disclosure only, and is not intended to limit the scope of the present disclosure in any way, which includes additional implementations in which functions may be performed out of the order illustrated or discussed. Any changes and modifications of the present invention based on the above disclosure will be within the scope of the appended claims.

Claims (8)

1. A method for sending authentication information by instant messaging, comprising the steps of:
the user uses the second terminal to log in the network;
triggering authentication information corresponding to the network login to be sent to a first terminal associated with a second terminal, and associating the second terminal with the first terminal based on geographic address information set by a user, wherein geographic position information of the first terminal and the second terminal is collected in real time, and the first terminal and the second terminal which are positioned at the same plane position and the same height position are associated; the second terminal and the first terminal respectively log in the same instant messaging tool identification number of the user; acquiring the authentication information through an instant messaging tool on the first terminal, and sending the authentication information to an instant messaging client of a second terminal logging in the same instant messaging tool identification number; outputting the authentication information through the instant messaging client on the second terminal;
wherein, still include the step: collecting geographic position information of a second terminal and a first terminal; judging whether the first terminal is located in a preset range of the second terminal; and if so, transmitting authentication information to the first terminal.
2. The method of claim 1, further comprising the steps of: and loading the authentication information into an authentication information input field through the instant messaging tool or a third-party application associated with the instant messaging tool.
3. The method of claim 1, wherein: the first terminal is a mobile phone, the authentication information is a short message verification code, and the authentication information is received through a short message service of the mobile phone before the instant communication tool collects the authentication information.
4. The method of claim 1, wherein: the authentication information is a mailbox verification code, and is received by an Email tool on the first terminal before the instant communication tool collects the authentication information.
5. The method of claim 1, wherein: the associated first terminal and the second terminal are located in the same local area network.
6. The method of claim 1, wherein: and the associated first terminal and the second terminal synchronously perform the identity authentication of the user.
7. An apparatus for transmitting authentication information through instant messaging according to the method of claim 1, comprising the structure of:
the authentication information sending unit is used for triggering the authentication information corresponding to the network login to be sent to the first terminal associated with the second terminal when the user utilizes the second terminal to carry out the network login;
and the authentication information processing unit is used for acquiring the authentication information through the instant messaging tool on the first terminal and sending the authentication information to a second terminal which logs in the same instant messaging tool identification number.
8. A system for transmitting authentication information by instant messaging according to the method of claim 1, comprising:
the second terminal is used for triggering the authentication information corresponding to the network login to be sent to the associated first terminal and receiving the authentication information sent by the first terminal when a user utilizes the second terminal to carry out network login;
the first terminal is used for receiving the authentication information sent by the second terminal, acquiring the authentication information through the instant messaging tool and sending the authentication information to the second terminal which logs in the same instant messaging tool identification number.
CN202010890997.8A 2020-08-29 2020-08-29 Method, device and system for sending authentication information through instant messaging Active CN112235177B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010890997.8A CN112235177B (en) 2020-08-29 2020-08-29 Method, device and system for sending authentication information through instant messaging
PCT/CN2020/112409 WO2022041179A1 (en) 2020-08-29 2020-08-31 Method, device and system for sending authentication information by means of instant messaging

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010890997.8A CN112235177B (en) 2020-08-29 2020-08-29 Method, device and system for sending authentication information through instant messaging

Publications (2)

Publication Number Publication Date
CN112235177A CN112235177A (en) 2021-01-15
CN112235177B true CN112235177B (en) 2021-12-24

Family

ID=74115712

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010890997.8A Active CN112235177B (en) 2020-08-29 2020-08-29 Method, device and system for sending authentication information through instant messaging

Country Status (2)

Country Link
CN (1) CN112235177B (en)
WO (1) WO2022041179A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114979048B (en) * 2022-08-02 2022-11-29 深圳市明源云科技有限公司 Identity verification method, system, electronic device and medium based on instant messaging
CN115834077B (en) * 2022-11-11 2023-08-01 北京深盾科技股份有限公司 Control method, control system, electronic device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580112A (en) * 2013-10-25 2015-04-29 阿里巴巴集团控股有限公司 Service authentication method and system, and server
CN104767614A (en) * 2014-01-03 2015-07-08 中国移动通信集团浙江有限公司 Information authentication method and device
CN105245346A (en) * 2015-10-19 2016-01-13 宇龙计算机通信科技(深圳)有限公司 Identity authentication method and user terminal
CN109325340A (en) * 2018-10-26 2019-02-12 北京深思数盾科技股份有限公司 A kind of method, apparatus and Internet Server of software client automated log on

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008211515A (en) * 2007-02-26 2008-09-11 Quixun Co Ltd Automatic login system using mobile telephone
CN102546914A (en) * 2010-12-27 2012-07-04 梁志龙 Automatic login system based on smart phone and control method
CN102497334B (en) * 2011-12-18 2016-08-10 上海量明科技发展有限公司 Remote-operated method, client and system is triggered by JICQ
JP6301579B2 (en) * 2012-12-03 2018-03-28 フェリカネットワークス株式会社 COMMUNICATION TERMINAL, COMMUNICATION METHOD, PROGRAM, AND COMMUNICATION SYSTEM
AU2014297265A1 (en) * 2013-07-30 2016-02-18 Nec Corporation Information processing device, authentication system, authentication method, and program
CN104796385B (en) * 2014-01-20 2019-04-16 腾讯科技(深圳)有限公司 Terminal binding method, apparatus and system
CN105407074A (en) * 2014-09-11 2016-03-16 腾讯科技(深圳)有限公司 Authentication method, apparatus and system
CN105490809B (en) * 2014-09-17 2020-11-06 腾讯科技(深圳)有限公司 Information acquisition method and device, terminal and server
CN105577648A (en) * 2015-12-11 2016-05-11 北京奇虎科技有限公司 Method for obtaining and sending short message identifying code, calculating device and mobile terminal
CN105681580A (en) * 2016-03-17 2016-06-15 北京小米移动软件有限公司 Event reminding method, device and terminal equipment
CN108200089B (en) * 2018-02-07 2022-06-07 腾讯云计算(北京)有限责任公司 Method, device and system for realizing information security and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580112A (en) * 2013-10-25 2015-04-29 阿里巴巴集团控股有限公司 Service authentication method and system, and server
CN104767614A (en) * 2014-01-03 2015-07-08 中国移动通信集团浙江有限公司 Information authentication method and device
CN105245346A (en) * 2015-10-19 2016-01-13 宇龙计算机通信科技(深圳)有限公司 Identity authentication method and user terminal
CN109325340A (en) * 2018-10-26 2019-02-12 北京深思数盾科技股份有限公司 A kind of method, apparatus and Internet Server of software client automated log on

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Android移动终端安全管理系统的设计与实现;傅镜艺;《CNKI中国硕士论文全文数据库》;20171231;全文 *
Certificate revocation in vehicular ad hoc networks techniques and protocols: a survey;Taimur KHAN;《CNKI中国硕士论文全文数据库》;20191231;全文 *

Also Published As

Publication number Publication date
WO2022041179A1 (en) 2022-03-03
CN112235177A (en) 2021-01-15

Similar Documents

Publication Publication Date Title
KR100683976B1 (en) Method, arrangement and apparatus for authentication
US7979054B2 (en) System and method for authenticating remote server access
US9344896B2 (en) Method and system for delivering a command to a mobile device
KR101304006B1 (en) Communication system providing wireless authentication for private data access and related methods
US20060141987A1 (en) Identification of a terminal with a server
CN101668288B (en) Identity authenticating method, identity authenticating system and terminal
CN112235177B (en) Method, device and system for sending authentication information through instant messaging
US6795924B1 (en) Sat back channel security solution
WO2001080525A1 (en) Network access security
KR20160143333A (en) Method for Double Certification by using Double Channel
CN103249014A (en) Method for encrypting short message of mobile communication
CN108055238A (en) A kind of account verification method and system
WO2023050524A1 (en) Im-based user identity authentication method and apparatus, and server and storage medium
EP1680940B1 (en) Method of user authentication
US20220067690A1 (en) Peer-to-peer digital transaction detail error reduction
CN101184107B (en) Network transaction system and method for executing network transaction using the system
CN101022576A (en) Method and system for realizing air selecting number
WO2012063558A1 (en) User verification device and user verification method
CN110719252A (en) Methods, systems, and computer readable media for authorizing transactions over a communication channel
CN105207777A (en) Network information verification method and apparatus
CN109076317A (en) Verify the method and server of message legitimacy
WO2012041781A1 (en) Fraud prevention system and method using unstructured supplementary service data (ussd)
CN112423249B (en) User short message sending method, device and system
CN115022004B (en) Data processing method, device and server
KR20170037241A (en) Method and system for messaging automatic response service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant