CN113704738A - Terminal identity verification method based on historical map and related equipment - Google Patents

Terminal identity verification method based on historical map and related equipment Download PDF

Info

Publication number
CN113704738A
CN113704738A CN202111014291.6A CN202111014291A CN113704738A CN 113704738 A CN113704738 A CN 113704738A CN 202111014291 A CN202111014291 A CN 202111014291A CN 113704738 A CN113704738 A CN 113704738A
Authority
CN
China
Prior art keywords
authentication
historical
terminal
variable data
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111014291.6A
Other languages
Chinese (zh)
Inventor
梁雪涛
李升建
张延良
薛雷
宋业栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weichai Power Co Ltd
Weifang Weichai Power Technology Co Ltd
Original Assignee
Weichai Power Co Ltd
Weifang Weichai Power Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weichai Power Co Ltd, Weifang Weichai Power Technology Co Ltd filed Critical Weichai Power Co Ltd
Priority to CN202111014291.6A priority Critical patent/CN113704738A/en
Publication of CN113704738A publication Critical patent/CN113704738A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Abstract

The invention provides a terminal identity verification method based on a historical map and related equipment, and the scheme comprises the following steps: after a login request of the terminal equipment is acquired, authentication and certification are carried out on the terminal equipment, wherein certification information in the authentication and certification process at least comprises terminal identity information and historical variable data, the historical variable data are variable data known by a system platform and the terminal equipment at the same time, namely, an authenticatee and an authentication demander hold at the same time, so the historical variable data do not need to be issued to the terminal equipment by the system platform, the terminal equipment can directly feed local calling data back to the system platform end, the historical variable data are not easily hijacked by third-party equipment, and the reliability of an authentication result is improved.

Description

Terminal identity verification method based on historical map and related equipment
Technical Field
The invention relates to the technical field of data security, in particular to a terminal identity verification method based on a historical map and related equipment.
Background
In the internet of things system, a terminal needs to be connected with a platform and then can carry out business communication. In the connection authentication process, the identity of the terminal is easily forged. Once the terminal identity is forged, a third party can easily invade the platform.
In the prior art, a verification method of a terminal device is generally an authentication code scheme, and in the scheme, a platform issues an identity ID of a terminal and a corresponding authentication code. When the terminal logs in, the identity ID and the authentication code need to be uploaded, and the platform passes the verification and then passes the verification. However, the authentication process of this scheme is easily eavesdropped and the authentication code is easily forged.
Therefore, how to safely and effectively verify the identity information of the terminal device becomes one of the technical problems that the technical staff in the field needs to solve urgently.
Disclosure of Invention
In view of this, embodiments of the present invention provide a terminal identity authentication method based on a historical map and related devices, so as to implement security authentication of a terminal device.
In order to achieve the above purpose, the embodiments of the present invention provide the following technical solutions:
a terminal identity verification method based on a historical map comprises the following steps:
acquiring a login request of terminal equipment;
carrying out authentication and certification on the terminal equipment;
when the authentication passes, judging the terminal equipment as a legal user;
wherein, the authentication information in the authentication at least comprises:
the terminal identity information comprises terminal identity information and historical variable data, wherein the historical variable data is variable data commonly held by the terminal equipment and a system applying the method.
Optionally, in the terminal identity verification method based on the historical map, the historical variable data includes, but is not limited to:
one or more of historical authentication data, data size and serial number;
the data size is the size of a data packet appointed in historical interactive data of the terminal equipment and the system applying the method;
and the serial number is matched with the serial number of the terminal equipment by the system applying the method in the historical access process.
Optionally, in the terminal identity verification method based on the historical map, the historical authentication data includes:
and the terminal equipment presets the authentication times or the authentication result within a preset time length recently.
Optionally, in the terminal identity verification method based on the historical map, the preset number of times is 32.
Optionally, in the terminal identity verification method based on the historical map, performing authentication and verification on the terminal device includes:
sending authentication information to the terminal equipment;
acquiring authentication information fed back by the terminal equipment;
judging whether authentication information fed back by the terminal equipment is authenticated based on locally stored terminal identity information and historical variable data;
after the terminal device acquires the authentication information, extracting the data type of variable data in the authentication information, extracting historical variable data stored in the terminal device based on the data type of the variable data, and feeding back identity information of the terminal device and the historical variable data as authentication information.
A terminal identity verification device based on a historical map comprises:
the request acquisition unit is used for acquiring a login request of the terminal equipment;
the authentication unit is used for performing authentication and certification on the terminal equipment, wherein the certification information in the authentication and certification comprises terminal identity information and historical variable data, and the historical variable data is variable data commonly held by the terminal equipment and a system applying the method; and when the authentication passes, judging that the terminal equipment is a legal user.
Optionally, in the terminal identity verification apparatus based on the historical map, the historical variable data includes but is not limited to:
the method comprises one or more items of historical authentication data, data size and serial number, wherein the data size is the size of data interacted between the terminal device and a system applying the method in the historical access process, and the serial number is the serial number matched with the terminal device by the system applying the method in the historical access process.
Optionally, in the terminal identity verification apparatus based on the historical map, the historical authentication data includes:
and the terminal equipment presets the authentication times or the authentication result within a preset time length recently.
Optionally, in the terminal identity verification apparatus based on the historical map, when the authentication unit performs authentication and verification on the terminal device, the authentication unit is specifically configured to:
sending authentication information to the terminal equipment;
acquiring authentication information fed back by the terminal equipment;
judging whether authentication information fed back by the terminal equipment is authenticated based on locally stored terminal identity information and historical variable data;
after the terminal device acquires the authentication information, extracting the data type of variable data in the authentication information, extracting historical variable data stored in the terminal device based on the data type of the variable data, and feeding back identity information of the terminal device and the historical variable data as authentication information.
A readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the history-map-based terminal authentication method as set forth in any one of the above.
An authentication device comprising a memory and a processor;
the memory is used for storing programs;
the processor is configured to execute the program to implement the steps of the terminal identity verification method based on the historical map according to any one of the above.
Based on the technical scheme, according to the scheme provided by the embodiment of the invention, after a login request of the terminal equipment is obtained, authentication is performed on the terminal equipment, wherein authentication information in the authentication process at least comprises terminal identity information and historical variable data, and because the historical variable data are variable data known by a system platform and the terminal equipment at the same time, namely, an authenticatee and an authentication demander hold at the same time, the historical variable data do not need to be issued to the terminal equipment by the system platform, the terminal equipment can directly feed local retrieval data back to the system platform end, the historical variable data are not easy to be hijacked by third-party equipment, and the reliability of an authentication result is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic flowchart of a terminal identity verification method based on a historical map according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a terminal identity verification method based on a historical map according to another embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a terminal identity authentication device based on a historical map disclosed in an embodiment of the present application;
fig. 4 is a schematic structural diagram of an authentication device disclosed in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to reliably authenticate a login device, the application provides a terminal identity verification method based on a historical map, and referring to fig. 1, the method may include:
step S101: acquiring a login request of terminal equipment;
in the technical scheme disclosed in this embodiment, when a terminal device wants to log in a system platform to which the terminal identity authentication method based on the historical map provided by the present application is applied, a login request needs to be sent to the system platform first, the login request for acquiring the terminal device in this step is a login request sent by the system platform for acquiring the terminal device, a data format of the login request can be set by itself according to a user requirement, and the present application is not limited too much.
Step S102: carrying out authentication and certification on the terminal equipment;
when the system platform acquires the login request sent by the terminal equipment, authentication and verification are required to be carried out on the terminal equipment, and only when the authentication and verification is passed, the terminal equipment is considered to be safe and reliable equipment, so that the data access between the terminal equipment and the system platform is allowed.
In the prior art, when authentication is performed, a system platform issues an Identity (ID) of a terminal and a corresponding authentication code. When the terminal equipment logs in the system platform, the identity ID and the authentication code of the terminal equipment need to be uploaded, and the platform passes the verification and then passes the verification. The identity ID and the authentication code in this authentication method are easily eavesdropped, so in this scheme, the authentication information in the authentication at least includes: the authentication method comprises the steps of using terminal identity information and historical variable data as authentication keys to carry out authentication and certification, wherein in the scheme, the authentication keys can adopt an HEX format in the authentication process, wherein the terminal identity information refers to an identity ID of the terminal equipment, and the identity ID is issued to the terminal equipment by a system platform and is used for referring to the identity of the terminal equipment. The historical variable data is variable data known by the system platform and the terminal equipment at the same time, namely, the authenticated party and the authentication demander hold the variable data at the same time, so that the secret key does not need to use additional messages for mutual interaction agreement, third-party software is difficult to monitor, and the system is easy to develop.
Step S103: when the authentication passes, judging the terminal equipment as a legal user;
in this step, when the ID of the terminal device passes the authentication and the historical variable data uploaded by the terminal device is consistent with the historical variable data locally stored in the system platform, the terminal device is considered to pass the authentication.
In the scheme, after a login request of the terminal equipment is acquired, authentication and authentication are carried out on the terminal equipment, wherein authentication information in the authentication and authentication process at least comprises terminal identity information and historical variable data, the historical variable data are variable data known by a system platform and the terminal equipment at the same time, namely, an authenticatee and an authentication demander hold at the same time, so that the historical variable data do not need to be issued to the terminal equipment by the system platform, the terminal equipment can directly feed back the locally-taken data to the system platform end, the historical variable data are not easy to be hijacked by third-party equipment, and the reliability of an authentication result is improved.
In the technical scheme disclosed in the embodiment of the application, when the system platform acquires the login request of the terminal device, historical variable data matched with the terminal device is acquired from a local database based on the login request, so that the historical variable data long-transmitted by the terminal device can be checked in the subsequent process.
In the technical solution disclosed in the embodiment of the present application, the historical variable data is variable data known to both the system platform and the terminal device, that is, variable data held by the authenticator and the authentication demander, and any variable data that can be held by both the terminal device and the system platform can be used as the historical variable data in the above solution, and the historical variable data may be one or more types of data, that is, when performing authentication, the historical variable data may include one set of data or multiple sets of data, and specifically, in the solution, the historical variable data includes but is not limited to: one or more of historical authentication data, data size and serial number; the historical authentication data refers to a historical authentication result, for example, the authentication result of the terminal device for the latest N times, the value of N may be designed according to the user requirement, for example, N may be 32, that is, the historical authentication result refers to the authentication result of the terminal device for the latest 32 times in history, and the result may be represented by a 4Byte number.
The data size is the size of a certain data packet in the historical interactive data of the terminal device and the system applying the method, the certain data packet is a pre-specified data packet, for example, the size of the data packet uploaded by the terminal device and acquired by the system platform at a certain time node, or the size of the data packet issued by the system platform to the terminal device at a certain time node; the data size of the last packet of data may also be used as an authentication key, that is, the data size, when the terminal device is authenticated, and the serial number is a serial number matched for the terminal device by a system applying the method in the history access process, for example, when the system platform performs data interaction with the terminal device last time, the serial number matched for the terminal device.
Specifically, in the technical solution provided in this embodiment, historical authentication data may be selected as the historical variable data, and in this solution, the historical authentication data specifically includes: and the terminal equipment presets the authentication times or the authentication result within a preset time length recently. For example, the terminal device accesses the system platform, and the authentication result of the latest 32 times of authentication is historically obtained.
The following are exemplified:
for example, the identity ID of the terminal device is 4E04, and when the terminal device accesses the system platform, the authentication results of the last 32 times are: the first 31 passes and the last one does not.
The authentication information used in the authentication of the terminal device is 4E04 FFFE
Note: the FFFE is expanded to binary 11111111111111111111111111111111111111111110, where 0 indicates no pass and 1 indicates pass.
In the technical solution disclosed in the embodiment of the present application, the system platform may require the type of the historical variable data in the authentication process based on a preset rule or in a random form, for example, referring to fig. 2, and perform authentication and verification on the terminal device specifically may include:
step S201: sending authentication information to the terminal equipment;
in this scheme, the authentication information at least includes a type identifier of historical variable data, and when the system platform sends the authentication information to the terminal device, the system platform writes the type identifier of the historical variable data to be authenticated into the authentication information based on a preset logic, and sends the authentication information to the terminal device after the authentication information is allowed, and the type identifier may be one type identifier or a plurality of type identifiers.
Step S201: acquiring authentication information fed back by the terminal equipment;
after the terminal equipment acquires the authentication information, the authentication information is analyzed, the data type of variable data in the authentication information is extracted, historical variable data matched with the data type of the variable data is called from a local database, the historical variable data can be one or more, and the identity information of the terminal equipment and the historical variable data are used as authentication information to be fed back.
Step S201: judging whether authentication information fed back by the terminal equipment is authenticated based on locally stored terminal identity information and historical variable data;
in the scheme, the system platform calls historical variable data matched with the terminal equipment from a local database based on the type identifier, when the authentication information fed back by the terminal equipment is obtained, the system platform performs authentication based on the historical variable data stored in the system platform and the historical variable data obtained by the terminal equipment, if the historical variable data and the historical variable data are the same, the authentication based on the historical variable data passes, then the authentication of the terminal identity information is performed, and of course, the authentication and the authentication can be performed simultaneously.
The embodiment of the invention discloses a terminal identity verification device based on a historical map, and the specific working content of each unit in the device is shown in the content of the method embodiment.
The terminal authentication device based on the historical map provided by the embodiment of the invention is described below, and the terminal authentication device based on the historical map described below and the terminal authentication method based on the historical map described above can be referred to in a corresponding manner.
Referring to fig. 3, the terminal identity authentication apparatus based on a history map disclosed in the embodiment of the present application may include:
a request acquisition unit 100, configured to acquire a login request of a terminal device;
an authentication unit 200, configured to perform authentication and authorization on the terminal device, where authentication information in the authentication and authorization includes terminal identity information and historical variable data, and the historical variable data is variable data commonly held by the terminal device and a system applying the method; and when the authentication passes, judging that the terminal equipment is a legal user.
In the scheme, after the request obtaining unit 100 obtains a login request of a terminal device, the authentication unit 200 is adopted to authenticate the terminal device, wherein authentication information in the authentication and authentication process at least comprises terminal identity information and historical variable data, and because the historical variable data are variable data known by both a system platform and the terminal device, namely, an authenticated person and an authentication demander, the historical variable data are simultaneously held by the authenticated person and the authentication demander, the historical variable data do not need to be issued to the terminal device by the system platform, the terminal device can directly feed local retrieval data back to the system platform end, the historical variable data are not easy to be hijacked by a third-party device, and the reliability of an authentication result is improved.
Corresponding to the above method, the historical variable data includes but is not limited to:
the method comprises one or more items of historical authentication data, data size and serial number, wherein the data size is the size of data interacted between the terminal device and a system applying the method in the historical access process, and the serial number is the serial number matched with the terminal device by the system applying the method in the historical access process.
Corresponding to the above method, the historical authentication data comprises:
and the terminal equipment presets the authentication times or the authentication result within a preset time length recently.
Corresponding to the above method, when performing authentication on the terminal device, the authentication unit 200 is specifically configured to:
sending authentication information to the terminal equipment;
acquiring authentication information fed back by the terminal equipment;
judging whether authentication information fed back by the terminal equipment is authenticated based on locally stored terminal identity information and historical variable data;
after the terminal device acquires the authentication information, extracting the data type of variable data in the authentication information, extracting historical variable data stored in the terminal device based on the data type of the variable data, and feeding back identity information of the terminal device and the historical variable data as authentication information.
Corresponding to the above method, the present application also discloses a readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the steps of the historical map-based terminal authentication method according to any one of the above embodiments.
For example, the computer program, when being executed by a processor, is adapted to carry out the steps of:
acquiring a login request of terminal equipment;
carrying out authentication and certification on the terminal equipment;
when the authentication passes, judging the terminal equipment as a legal user;
wherein, the authentication information in the authentication at least comprises:
the terminal identity information comprises terminal identity information and historical variable data, wherein the historical variable data is variable data commonly held by the terminal equipment and a system applying the method.
The terminal identity verification device based on the historical map can be applied to authentication equipment such as a PC terminal, a cloud platform, a server cluster and the like. Alternatively, FIG. 4 shows the hardware of the data evaluation device
Structural block diagram, referring to fig. 4, the hardware structure of the data evaluation device may include: at least one processor 1, at least one communication interface 2, at least one memory 3 and at least one communication bus 4;
in the embodiment of the application, the number of the processor 1, the communication interface 2, the memory 3 and the communication bus 4 is at least one, and the processor 1, the communication interface 2 and the memory 3 complete mutual communication through the communication bus 4;
the processor 1 may be a central processing unit CPU, or an application Specific Integrated circuit asic, or one or more Integrated circuits configured to implement embodiments of the present invention, etc.;
the memory 3 may include a high-speed RAM memory, and may further include a non-volatile memory (non-volatile memory) or the like, such as at least one disk memory;
the memory stores a program, and the processor may invoke the program stored in the memory, where the program is specifically used to implement the terminal identity authentication method based on the historical map provided in any of the above embodiments of the present application, for example, to implement:
acquiring a login request of terminal equipment;
carrying out authentication and certification on the terminal equipment;
when the authentication passes, judging the terminal equipment as a legal user;
wherein, the authentication information in the authentication at least comprises:
the terminal identity information comprises terminal identity information and historical variable data, wherein the historical variable data is variable data commonly held by the terminal equipment and a system applying the method.
For convenience of description, the above system is described with the functions divided into various modules, which are described separately. Of course, the functionality of the various modules may be implemented in the same one or more software and/or hardware implementations of the invention.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, the system or system embodiments are substantially similar to the method embodiments and therefore are described in a relatively simple manner, and reference may be made to some of the descriptions of the method embodiments for related points. The above-described system and system embodiments are only illustrative, wherein the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (11)

1. A terminal identity verification method based on a historical map is characterized by comprising the following steps:
acquiring a login request of terminal equipment;
carrying out authentication and certification on the terminal equipment;
when the authentication passes, judging the terminal equipment as a legal user;
wherein, the authentication information in the authentication at least comprises:
the terminal identity information comprises terminal identity information and historical variable data, wherein the historical variable data is variable data commonly held by the terminal equipment and a system applying the method.
2. The historical map-based terminal authentication method according to claim 1, wherein the historical variable data includes but is not limited to:
one or more of historical authentication data, data size and serial number;
the data size is the size of a data packet appointed in historical interactive data of the terminal equipment and the system applying the method;
and the serial number is matched with the serial number of the terminal equipment by the system applying the method in the historical access process.
3. The historical map-based terminal identity verification method according to claim 2, wherein the historical authentication data comprises:
and the terminal equipment presets the authentication times or the authentication result within a preset time length recently.
4. The historical map-based terminal authentication method according to claim 3, wherein the preset number of times is 32.
5. The terminal identity verification method based on the historical map of claim 1, wherein the authentication and certification of the terminal device comprises:
sending authentication information to the terminal equipment;
acquiring authentication information fed back by the terminal equipment;
judging whether authentication information fed back by the terminal equipment is authenticated based on locally stored terminal identity information and historical variable data;
after the terminal device acquires the authentication information, extracting the data type of variable data in the authentication information, extracting historical variable data stored in the terminal device based on the data type of the variable data, and feeding back identity information of the terminal device and the historical variable data as authentication information.
6. A terminal identity verification device based on a historical map is characterized by comprising:
the request acquisition unit is used for acquiring a login request of the terminal equipment;
the authentication unit is used for performing authentication and certification on the terminal equipment, wherein the certification information in the authentication and certification comprises terminal identity information and historical variable data, and the historical variable data is variable data commonly held by the terminal equipment and a system applying the method; and when the authentication passes, judging that the terminal equipment is a legal user.
7. The historical map-based terminal authentication device according to claim 6, wherein the historical variable data includes but is not limited to:
the method comprises one or more items of historical authentication data, data size and serial number, wherein the data size is the size of data interacted between the terminal device and a system applying the method in the historical access process, and the serial number is the serial number matched with the terminal device by the system applying the method in the historical access process.
8. The historical map-based terminal authentication device according to claim 7, wherein the historical authentication data comprises:
and the terminal equipment presets the authentication times or the authentication result within a preset time length recently.
9. The historical-map-based terminal identity verification device according to claim 6, wherein the authentication unit, when performing authentication and authorization on the terminal device, is specifically configured to:
sending authentication information to the terminal equipment;
acquiring authentication information fed back by the terminal equipment;
judging whether authentication information fed back by the terminal equipment is authenticated based on locally stored terminal identity information and historical variable data;
after the terminal device acquires the authentication information, extracting the data type of variable data in the authentication information, extracting historical variable data stored in the terminal device based on the data type of the variable data, and feeding back identity information of the terminal device and the historical variable data as authentication information.
10. A readable storage medium having stored thereon a computer program, wherein the computer program, when executed by a processor, implements the steps of the historic-map-based terminal authentication method according to any one of claims 1 to 5.
11. An authentication device comprising a memory and a processor;
the memory is used for storing programs;
the processor, configured to execute the program, and implement the steps of the historic-map-based terminal authentication method according to any one of claims 1 to 5.
CN202111014291.6A 2021-08-31 2021-08-31 Terminal identity verification method based on historical map and related equipment Pending CN113704738A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111014291.6A CN113704738A (en) 2021-08-31 2021-08-31 Terminal identity verification method based on historical map and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111014291.6A CN113704738A (en) 2021-08-31 2021-08-31 Terminal identity verification method based on historical map and related equipment

Publications (1)

Publication Number Publication Date
CN113704738A true CN113704738A (en) 2021-11-26

Family

ID=78658150

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111014291.6A Pending CN113704738A (en) 2021-08-31 2021-08-31 Terminal identity verification method based on historical map and related equipment

Country Status (1)

Country Link
CN (1) CN113704738A (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104144419A (en) * 2014-01-24 2014-11-12 腾讯科技(深圳)有限公司 Identity authentication method, device and system
US8904496B1 (en) * 2012-03-30 2014-12-02 Emc Corporation Authentication based on a current location of a communications device associated with an entity
CN105072617A (en) * 2015-07-24 2015-11-18 江苏省公用信息有限公司 Authentication method based on WIFI access
CN105719140A (en) * 2014-12-05 2016-06-29 阿里巴巴集团控股有限公司 Method and device for user information verification
CN106789905A (en) * 2016-11-22 2017-05-31 上海斐讯数据通信技术有限公司 A kind of network access equipment and method
CN108471400A (en) * 2018-02-07 2018-08-31 阿里巴巴集团控股有限公司 Method for authenticating, apparatus and system
CN108712413A (en) * 2018-05-15 2018-10-26 上海掌门科技有限公司 A kind of method and apparatus of authentication
CN109087091A (en) * 2018-06-29 2018-12-25 北京东方英卡数字信息技术有限公司 A kind of account trading security system and method
CN109151820A (en) * 2018-08-24 2019-01-04 安徽讯飞智能科技有限公司 One kind being based on the safety certifying method and device of " one machine of a people, one card No.1 "
CN110113302A (en) * 2019-03-20 2019-08-09 上海博泰悦臻网络技术服务有限公司 A kind of method of data synchronization, device end and server-side
CN110213269A (en) * 2019-06-03 2019-09-06 武汉思普崚技术有限公司 A kind of network behavior data authentication method and system
TW202004606A (en) * 2018-05-28 2020-01-16 香港商阿里巴巴集團服務有限公司 Identity verification method and apparatus
CN110795721A (en) * 2018-08-03 2020-02-14 松下电器(美国)知识产权公司 Data distribution method, authentication server, and data structure
CN111401159A (en) * 2020-03-03 2020-07-10 北京三快在线科技有限公司 Hotel authentication management method and system, hotel management system and user terminal

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8904496B1 (en) * 2012-03-30 2014-12-02 Emc Corporation Authentication based on a current location of a communications device associated with an entity
CN104144419A (en) * 2014-01-24 2014-11-12 腾讯科技(深圳)有限公司 Identity authentication method, device and system
CN105719140A (en) * 2014-12-05 2016-06-29 阿里巴巴集团控股有限公司 Method and device for user information verification
CN105072617A (en) * 2015-07-24 2015-11-18 江苏省公用信息有限公司 Authentication method based on WIFI access
CN106789905A (en) * 2016-11-22 2017-05-31 上海斐讯数据通信技术有限公司 A kind of network access equipment and method
CN108471400A (en) * 2018-02-07 2018-08-31 阿里巴巴集团控股有限公司 Method for authenticating, apparatus and system
CN108712413A (en) * 2018-05-15 2018-10-26 上海掌门科技有限公司 A kind of method and apparatus of authentication
TW202004606A (en) * 2018-05-28 2020-01-16 香港商阿里巴巴集團服務有限公司 Identity verification method and apparatus
CN109087091A (en) * 2018-06-29 2018-12-25 北京东方英卡数字信息技术有限公司 A kind of account trading security system and method
CN110795721A (en) * 2018-08-03 2020-02-14 松下电器(美国)知识产权公司 Data distribution method, authentication server, and data structure
CN109151820A (en) * 2018-08-24 2019-01-04 安徽讯飞智能科技有限公司 One kind being based on the safety certifying method and device of " one machine of a people, one card No.1 "
CN110113302A (en) * 2019-03-20 2019-08-09 上海博泰悦臻网络技术服务有限公司 A kind of method of data synchronization, device end and server-side
CN110213269A (en) * 2019-06-03 2019-09-06 武汉思普崚技术有限公司 A kind of network behavior data authentication method and system
CN111401159A (en) * 2020-03-03 2020-07-10 北京三快在线科技有限公司 Hotel authentication management method and system, hotel management system and user terminal

Similar Documents

Publication Publication Date Title
CN106101258B (en) Interface calling method, device and system of hybrid cloud
CN110602052B (en) Micro-service processing method and server
CN107196950B (en) Verification method, verification device and server
KR101589192B1 (en) Identity authentication and management device and method thereof
CN107911222B (en) Digital signature generating method, digital signature verifying method, digital signature generating apparatus, digital signature verifying apparatus, and storage medium storing digital signature verifying program
US20140041002A1 (en) Secure Access Method, Apparatus And System For Cloud Computing
CN109005142B (en) Website security detection method, device, system, computer equipment and storage medium
CN110198296B (en) Authentication method and device, storage medium and electronic device
CN111917773A (en) Service data processing method and device and server
CN109547426B (en) Service response method and server
CN112235321B (en) Short message verification code anti-brushing method and device
CN109145651B (en) Data processing method and device
CN113472774A (en) Account login-free method, system, device and computer readable storage medium
CN113055185A (en) Token-based authentication method and device, storage medium and electronic device
CN115695012A (en) Login request processing method and device, electronic equipment and storage medium
US20180039771A1 (en) Method of and server for authorizing execution of an application on an electronic device
CN109829321B (en) Method, device, equipment and storage medium for authenticating identity
CN112804222B (en) Data transmission method, device, equipment and storage medium based on cloud deployment
CN113761498A (en) Third party login information hosting method, system, equipment and storage medium
CN112948857A (en) Document processing method and device
CN105141642B (en) A kind of method and device preventing illegal user's behavior
CN111371811A (en) Resource calling method, resource calling device, client and service server
CN113704738A (en) Terminal identity verification method based on historical map and related equipment
CN115567271A (en) Authentication method and device, page skip method and device, electronic equipment and medium
CN112597118B (en) Shared file adding method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination