CN116389013B - Short message password verification method, mobile terminal and system - Google Patents

Short message password verification method, mobile terminal and system Download PDF

Info

Publication number
CN116389013B
CN116389013B CN202310668089.8A CN202310668089A CN116389013B CN 116389013 B CN116389013 B CN 116389013B CN 202310668089 A CN202310668089 A CN 202310668089A CN 116389013 B CN116389013 B CN 116389013B
Authority
CN
China
Prior art keywords
verification code
function
user
verification
short message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310668089.8A
Other languages
Chinese (zh)
Other versions
CN116389013A (en
Inventor
温日盛
何奎
楚宁志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Lubangtong Intelligent Technology Co ltd
Original Assignee
Guangzhou Lubangtong Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Lubangtong Intelligent Technology Co ltd filed Critical Guangzhou Lubangtong Intelligent Technology Co ltd
Priority to CN202310668089.8A priority Critical patent/CN116389013B/en
Publication of CN116389013A publication Critical patent/CN116389013A/en
Application granted granted Critical
Publication of CN116389013B publication Critical patent/CN116389013B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The application belongs to the field of computers, and discloses a short message password verification method, which comprises the following steps: step 1: receiving a short message verification code and a JS function corresponding to the verification code; step 2: decrypting the encrypted JS function to obtain a decrypted JS function, and operating the decrypted JS function to obtain a verification code; step 3: judging whether the verification code input by the user is consistent with the verification code obtained in the step 2, if so, passing verification, and if not, prompting the user to input again until the verification code input by the user is consistent with the verification code obtained in the step 2. The method comprises the steps of producing a verification code and a JS function (JavaScript function) corresponding to the verification code at a server side, and judging whether the verification code input by a user is correct or not by the mobile terminal through running the JS function so as to open the authority of the next operation of the user, such as login. Meanwhile, the application also provides a mobile terminal and a system based on the method.

Description

Short message password verification method, mobile terminal and system
Technical Field
The application belongs to the field of computers, and particularly relates to a short message password verification method, a mobile terminal and a system.
Background
The app or web short message verification codes in the market are submitted together with account passwords through submitting data (such as login), the back-end service verifies the verification codes first, and when the verification codes are wrong, the data are returned to the client to prompt the user that the verification codes are wrong, so that the method is long in time consumption, and the user is not benefited to experience system functions due to the fact that the network is unstable.
CN115866542a discloses a method, device, equipment and storage medium for applying and verifying short message verification code, which relates to the field of communication, and the application method comprises: responding to a short message verification code application request sent by first self-service terminal equipment, and acquiring an application date, a first equipment ID and a mobile phone number; judging whether a short message verification code record corresponding to the mobile phone number is empty or not; if the first short message verification code is empty, a first check code and a first short message verification code are generated; if the first preset condition is not satisfied, judging whether the first preset condition is satisfied; if yes, generating a first check code and a first short message verification code; calculating a mobile phone number, a first equipment ID, an application date, a first short message verification code and a first verification code to generate first verification information; updating and storing the short message verification code record; controlling a first self-service terminal device to prompt a first check code; and sending the first short message verification code and the first verification code to the mobile terminal to which the mobile phone number belongs. The application can reduce the condition that the user inputs the short message verification code for a plurality of times continuously.
The method only introduces how the verification code is generated, and does not solve the problem that multiple interactions are needed after the verification code is input in error.
CN116074833a discloses a method and device for judging short message verification code. The method comprises the following steps: generating a unique verification code, generating a short message to be verified by the unique verification code, encrypting the short message to obtain an encrypted short message, and transmitting the encrypted short message to a receiving terminal; decrypting the encrypted short message by using a decryption device of the receiving terminal, thereby obtaining a verification short message; obtaining the type of the sending terminal according to the identification number of the sending terminal, and detecting and verifying the correctness of the short message according to the type of the sending terminal; sending a verification acquisition page to a sending terminal to receive a verification test signal generated by the sending terminal through the verification acquisition page, and acquiring a test verification code according to the verification test signal; comparing the test verification code with the unique verification code to obtain a verification true value; and logging in the corresponding application program on the transmitting terminal when the verification true value is true.
The method only solves the security problem of the verification code, the verification process is too complex, and the participation of the sending terminal is needed.
Therefore, the core of the project is how to complete verification of the short message verification code without subsequent participation of a server (a sending terminal).
Disclosure of Invention
Aiming at the defects of the prior art, the application aims to provide a short message password verification method, which is characterized in that a verification code and a JS function (JavaScript function) corresponding to the verification code are produced at a server side, and a mobile terminal judges whether the verification code input by a user is correct or not to open the authority of the next operation of the user through running the JS function, such as login.
The method can only adopt the matching of the verification code and the JS function, and compared with other algorithms, the JS function can be suitable for various systems such as android, apples and the like, and cannot be replaced by other functions, so that the method is one of the innovation points of the scheme.
Meanwhile, the application also provides a mobile terminal and a system based on the method.
In order to achieve the aim of the application, the application adopts the following technical scheme: a short message password verification method comprises the following steps:
step 1: receiving a short message verification code and a JS function corresponding to the verification code; the JS function is an encrypted JS function;
step 2: decrypting the encrypted JS function to obtain a decrypted JS function, and operating the decrypted JS function to obtain a verification code;
step 3: judging whether the verification code input by the user is consistent with the verification code obtained in the step 2, if so, passing verification, and if not, prompting the user to input again until the verification code input by the user is consistent with the verification code obtained in the step 2.
In the above short message password verification method, in step 3, when the number of times that the verification code input by the user is inconsistent with the verification code obtained in step 2 exceeds the first preset number of times, the user is prompted to re-obtain the short message verification code.
In the above short message password verification method, the step 3 specifically includes:
step 31: when a user inputs a number in the number input box, judging whether the number is the same as the number at the corresponding position in the verification code acquired in the step 2;
step 32: if not, prompting the user to re-input the number in the number input box, and performing step 31;
step 33: if the number is the same, the next number input box is opened for the user to input the number, and step 31 is performed until the verification code input by the user is consistent with the verification code acquired in step 2.
In the above method for verifying the short message password, in the step 32, if the number of times of the digits input by the user in the same digital input box and the number of the corresponding position in the verification code obtained in the step 2 are different, exceeds a second preset number of times, the user is prompted to re-obtain the short message verification code.
In the short message password verification method, the second preset times are smaller than the first preset times, and the first preset times are 3-5 times.
Meanwhile, the application also discloses a mobile terminal, which comprises the following units:
a short message receiving unit: the method is used for receiving the short message verification code;
a data receiving unit: the JS function is used for receiving the corresponding verification code; the JS function is an encrypted JS function;
a data transmitting unit: the method comprises the steps of sending an authentication code acquisition request, and a user name and a password related to the authentication code;
decryption unit: the method comprises the steps of decrypting an encrypted JS function to obtain a decrypted JS function;
JS running unit: the JS function is used for running the decrypted JS function to obtain the verification code;
and a display unit: the verification code input interface is used for displaying the verification code;
and a verification unit: and 2, judging whether the verification code input by the user on the display unit is consistent with the verification code obtained by the JS running unit, if so, passing the verification, and if not, prompting the user to re-input until the verification code input by the user is consistent with the verification code obtained in the step 2.
Finally, the application also discloses a short message verification code verification system, which comprises a server and the mobile terminal;
the server is used for receiving the verification code acquisition request sent by the data sending unit, the user name and the password related to the verification code, generating the verification code and the JS function after verifying the user name and the password, and encrypting the JS function; and sending the encrypted JS function to a data receiving unit, and sending the verification code to a short message receiving unit.
Compared with the prior art, the application has the following beneficial effects:
the application can accelerate the step of checking the verification code in advance, and the application does not need to send a server for verification after the mobile terminal is successfully checked, thereby reducing the steps of one-time data interaction.
As a preferred scheme of the application, by means of digital verification one by one, the method can achieve the purpose of checking whether the verification code is correct in real time by monitoring the real-time input of the user verification code, and can be used for judging that certain functions cannot be operated (for example, when the verification code is incorrect, a login button cannot be clicked, and only the verification code is correct, the login button can be clicked), so that the problem of reduced user experience caused by repeated input errors of a user can be avoided.
Drawings
FIG. 1 is a flow chart of example 1;
fig. 2 is a block diagram of the structure of embodiment 2.
Detailed Description
The technical scheme of the application is further described by the following specific embodiments. It will be apparent to those skilled in the art that the examples are merely to aid in understanding the application and are not to be construed as a specific limitation thereof.
Example 1
Referring to fig. 1, a short message password authentication method includes the following steps:
step 1: receiving a short message verification code and a JS function corresponding to the verification code; the JS function is an encrypted JS function;
the short message verification code and the JS function are generated by a server, the method is suitable for most of APP, and the short message verification of the APP is taken as an example for explanation:
when a user logs in an APP at a mobile phone terminal, short message verification code verification is needed in a login stage, and at the moment, the user operates at the mobile phone terminal to send a verification code acquisition request;
an APP of a mobile phone terminal of a user can send an account number, a password, a mobile phone number and an authentication code acquisition request to a server, wherein the server is a server corresponding to the APP; the server can be a cloud server or a server of an APP operation company which can be deployed in the field;
after receiving the account number, the password and the verification code, the server generates the verification code and an encrypted JS function when the account number and the password pass verification, and the JS function can obtain the verification code after decryption and operation;
the APP of the server and the mobile phone terminal pre-defines an encryption and decryption algorithm.
Step 2: decrypting the encrypted JS function to obtain a decrypted JS function, and operating the decrypted JS function to obtain a verification code;
in this embodiment, only the JS function can be used, if other algorithms are used, code conversion is required according to the corresponding terminal platform, and the code conversion is relatively complex, for example, the code conversion is required to be converted into a code which can be identified by the android or apple system of the mobile phone terminal by using other algorithms. The JS function can operate for all terminal platforms.
Step 3: judging whether the verification code input by the user on the APP display interface is consistent with the verification code obtained in the step 2, if so, passing verification, and if not, prompting the user to input again until the verification code input by the user is consistent with the verification code obtained in the step 2. Of course, in practical application, it is impossible to allow the user to verify for numerous times, and in general, 3-5 times of verification failures require the user to acquire the verification code again;
further preferably, the step 3 specifically includes:
step 31: when a user inputs a number in the number input box, judging whether the number is the same as the number at the corresponding position in the verification code acquired in the step 2; for example, if 5 should be input in the first digital input box, but 3 should be input, in step 31, the first digits of the verification code obtained in step 2 and 3 are compared to see if they are consistent;
step 32: if not, prompting the user to re-input the number in the number input box, and performing step 31;
of course, step 32 is not filled infinitely, and the user is generally only allowed to repeat operation step 32 twice for the same digital input box, and is prompted to acquire the verification code again if the operation is performed twice more than twice;
step 33: if the number is the same, the next number input box is opened for the user to input the number, and step 31 is performed until the verification code input by the user is consistent with the verification code acquired in step 2.
In this embodiment, a mode of verifying numbers one by one is adopted, when a user inputs a number error, the user is prompted to read the verification code again, and in general, the user can complete correct input of the verification code after inputting the number error once.
Compared with the traditional method that the verification code is required to be sent to the server for verification, the method and the system for verifying the short message verification code, disclosed by the application, have the advantages that the verification is transplanted to the mobile terminal, the safety verification is completed through the encrypted JS function, on one hand, the number of times of data interaction is reduced, and on the other hand, the safety of verification of the short message verification code is ensured.
Example 2
Referring to fig. 2, a short message verification code verification system includes a server 1 and a mobile terminal 2;
the server is used for receiving the verification code acquisition request sent by the data sending unit, the user name and the password related to the verification code and the mobile phone number of the mobile terminal, generating the verification code and the JS function after verifying the user name and the password, and encrypting the JS function; and sending the encrypted JS function to a data receiving unit, and sending the verification code to a short message receiving unit.
The mobile terminal comprises the following units:
short message receiving unit 21: the short message verification code is used for receiving the short message verification code sent by the server;
the data receiving unit 22: the JS function corresponding to the verification code is used for receiving the JS function sent by the server;
the JS function is an encrypted JS function;
the data transmission unit 23: the mobile terminal is used for sending an identifying code obtaining request, a user name and a password related to the identifying code and a mobile phone number of the mobile terminal to a server;
decryption unit 24: the method comprises the steps of decrypting an encrypted JS function to obtain a decrypted JS function;
the JS operation unit 25: the JS function is used for running the decrypted JS function to obtain the verification code;
display unit 26: the verification code input interface is used for displaying the verification code;
the verification unit 27: and 2, judging whether the verification code input by the user on the display unit is consistent with the verification code obtained by the JS running unit, if so, passing the verification, and if not, prompting the user to re-input until the verification code input by the user is consistent with the verification code obtained in the step 2.
The following description is made by verifying a short message verification code of an APP:
after a user installs a certain APP and registers, the APP requires short message verification when registering, and at the moment, the user clicks on an APP operation interface of a display unit to obtain a verification code; the data transmitting unit transmits the verification code acquisition request, the user name and the password and the mobile phone number of the mobile terminal to the server;
the server receives the verification code acquisition request, the user name and the password, the mobile phone number, the verification code and the JS function are generated after the user name and the password are verified, and encryption processing is carried out on the JS function; the JS function after encryption processing is sent to a data receiving unit, and the verification code is sent to a short message receiving unit;
the display unit displays the short message verification code received by the short message receiving unit;
the data receiving unit decrypts the encrypted JS function in the background of the mobile terminal according to a preset encryption and decryption algorithm to obtain a decrypted JS function; the JS running unit runs the decrypted JS function to obtain a verification code;
the user inputs the verification code in the display unit operation;
verification of the verification code can be divided into two modes, one mode is to input a complete verification code and then obtain the verification code with the JS running unit for verification comparison, and the other mode is to input one number for comparison once until verification of all numbers is completed. The above operations are all performed by the verification unit;
when the verification passes, the APP allows the user to operate the APP.
Through the system, the server does not need to participate in the subsequent verification process, so that the data interaction times can be reduced, and the user experience is improved.

Claims (5)

1. The short message password verification method is characterized by comprising the following steps of:
step 1: receiving a short message verification code and a JS function corresponding to the verification code; the JS function is an encrypted JS function;
step 2: decrypting the encrypted JS function to obtain a decrypted JS function, and operating the decrypted JS function to obtain a verification code;
step 3: judging whether the verification code input by the user is consistent with the verification code obtained in the step 2, if so, passing the verification, and if not, prompting the user to input again until the verification code input by the user is consistent with the verification code obtained in the step 2;
in step 3, when the inconsistent times of the verification code input by the user and the verification code obtained in step 2 exceed the first preset times, prompting the user to re-obtain the short message verification code;
the step 3 specifically comprises the following steps:
step 31: when a user inputs a number in the number input box, judging whether the number is the same as the number at the corresponding position in the verification code acquired in the step 2;
step 32: if not, prompting the user to re-input the number in the number input box, and performing step 31;
step 33: if the number is the same, the next number input box is opened for the user to input the number, and step 31 is performed until the verification code input by the user is consistent with the verification code acquired in step 2.
2. The method according to claim 1, wherein in the step 32, if the number of times of the user inputting the number in the same digital input box and the number of the corresponding position in the verification code obtained in the step 2 are different, exceeds a second preset number of times, the user is prompted to re-obtain the short message verification code.
3. The short message password verification method according to claim 2, wherein the second preset times are smaller than the first preset times, and the first preset times are 3-5 times.
4. A mobile terminal for implementing the method of any of claims 1-3, characterized by comprising the following elements:
a short message receiving unit: the method is used for receiving the short message verification code;
a data receiving unit: the JS function is used for receiving the corresponding verification code; the JS function is an encrypted JS function;
a data transmitting unit: the method comprises the steps of sending an authentication code acquisition request, and a user name and a password related to the authentication code;
decryption unit: the method comprises the steps of decrypting an encrypted JS function to obtain a decrypted JS function;
JS running unit: the JS function is used for running the decrypted JS function to obtain the verification code;
and a display unit: the verification code input interface is used for displaying the verification code;
and a verification unit: and 2, judging whether the verification code input by the user on the display unit is consistent with the verification code obtained by the JS running unit, if so, passing the verification, and if not, prompting the user to re-input until the verification code input by the user is consistent with the verification code obtained in the step 2.
5. A short message verification code verification system, which is characterized by comprising a server and the mobile terminal according to claim 4;
the server is used for receiving the verification code acquisition request sent by the data sending unit, the user name and the password related to the verification code, generating the verification code and the JS function after verifying the user name and the password, and encrypting the JS function; and sending the encrypted JS function to a data receiving unit, and sending the verification code to a short message receiving unit.
CN202310668089.8A 2023-06-07 2023-06-07 Short message password verification method, mobile terminal and system Active CN116389013B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310668089.8A CN116389013B (en) 2023-06-07 2023-06-07 Short message password verification method, mobile terminal and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310668089.8A CN116389013B (en) 2023-06-07 2023-06-07 Short message password verification method, mobile terminal and system

Publications (2)

Publication Number Publication Date
CN116389013A CN116389013A (en) 2023-07-04
CN116389013B true CN116389013B (en) 2023-09-15

Family

ID=86971714

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310668089.8A Active CN116389013B (en) 2023-06-07 2023-06-07 Short message password verification method, mobile terminal and system

Country Status (1)

Country Link
CN (1) CN116389013B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100136572A (en) * 2009-06-19 2010-12-29 김세용 Apparatus and method for creating otp using authentication method of client ip address
CN104753944A (en) * 2015-03-31 2015-07-01 北京畅游天下网络技术有限公司 Account security verifying method and system
CN105812366A (en) * 2016-03-14 2016-07-27 携程计算机技术(上海)有限公司 Server, anti-crawler system and anti-crawler verification method
CN110493261A (en) * 2019-09-16 2019-11-22 腾讯科技(深圳)有限公司 Identifying code acquisition methods, client, server and storage medium based on block chain
CN110798436A (en) * 2018-08-03 2020-02-14 广州小鹏汽车科技有限公司 Verification code verification method and device
CN115314263A (en) * 2022-07-25 2022-11-08 浪潮云信息技术股份公司 KEYCLOAK-based dual-factor authentication cloud inspection platform APP authentication method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100136572A (en) * 2009-06-19 2010-12-29 김세용 Apparatus and method for creating otp using authentication method of client ip address
CN104753944A (en) * 2015-03-31 2015-07-01 北京畅游天下网络技术有限公司 Account security verifying method and system
CN105812366A (en) * 2016-03-14 2016-07-27 携程计算机技术(上海)有限公司 Server, anti-crawler system and anti-crawler verification method
CN110798436A (en) * 2018-08-03 2020-02-14 广州小鹏汽车科技有限公司 Verification code verification method and device
CN110493261A (en) * 2019-09-16 2019-11-22 腾讯科技(深圳)有限公司 Identifying code acquisition methods, client, server and storage medium based on block chain
CN115314263A (en) * 2022-07-25 2022-11-08 浪潮云信息技术股份公司 KEYCLOAK-based dual-factor authentication cloud inspection platform APP authentication method and system

Also Published As

Publication number Publication date
CN116389013A (en) 2023-07-04

Similar Documents

Publication Publication Date Title
CN103617531B (en) Safe payment method based on credible two-dimension code and device
CN110930147B (en) Offline payment method and device, electronic equipment and computer-readable storage medium
CN102231716B (en) Instant communication service login method
CN103107996A (en) On-line download method and system of digital certificate and digital certificate issuing platform
CN104917740A (en) Password resetting method and password verifying method and device
CN102364888B (en) Setting method, setting system, terminal and authentication server for dynamic token key factor
US7340773B2 (en) Multi-stage authorisation system
US9461986B2 (en) Single sign-on for disparate servers
CN114513310A (en) Authentication method and device for vehicle diagnosis equipment, electronic equipment and medium
CN110659899A (en) Offline payment method, device and equipment
CN116389013B (en) Short message password verification method, mobile terminal and system
CN111050326B (en) Block chain-based short message verification method, device, equipment and medium
CN112351043A (en) Vehicle navigation factory setting password management method and system
CN114826623B (en) Mock test message processing method and device
KR20150097059A (en) Payment method via fingerprint authentication, user terminal and payment relay server
CN114567469B (en) Application password type detection method and platform based on B/S mode
CN109600354A (en) Network identity validation System and method for
CN115086090A (en) Network login authentication method and device based on UKey
CN111127019B (en) Method, system and device for backing up mnemonic words
CN111382050B (en) Network service interface testing method and device
CN113852628A (en) Decentralized single sign-on method, decentralized single sign-on device and storage medium
CN112948815A (en) Off-line weak password checking method and device based on Hash matching
CN111212050B (en) Method and system for encrypting and transmitting data based on digital certificate
CN111212042B (en) Data transmission method, device and system
CN114640464B (en) Subscription data transmission method, device, equipment and storage medium based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant