CN117150475A - Application starting method and device, electronic equipment and storage medium - Google Patents
Application starting method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN117150475A CN117150475A CN202311132869.7A CN202311132869A CN117150475A CN 117150475 A CN117150475 A CN 117150475A CN 202311132869 A CN202311132869 A CN 202311132869A CN 117150475 A CN117150475 A CN 117150475A
- Authority
- CN
- China
- Prior art keywords
- verification code
- random number
- application
- vehicle
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 78
- 238000012795 verification Methods 0.000 claims abstract description 254
- 238000012545 processing Methods 0.000 claims abstract description 15
- 230000006870 function Effects 0.000 claims description 14
- 238000004590 computer program Methods 0.000 claims description 9
- 230000004044 response Effects 0.000 claims description 9
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 230000008569 process Effects 0.000 description 12
- 238000004891 communication Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/588—Random number generators, i.e. based on natural stochastic processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
- G06F2211/008—Public Key, Asymmetric Key, Asymmetric Encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Lock And Its Accessories (AREA)
Abstract
The application provides an application starting method, an application starting device, electronic equipment and a storage medium. The method comprises the following steps: responding to a starting operation aiming at a target application, processing a random number generated by the target application, and generating a two-dimensional code; acquiring a first verification code generated by a target terminal based on the random number, the current first system time and the effective duration information of the target terminal; the random number is obtained by the target terminal through scanning and analyzing the two-dimensional code by an application management program; generating a second verification code based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information; and starting the target application under the condition that the first verification is consistent with the second verification code. The application can achieve the purpose of improving the safety of application starting and carrying out identity authentication on the user.
Description
Technical Field
The present application relates to the field of vehicle security technologies, and in particular, to an application starting method, an application starting device, an electronic device, and a storage medium.
Background
Each operating system has many debugging means and hidden development functions, such as application programs of a developer mode, an engineering mode and the like of the mobile phone. These applications may provide specialized debugging functions and hidden system information and capture some exception information. Engineering mode application programs exist in the vehicle-mounted system, and the engineering mode application programs are subjected to links such as development, debugging, production, offline, after-sales and the like along with the whole vehicle. In order to avoid unnecessary misunderstanding caused by the debugging function, the user is limited to professionals such as developers, manufacturers, 4S shop staff and the like, the engineering mode is also required to be started by a hidden means, and a common opening mode is to start the engineering mode application by inputting a hidden password (such as: # 12345# #) through telephone dialing.
The starting method of the engineering mode application has the risk of leakage because of fixed password rules, and reduces the safety of starting the engineering mode application. Meanwhile, the telephone dialing mode cannot verify the identity of the user, and cannot limit the user of the engineering mode application.
Disclosure of Invention
The embodiment of the application provides an application starting method, an application starting device, electronic equipment and a storage medium, which are used for solving the problems that the risk of leakage exists in the related technology, the safety of starting engineering mode application is reduced, the identity of a user cannot be checked, and the user of the engineering mode application cannot be limited.
In order to solve the technical problems, the embodiment of the application is realized as follows: :
in a first aspect, an embodiment of the present application provides an application starting method, applied to a vehicle-mounted terminal, where the method includes:
responding to a starting operation aiming at a target application, processing a random number generated by the target application, and generating a two-dimensional code;
acquiring a first verification code generated by a target terminal based on the random number, the current first system time and the effective duration information of the target terminal; the random number is obtained by the target terminal through scanning and analyzing the two-dimensional code by an application management program;
generating a second verification code based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information;
and starting the target application under the condition that the first verification is consistent with the second verification code.
Optionally, the processing the random number generated by the target application in response to the starting operation for the target application, to generate the two-dimensional code includes:
responding to a starting operation aiming at the target application, and acquiring a random number generated by the target application;
encrypting the random number based on an asymmetric encryption algorithm to generate an encrypted ciphertext;
And performing conversion processing on the encrypted ciphertext to generate the two-dimensional code.
Optionally, the obtaining the first verification code generated by the target terminal based on the random number, the current first system time of the target terminal and the valid duration information includes:
displaying a verification code input box on the vehicle-mounted screen;
and acquiring the first verification code input by the user in the verification code input box.
Optionally, the generating a second verification code based on the random number, the current second system time of the vehicle-mounted terminal and the valid duration information includes:
generating the second verification code with a specific bit number based on an HmacSHA1 algorithm by taking the random number as a secret key and the second system time and the effective duration information as messages;
the first verification code and the second verification code have the same length.
Optionally, the target application is an engineering mode application.
In a second aspect, an embodiment of the present application provides an application starting method, applied to a target terminal, where the method includes:
scanning and analyzing a two-dimensional code on a vehicle-mounted screen of the vehicle-mounted terminal to obtain a random number;
generating a first verification code based on the random number, the current first system time of the target terminal and the effective duration information;
The first verification code is sent to the vehicle-mounted terminal, the vehicle-mounted terminal compares the first verification code with a second verification code, and when the first verification code is consistent with the second verification code, the target application is started, and the second verification code is generated by the vehicle-mounted terminal based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information.
Optionally, the scanning and analyzing the two-dimensional code on the vehicle-mounted screen of the vehicle-mounted terminal to obtain the random number includes:
after a user logs in an application management program, acquiring the two-dimensional code scanned by a scanning function based on the application management program;
and analyzing the two-dimensional code to obtain the random number.
Optionally, the generating a first verification code based on the random number, the current first system time of the target terminal and the valid duration information includes:
generating the first verification code with a specific bit number by taking the random number as a secret key and the first system time and the effective duration information as messages based on an HmacSHA1 algorithm;
the first verification code and the second verification code have the same length.
In a third aspect, an embodiment of the present application provides an application starting apparatus, applied to a vehicle-mounted terminal, where the apparatus includes:
the two-dimensional code generation module is used for responding to the starting operation of the target application, processing the random number generated by the target application and generating a two-dimensional code;
the first verification code acquisition module is used for acquiring a first verification code generated by the target terminal based on the random number, the current first system time of the target terminal and the effective duration information; the method comprises the steps of carrying out a first treatment on the surface of the The random number is obtained by the target terminal through scanning and analyzing the two-dimensional code by an application management program;
the second verification code generation module is used for generating a second verification code based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information;
and the target application starting module is used for starting the target application under the condition that the first verification code is consistent with the second verification code.
Optionally, the two-dimensional code generating module includes:
a random number acquisition unit, configured to acquire a random number generated by the target application in response to a start operation for the target application;
the encrypted ciphertext generating unit is used for encrypting the random number based on an asymmetric encryption algorithm to generate an encrypted ciphertext;
And the two-dimensional code generating unit is used for converting the encrypted ciphertext to generate the two-dimensional code.
Optionally, the first verification code obtaining module includes:
an input frame display unit for displaying a verification code input frame on the vehicle-mounted screen;
the first verification code acquisition unit is used for acquiring the first verification code input by the user in the verification code input box.
Optionally, the second verification code generating module includes:
the second verification code generating unit is used for generating the second verification code with a specific bit number based on an HmacSHA1 algorithm by taking the random number as a secret key and the second system time and the effective duration information as messages;
the first verification code and the second verification code have the same length.
Optionally, the target application is an engineering mode application.
In a fourth aspect, an embodiment of the present application provides an application starting apparatus, applied to a target terminal, where the apparatus includes:
the random number acquisition module is used for scanning and analyzing the two-dimensional code on the vehicle-mounted screen of the vehicle-mounted terminal to obtain a random number;
the first verification code generation module is used for generating a first verification code based on the random number, the current first system time of the target terminal and the effective duration information;
The target application starting module is used for sending the first verification code to the vehicle-mounted terminal, comparing the first verification code with the second verification code by the vehicle-mounted terminal, and starting the target application when the first verification code is consistent with the second verification code, wherein the second verification code is generated by the vehicle-mounted terminal based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information.
Optionally, the random number acquisition module includes:
the two-dimensional code scanning unit is used for acquiring the two-dimensional code scanned by the scanning function based on the application management program after a user logs in the application management program;
and the random number acquisition unit is used for analyzing the two-dimensional code to obtain the random number.
Optionally, the first verification code generating module includes:
the first verification code generation unit is used for generating the first verification code with a specific bit number based on an HmacSHA1 algorithm by taking the random number as a secret key and the first system time and the effective duration information as messages;
the first verification code and the second verification code have the same length.
In a fifth aspect, an embodiment of the present application provides an electronic device, including: :
A memory, a processor, and a computer program stored on the memory and executable on the processor, which when executed by the processor implements the application launch method of any one of the above.
In a sixth aspect, an embodiment of the present application provides a readable storage medium, which when executed by a processor of an electronic device, enables the electronic device to perform the application starting method described in any one of the above.
In the embodiment of the application, in response to starting operation aiming at a target application, a random number generated by the target application is processed to generate a two-dimensional code, a first verification code generated by a target terminal based on the random number, the current first system time and effective duration information of the target terminal is obtained by scanning and analyzing the two-dimensional code through an application management program by the target terminal, a second verification code is generated based on the random number, the current second system time and the effective duration information of the vehicle-mounted terminal, and the target application is started under the condition that the first verification code is consistent with the second verification code. According to the embodiment of the application, the random number is used as the generation standard of the verification code, the one-time dynamic verification code is performed on the opening mode, the verification code has timeliness, and the safety of starting the engineering mode application can be improved. Meanwhile, the target terminal side can start the engineering mode application only by logging in the application management program, so that the user can be authenticated, and the user can be limited.
The foregoing description is only an overview of the present application, and is intended to be implemented in accordance with the teachings of the present application in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present application more readily apparent.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments of the present application will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flowchart illustrating steps of an application starting method according to an embodiment of the present application;
FIG. 2 is a flow chart of steps of a two-dimensional code generating method according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating steps of a method for obtaining a first verification code according to an embodiment of the present application;
FIG. 4 is a flowchart illustrating steps of a second verification code generating method according to an embodiment of the present application;
FIG. 5 is a flowchart illustrating steps of another method for starting an application according to an embodiment of the present application;
FIG. 6 is a flowchart illustrating steps of a method for obtaining a random number according to an embodiment of the present application;
FIG. 7 is a flowchart illustrating steps of a method for generating a first verification code according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of an application starting device according to an embodiment of the present application;
FIG. 9 is a schematic structural diagram of another application starting apparatus according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Referring to fig. 1, a flowchart of steps of an application starting method provided by an embodiment of the present application is shown, where the method may be applied to a vehicle-mounted terminal. As shown in fig. 1, the application starting method may include: step 101, step 102, step 103 and step 104.
Step 101: and responding to the starting operation of the target application, processing the random number generated by the target application, and generating the two-dimensional code.
The embodiment of the application can be applied to a scene of starting the target application (such as engineering mode application and the like) by adopting a one-time dynamic verification mode.
The embodiment of the application can be applied to the vehicle-mounted terminal, namely, the execution main body is the vehicle-mounted terminal.
In this example, the target application may be, but is not limited to, an engineering mode application. Engineering mode (EngineerMode) is a tool mode used by engineers to debug various configurations of hardware, and to complete the setting of relevant parameters.
After receiving the start operation of the target application, a random number may be generated by the target application in response to the start operation for the target application. The vehicle-mounted terminal can process the random number generated by the target application to generate a two-dimensional code. Specifically, the random number may be converted into the encrypted ciphertext, and then the encrypted ciphertext may be converted into the two-dimensional code. This implementation may be described in detail below in conjunction with fig. 2.
Referring to fig. 2, a step flowchart of a two-dimensional code generating method provided by an embodiment of the present application is shown. As shown in fig. 2, the two-dimensional code generation method may include: step 201, step 202 and step 203.
Step 201: and responding to the starting operation aiming at the target application, and acquiring the random number generated by the target application.
In the embodiment of the application, after receiving the starting operation of the target application, the vehicle-mounted terminal can respond to the starting operation of the target application to generate a random number by the target application, and can acquire the random number generated by the target application.
After the random number generated by the target application is obtained, step 202 is performed.
Step 202: and encrypting the random number based on an asymmetric encryption algorithm to generate an encrypted ciphertext.
The asymmetric encryption algorithm is a secret method of a key. The asymmetric encryption algorithm requires two keys: public keys (public keys) and private keys (private keys). The public key and the private key are a pair, and if the data is encrypted by the public key, the data can be decrypted only by the corresponding private key. Because two different keys are used for encryption and decryption, this algorithm is called an asymmetric encryption algorithm.
In this embodiment, the asymmetric encryption algorithm may be, but is not limited to, an RSA asymmetric encryption algorithm.
After the random number generated by the target application is obtained, the random number may be encrypted based on an asymmetric encryption algorithm to generate an encrypted ciphertext. Specifically, the random number may be encrypted using a public key, resulting in an encrypted ciphertext.
After encrypting the random number based on the asymmetric encryption algorithm to generate an encrypted ciphertext, step 203 is performed.
Step 203: and performing conversion processing on the encrypted ciphertext to generate the two-dimensional code.
After encrypting the random number based on the asymmetric encryption algorithm to generate an encrypted ciphertext, the encrypted ciphertext may be converted to generate the two-dimensional code.
After the two-dimensional code is generated, the two-dimensional code can be displayed on a screen of the vehicle-mounted terminal, so that a subsequent user can conveniently use other equipment to perform scanning analysis.
According to the embodiment of the application, the two-dimensional code is generated by adopting the random number and the asymmetric encryption algorithm, so that the uniqueness and timeliness of the verification code generated subsequently can be ensured, and the safety of starting the engineering mode application can be improved.
After processing the random number generated by the target application to generate the two-dimensional code, step 102 is performed.
Step 102: acquiring a first verification code generated by a target terminal based on the random number, the current first system time and the effective duration information of the target terminal; the random number is obtained by scanning and analyzing the two-dimensional code through an application management program by the target terminal.
After the random number generated by the target application is processed to generate the two-dimensional code, the user can scan the two-dimensional code through an application management program of the target terminal (such as a mobile phone and the like). Specifically, a user may first log in an application management program in a target terminal, and start a code scanning function to scan a two-dimensional code on a screen of the vehicle-mounted terminal.
According to the embodiment of the application, the login account of the application management program is limited, so that a user of the engineering mode application can be limited to use the appointed mobile phone program and obtain authentication, and the starting security of the engineering mode application is further improved.
After the target terminal scans the two-dimensional code, the two-dimensional code can be analyzed to obtain the encrypted ciphertext. Then, the encrypted password can be decrypted by adopting an asymmetric encryption algorithm, and then a random number can be obtained. In particular, the encrypted password may be decrypted using a private key of an asymmetric encryption algorithm.
After the target terminal acquires the random number, a first verification code can be generated based on the random number, the current first system time of the target terminal and the effective duration information. The specific value of the effective duration may be determined according to the service requirement, which is not limited in this embodiment.
In a specific implementation, the target terminal may use the HmacSHA1 algorithm to process a random number as a key, the first system time and the effective duration information as a message, and the key and the message as inputs to obtain a verification code with a specific bit number. The valid duration information may indicate the valid duration of the verification code.
After the target terminal side generates the first verification code, the user can input the first verification code into an input box on a screen of the vehicle-mounted terminal, so that the transmission of the first verification code to the vehicle-mounted terminal is realized. This implementation may be described in detail below in conjunction with fig. 3.
Referring to fig. 3, a flowchart of steps of a first verification code obtaining method according to an embodiment of the present application is shown. As shown in fig. 3, the first verification code obtaining method may include: step 301 and step 302.
Step 301: and displaying a verification code input box on the vehicle-mounted screen.
In the embodiment of the application, the verification code input box can be displayed on the vehicle-mounted screen in advance. It is understood that an authentication code input box may be displayed in advance on the in-vehicle screen while the two-dimensional code is generated and displayed on the in-vehicle screen.
After the verification code input box is displayed on the in-vehicle screen, step 302 is performed.
Step 302: and acquiring the first verification code input by the user in the verification code input box.
After the verification code input box is displayed on the vehicle-mounted screen, the first verification code input by the user in the verification code input box can be completed, namely, the user can complete filling of the first verification code, and the vehicle-mounted terminal can acquire the first verification code.
According to the embodiment of the application, the verification code generated by the target terminal side is acquired in the mode of user input, so that the verification process does not need to depend on a network, and the vehicle-mounted terminal does not need to depend on the network.
After acquiring the first verification code generated by the target terminal based on the random number, the current first system time and the valid duration information of the target terminal, step 103 is executed.
Step 103: and generating a second verification code based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information.
After the first verification code generated by the target terminal based on the random number, the current first system time and the effective duration information of the target terminal is obtained, a second verification code can be generated by the vehicle-mounted terminal according to the random number, the current second system time and the effective duration information of the vehicle-mounted terminal. In this example, the length of the second verification code is the same as the length of the first verification code, for example, when the length of the first verification code is 6 digits, then the length of the second verification code is also 6 digits, and so on.
In this example, the second verification code may be generated based on the HmacSHA1 algorithm. This implementation may be described in detail below in conjunction with fig. 4.
Referring to fig. 4, a flowchart of steps of a second verification code generating method according to an embodiment of the present application is shown. As shown in fig. 4, the second verification code generation method may include: step 401.
Step 401: and generating the second verification code with a specific bit number by taking the random number as a secret key and the second system time and the effective duration information as messages based on an HmacSHA1 algorithm.
In the embodiment of the application, hmacSHA1 algorithm: HMAC is a hashed message authentication code (Hash-based Message Authentication Code), which uses a Hash algorithm to generate a message digest as output with a key and a message as input. The HMAC-SHA1 signature algorithm is a commonly used signature algorithm for generating a signature digest for a piece of information.
In this example, the random number may be used as a key, the second system time and the valid duration information may be used as a message, and the key and the message may be processed using a hash algorithm, so that a second verification code of a specific number of bits may be generated.
In the embodiment of the application, the same key is held by the vehicle machine side and the target terminal and the same Hash algorithm is adopted to generate the verification code with the same length based on the same time base, so that one-time dynamic verification can be realized, and the safety of starting the engineering mode application is improved.
After generating the second verification code based on the random number, the current second system time of the vehicle-mounted terminal, and the valid duration information, step 104 is performed.
Step 104: and starting the target application under the condition that the first verification is consistent with the second verification code.
After the second verification code is generated based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information, the first verification code and the second verification code can be compared, and therefore verification code comparison results can be obtained.
And when the verification code comparison result indicates that the first verification code is inconsistent with the second verification code, the verification fails, and the target application is not allowed to be started.
And when the verification code comparison result indicates that the first verification code is consistent with the second verification code, the verification is passed, and the target application is allowed to be started. At this time, the target application may be started and a functional interface of the target application is entered.
Compared with the password starting mode in the prior art, the embodiment of the application adopts the dynamic verification code, and the verification code rule is not fixed, so that the safety of starting the target application can be improved.
According to the application starting method provided by the embodiment of the application, the random number generated by the target application is processed in response to the starting operation aiming at the target application, the two-dimensional code is generated, the first verification code generated by the target terminal based on the random number, the current first system time and the effective duration information of the target terminal is obtained, the random number is obtained by scanning and analyzing the two-dimensional code through the application management program by the target terminal, the second verification code is generated based on the random number, the current second system time and the effective duration information of the vehicle-mounted terminal, and the target application is started under the condition that the first verification code is consistent with the second verification code. According to the embodiment of the application, the random number is used as the generation standard of the verification code, the one-time dynamic verification code is performed on the opening mode, the verification code has timeliness, and the safety of starting the engineering mode application can be improved. Meanwhile, the target terminal side can start the engineering mode application only by logging in the application management program, so that the user can be authenticated, and the user can be limited.
Referring to fig. 5, a flowchart of steps of another method for starting an application provided in an embodiment of the present application is shown, where the method may be applied to a target terminal. As shown in fig. 5, the application starting method may include: step 501, step 502 and step 503.
Step 501: and scanning and analyzing the two-dimensional code on the vehicle-mounted screen of the vehicle-mounted terminal to obtain the random number.
The embodiment of the application can be applied to the target terminal, namely, the execution subject is the target terminal.
In this example, the target terminal may be an electronic device such as a mobile phone, a tablet computer, or the like, and specifically, the specific type of the target terminal may be determined according to the service requirement, which is not limited in this embodiment.
On the vehicle terminal side, when a user starts a target application, a random number can be generated by the target application. The vehicle-mounted terminal can process the random number generated by the target application to generate a two-dimensional code, and the two-dimensional code is displayed on the vehicle-mounted screen.
Then, a user can log in an application management program installed in the target terminal, scan a two-dimensional code on the vehicle-mounted screen, and analyze the two-dimensional code to obtain a random number. This implementation may be described in detail below in conjunction with fig. 6.
Referring to fig. 6, a flowchart of steps of a method for obtaining a random number according to an embodiment of the present application is shown. As shown in fig. 6, the random number acquisition method may include: step 601 and step 602.
Step 601: and after the user logs in the application management program, acquiring the two-dimensional code scanned by the scanning function of the application management program.
In the embodiment of the application, when a user needs to scan the two-dimensional code on the vehicle-mounted screen, the user needs to log in the application management program firstly, namely, the user name and the password are input.
After the user logs in the application management program, the two-dimensional code on the vehicle-mounted screen can be scanned based on the scanning function of the application management program.
After the two-dimensional code scanned by the scanning function based on the application management program is acquired, step 602 is performed.
Step 602: and analyzing the two-dimensional code to obtain the random number.
After the two-dimensional code scanned by the scanning function based on the application management program is acquired, the two-dimensional code can be analyzed, and then the random number can be obtained.
After scanning and analyzing the two-dimensional code on the vehicle-mounted screen of the vehicle-mounted terminal to obtain the random number, step 502 is executed.
Step 502: and generating a first verification code based on the random number, the current first system time of the target terminal and the effective duration information.
After the two-dimensional code on the vehicle-mounted screen of the vehicle-mounted terminal is scanned and analyzed to obtain the random number, a first verification code can be generated based on the random number, the current first system time of the target terminal and the effective duration information. Wherein the validity duration may be used to indicate the validity time of the generated verification code. The first verification code and the second verification code are generated in the effective duration, and if the effective duration is exceeded, verification failure results can occur.
In a specific implementation, the first verification code may be generated based on the HmacSHA1 algorithm. This implementation may be described in detail below in conjunction with fig. 7.
Step 701: and generating the first verification code with a specific bit number by taking the random number as a secret key and the first system time and the effective duration information as messages based on an HmacSHA1 algorithm.
In the embodiment of the application, hmacSHA1 algorithm: HMAC is a hashed message authentication code, and HMAC uses a hash algorithm to generate a message digest as output, with a key and a message as inputs. The HMAC-SHA1 signature algorithm is a commonly used signature algorithm for generating a signature digest for a piece of information.
In this example, a random number may be used as a key, and the first system time and the valid duration information may be used as a message, and the key and the message may be processed using a hash algorithm, so that a first verification code with a specific number of bits may be generated.
In the embodiment of the application, the same key is held by the vehicle machine side and the target terminal and the same Hash algorithm is adopted to generate the verification code with the same length based on the same time base, so that one-time dynamic verification can be realized, and the safety of starting the engineering mode application is improved.
After generating the first verification code based on the random number, the current first system time of the target terminal, and the validity duration information, step 503 is performed.
Step 503: the first verification code is sent to the vehicle-mounted terminal, the vehicle-mounted terminal compares the first verification code with a second verification code, and when the first verification code is consistent with the second verification code, the target application is started, and the second verification code is generated by the vehicle-mounted terminal based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information.
After the first verification code is generated based on the random number, the current first system time of the target terminal and the effective duration information, the first verification code can be sent to the vehicle-mounted terminal, so that the vehicle-mounted terminal compares the first verification code with the second verification code, and when the first verification code is consistent with the second verification code, the target application is started and enters a functional interface of the target application. The second verification code is generated by the vehicle-mounted terminal based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information. The specific process can be as follows: after the vehicle-mounted terminal obtains the first verification code generated by the target terminal based on the random number, the current first system time and the effective duration information of the target terminal, the vehicle-mounted terminal can generate a second verification code according to the random number, the current second system time and the effective duration information of the vehicle-mounted terminal. The first verification code and the second verification code are then compared. And if the first verification code is consistent with the second verification code, the verification is passed, and the target application is allowed to be started. At this time, the target application may be started and a functional interface of the target application is entered.
According to the application starting method provided by the embodiment of the application, the random number is obtained by scanning and analyzing the two-dimensional code on the vehicle-mounted screen of the vehicle-mounted terminal. And generating a first verification code based on the random number, the current first system time of the target terminal and the effective duration information. The first verification code is sent to the vehicle-mounted terminal, the vehicle-mounted terminal compares the first verification code with the second verification code, and when the first verification code is consistent with the second verification code, the target application is started, and the second verification code is generated by the vehicle-mounted terminal based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information. According to the embodiment of the application, the random number is used as the generation standard of the verification code, the one-time dynamic verification code is performed on the opening mode, the verification code has timeliness, and the safety of starting the engineering mode application can be improved.
Referring to fig. 8, a schematic structural diagram of an application starting apparatus according to an embodiment of the present application is shown, where the apparatus may be applied to a vehicle-mounted terminal. As shown in fig. 8, the application starting apparatus 800 may include the following modules:
the two-dimensional code generating module 810 is configured to process a random number generated by a target application in response to a start operation for the target application, and generate a two-dimensional code;
A first verification code acquisition module 820, configured to acquire a first verification code generated by a target terminal based on the random number, a current first system time of the target terminal, and valid duration information; the random number is obtained by the target terminal through scanning and analyzing the two-dimensional code by an application management program;
a second verification code generating module 830, configured to generate a second verification code based on the random number, the current second system time of the vehicle-mounted terminal, and the valid duration information;
and the target application starting module 840 is configured to start the target application if the first verification code is consistent with the second verification code.
Optionally, the two-dimensional code generating module 810 includes:
a random number acquisition unit, configured to acquire a random number generated by the target application in response to a start operation for the target application;
the encrypted ciphertext generating unit is used for encrypting the random number based on an asymmetric encryption algorithm to generate an encrypted ciphertext;
and the two-dimensional code generating unit is used for converting the encrypted ciphertext to generate the two-dimensional code.
Optionally, the first verification code obtaining module 820 includes:
an input frame display unit for displaying a verification code input frame on the vehicle-mounted screen;
The first verification code acquisition unit is used for acquiring the first verification code input by the user in the verification code input box.
Optionally, the second verification code generating module 830 includes:
the second verification code generating unit is used for generating the second verification code with a specific bit number based on an HmacSHA1 algorithm by taking the random number as a secret key and the second system time and the effective duration information as messages;
the first verification code and the second verification code have the same length.
Optionally, the target application is an engineering mode application.
According to the application starting device provided by the embodiment of the application, the random number generated by the target application is processed in response to the starting operation aiming at the target application, the two-dimensional code is generated, the first verification code generated by the target terminal based on the random number, the current first system time and the effective duration information of the target terminal is obtained by scanning and analyzing the two-dimensional code through the application management program by the target terminal, the second verification code is generated based on the random number, the current second system time and the effective duration information of the vehicle-mounted terminal, and the target application is started under the condition that the first verification code is consistent with the second verification code. According to the embodiment of the application, the random number is used as the generation standard of the verification code, the one-time dynamic verification code is performed on the opening mode, the verification code has timeliness, and the safety of starting the engineering mode application can be improved. Meanwhile, the target terminal side can start the engineering mode application only by logging in the application management program, so that the user can be authenticated, and the user can be limited.
Referring to fig. 9, a schematic structural diagram of another application starting apparatus provided in an embodiment of the present application is shown, where the apparatus may be applied to a target terminal. As shown in fig. 9, the application starting apparatus 900 may include the following modules:
the random number acquisition module 910 is configured to scan and parse a two-dimensional code on a vehicle-mounted screen of the vehicle-mounted terminal to obtain a random number;
a first verification code generating module 920, configured to generate a first verification code based on the random number, the current first system time of the target terminal, and valid duration information;
the target application starting module 930 is configured to send the first verification code to the vehicle-mounted terminal, compare the first verification code with a second verification code by the vehicle-mounted terminal, and start the target application when the first verification code is consistent with the second verification code, where the second verification code is a verification code generated by the vehicle-mounted terminal based on the random number, the current second system time of the vehicle-mounted terminal, and the valid duration information.
Optionally, the random number acquisition module 910 includes:
the two-dimensional code scanning unit is used for acquiring the two-dimensional code scanned by the scanning function based on the application management program after a user logs in the application management program;
And the random number acquisition unit is used for analyzing the two-dimensional code to obtain the random number.
Optionally, the first verification code generating module 920 includes:
the first verification code generation unit is used for generating the first verification code with a specific bit number based on an HmacSHA1 algorithm by taking the random number as a secret key and the first system time and the effective duration information as messages;
the first verification code and the second verification code have the same length.
The application starting device provided by the embodiment of the application obtains the random number by scanning and analyzing the two-dimensional code on the vehicle-mounted screen of the vehicle-mounted terminal. And generating a first verification code based on the random number, the current first system time of the target terminal and the effective duration information. The first verification code is sent to the vehicle-mounted terminal, the vehicle-mounted terminal compares the first verification code with the second verification code, and when the first verification code is consistent with the second verification code, the target application is started, and the second verification code is generated by the vehicle-mounted terminal based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information. According to the embodiment of the application, the random number is used as the generation standard of the verification code, the one-time dynamic verification code is performed on the opening mode, the verification code has timeliness, and the safety of starting the engineering mode application can be improved.
Additionally, the embodiment of the application also provides electronic equipment, which comprises: : the system comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the computer program is executed by the processor to realize the application starting method.
Fig. 10 shows a schematic structural diagram of an electronic device 1000 according to an embodiment of the present application. As shown in fig. 10, the electronic device 1000 includes a Central Processing Unit (CPU) 1001 that can perform various appropriate actions and processes according to computer program instructions stored in a Read Only Memory (ROM) 1002 or computer program instructions loaded from a storage unit 1008 into a Random Access Memory (RAM) 1003. In the RAM1003, various programs and data required for the operation of the electronic apparatus 1000 can also be stored. The CPU1001, ROM1002, and RAM1003 are connected to each other by a bus 1004. An input/output (I/O) interface 1005 is also connected to bus 1004.
Various components in the electronic device 1000 are connected to the I/O interface 1005, including: an input unit 1006 such as a keyboard, mouse, microphone, etc.; an output unit 1007 such as various types of displays, speakers, and the like; a storage unit 1008 such as a magnetic disk, an optical disk, or the like; and communication unit 1009 such as a network card, modem, wireless communication transceiver, etc. Communication unit 1009 allows electronic device 1000 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunications networks.
The various procedures and processes described above may be performed by the processing unit 1001. For example, the methods of any of the embodiments described above may be implemented as a computer software program tangibly embodied on a computer-readable medium, such as the storage unit 1008. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 1000 via the ROM1002 and/or the communication unit 1009. When the computer program is loaded into RAM1003 and executed by CPU1001, one or more actions in the method described above may be performed.
The embodiment of the application also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, realizes the processes of the above application starting method embodiment, and can achieve the same technical effects, and in order to avoid repetition, the description is omitted here. Wherein the computer readable storage medium is selected from Read-Only Memory (ROM), random access Memory (Random Access Memory, RAM), magnetic disk or optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are to be protected by the present application.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk, etc.
The foregoing is merely illustrative of the present application, and the present application is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present application. Therefore, the protection scope of the application is subject to the protection scope of the claims.
Claims (12)
1. An application starting method applied to a vehicle-mounted terminal, the method comprising:
responding to a starting operation aiming at a target application, processing a random number generated by the target application, and generating a two-dimensional code;
acquiring a first verification code generated by a target terminal based on the random number, the current first system time and the effective duration information of the target terminal; the random number is obtained by the target terminal through scanning and analyzing the two-dimensional code by an application management program;
generating a second verification code based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information;
and starting the target application under the condition that the first verification is consistent with the second verification code.
2. The method of claim 1, wherein the processing the random number generated by the target application in response to the start operation for the target application to generate the two-dimensional code comprises:
Responding to a starting operation aiming at the target application, and acquiring a random number generated by the target application;
encrypting the random number based on an asymmetric encryption algorithm to generate an encrypted ciphertext;
and performing conversion processing on the encrypted ciphertext to generate the two-dimensional code.
3. The method of claim 1, wherein the obtaining the first verification code generated by the target terminal based on the random number, the current first system time of the target terminal, and the valid duration information, comprises:
displaying a verification code input box on the vehicle-mounted screen;
and acquiring the first verification code input by the user in the verification code input box.
4. The method of claim 1, wherein the generating a second verification code based on the random number, the current second system time of the vehicle-mounted terminal, and the valid duration information comprises:
generating the second verification code with a specific bit number based on an HmacSHA1 algorithm by taking the random number as a secret key and the second system time and the effective duration information as messages;
the first verification code and the second verification code have the same length.
5. The method according to any one of claims 1 to 4, wherein the target application is an engineering mode application.
6. An application starting method applied to a target terminal, the method comprising:
scanning and analyzing a two-dimensional code on a vehicle-mounted screen of the vehicle-mounted terminal to obtain a random number;
generating a first verification code based on the random number, the current first system time of the target terminal and the effective duration information;
the first verification code is sent to the vehicle-mounted terminal, the vehicle-mounted terminal compares the first verification code with a second verification code, and when the first verification code is consistent with the second verification code, the target application is started, and the second verification code is generated by the vehicle-mounted terminal based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information.
7. The method according to claim 6, wherein the scanning and analyzing the two-dimensional code on the vehicle-mounted screen of the vehicle-mounted terminal to obtain the random number includes:
after a user logs in an application management program, acquiring the two-dimensional code scanned by a scanning function based on the application management program;
and analyzing the two-dimensional code to obtain the random number.
8. The method of claim 6, wherein the generating a first verification code based on the random number, the current first system time of the target terminal, and the validity duration information comprises:
Generating the first verification code with a specific bit number by taking the random number as a secret key and the first system time and the effective duration information as messages based on an HmacSHA1 algorithm;
the first verification code and the second verification code have the same length.
9. An application starting apparatus applied to a vehicle-mounted terminal, the apparatus comprising:
the two-dimensional code generation module is used for responding to the starting operation of the target application, processing the random number generated by the target application and generating a two-dimensional code;
the first verification code acquisition module is used for acquiring a first verification code generated by the target terminal based on the random number, the current first system time of the target terminal and the effective duration information; the method comprises the steps of carrying out a first treatment on the surface of the The random number is obtained by the target terminal through scanning and analyzing the two-dimensional code by an application management program;
the second verification code generation module is used for generating a second verification code based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information;
and the target application starting module is used for starting the target application under the condition that the first verification code is consistent with the second verification code.
10. An application starting apparatus applied to a target terminal, the apparatus comprising:
the random number acquisition module is used for scanning and analyzing the two-dimensional code on the vehicle-mounted screen of the vehicle-mounted terminal to obtain a random number;
the first verification code generation module is used for generating a first verification code based on the random number, the current first system time of the target terminal and the effective duration information;
the target application starting module is used for sending the first verification code to the vehicle-mounted terminal, comparing the first verification code with the second verification code by the vehicle-mounted terminal, and starting the target application when the first verification code is consistent with the second verification code, wherein the second verification code is generated by the vehicle-mounted terminal based on the random number, the current second system time of the vehicle-mounted terminal and the effective duration information.
11. An electronic device, comprising:
memory, a processor and a computer program stored on the memory and executable on the processor, which when executed by the processor implements the application launch method of any one of claims 1 to 5 or claims 6 to 8.
12. A readable storage medium, characterized in that instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the application launch method of any one of claims 1 to 5, or claims 6 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311132869.7A CN117150475A (en) | 2023-09-01 | 2023-09-01 | Application starting method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311132869.7A CN117150475A (en) | 2023-09-01 | 2023-09-01 | Application starting method and device, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117150475A true CN117150475A (en) | 2023-12-01 |
Family
ID=88900397
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311132869.7A Pending CN117150475A (en) | 2023-09-01 | 2023-09-01 | Application starting method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117150475A (en) |
-
2023
- 2023-09-01 CN CN202311132869.7A patent/CN117150475A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106487511B (en) | Identity authentication method and device | |
US9197420B2 (en) | Using information in a digital certificate to authenticate a network of a wireless access point | |
CN109005155B (en) | Identity authentication method and device | |
US20100332841A1 (en) | Authentication Method and System | |
CN108322416B (en) | Security authentication implementation method, device and system | |
CN111431719A (en) | Mobile terminal password protection module, mobile terminal and password protection method | |
WO2020018182A1 (en) | Public-private key pair protected password manager | |
CN110659467A (en) | Remote user identity authentication method, device, system, terminal and server | |
CN110690956B (en) | Bidirectional authentication method and system, server and terminal | |
KR20130072790A (en) | User authentication system and method thereof | |
CN104426659A (en) | Dynamic password generating method, authentication method, authentication system and corresponding equipment | |
CN105447715A (en) | Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party | |
CN104767617A (en) | Message processing method, system and related device | |
CN111031539A (en) | Method and system for enhancing login security of Windows operating system based on mobile terminal | |
CN112559991A (en) | System secure login method, device, equipment and storage medium | |
CN109451504B (en) | Internet of things module authentication method and system | |
CN113726766A (en) | Offline identity authentication method, system and medium | |
CN115150109A (en) | Authentication method, device and related equipment | |
CN112749182A (en) | Method, audit terminal, device and storage medium for agent access to Oracle database | |
CN116170759A (en) | Local area network access method and system based on WeChat | |
CN117150475A (en) | Application starting method and device, electronic equipment and storage medium | |
CN110971511B (en) | Instant messaging processing method, device, equipment and computer readable storage medium | |
CN114070571A (en) | Method, device, terminal and storage medium for establishing connection | |
Guo et al. | Extending registration and authentication processes of FIDO2 external authenticator with qr codes | |
CN115174181B (en) | Method, device, equipment and storage medium for realizing single sign-on |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |