WO2019037373A1 - 身份验证 - Google Patents
身份验证 Download PDFInfo
- Publication number
- WO2019037373A1 WO2019037373A1 PCT/CN2017/119701 CN2017119701W WO2019037373A1 WO 2019037373 A1 WO2019037373 A1 WO 2019037373A1 CN 2017119701 W CN2017119701 W CN 2017119701W WO 2019037373 A1 WO2019037373 A1 WO 2019037373A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- password
- user
- client
- additional password
- server
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1073—Registration or de-registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Definitions
- This application relates to authentication.
- the website or application asks the user to set a username and password, and at the same time requires the user to set a mobile phone number or mailbox associated with the username and password for easy access. Authentication or password retrieval.
- the embodiment of the present application provides an identity verification method, and the security of the identity verification method has been improved.
- an embodiment of the present application provides an identity verification method, including:
- the client on the terminal device obtains the user identifier and password to be verified in response to the user's identity verification operation
- the client obtains an additional password according to the user identifier
- the client sends an authentication request to the server, wherein the authentication request includes the user identification, the password, and the additional password to enable the server to respond to the identity verification request based on the
- the user ID, password, and additional password stored on the server are authenticated.
- an embodiment of the present application provides an identity verification method, including:
- the server obtains an additional password that matches the user identifier carried in the user registration request according to the received user registration request;
- the server stores the additional password in association with the user identifier
- the server performs identity verification according to the received identity verification request, where the identity verification request includes a user identity to be verified, a password, and an additional password stored on the client associated with the user identity.
- the embodiment of the present application further provides a terminal device, including:
- the machine readable storage medium stores machine executable instructions executable by the processor, the processor being caused by the machine executable instructions:
- the server Sending an authentication request to the server, wherein the authentication request includes the user identification, the password, and the additional password to enable the server to be based on the storage on the server in response to the identity verification request User ID, password, and additional password for authentication.
- the client on the terminal device obtains the user identifier and password to be verified in response to the identity verification operation of the user; the client obtains an additional password according to the user identifier; the client Sending an authentication request to the server, wherein the authentication request includes the user identifier, the password, and the additional password to enable the server to be stored on the server in response to the identity verification request User ID, password, and additional password for authentication.
- the verification method disclosed in the embodiment of the present application effectively authenticates the user by combining the additional password, thereby effectively improving the security of the user identity verification, and effectively avoiding the leakage of the user account information caused by the theft of the registration password.
- the thief can not obtain the additional password when the other client authenticates. Therefore, even if the user name and password are stolen, the authentication cannot be completed, and the user account cannot be successfully logged in to obtain the user's account. information.
- FIG. 3 is a flowchart of an identity verification method provided by an embodiment of the present application.
- FIG. 5 is a flowchart of an identity verification method according to an embodiment of the present application.
- FIG. 6 is a flowchart of an identity verification method provided by an embodiment of the present application.
- FIG. 7 is a schematic structural diagram of identity verification logic provided by an embodiment of the present application.
- FIG. 8 is a schematic structural diagram of identity verification logic provided by an embodiment of the present application.
- FIG. 9 is a schematic structural diagram of identity verification logic provided by an embodiment of the present application.
- FIG. 10 is a schematic structural diagram of identity verification logic provided by an embodiment of the present application.
- FIG. 11 is a schematic structural diagram of hardware of a terminal device according to an embodiment of the present application.
- FIG. 12 is a schematic structural diagram of a hardware of a server provided by an embodiment of the present application.
- account information may also be leaked.
- a user usually logs in to a website or an application on a different terminal device.
- a malware in a terminal device steals a user's login password and then logs in to the user's account at another terminal device, the user account can be made. Information security will be threatened.
- An authentication method disclosed by the example of the present application includes: Step 100 to Step 120.
- Step 100 Obtain a user identifier and password to be verified according to the user's identity verification operation.
- the user login portal set on the website page or the application page for authentication. After the authentication is passed, Access to personal information in the user's account is allowed.
- the user authentication function is triggered, and the user identifier and the password to be verified are obtained by calling the website page or the interface of the application page to be sent to the server for identity verification.
- the user identifier may be a username.
- Step 110 obtaining an additional password.
- the client stores an additional password, and can directly read the additional password stored locally by the client, that is, read and perform the identity verification.
- An additional password pre-stored by the operating client.
- the client can initiate a request for generating an additional password to the server through an entry that generates an additional password on the interface. To get an additional password. Then, get the additional password entered by the user for the authentication operation.
- the user may first log in on the terminal device or the registered terminal device that has already logged in, and then initiate a request for generating an additional password to the server through the preset entry for obtaining the additional password on the client, and the server will add the matching with the login user.
- the password is sent to the logged in client that initiated the request for display.
- the additional password is then manually entered by the user into the client to be logged in.
- the user through the client to be logged in, that is, the client that does not store the additional password, initiates the generation of the additional password to the server through the preset entry for generating the additional password, such as generating the additional password button, if at least the user identifier is input.
- Request to get an additional password An additional password matching the entered user identification is transmitted by the server through a registration information receiving manner that matches the entered user identification. Then, the user adds the additional password in the received information to the client to be logged in manually.
- the additional password may be generated by a client or may be generated by a server that performs authentication.
- the additional password is stored at the same time on the client side and the server side performing authentication.
- Step 120 Send the user identifier and password to be verified and the additional password to the server for identity verification.
- the user identifier to be verified, the password to be verified, and the additional password are obtained, the user identifier to be verified, the password to be verified, and the additional password are further sent to the server, so that the server identifies the user. verification.
- the to-be-verified user identifier, the to-be-verified password, and the additional password may be sent to the server for authenticating, and the server may use the password to be verified based on the user identifier and pre-stored user information. And verifying the additional password separately, and confirming that the user identity verification is successful when the password to be verified and the additional password are all verified.
- the password to be verified is encrypted by the additional password, and then the encrypted password to be verified and the user identifier to be verified are sent to the server for authentication, first by the server. Acquiring a pre-stored additional password matched by the user identifier, decrypting the encrypted password to be verified based on a pre-stored additional password matching the user identifier, and verifying the password to be verified obtained after decryption, When the password to be verified obtained after decryption is verified, the user authentication is confirmed to be successful.
- the additional password used for encryption is inconsistent with the pre-stored additional password that is obtained by the server and matches the user identifier, even if the password that is input by the user is the registration password, the password to be verified after decryption is not the user-entered password to be verified. The password will also verify the failure.
- the identity verification method disclosed in the embodiment of the present application obtains the user identifier and password to be verified according to the identity verification operation of the user, and obtains the corresponding additional password, and then the user identifier and password to be verified and the additional The password is sent to the server for authentication.
- the user is authenticated by combining the additional password, thereby effectively improving the security of the user identity verification, and effectively avoiding the theft of the user account information caused by the password theft.
- the thief can authenticate with other clients.
- the additional password cannot be obtained, even if the user name and password are stolen, the authentication cannot be completed, the user account cannot be successfully logged in, and the user's account is obtained. information.
- An identity verification method disclosed in another embodiment of the present application includes: Step 200 to Step 240.
- Step 200 In response to the registration operation of the user, the client sends a user registration request to obtain an additional password of the user.
- the page of the website or application can be provided with a user registration portal for user registration so that the user can manage personal information through the website or application and can use the richer functionality provided by the website or application.
- User registration you need to enter the user ID and registration password, the user ID as the unique identifier of the user in the website or application, can distinguish different users; the registration password is used as the authentication information of the user ID, so that the server pairs through the client The logged in user authenticates.
- the user ID and registration password are stored on the server side for authentication.
- the user identifier and the registration password input by the user may be obtained by calling the interface of the website page or the application page, and a user registration request is generated, and then the user registration request is sent to The user of the website or application corresponds to the user registration.
- the user registration request may include at least: a user identifier and a registration password.
- the user identification is usually a username.
- the additional password can be generated by the client or server when the user registers.
- the registration information is included in the user registration request, and includes at least: a user identifier.
- the additional password may be generated by the client, or generated by the server, and stored on the client and the server respectively.
- the additional password is generated according to the registration information of the user, and includes: generating, according to the user identifier, a random password that matches the user identifier, as an additional password; or generating, according to the user identifier and the device identifier of the client where the registration operation is located.
- the additional password that the user identification matches. Taking the additional password on the server side as an example, generating the additional password includes at least the following two methods.
- the server In the first manner, according to the user identifier included in the user registration request sent by the client, the server generates a random password matching the user identifier as an additional password. For example, according to the user identifier, according to a preset algorithm, such as using the rand() function, a random password is generated as an additional password.
- the server of the website or the application After receiving the user registration request sent by the client, the server of the website or the application generates a matching additional password for the user according to the user identifier in the user registration request, and locally stores the user identifier, the registration password, and the server locally. The correspondence of additional passwords.
- an additional password matching the user identifier is generated according to the user identifier included in the user registration request sent by the client and the device identifier of the client. For example, according to the user identifier and the device identifier, according to a preset algorithm, for example, the device identifier is used as an additional password or the device identifier and the user identifier are XORed by a front-to-back basis. And generating an additional password that matches the user identifier, and storing, in the server, a correspondence between the user identifier, the registration password, and the additional password.
- the device identifier may be: a device IP address, a device serial number, and the like.
- the client After generating the additional password, the client sends the user ID, registration password, and additional password to the server for storage by using the user registration request or generating an additional password request. And the additional password is stored locally at the same time.
- the existing website or application usually requires the user to preset the way to receive the information (such as verification code, additional password).
- the preset manner of receiving information includes, but is not limited to, any one of the following: receiving information by mail, receiving information by mobile phone short message, receiving information by telephone, receiving information by instant communication message, and the like.
- Step 210 The client that performs the registration operation stores the acquired password.
- the client After the client generates the additional password, the user ID, the registration password, and the additional password are sent to the server for storage by the user registration request or the generated additional password request, and the additional password is stored locally at the same time. After the server generates an additional password, it will send the generated additional password to the client for storage in response to the user registration request.
- Step 220 In response to the user's identity verification operation, the client obtains the user identifier and password to be verified.
- Step 230 The client reads an additional password pre-stored by the client executing the identity verification operation.
- the user When the user logs in through the client on the registered terminal device, the user triggers the login button after inputting the user identifier and the password to be verified at the login entry of the client, and the client reads the locally stored additional password, and according to the user to be verified.
- the identity and password, as well as the additional password generation authentication request, are sent to the server for authentication by the server.
- the pre-stored additional password is obtained by any one of the following methods: when the user registers, the client or the server generates; when the user passes the verification code, the user downloads from the server; the user passes the non-registered terminal device for the first time. When logging in, it is received by the logged-in client or received by the pre-registered information receiving method.
- Step 240 Send the user identifier and password to be verified and the additional password to the server, so that the server authenticates the user.
- the verification password and the user identifier are sent to the server, and the server performs identity verification based on the encrypted password to be verified and the user identifier; or the user identifier and password to be verified and the additional password are simultaneously sent.
- the server performs identity verification based on the received user identifier and password to be verified, and the additional password.
- the client may send the to-be-verified user ID and password PW 2 for authentication, and the additional password PW 1 in the following two manners.
- the additional encrypted by the password PW. 1 to be authenticated password PW 2, to be verified is encrypted password PW after 3, transmits the encrypted password PW 3 to be authenticated and the user ID to the identification
- the server is used for authentication.
- the server can authenticate in two ways.
- the server first obtains the locally stored additional password PW 1 corresponding to the identity identifier according to the user identity ID sent with the encrypted password to be verified. ', and decrypting the received ciphered password PW 3 by using the additional password PW1', obtaining the decrypted password PW 2 'to be verified, and further obtaining the password PW 2 'to be verified after decryption
- the registration password PW that is locally stored on the server side and matches the user identifier is compared. If the comparison is successful, the authentication is passed, otherwise the authentication fails.
- the user identifier stored by the server may have more than one additional password.
- the encrypted password to be verified is decrypted
- the encrypted password is decrypted by each additional password to obtain the same password as the additional password.
- the number of decoded passwords to be verified, and the decoded passwords to be verified are compared with the registration passwords locally stored by the server and matched with the user identifiers, and the authentication is performed as long as one of the comparisons is successful. by.
- the server receives the to-be-verified user ID and password PW 2 and the additional password PW 1 that are simultaneously sent, the server first obtains the locally stored registration password PW corresponding to the identity ID according to the user identity ID. And the additional password PW 1 ', and the received additional password PW 1 is compared with the local storage additional password PW 1 ', and the received password to be verified PW 2 and the local storage registration password PW are performed. The comparison is successful, and only when the two match are successful, the authentication is determined to be successful. Otherwise, authentication fails because an array of passwords fails.
- the received additional password needs to be compared with the multiple additional passwords stored by the server and matched with the user identifier. As long as one match is successful, the additional password is considered to be successful.
- the identity verification method disclosed in the embodiment of the present application obtains the user ID and password to be verified input by the user when the user performs the identity authentication operation, and reads the additional password stored locally by the client. Then, the user ID and password to be verified and the additional password are sent to the server for identity verification, thereby authenticating the user by combining the additional password, and storing the additional password on the client, effectively improving
- the security of user authentication can effectively prevent the theft of user account information caused by password theft.
- the thief can not obtain the additional password when the other client authenticates. Therefore, even if the user name and password are stolen, the authentication cannot be completed, and the user account cannot be successfully logged in to obtain the user's account. information.
- a user may register with the same username and password on multiple platforms or applications, but if the username and password on one of the platforms is compromised, the pirate can log in with the stolen username and password.
- Other apps that cause insecure issues with accounts for other apps.
- the identity verification method disclosed in the embodiment of the present application since the thief cannot obtain the additional password stored on the application client, the identity verification cannot be successfully performed. Even if the thief steals the additional password stored by one of the application clients, since the additional password is randomly generated and stored on the application server by the application server, the server of the different application to be logged in cannot verify the additional password of the other application, so The thief cannot successfully authenticate. Further enhance the security of authentication.
- An identity verification method disclosed in another embodiment of the present application includes: Step 300 to Step 340.
- Step 300 In response to the user acquiring an additional password, sending an additional password request to the server to obtain the additional password of the user.
- the user when the user switches to the unregistered client to log in or the password stored in the registered client is damaged or lost, the user can obtain an additional password entry through the client interface, such as obtaining an additional password button, and obtaining an additional call to the server. password.
- the user inputs at least the user identifier on the client to be logged in, and triggers the button for acquiring the additional password.
- the client detects the user obtaining the additional password, it generates an additional password request and sends it to the server.
- the generating additional password request includes at least a user identifier.
- the server After receiving the request for generating the additional password sent by the client to be logged in, the server determines that the user identifier is currently in the unlogged state, and then the server obtains the registration information corresponding to the user identifier, where the registration information includes the preset receiving.
- the way information is.
- the manner of receiving the information includes, but is not limited to, any one of the following: receiving information by mail, receiving information by mobile phone short message, receiving information by telephone, receiving information by instant communication message, and the like.
- the information is received by mail in the manner of receiving information, and the registration information includes an email address of the received information.
- the registration information corresponding to the user identifier further includes: a registration password and an additional password.
- the server sends the additional password corresponding to the user identifier to the user to which the user identifier belongs by using the preset email address through the preset email address.
- the server may regenerate the additional password according to the user identifier, and then send the password to the user corresponding to the user identifier in a preset manner.
- the user When the user switches the client to log in, in another embodiment, the user first logs in through the client storing the additional password. After successfully logging in, the user obtains the additional password through the accessing the additional password entry set by the client interface. operating. After the client detects the user obtaining the additional password, it generates an additional password request and sends it to the server to obtain the additional password.
- the generating the additional password request includes at least: a user identifier.
- the user may perform another login password verification when the user performs the operation of acquiring the additional password through the acquisition of the additional password entry set by the client interface.
- the server After the server receives the request for generating an additional password sent by the client to be logged in, it is determined that the user identifier is currently in the logged-in state, and then the server obtains the registration information corresponding to the user identifier, where the registration information includes an additional password. And sending the additional password to the client that sent the request to generate an additional password. After receiving the additional password sent by the server, the client sending the additional password request displays the additional password on the client interface, so that the client to be logged in can input.
- Step 310 Acquire an additional password input by the user at the client performing the authentication operation.
- the additional password is obtained by the logged-in client, or obtained by the pre-registered information receiving manner corresponding to the user identifier.
- the user obtains an additional password by means of pre-registered receiving information, such as receiving an email, receiving a call, or receiving a short message, or receiving an additional password through a client that has already logged in.
- pre-registered receiving information such as receiving an email, receiving a call, or receiving a short message, or receiving an additional password through a client that has already logged in.
- the user receives the email through the pre-registered mailbox receiving the information, and obtains the additional password as an example, and the additional password carried in the email can be input to the client to be logged in.
- the additional password may be a character string or a two-dimensional code.
- the client scan code that performs the identity verification operation inputs the additional password.
- the client to be logged in obtains the additional password obtained by scanning by calling the system interface, or calls the system interface to obtain the additional password entered in the additional password edit box.
- Step 320 Acquire a user identifier and a password to be verified in response to the user's identity verification operation.
- Step 330 Send the user identifier and password to be verified and the additional password to the server for identity verification.
- the user identity and the password to be verified and the additional password are sent to the server.
- Step 340 storing the additional password.
- the client After the user switches the client to log in successfully, or the user re-acquires the additional password and successfully logs in, the client stores the additional password locally for direct reading after subsequent login.
- the identity verification method disclosed in the embodiment of the present application obtains an additional password by using a client that has already logged in or a pre-registered information receiving manner, and then performs identity verification according to the additional password and the user identifier and password to be verified, thereby improving identity verification. Security.
- the verification method disclosed in the embodiment of the present application acquires an additional password through a trusted identity, so that the user can log in normally when the password is lost or the machine is easy to be used.
- For criminals who have stolen the username and password because they do not have a trusted identity, that is, they cannot receive additional passwords, they cannot obtain additional passwords, and cannot pass authentication, which effectively improves the security of user authentication. It can effectively prevent theft of user account information caused by password theft.
- the additional password can be transmitted in the form of a two-dimensional code, and a function module for displaying and identifying the two-dimensional code can be set on the client, so that the user can input the additional password quickly and accurately, thereby further improving the authentication efficiency.
- an identity verification method disclosed in another embodiment of the present application is as shown in FIG. 4, and the method includes: Step 400 to Step 450.
- Step 400 in response to the user acquiring an additional password, sending an additional password request to the server to obtain the additional password of the user.
- the user when the user switches to the unregistered client to log in or the password stored in the registered client is damaged or lost, the user can obtain an additional password entry through the client interface, such as obtaining an additional password button, and obtaining an additional call to the server. password.
- the user needs to input at least the user identifier on the client to be logged in, and then trigger the button for obtaining the additional password.
- the client user obtains an additional password, generates an additional password request, and sends it to the server.
- the generating additional password request includes at least a user identifier.
- the server After receiving the request for generating the additional password sent by the client to be logged in, the server determines that the user identifier is currently in the unlogged state, and then the server obtains the registration information corresponding to the user identifier, where the registration information includes the preset receiving.
- the way information is.
- the manner of receiving the information includes, but is not limited to, any one of the following: receiving information by mail, receiving information by mobile phone short message, receiving information by telephone, receiving information by instant communication message, and the like.
- the information is received by mail in the manner of receiving information, and the registration information includes an email address of the received information.
- the server sends a verification code in the form of an email through a preset email address, and performs authentic identity verification on the logged-in user.
- Step 410 Acquire a verification code input by a client that performs an identity verification operation, and perform verification code verification.
- the user obtains the verification code by means of pre-registered receiving information, such as receiving the verification code sent by the server by receiving the mail, receiving the call, or receiving the short message.
- the user receives the email through the mailbox that receives the pre-registered information, and takes the verification code as an example. The user forwards the verification code carried in the email to the client to be logged in.
- the user sends a verification code to the server to complete the verification code verification by triggering the verification code set button set by the client.
- Step 420 receiving an additional password.
- the server After the server verifies the verification code of the client successfully, the server sends the additional password corresponding to the user identifier to the client that sends the acquisition. After sending the verification code, the client receives the additional password sent by the server in real time.
- Step 430 Acquire a user identifier and password to be verified according to the user's identity verification operation.
- Step 440 Send the user identifier and password to be verified and the additional password to the server for identity verification.
- the user ID and password to be verified and the additional password are sent to the server for specific real-time mode for identity verification.
- the embodiment shown in FIG. 2 is not described here.
- Step 450 storing the additional password.
- the client After the user switches the client to log in successfully, or the user re-acquires the additional password and successfully logs in, the client stores the additional password locally for direct reading after subsequent login.
- the identity verification method disclosed in the embodiment of the present application first performs verification code verification, and after the verification code is verified, downloads an additional password from the server, and then combines the additional password and the user identifier and password to be verified to perform identity verification.
- the problem of low security exists in the prior art authentication method.
- the verification method disclosed in the embodiment of the present application determines the true identity of the user by first performing verification code verification, and then generates an additional password for the client to be logged in, and the identity verification has been completed, so that in the case of a lost password or an easy machine login, Users can log in normally through the client.
- the client silently obtains the additional password from the server and saves it locally on the client, so that the next time the client is logged in, and the user is prevented from manually inputting the additional password, thereby further improving the authentication efficiency and accuracy.
- An identity verification method disclosed in another embodiment of the present application includes: Step 500 to Step 510.
- Step 500 Acquire an additional password that matches the user identifier carried in the user registration request according to the received user registration request, and simultaneously store the additional password at the server and the client.
- the server receives the request sent by the client in real time, including but not limited to: a user registration request.
- the client sends a user registration request to the server when the registration button is triggered after the user inputs the user identification and the registration password.
- the user registration request at least includes: a user identifier and a registration password. If the additional password is generated by the client, the user registration request further includes: an additional password. If the additional password is generated by the server, the user registration request may further include: a device identifier of the terminal device where the client is located. The device identifier may be: a device IP address, a device serial number, and the like.
- the server obtains the additional password according to the received user registration request, including: generating a random password matching the user identifier as the additional password according to the received user identifier included in the user registration request; or Generating an additional password that matches the user identifier according to the received user identifier and the device identifier of the client, or acquiring the additional password carried in the user registration request.
- the additional password is stored locally at the server.
- the server stores the matching relationship between the user identifier, the registration password, and the additional password.
- the server sends the additional password to the client in response to the user registration request, so that the client stores the additional password.
- Step 510 Perform identity verification according to the received identity verification request.
- the identity verification request includes a user identifier and password to be verified, and an additional password.
- Authenticating the current user of the client according to the authentication request sent by the client including: obtaining, by using the user identifier in the authentication request, an additional password and a registration password that are stored by the server and matched with the user identifier. Decrypting the encrypted password to be verified in the authentication request, and matching the decrypted password to be verified with the registration password to perform identity verification; or, by using the identity verification request.
- the user identifier in the server obtains an additional password and a registration password that are stored by the server and matched with the user identifier, and are used to match the additional password and the password to be verified included in the authentication request to perform identity verification.
- the client may send the password to be verified and the additional password for performing authentication in two forms.
- the server authenticates in two ways. For a specific implementation manner of authenticating the current user of the client according to the authentication request sent by the client, refer to the detailed description of the authentication in the second embodiment, and details are not described herein again.
- the identity verification method disclosed in the embodiment of the present application obtains an additional password according to the user registration request sent by the client, and then stores the additional password at the server local and the client simultaneously, when the client When the terminal sends the authentication request, the current user of the client is authenticated based on the to-be-verified user ID and password included in the authentication request sent by the client, and the existing user is authenticated, and the identity in the prior art is solved.
- the verification method has a lower security issue.
- the verification method disclosed in the embodiment of the present application authenticates the user by combining the additional password, and stores the additional password on the client, thereby effectively improving the security of the user identity verification, and effectively avoiding the user account information caused by the password being stolen. Stolen.
- the identity verification method disclosed in another embodiment of the present application includes: Step 600 to Step 640.
- Step 600 Receive an additional password request, the generate additional password request including at least a user identifier.
- the server receives the request sent by the client in real time, including but not limited to: generating an additional password request.
- the client deletes the data due to the terminal device, the additional password is lost, or the user cannot obtain the additional password stored locally by the client due to the switchover of the terminal device.
- the user can re-acquire the additional password by obtaining the additional password entry at the client to be logged in. .
- the client sends a request for obtaining an additional password to the server.
- the obtaining an additional password request includes at least: a user identifier. If the additional password is generated by the client, the user registration request further includes: an additional password. If the additional password is generated by the server, the user registration request may further include: a device identifier of the client.
- the device identifier may be: a device IP address, a device serial number, and the like.
- the server receives the request sent by the client in real time. After receiving the request for obtaining the additional password sent by the client, the server first determines whether the user identifier carried in the request for obtaining the additional password has been logged in, and takes a corresponding response according to the login status of the user identifier.
- Step 610 Determine whether the user identifier has been logged in. If the user identifier is not logged in, go to step 620. Otherwise, go to step 630.
- the server determines the login status of the user identity according to the stored user information. The server determines whether the user identifier has been logged in, and if the user identifier is not logged in, sending an additional password matching the user identifier by using the received information pre-registered by the user identifier; if the user identifier is already logged in, Sending an additional password that matches the user ID to the client that sent the request to generate an additional password.
- Step 620 Send an additional password matching the user identifier by means of the user identifier pre-registered receiving information.
- the server determines that the user identifier is not logged in, sending an additional password that matches the user identifier by using the pre-registered receiving information of the user identifier, or first performing verification code verification on the user identifier, and After the verification code is verified, an additional password is sent to the client that sends the request for the additional password.
- the user registers the manner for receiving information when registering, including but not limited to any of the following: receiving information by mail, receiving information by mobile phone short message, receiving information by telephone, receiving information by instant communication message, and the like.
- the server determines, according to the user identifier, the manner in which the user identifier is registered for accepting information, such as receiving information by using a mail, and then passing the stored additional password corresponding to the user identifier or the regenerated password corresponding to the identifier through the West Sydney.
- the receiving mode is transmitted, so that the user can receive the additional password by means of the received information.
- Step 630 Send an additional password matching the user identifier to the client that sends the request for generating an additional password.
- the server determines that the user identifier has been logged in, it confirms that the user is in a scenario for obtaining an additional password for logging in at the other client through the client that has logged in, and therefore, the server adds an additional password matching the user identifier to The client that generates the additional password request, that is, the client that has logged in, is sent, so that the user can complete the input of the additional password on the client to be logged in through the additional password displayed by the client that has already logged in.
- Step 640 Perform identity verification according to the received identity verification request.
- the identity verification request includes a user identifier and password to be verified, and an additional password.
- the additional password may be a character string or a two-dimensional code.
- the client scan code that performs the identity verification operation inputs the additional password.
- the verification code verification is initiated; if the verification code verification is passed, the additional password matching the user identifier carried in the generating the additional password request is obtained. And sending the additional password to a client that generates an additional password request for storing the additional password at the client.
- the client When the user switches to another terminal device for account login, the client will not be able to obtain the additional password stored locally. Therefore, the client prompts the user to initiate an operation for acquiring the additional password, and sends an additional password request according to the operation.
- the verification code is received by receiving the information in advance, and verification code verification is performed to verify the true identity of the user. Then, after the verification code verification is passed, the additional password is further obtained.
- the generating an additional password request includes at least: a user identifier.
- the server After receiving the request for generating the additional password, the server obtains the manner of receiving the information set by the user in advance according to the user identifier carried in the generating the additional password request, and sends the verification code by using the received information manner,
- the user performs identity verification, that is, performs verification code verification, such as sending a verification code to the user by using a short message or a telephone or a mailbox, and asking the user to input the verification code at the client to complete the verification code verification.
- the server acquires an additional password that matches the user identifier carried in the generated additional password request, and stores the additional password locally at the server, and simultaneously sends the additional password to the client that sends the request for generating the additional password. End, the client is convenient to store the additional password.
- the generating the additional password request further includes: an additional password.
- the server After receiving the request for generating an additional password, the server directly stores the additional password in the correspondence between the user identifier and the additional password.
- the user registration request may further include: a device identifier of the client. The server generates an additional password based on the device identification and the user identification.
- the device identifier may be: a device IP address, a device serial number, and the like.
- the verification method disclosed in this embodiment can implement normal identity verification on different terminal devices by generating an additional password request according to the client.
- a sinister who steals a password because it cannot obtain a verification code through a pre-set information receiving method, it cannot be verified by a verification code, and an additional password cannot be obtained. Therefore, the authentication cannot be successfully performed, thereby effectively preventing the password from being stolen. The resulting user account information is stolen, and the security of the user account information is protected.
- FIG. 11 is a hardware structural diagram of a terminal device according to some embodiments of the present disclosure.
- the terminal device 1000 can include a processor 1010 and a machine readable storage medium 1020.
- the processor 1010 and the machine readable storage medium 1020 can communicate via the system bus 1030. And, by reading and executing the machine executable instructions stored in the machine readable storage medium 1020 corresponding to the authentication logic, the processor 1010 can perform the method of identity verification described above.
- the machine-readable storage medium 1020 referred to herein can be any electronic, magnetic, optical, or other physical storage device that can contain or store information such as executable instructions, data, and the like.
- the machine-readable storage medium 1020 may be a RAM (Random Access Memory), a volatile memory, a non-volatile memory, a flash memory, a storage drive (such as a hard disk drive), a solid state drive, or any type of A storage disk (such as a compact disc, a DVD, etc.), or a similar storage medium, or a combination thereof.
- the functional verification logic in the terminal device may be:
- the first verification information obtaining module 700 is configured to obtain a user identifier and a password to be verified in response to an identity verification operation of the user;
- the second verification information obtaining module 710 is configured to obtain an additional password according to the user identifier.
- the verification information sending module 720 is configured to send an identity verification request to the server, where the identity verification request includes the user identifier, the password, and the additional password to enable the server to respond to the identity verification request.
- the authentication is performed based on the user ID, password, and additional password stored on the server.
- the second verification information obtaining module 710 further includes:
- the first verification information obtaining unit 7101 is configured to read, by the client, an additional password that is pre-stored in the client and that matches the user identifier.
- the pre-stored additional password is obtained by: in response to the user registering operation on the client, the client acquiring a user identifier and a password to be registered; the client generating An additional password that matches the user identification; the client stores the additional password in association with the user identification in the client; the client identifies the user identification, the password, and the The additional password is sent to the server by a user registration request such that the server stores the additional password in association with the user identification.
- the pre-stored additional password is obtained by: in response to the user registering operation on the client, the client acquiring a user identifier and password to be registered; the client The server sends a user registration request, where the user registration request includes the user identifier and the password; the client receives an additional password generated by the server in response to the user registration request; the client The additional password is stored in the client in association with the user identification.
- the second verification information obtaining module 710 further includes:
- a second verification information obtaining unit 7102 configured to: when the client does not store the additional password that matches the user identifier, the client responds to the additional password acquisition operation of the user, to the The server sends an additional password acquisition request, wherein the additional password acquisition request includes the user identifier; the client acquires an additional password input by the user at the client, wherein the additional password is the server response And sending to the user by using the information received by the logged-in client or pre-registered by the user identifier in the additional password acquisition request.
- the client when the additional password is transmitted by the two-dimensional code, the client inputs the additional password by scanning the two-dimensional code.
- the verification information sending module 720 further includes any one of the following:
- a first identity verification unit 7201 configured to: the client encrypts and fuses the password by using the additional password to obtain a fusion password; and the client loads the fusion password and the user identifier into the identity Verifying the request; the client sends the authentication request to the server.
- a second identity verification unit 7202 configured by the client to simultaneously load the user identifier, the password, and the additional password into the identity verification request; the client sends the identity verification request to the server.
- the client on the terminal device obtains the user identifier and password to be verified in response to the identity verification operation of the user; the client obtains an additional password according to the user identifier; the client Sending an authentication request to the server, wherein the authentication request includes the user identifier, the password, and the additional password to enable the server to be stored on the server in response to the identity verification request User ID, password, and additional password for authentication.
- the user is authenticated by combining the additional password, which effectively improves the security of the user identity verification, and can effectively prevent the user account information from being stolen due to the theft of the password.
- the thief can not obtain the additional password when the other client authenticates. Therefore, even if the user name and password are stolen, the authentication cannot be completed, and the user account cannot be successfully logged in to obtain the user's account. information.
- the user ID and password to be verified and the additional password are then sent to the server for identity verification.
- the thief uses other clients.
- the additional password cannot be obtained, even if the user name and password are stolen, the authentication cannot be completed, the user account cannot be successfully logged in, and the user's account information is obtained, thereby further improving the authentication security.
- the user can be guaranteed to log in normally on different clients.
- the client to be logged in can input an additional password by scanning the code, so that the user can input the additional password quickly, conveniently and accurately, thereby improving the verification efficiency.
- FIG. 12 is a hardware structural diagram of a server according to some embodiments of the present disclosure.
- the terminal device 1100 can include a processor 1110 and a machine readable storage medium 1120.
- the processor 1110 and the machine readable storage medium 1120 can communicate via the system bus 1130. And, by reading and executing machine executable instructions corresponding to the authentication logic stored in the machine readable storage medium 1120, the processor 1110 can perform the method of identity verification described above.
- the machine-readable storage medium 1120 referred to herein can be any electronic, magnetic, optical, or other physical storage device that can contain or store information such as executable instructions, data, and the like.
- the machine-readable storage medium 1120 may be a RAM (Random Access Memory), a volatile memory, a non-volatile memory, a flash memory, a storage drive (such as a hard disk drive), a solid state drive, or any type of A storage disk (such as a compact disc, a DVD, etc.), or a similar storage medium, or a combination thereof.
- the authentication logic in the server may include:
- the first additional password obtaining module 900 is configured to acquire, according to the received user registration request, an additional password that matches the user identifier carried in the user registration request, and store the additional password in association with the user identifier;
- the verification module 910 is configured to perform identity verification according to the received identity verification request, where the identity verification request includes a user identifier to be verified, a password, and an additional password stored on the client and associated with the user identifier;
- the logic further includes: a second additional password obtaining module 920, the second additional password obtaining module 920 further comprising: a request receiving unit 9201, a determining unit 9202, and a first additional password.
- the request receiving unit 9201 is configured to receive an additional password acquisition request, where the additional password acquisition request includes at least a user identifier;
- the determining unit 9202 is configured to determine whether the user identifier is already logged in;
- the first additional password obtaining unit 9203 is configured to send, by using the received information pre-registered by the user identifier, an additional password that matches the user identifier, if the user identifier is not logged in;
- the second additional password obtaining unit 9204 is configured to acquire an additional password that matches the user identifier carried in the additional password acquisition request, if the verification code verification is passed;
- the third additional password obtaining unit 9205 is configured to: if the user identifier has been logged in, the server sends an additional password that matches the user identifier to a client that sends the additional password acquisition request.
- the verification module 910 includes any of the following:
- the first verification unit 9101 is configured to obtain, by using the user identifier in the identity verification request, an additional password and a registration password that are stored by the server and match the user identifier, and are used to encrypt and merge the identity verification request. Declaring the verification password for decryption, and matching the decrypted password to be verified with the registration password to perform identity verification;
- the second verification unit 9102 is configured to obtain, by using the user identifier in the identity verification request, an additional password and a registration password stored by the server that match the user identifier, and the additional password and the password included in the identity verification request.
- the passwords to be verified are matched separately to perform authentication.
- the server acquires an additional password that matches the user identifier carried in the user registration request according to the received user registration request; the server associates the additional password with the user identifier. Storing; the server performs authentication according to the received authentication request, wherein the authentication request includes a user identifier to be verified, a password, and an additional password stored on the client associated with the user identifier.
- the server disclosed in the embodiment of the present application authenticates the user by combining the additional password, and stores the additional password on the client, thereby effectively improving the security of the user identity verification, and effectively preventing the user account information caused by the password being stolen. Pirates.
- the user can implement normal identity verification on different devices.
- a sinister who steals a password because it cannot obtain a verification code through a pre-set information receiving method, it cannot be verified by a verification code, and an additional password cannot be obtained. Therefore, the authentication cannot be successfully performed, thereby effectively preventing the password from being stolen. The resulting user account information is stolen, and the security of the user account information is protected.
- Embodiments of the subject matter and functional operations described in this specification can be implemented in the following: digital electronic circuits, tangible embodied computer software or firmware, computer hardware including the structures disclosed in the specification and their structural equivalents, or One or more combinations.
- Embodiments of the subject matter described in this specification can be implemented as one or more computer programs, i.e., one of computer program instructions encoded on a tangible, non-transitory program carrier to be executed by a data processing device or to control operation of a data processing device or Multiple modules.
- the program instructions may be encoded on an artificially generated propagating signal, such as a machine-generated electrical, optical or electromagnetic signal that is generated to encode and transmit the information to a suitable receiver device for data
- the processing device executes.
- the computer storage medium can be a machine readable storage device, a machine readable storage substrate, a random or serial access memory device, or a combination of one or more of them.
- the processes and logic flows described in this specification can be performed by one or more programmable computers executing one or more computer programs to perform the corresponding functions by operating in accordance with input data and generating an output.
- the processing and logic flow may also be performed by dedicated logic circuitry, such as an FPGA (Field Programmable Gate Array) or an ASIC (Application Specific Integrated Circuit), and the apparatus may also be implemented as dedicated logic circuitry.
- FPGA Field Programmable Gate Array
- ASIC Application Specific Integrated Circuit
- Computers suitable for the execution of a computer program include, for example, a general purpose and/or special purpose microprocessor, or any other type of central processing unit.
- the central processing unit will receive instructions and data from a read only memory and/or a random access memory.
- the basic components of a computer include a central processing unit for implementing or executing instructions and one or more memory devices for storing instructions and data.
- the computer will also include one or more mass storage devices for storing data, such as a magnetic disk, magneto-optical disk or optical disk, or the like, or the computer will be operatively coupled to the mass storage device for receiving data or It transmits data, or both.
- the computer does not have to have such a device.
- the computer can be embedded in another device, such as a mobile phone, a personal digital assistant (PDA), a mobile audio or video player, a game console, a global positioning system (GPS) receiver, or, for example, a universal serial bus (USB) ) Portable storage devices for flash drives, to name a few.
- PDA personal digital assistant
- GPS global positioning system
- USB universal serial bus
- Computer readable media suitable for storing computer program instructions and data include all forms of nonvolatile memory, media and memory devices including, for example, semiconductor memory devices (eg, EPROM, EEPROM, and flash memory devices), magnetic disks (eg, internal hard drives or Mobile disk), magneto-optical disks, and CD ROM and DVD-ROM disks.
- semiconductor memory devices eg, EPROM, EEPROM, and flash memory devices
- magnetic disks eg, internal hard drives or Mobile disk
- magneto-optical disks e.g, CD ROM and DVD-ROM disks.
- the processor and memory may be supplemented by, or incorporated in, special purpose logic circuitry.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Power Engineering (AREA)
- General Business, Economics & Management (AREA)
- Multimedia (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Telephonic Communication Services (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (15)
- 一种身份验证方法,包括:终端设备上的客户端响应于用户的身份验证操作,获取待验证的用户标识和密码;所述客户端根据所述用户标识,获取附加密码;所述客户端向服务器发送身份验证请求,其中,所述身份验证请求包括所述用户标识、所述密码及所述附加密码,以使所述服务器能够响应于所述身份验证请求而基于所述服务器上存储的用户标识、密码和附加密码进行身份验证。
- 根据权利要求1所述的方法,其中,获取所述附加密码,包括:所述客户端读取所述客户端中预先存储的与所述用户标识匹配的附加密码。
- 根据权利要求2所述的方法,其中,所述预先存储的附加密码通过以下方式获得:响应于所述用户在所述客户端上的注册操作,所述客户端获取待注册的用户标识和密码;所述客户端生成与所述用户标识匹配的附加密码;所述客户端将所述附加密码与所述用户标识相关联地存储于所述客户端;所述客户端将所述用户标识、所述密码以及所述附加密码通过用户注册请求发送至所述服务器,以使得所述服务器将所述附加密码与所述用户标识相关联地存储。
- 根据权利要求2所述的方法,其中,所述预先存储的附加密码通过以下方式获得:响应于所述用户在所述客户端上的注册操作,所述客户端获取待注册的用户标识和密码;所述客户端向所述服务器发送用户注册请求,其中,所述用户注册请求包括所述用户标识和所述密码;所述客户端接收所述服务器响应于所述用户注册请求而生成的附加密码;所述客户端将所述附加密码与所述用户标识相关联地存储于所述客户端。
- 根据权利要求2所述的方法,其特征在于,获取所述附加密码,还包括:在所述客户端未存储与所述用户标识匹配的所述附加密码的情况下,所述客户端响应于所述用户的附加密码获取操作,向所述服务器发送附加密码获取请求,其中,所述附加密码获取请求包括所述用户标识;所述客户端获取所述用户在所述客户端输入的附加密码,其中,所述附加密码是所述服务器响应于所述附加密码获取请求而通过已登录客户端获取或所述用户标识预先注册的信息接收方式发送至所述用户。
- 根据权利要求4所述的方法,其特征在于,当所述附加密码通过二维码发送时,所述客户端通过扫描所述二维码输入所述附加密码。
- 根据权利要求1至6任一项所述的方法,其特征在于,向所述服务器发送所述身份验证请求,包括:所述客户端通过所述附加密码对所述密码进行加密融合,以获得融合密码;所述客户端把所述融合密码和所述用户标识载入所述身份验证请求;所述客户端将所述身份验证请求发送至所述服务器。
- 根据权利要求1至6任一项所述的方法,其特征在于,向所述服务器发送所述身份验证请求,包括:所述客户端将所述用户标识、所述密码及所述附加密码同时载入所述身份验证请求;所述客户端将所述身份验证请求发送至所述服务器。
- 一种身份验证方法,包括:服务器根据接收到的用户注册请求,获取与所述用户注册请求中携带的用户标识匹配的附加密码;所述服务器将所述附加密码与所述用户标识相关联地存储;所述服务器根据接收到的身份验证请求进行身份验证,其中,所述身份验证请求包括待验证的用户标识、密码及客户端上存储的与所述用户标识关联的附加密码。
- 根据权利要求9所述的方法,其特征在于,还包括:所述服务器接收附加密码获取请求,所述附加密码获取请求至少包括用户标识;所述服务器判断所述用户标识是否已经登录;若所述用户标识未登录,则所述服务器通过所述用户标识预先注册的接收信息方式发送与所述用户标识匹配的附加密码;若所述用户标识已经登录,则所述服务器发送与所述用户标识匹配的附加密码至发送所述附加密码获取请求的客户端。
- 根据权利要求10所述的方法,其特征在于,还包括:若所述用户标识未登录,则所述服务器启动验证码验证;若所述验证码验证通过,则所述服务器获取与所述附加密码获取请求中携带的用户标识匹配的附加密码,并发送所述附加密码至发送所述附加密码获取请求的客户端,用于在所述客户端存储所述附加密码。
- 一种终端设备,包括:处理器和机器可读存储介质,所述机器可读存储介质存储有能够被所述处理器执行的机器可执行指令,所述处理器被所述机器可执行指令促使:响应于用户的身份验证操作,获取待验证的用户标识和密码;根据所述用户标识,获取附加密码;向服务器发送身份验证请求,其中,所述身份验证请求包括所述用户标识、所述密码及所述附加密码,以使所述服务器能够响应于所述身份验证请求而基于所述服务器上存储的用户标识、密码和附加密码进行身份验证。
- 一种服务器,包括:处理器和机器可读存储介质,所述机器可读存储介质存储有能够被所述处理器执行的机器可执行指令,所述处理器被所述机器可执行指令促使以执行如权利要求9至11任一项所述的身份验证方法。
- 一种机器可读存储介质,存储有机器可读指令,在被处理器调用和执行时,所述机器可执行指令促使所述处理器执行如权利要求1至8任一项所述的身份验证方法。
- 一种机器可读存储介质,存储有机器可读指令,在被处理器调用和执行时,所述机器可执行指令促使所述处理器执行如权利要求9至11任一项所述的身份验证方法。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA3068090A CA3068090A1 (en) | 2017-08-24 | 2017-12-29 | Identity authentication |
EP17922615.4A EP3618381A4 (en) | 2017-08-24 | 2017-12-29 | IDENTITY AUTHENTICATION |
KR1020197035648A KR102307665B1 (ko) | 2017-08-24 | 2017-12-29 | 신원 인증 |
JP2019565469A JP6936340B2 (ja) | 2017-08-24 | 2017-12-29 | 身元認証 |
US16/619,931 US20200213293A1 (en) | 2017-08-24 | 2017-12-29 | Identity authentication |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710737863.0 | 2017-08-24 | ||
CN201710737863.0A CN107733852B (zh) | 2017-08-24 | 2017-08-24 | 一种身份验证方法及装置,电子设备 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019037373A1 true WO2019037373A1 (zh) | 2019-02-28 |
Family
ID=61204767
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/119701 WO2019037373A1 (zh) | 2017-08-24 | 2017-12-29 | 身份验证 |
Country Status (8)
Country | Link |
---|---|
US (1) | US20200213293A1 (zh) |
EP (1) | EP3618381A4 (zh) |
JP (1) | JP6936340B2 (zh) |
KR (1) | KR102307665B1 (zh) |
CN (1) | CN107733852B (zh) |
CA (1) | CA3068090A1 (zh) |
TW (1) | TWI686075B (zh) |
WO (1) | WO2019037373A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113852681A (zh) * | 2021-09-22 | 2021-12-28 | 深信服科技股份有限公司 | 一种网关认证方法、装置及安全网关设备 |
CN114866251A (zh) * | 2022-04-25 | 2022-08-05 | 中国银联股份有限公司 | 一种设备互联安全认证系统、方法、装置、服务器及介质 |
Families Citing this family (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108183924A (zh) * | 2018-03-01 | 2018-06-19 | 深圳市买买提信息科技有限公司 | 一种登录验证方法及终端设备 |
CN108183798A (zh) * | 2018-03-13 | 2018-06-19 | 深圳市欧乐在线技术发展有限公司 | 应用的实名认证方法、服务器、移动终端及可读存储介质 |
CN110213597B (zh) * | 2018-03-30 | 2021-09-07 | 腾讯科技(深圳)有限公司 | 一种通过浏览器进入直播房间的方法和装置 |
US10778678B2 (en) | 2018-07-18 | 2020-09-15 | Alibaba Group Holding Limited | Identity identification and preprocessing |
CN111182010B (zh) * | 2018-11-09 | 2023-04-07 | 杭州海康威视数字技术股份有限公司 | 一种本地服务提供方法及装置 |
CN111356091B (zh) * | 2018-12-21 | 2021-08-27 | 中国移动通信集团终端有限公司 | 消息发送、接收方法及终端 |
CN109982413B (zh) * | 2019-02-19 | 2023-04-07 | 北京三快在线科技有限公司 | 移动热点的识别方法、装置、电子设备和存储介质 |
CN111901353A (zh) * | 2019-07-18 | 2020-11-06 | 创新先进技术有限公司 | 身份识别预处理方法、身份识别方法,及其设备和系统 |
CN110691093B (zh) * | 2019-10-08 | 2022-04-08 | 迈普通信技术股份有限公司 | 密码找回方法、装置、网络设备及计算机可读存储介质 |
CN110808966A (zh) * | 2019-10-23 | 2020-02-18 | 天津华来科技有限公司 | 身份信息生成方法、装置及存储介质 |
CN112995577A (zh) * | 2019-12-02 | 2021-06-18 | 中兴通讯股份有限公司 | 终端桌面内容的监控方法、平台、终端、系统及存储介质 |
CN111339270B (zh) * | 2020-02-20 | 2023-04-25 | 中国农业银行股份有限公司 | 一种密码校验方法及装置 |
CN111340449B (zh) * | 2020-02-27 | 2023-05-02 | 吴雅君 | 一种人力资源用共享服务系统 |
CN113472716B (zh) * | 2020-03-30 | 2023-09-19 | 中移互联网有限公司 | 系统访问方法、网关设备、服务器、电子设备及存储介质 |
EP3896588B1 (en) * | 2020-04-18 | 2024-03-06 | Deutsche Telekom AG | Backlock access for logging into a computing device |
CN111565179B (zh) * | 2020-04-27 | 2022-12-06 | 北京奇艺世纪科技有限公司 | 身份校验方法、装置、电子设备及存储介质 |
US11405216B2 (en) * | 2020-05-07 | 2022-08-02 | Adp, Inc. | System for authenticating verified personal credentials |
CN111783075B (zh) * | 2020-06-28 | 2022-09-09 | 平安普惠企业管理有限公司 | 基于密钥的权限管理方法、装置、介质及电子设备 |
CN111787005B (zh) * | 2020-06-30 | 2023-02-17 | 中国工商银行股份有限公司 | 一种动态加密的安全登录方法及装置 |
CN112100611A (zh) * | 2020-08-14 | 2020-12-18 | 广州江南科友科技股份有限公司 | 一种密码生成方法、装置、存储介质和计算机设备 |
CN114221774A (zh) * | 2020-09-04 | 2022-03-22 | 中兴通讯股份有限公司 | 鉴权方法、服务器、终端设备及存储介质 |
CN112784254A (zh) * | 2020-12-28 | 2021-05-11 | 深圳恒芯安全信息技术有限公司 | 一种口令管理方法、装置、终端设备及存储介质 |
US12021861B2 (en) * | 2021-01-04 | 2024-06-25 | Bank Of America Corporation | Identity verification through multisystem cooperation |
CN113536259A (zh) * | 2021-07-29 | 2021-10-22 | 合肥新青罗数字技术有限公司 | 企业服务平台的实名认证方法 |
CN113992982A (zh) * | 2021-10-25 | 2022-01-28 | 深圳康佳电子科技有限公司 | 一种节目数据同步配置方法、装置、终端设备及存储介质 |
CN116911988B (zh) * | 2023-04-04 | 2024-04-05 | 深圳市奥盛通科技有限公司 | 交易数据处理方法、系统、计算机设备及存储介质 |
CN116389168B (zh) * | 2023-05-31 | 2023-08-29 | 北京芯盾时代科技有限公司 | 一种身份认证方法和装置 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102868732A (zh) * | 2012-08-27 | 2013-01-09 | 北京小米科技有限责任公司 | 一种基于账户密码的登录实现方法、系统及装置 |
CN103747013A (zh) * | 2014-01-24 | 2014-04-23 | 沈文策 | 一种云端登录验证方法及装置 |
CN104079409A (zh) * | 2014-06-10 | 2014-10-01 | 百度在线网络技术(北京)有限公司 | 账号的登录方法及装置 |
CN104601532A (zh) * | 2013-10-31 | 2015-05-06 | 腾讯科技(深圳)有限公司 | 一种登录账户的方法及装置 |
US20150237038A1 (en) * | 2014-02-18 | 2015-08-20 | Secureauth Corporation | Fingerprint based authentication for single sign on |
CN105407074A (zh) * | 2014-09-11 | 2016-03-16 | 腾讯科技(深圳)有限公司 | 身份验证方法、装置及系统 |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008015877A (ja) * | 2006-07-07 | 2008-01-24 | Fujitsu Ltd | 認証システム及びその方法 |
CN101465735B (zh) * | 2008-12-19 | 2011-06-01 | 北京大学 | 网络用户身份验证方法、服务器及客户端 |
CN102025506A (zh) * | 2010-12-20 | 2011-04-20 | 中国联合网络通信集团有限公司 | 用户身份验证方法及装置 |
CN102184501A (zh) * | 2011-03-24 | 2011-09-14 | 上海博路信息技术有限公司 | 一种移动终端的电子优惠券系统 |
CN102202067B (zh) * | 2011-07-15 | 2016-06-08 | 席勇良 | 动态随机密码登录方法 |
US8490162B1 (en) * | 2011-09-29 | 2013-07-16 | Amazon Technologies, Inc. | System and method for recognizing malicious credential guessing attacks |
KR101420149B1 (ko) * | 2012-05-02 | 2014-07-17 | 주식회사 시큐브 | 이중 인증 로그인 시스템 및 방법 |
US9053304B2 (en) * | 2012-07-13 | 2015-06-09 | Securekey Technologies Inc. | Methods and systems for using derived credentials to authenticate a device across multiple platforms |
CN103384248B (zh) * | 2013-07-08 | 2016-03-02 | 张忠义 | 一种可以防止黑客程序再次登陆的方法 |
US9432358B2 (en) * | 2013-10-31 | 2016-08-30 | Tencent Technology (Shenzhen) Company Limited | System and method of authenticating user account login request messages |
CN106549759A (zh) * | 2015-09-16 | 2017-03-29 | 阿里巴巴集团控股有限公司 | 身份认证方法和装置 |
CN106355106A (zh) * | 2016-08-30 | 2017-01-25 | 深圳市引导美电子商务有限公司 | 一种账户信息存储方法及系统 |
CN106452772B (zh) * | 2016-11-16 | 2019-10-25 | 华为技术有限公司 | 终端认证方法和装置 |
CN106954216B (zh) * | 2017-04-28 | 2020-07-14 | 北京北信源软件股份有限公司 | 基于802.1x协议的认证方法及系统 |
-
2017
- 2017-08-24 CN CN201710737863.0A patent/CN107733852B/zh active Active
- 2017-12-29 JP JP2019565469A patent/JP6936340B2/ja active Active
- 2017-12-29 CA CA3068090A patent/CA3068090A1/en active Pending
- 2017-12-29 WO PCT/CN2017/119701 patent/WO2019037373A1/zh unknown
- 2017-12-29 EP EP17922615.4A patent/EP3618381A4/en not_active Withdrawn
- 2017-12-29 US US16/619,931 patent/US20200213293A1/en not_active Abandoned
- 2017-12-29 KR KR1020197035648A patent/KR102307665B1/ko active IP Right Grant
-
2018
- 2018-06-26 TW TW107121922A patent/TWI686075B/zh not_active IP Right Cessation
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102868732A (zh) * | 2012-08-27 | 2013-01-09 | 北京小米科技有限责任公司 | 一种基于账户密码的登录实现方法、系统及装置 |
CN104601532A (zh) * | 2013-10-31 | 2015-05-06 | 腾讯科技(深圳)有限公司 | 一种登录账户的方法及装置 |
CN103747013A (zh) * | 2014-01-24 | 2014-04-23 | 沈文策 | 一种云端登录验证方法及装置 |
US20150237038A1 (en) * | 2014-02-18 | 2015-08-20 | Secureauth Corporation | Fingerprint based authentication for single sign on |
CN104079409A (zh) * | 2014-06-10 | 2014-10-01 | 百度在线网络技术(北京)有限公司 | 账号的登录方法及装置 |
CN105407074A (zh) * | 2014-09-11 | 2016-03-16 | 腾讯科技(深圳)有限公司 | 身份验证方法、装置及系统 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3618381A4 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113852681A (zh) * | 2021-09-22 | 2021-12-28 | 深信服科技股份有限公司 | 一种网关认证方法、装置及安全网关设备 |
CN114866251A (zh) * | 2022-04-25 | 2022-08-05 | 中国银联股份有限公司 | 一种设备互联安全认证系统、方法、装置、服务器及介质 |
CN114866251B (zh) * | 2022-04-25 | 2023-07-07 | 中国银联股份有限公司 | 一种设备互联安全认证系统、方法、装置、服务器及介质 |
Also Published As
Publication number | Publication date |
---|---|
TWI686075B (zh) | 2020-02-21 |
CN107733852B (zh) | 2019-06-21 |
CN107733852A (zh) | 2018-02-23 |
KR102307665B1 (ko) | 2021-10-01 |
JP2020523664A (ja) | 2020-08-06 |
JP6936340B2 (ja) | 2021-09-15 |
TW201914256A (zh) | 2019-04-01 |
EP3618381A4 (en) | 2020-09-23 |
CA3068090A1 (en) | 2019-02-28 |
US20200213293A1 (en) | 2020-07-02 |
EP3618381A1 (en) | 2020-03-04 |
KR20200003158A (ko) | 2020-01-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019037373A1 (zh) | 身份验证 | |
US20230231718A1 (en) | Method of using one device to unlock another device | |
US11764966B2 (en) | Systems and methods for single-step out-of-band authentication | |
US10826882B2 (en) | Network-based key distribution system, method, and apparatus | |
US20170063827A1 (en) | Data obfuscation method and service using unique seeds | |
WO2017206250A1 (zh) | 终端的备份销毁方法和装置 | |
US11038684B2 (en) | User authentication using a companion device | |
US10511438B2 (en) | Method, system and apparatus using forward-secure cryptography for passcode verification | |
US20200233947A1 (en) | System and method for facilitating authentication via a short-range wireless token | |
US20180053018A1 (en) | Methods and systems for facilitating secured access to storage devices | |
US10333707B1 (en) | Systems and methods for user authentication | |
CN103888429A (zh) | 虚拟机启动方法、相关设备和系统 | |
CN111901303A (zh) | 设备认证方法和装置、存储介质及电子装置 | |
WO2018099407A1 (zh) | 账户认证登录方法及装置 | |
US20140250499A1 (en) | Password based security method, systems and devices | |
KR102016976B1 (ko) | 싱글 사인 온 서비스 기반의 상호 인증 방법 및 시스템 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17922615 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2019565469 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 20197035648 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2017922615 Country of ref document: EP Effective date: 20191129 |
|
ENP | Entry into the national phase |
Ref document number: 3068090 Country of ref document: CA |
|
NENP | Non-entry into the national phase |
Ref country code: DE |