CN104660401A - Authentication method, authentication system and terminal - Google Patents
Authentication method, authentication system and terminal Download PDFInfo
- Publication number
- CN104660401A CN104660401A CN201310576558.XA CN201310576558A CN104660401A CN 104660401 A CN104660401 A CN 104660401A CN 201310576558 A CN201310576558 A CN 201310576558A CN 104660401 A CN104660401 A CN 104660401A
- Authority
- CN
- China
- Prior art keywords
- terminal
- authorization information
- terminal iidentification
- iidentification
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Information Transfer Between Computers (AREA)
Abstract
The invention provides an authentication method. The method comprises the steps that a server sends authentication information related to a terminal identifier of a terminal to the terminal; the terminal sends response information corresponding to the authentication information to the server, wherein the response information is related to the terminal identifier; and the server acquires the terminal identifier and authenticates the response information according to the authentication information and the acquired terminal identifier. In the authentication method, the terminal identifier is unique, and the response information is related to the terminal identifier, if the terminal identifier is unknown, the response information corresponding to the authentication information cannot be acquired, and the response information cannot be authenticated by the server according to the authentication information and the terminal identifier. Even if a malicious user transmits the authentication information to natural person through third-party software, the natural person does not know the terminal identifier and cannot decode, so that the authentication safety is improved. The invention also provides an authentication system and a terminal.
Description
Technical field
The present invention relates to computer safety field, particularly relate to a kind of verification method, system and terminal.
Background technology
Identifying code (Completely Automated Public Turing test to tell Computers andHumans Apart, abbreviation CAPTCHA, the full-automatic turing test distinguishing computer and the mankind) mode of to be a kind of user of differentiation be computer and people.Identifying code may be used for preventing malice decryption, brush ticket, forum pours water, and effectively prevent certain hacker from carrying out continuous login attempt to some particular registered user specific program Brute Force modes, be widely used in various webpage and software program.
The verification mode of existing use identifying code, generally that server generates the identifying code picture through special processing and sends to terminal, terminal shows identifying code picture in webpage or software program, identify the checking content in identifying code picture by user and input, then by terminal, the checking content of input being sent to server and verifying.Owing to using computer to carry out automatic decoding identification difficulty to identifying code picture, certain restriction is served to malicious user.
But some malicious users, in order to crack identifying code picture, have developed Malware, and employ some natural persons (being commonly called as " code work ") and come manually to crack.Particularly, the identifying code picture reproduction shown in webpage or software program can be got off by this Malware, and being transmitted to a yard work by Malware, checking content according to identifying code picture input validation content, then is inputted in original webpage or software program by Malware by code work.As long as code operating point is more than enough, the checking effect of identifying code picture will be lost efficacy, thus made malicious user reach the object of Brute Force, and fail safe is lower.
Summary of the invention
Based on this, be necessary to carry out security verified lower problem for use identifying code picture, a kind of verification method, system and terminal are provided.
A kind of verification method, described method comprises:
Server sends the authorization information relevant to the terminal iidentification of described terminal to terminal;
Described terminal to server sends the response message corresponding with described authorization information, and described response message is relevant to described terminal iidentification;
Described server obtains described terminal iidentification, and verifies described response message according to the terminal iidentification of described authorization information and described acquisition.
A kind of verification system, described system comprises server and terminal:
Described server is used for sending the authorization information relevant to terminal iidentification to described terminal;
Described terminal is used for sending the response message corresponding with described authorization information to described server, and described response message is relevant to described terminal iidentification;
Described server also for obtaining described terminal iidentification, and is verified described response message according to the terminal iidentification of described authorization information and described acquisition.
Above-mentioned verification method and system, when needs are verified, server sends the authorization information relevant to the terminal iidentification of described terminal to terminal, and then terminal to server sends the response message corresponding with this authorization information, and this response message is relevant to terminal iidentification.Server obtains this terminal iidentification, and verifies response message according to this terminal iidentification and authorization information.Because terminal iidentification has uniqueness, response message is relevant to terminal iidentification, if do not know terminal iidentification, just cannot know the response message corresponding with authorization information, also just cannot by server according to authorization information and terminal iidentification to the checking of response message.Even if therefore authorization information is transmitted to a yard work by third party software by malicious user, and code work does not know terminal iidentification, just cannot crack, improve the fail safe of checking.
A kind of verification method, described method comprises:
The authorization information relevant to the terminal iidentification of described terminal is sent to terminal;
Receive the response message corresponding with described authorization information that described terminal sends, described response message is relevant to described terminal iidentification;
Obtain described terminal iidentification, and according to the terminal iidentification of described authorization information and described acquisition, described response message is verified.
Above-mentioned verification method, when needs are verified, server sends the authorization information relevant to the terminal iidentification of described terminal to terminal, the response message corresponding with this authorization information of then receiving terminal transmission, and this response message is relevant to terminal iidentification.Server obtains this terminal iidentification, and verifies response message according to this terminal iidentification and authorization information.Because terminal iidentification has uniqueness, response message is relevant to terminal iidentification, if do not know terminal iidentification, just cannot know the response message corresponding with authorization information, also just cannot by server according to authorization information and terminal iidentification to the checking of response message.Even if therefore authorization information is transmitted to a yard work by third party software by malicious user, and code work does not know terminal iidentification, just cannot crack, improve the fail safe of checking.
A kind of verification method, described method comprises:
Terminal receives the authorization information relevant to the terminal iidentification of described terminal;
Described terminal sends the response message corresponding with described authorization information, and described response message is relevant to described terminal iidentification;
Described response message is used for verifying described response message according to described authorization information and described terminal iidentification.
A kind of terminal, described terminal comprises:
Authorization information receiver module, for receiving the authorization information relevant to the terminal iidentification of described terminal;
Response message sending module, for sending the response message corresponding with described authorization information, described response message is relevant to described terminal iidentification; Described response message is used for verifying described response message according to described authorization information and described terminal iidentification.
Above-mentioned verification method and terminal, when needs are verified, terminal receives the authorization information relevant to terminal iidentification, then send the response message corresponding with authorization information, and this response message is relevant to terminal iidentification.Wherein, response message is used for verifying this response message according to authorization information and terminal iidentification.Because terminal iidentification has uniqueness, response message is relevant to terminal iidentification, if do not know terminal iidentification, just cannot know the response message corresponding with authorization information, also just cannot by server according to authorization information and terminal iidentification to the checking of response message.Even if therefore authorization information is transmitted to a yard work by third party software by malicious user, and code work does not know terminal iidentification, just cannot crack, improve the fail safe of checking.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of verification method in an embodiment;
Fig. 2 is that in an embodiment, server obtains terminal iidentification, and according to the terminal iidentification of authorization information and acquisition to the schematic flow sheet of the step that response message is verified;
Fig. 3 is the schematic flow sheet of verification method in another embodiment;
Fig. 4 obtains terminal iidentification in an embodiment, and according to the terminal iidentification of authorization information and acquisition to the schematic flow sheet of the step that response message is verified;
Fig. 5 is the schematic flow sheet of verification method in another embodiment;
Fig. 6 is the structured flowchart of verification system in an embodiment;
Fig. 7 is the structured flowchart of verification system in another embodiment;
Fig. 8 is the structured flowchart of terminal in an embodiment;
Fig. 9 is the structured flowchart of terminal in another embodiment.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
As shown in Figure 1, in one embodiment, provide a kind of verification method, the method comprises:
Step 102, server sends the authorization information relevant to the terminal iidentification of terminal to terminal.
Server includes but not limited to various computer, comprises personal computer, mainframe computer, supercomputer and computer cluster etc.Terminal can include but not limited to smart mobile phone, panel computer, personal digital assistant, E-book reader, MP3(Moving Picture Experts Group Audio Layer III, dynamic image expert compression standard audio frequency aspect 3) or MP4(Moving Picture Experts Group Audio LayerIV, dynamic image expert compression standard audio frequency aspect 4) player, POS terminal, vehicle-mounted computer, pocket computer on knee and desktop computer etc.
Terminal is when needs are verified, send checking request to server, server receives this checking request, and sends the authorization information relevant to the terminal iidentification of terminal according to this checking request to terminal.Terminal iidentification is in order to identify each terminal.Terminal iidentification can be character string, and the character in this character string comprises at least one in numeral, letter, symbol and word.Terminal iidentification can be prestored by server, and when needs are verified, server directly reads.Terminal iidentification also can be stored by third party's service platform, and when needing to verify, server obtains from third party's service platform.
In one embodiment, terminal iidentification can be the IMEI(International MobileEquipment Identity of this terminal, International Mobile Equipment Identity code), telephone number or GUID (GUID, Globally Unique Identifier, also referred to as UUID, Universally Unique IDentifier) etc.
IMEI is made up of " electronics string number " 15 bit digital, it and every station terminal one_to_one corresponding, and this IMEI is that the whole world is unique.On part mobile phone, can check in the content difference of the mobile phone required input of the IMEI(different vendor of this mobile phone by keying in " * #06# ", the content of the different mobile phone required input of same manufacturer also may be different).IMEI overall length is 15, and each is made up of the numeral of 0 ~ 9.Telephone number is made up of numeral, and the telephone number of terminal is unique within the specific limits.GUID to be a kind of binary length generated by algorithm the be numeric identifier of 128, terminal can to the GUID of server or this terminal of third party's service platform acquisition request.
In the present embodiment, the IMEI of terminal, phone or GUID are used for checking as terminal iidentification, and its uniqueness or Local Steady make malicious user be difficult to forge or crack, and improve the fail safe of checking.
In one embodiment, step 102 comprises: server sends the authorization information according to the terminal iidentification stochastic generation of terminal to terminal.
Server first can obtain the terminal iidentification of terminal, thus according to this terminal iidentification stochastic generation authorization information.Server also can from the authorization information storehouse relevant to terminal iidentification random selecting authorization information, and send the authorization information chosen to terminal.Particularly, server has prestored authorization information storehouse, this authorization information storehouse comprises multinomial authorization information, and authorization information in this authorization information storehouse is all relevant to terminal iidentification.Server sends the authorization information according to the terminal iidentification stochastic generation of terminal to terminal, and the authorization information that terminal is received is random, adds the difficulty cracked, and improves the fail safe of checking.
In one embodiment, also comprise before step 102: server obtains the terminal iidentification of terminal, and verifies according to terminal iidentification, be verified and then perform step 102.
Particularly, server can the checking request of carried terminal mark that sends of receiving terminal, thus judges this terminal iidentification whether in the identification list prestored, if be then verified, and then sends the authorization information relevant to terminal iidentification to terminal.Here the checking according to terminal iidentification can regard the checking whether terminal to checking qualification as, if it does not have checking qualification, without the need to sending authorization information to this terminal, adds the fail safe of checking.
Step 104, terminal to server sends the response message corresponding with authorization information, and response message is relevant to terminal iidentification.
Terminal shows this authorization information after receiving authorization information, and user is according to the terminal iidentification that this authorization information and terminal store, and input response message corresponding to this authorization information to terminal, then this response message sends to server to verify by terminal.Authorization information comprises the prompting of the response message of requirement input, and this prompting is relevant to terminal iidentification.Concrete, the prompting in authorization information can be that in the character string of terminal iidentification, which or which figure place exists which or which character.User, according to the terminal iidentification that the prompting in authorization information and terminal store, inputs the response message that this authorization information is corresponding.
Illustrate, if terminal iidentification is IMEI, then authorization information can be " please input last 4 characters of IMEI ", or the prompting that " please input IMEI the 1st character and last 3 characters " etc. is relevant to IMEI like this.After terminal receives this authorization information, user by consulting the IMEI of this terminal, and according to the prompting in the IMEI of this terminal and authorization information, to this terminal input validation information.Such as, if authorization information is " please input last 4 characters of IMEI ", then the response message that this authorization information is corresponding should be last 4 characters of the IMEI of this terminal.
Step 106, server obtains terminal iidentification, and verifies response message according to the terminal iidentification of authorization information and acquisition.
Server can prestore this terminal iidentification, directly reads this terminal iidentification when needing; Or prestore this terminal iidentification by third-party platform, to this this terminal iidentification of third-party platform acquisition request when server needs.Server can determine the response message that input according to authorization information and terminal iidentification, the response message that the response message that then this should be able to be inputted and terminal send contrasts, if comparing result unanimously, by checking.
Above-mentioned verification method, because terminal iidentification has uniqueness, response message is relevant to terminal iidentification, if do not know terminal iidentification, just cannot know the response message corresponding with authorization information, also just cannot by server according to authorization information and terminal iidentification to the checking of response message.Even if therefore authorization information is transmitted to a yard work by third party software by malicious user, and code work does not know terminal iidentification, just cannot crack, improve the fail safe of checking.
As shown in Figure 2, in one embodiment, step 106 comprises:
Step 202, server obtains the user ID that terminal sends.
User ID, in order to unique identification user identity, such as, can be the account number etc. that user logs in client.Terminal can carry user ID when sending checking request to server in checking request, or can when the response message corresponding to server transmission authorization information, user ID is sent in the lump to server, or answer the instruction of server to send user ID to server when server needs, server thus obtain terminal send user ID.
Step 204, server obtains the terminal iidentification corresponding to user ID.
Can prestore the corresponding relation of user ID and terminal iidentification on the server, server to receive after user ID and can obtain terminal iidentification corresponding to user ID according to this corresponding relation.Also can prestore the corresponding relation of user ID and terminal at third party's service platform, server can utilize the terminal iidentification of third party's service platform acquisition corresponding to user ID.
In one embodiment, also comprise before step 102: user ID and terminal iidentification correspondence are uploaded onto the server by terminal, to make server record and to store the corresponding relation of user ID and terminal iidentification.In the present embodiment, user ID and terminal iidentification correspondence are uploaded onto the server by terminal in advance, server receives rear record and stores the corresponding relation of this user ID and this terminal iidentification, can be convenient to obtain terminal iidentification by user ID, and then utilize this terminal iidentification to verify.
Step 206, server is verified response message according to authorization information and terminal iidentification corresponding to user ID.
Server is according to the authorization information sending to terminal, and the terminal iidentification corresponding to user ID, can realize the checking to the response message that terminal sends.
In the present embodiment, prestore the corresponding relation of user ID and terminal iidentification, by user ID and terminal iidentification binding, needed during checking to know that user ID and terminal iidentification just can know the response message of needs input, make to crack more difficult, further increase the fail safe of checking.
With a concrete application scenarios, above-mentioned authentication ratio juris is described below.This application scenarios is that mobile phone is illustrated with terminal, specifically comprises the following steps:
(1), after user uses user ID Website login or software program on mobile phone, when mobile phone being browsed particular webpage or opens the specific webpage of software program, trigger mobile phone and send checking request to server, in this checking request, comprise user ID.
(2), to receive after checking request random selecting authorization information from the authorization information storehouse relevant to IMEI be " please input last 4 characters of IMEI " to server, and issue the mobile phone of this authorization information to requests verification, this mobile phone receives and shows this authorization information.
(2) after, user sees the authorization information that mobile phone shows, by consulting the IMEI of this mobile phone to mobile phone input " * #06# ", then according to authorization information, response message in the inputting interface that website or software program provide corresponding to input validation information, this response message is last 4 characters of the IMEI of this mobile phone.Then this response message sends to server to verify by mobile phone.
(3), server is according to the corresponding relation of the IMEI of the user ID stored in advance and this mobile phone, obtain the IMEI of this mobile phone, then combine the authorization information and the IMEI of this mobile phone that send to mobile phone, can determine that response message that user should input is last 4 characters of the IMEI of this mobile phone.Then mobile phone sends to the response message of server to compare with last 4 characters of the IMEI of the mobile phone determined by server, if consistent, is verified.
As shown in Figure 3, in one embodiment, provide a kind of verification method, the method comprises:
Step 302, sends the authorization information relevant to the terminal iidentification of terminal to terminal.
Server answers the checking request of terminal, sends the authorization information relevant to the terminal iidentification of terminal to terminal.Terminal iidentification is in order to identify each terminal.Terminal iidentification can be character string, and the character in this character string comprises at least one in numeral, letter, symbol and word.Terminal iidentification can be prestored by server, and when needs are verified, server directly reads.Terminal iidentification also can be stored by third party's service platform, and when needing to verify, server obtains from third party's service platform.
In one embodiment, terminal iidentification can be IMEI, the telephone number or GUID etc. of this terminal.In the present embodiment, the IMEI of terminal, phone or GUID are used for checking as terminal iidentification, and its uniqueness or Local Steady make malicious user be difficult to forge or crack, and improve the fail safe of checking.
In one embodiment, step 302 comprises: send the authorization information according to the terminal iidentification stochastic generation of terminal to terminal.
In the present embodiment, server first can obtain the terminal iidentification of terminal, thus according to this terminal iidentification stochastic generation authorization information.Server also can from the authorization information storehouse relevant to terminal iidentification random selecting authorization information, and send the authorization information chosen to terminal.Particularly, server has prestored authorization information storehouse, this authorization information storehouse comprises multinomial authorization information, and authorization information in this authorization information storehouse is all relevant to terminal iidentification.Server sends the authorization information according to the terminal iidentification stochastic generation of terminal to terminal, and the authorization information that terminal is received is random, adds the difficulty cracked, and improves the fail safe of checking.
In one embodiment, before step 302, also comprise: the terminal iidentification obtaining terminal, and verify according to terminal iidentification, be verified and then perform step 302.
Particularly, server can the checking request of carried terminal mark that sends of receiving terminal, thus judges this terminal iidentification whether in the identification list prestored, if be then verified, and then sends the authorization information relevant to terminal iidentification to terminal.Here according to the checking of terminal iidentification be can regard as to terminal whether have checking qualification checking, if its do not have checking qualification; without the need to this terminal send authorization information, add the fail safe of checking.
Step 304, the response message corresponding with authorization information that receiving terminal sends, response message is relevant to terminal iidentification.
Terminal shows this authorization information after receiving authorization information, and user is according to the terminal iidentification that this authorization information and terminal store, and input response message corresponding to this authorization information to terminal, then this response message sends to server to verify by terminal.Authorization information comprises the prompting of the response message of requirement input, and this prompting is relevant to terminal iidentification.Concrete, the prompting in authorization information can be that in the character string of terminal iidentification, which or which figure place exists which or which character.User, according to the terminal iidentification that the prompting in authorization information and terminal store, inputs the response message that this authorization information is corresponding.
Step 306, obtains terminal iidentification, and verifies response message according to the terminal iidentification of authorization information and acquisition.
Server can prestore this terminal iidentification, directly reads this terminal iidentification when needing; Or prestore this terminal iidentification by third-party platform, to this this terminal iidentification of third-party platform acquisition request when server needs.Server can determine the response message that input according to authorization information and terminal iidentification, the response message that the response message that then this should be able to be inputted and terminal send contrasts, if comparing result unanimously, by checking.
Above-mentioned verification method, because terminal iidentification has uniqueness, response message is relevant to terminal iidentification, if do not know terminal iidentification, just cannot know the response message corresponding with authorization information, also just cannot by server according to authorization information and terminal iidentification to the checking of response message.Even if therefore authorization information is transmitted to a yard work by third party software by malicious user, and code work does not know terminal iidentification, just cannot crack, improve the fail safe of checking.
As shown in Figure 4, in one embodiment, step 306 comprises:
Step 402, obtains the user ID that terminal sends.
User ID is in order to unique identification user identity, terminal can carry user ID when sending checking request to server in checking request, or can when the response message corresponding to server transmission authorization information, user ID is sent in the lump to server, or answer the instruction of server to send user ID to server when server needs, server thus obtain terminal send user ID.
Step 404, obtains the terminal iidentification corresponding to user ID.
Server can prestore the corresponding relation of user ID and terminal iidentification, server to receive after user ID and can obtain terminal iidentification corresponding to user ID according to this corresponding relation.Also can prestore the corresponding relation of user ID and terminal at third party's service platform, server can utilize the terminal iidentification of third party's service platform acquisition corresponding to user ID.
In one embodiment, also comprise before step 302: the user ID that receiving terminal sends and terminal iidentification, and store the corresponding relation of user ID and terminal iidentification.In the present embodiment, user ID and terminal iidentification correspondence are uploaded onto the server by terminal in advance, server receives the corresponding relation of this user ID of rear storage and this terminal iidentification, can be convenient to obtain terminal iidentification by user ID, and then utilize this terminal iidentification to verify.
Step 406, verifies response message according to authorization information and terminal iidentification corresponding to user ID.
Server is according to the authorization information sending to terminal, and the terminal iidentification corresponding to user ID, can realize the checking to the response message that terminal sends.
In the present embodiment, prestore the corresponding relation of user ID and terminal iidentification, by user ID and terminal iidentification binding, needed during checking to know that user ID and terminal iidentification just can know the response message of needs input, make to crack more difficult, further increase the fail safe of checking.
As shown in Figure 5, in one embodiment, provide a kind of verification method, the method comprises:
Step 502, terminal receives the authorization information relevant to the terminal iidentification of terminal.
Terminal is when needs are verified, send checking request to server, server receives this checking request, and sends the authorization information relevant to the terminal iidentification of terminal according to this checking request to terminal, and terminal receives this authorization information.Terminal iidentification is in order to identify each terminal.Terminal iidentification can be character string, and the character in this character string comprises at least one in numeral, letter, symbol and word.Terminal iidentification can be prestored by server, and when needs are verified, server directly reads.Terminal iidentification also can be stored by third party's service platform, and when needing to verify, server obtains from third party's service platform.
In one embodiment, terminal iidentification can be IMEI, the telephone number or GUID etc. of this terminal.In the present embodiment, the IMEI of terminal, phone or GUID are used for checking as terminal iidentification, and its uniqueness or Local Steady make malicious user be difficult to forge or crack, and improve the fail safe of checking.
In one embodiment, step 502 comprises: terminal receives the authorization information according to the terminal iidentification stochastic generation of terminal.
Server first can obtain the terminal iidentification of terminal, thus according to this terminal iidentification stochastic generation authorization information, and this authorization information is sent this terminal, the authorization information that terminal reception server sends.Server also can from the authorization information storehouse relevant to terminal iidentification random selecting authorization information, and send the authorization information chosen to terminal, the authorization information that terminal reception server sends.Particularly, server can prestore the authorization information storehouse relevant to terminal iidentification, this authorization information storehouse comprises multinomial authorization information, and authorization information in this authorization information storehouse is all relevant to terminal iidentification.Server sends the authorization information according to the terminal iidentification stochastic generation of terminal to terminal, and the authorization information that terminal is received is random, adds the difficulty cracked, and improves the fail safe of checking.
In one embodiment, step 502 also comprises: terminal receives to be carried out verifying according to the terminal iidentification of terminal and the authorization information relevant to terminal iidentification returned after being verified.
Particularly, server can the checking request of carried terminal mark that sends of receiving terminal, thus judges this terminal iidentification whether in the identification list prestored, if be then verified, and then sends the authorization information relevant to terminal iidentification to terminal.Here the checking according to terminal iidentification can regard the checking whether terminal to checking qualification as, if it does not have checking qualification, without the need to sending authorization information to this terminal, adds the fail safe of checking.
Step 504, terminal sends the response message corresponding with authorization information, and response message is relevant to the terminal iidentification of Receipt Validation information; Response message is used for verifying response message according to authorization information and terminal iidentification.
Terminal shows this authorization information after receiving authorization information, and user is according to the terminal iidentification that this authorization information and terminal store, and input response message corresponding to this authorization information to terminal, then this response message sends to server to verify by terminal.
Authorization information comprises the prompting of the response message of requirement input, and this prompting is relevant to terminal iidentification.Concrete, the prompting in authorization information can be that in the character string of terminal iidentification, which or which figure place exists which or which character.User, according to the terminal iidentification that the prompting in authorization information and terminal store, inputs the response message that this authorization information is corresponding.
Response message is used for verifying response message according to authorization information and terminal iidentification.Particularly, server can determine the response message that input according to authorization information and terminal iidentification, and the response message that the response message that then this should be able to be inputted and terminal send contrasts, if comparing result unanimously, by checking.
Above-mentioned verification method, because terminal iidentification has uniqueness, response message is relevant to terminal iidentification, if do not know terminal iidentification, just cannot know the response message corresponding with authorization information, also just cannot by server according to authorization information and terminal iidentification to the checking of response message.Even if therefore authorization information is transmitted to a yard work by third party software by malicious user, and code work does not know terminal iidentification, just cannot crack, improve the fail safe of checking.
In one embodiment, also comprise before step 502: send user ID; User ID is used for obtaining terminal iidentification according to user ID.
User ID is in order to unique identification user identity, terminal can carry user ID when sending checking request to server in checking request, or can when the response message corresponding to server transmission authorization information, send user ID to server in the lump, or answer when server needs the instruction of server to send user ID to server.
User ID is used for obtaining terminal iidentification according to user ID.Particularly, can prestore the corresponding relation of user ID and terminal iidentification on the server, server to receive after user ID and can obtain terminal iidentification corresponding to user ID according to this corresponding relation.Also can prestore the corresponding relation of user ID and terminal at third party's service platform, server can utilize the terminal iidentification of third party's service platform acquisition corresponding to user ID.Server gets terminal iidentification corresponding to user ID, and this terminal iidentification just can be utilized to verify response message.
In the present embodiment, terminal to server sends user ID, wherein user ID is used for obtaining terminal iidentification according to user ID, server needs when verifying to know that user ID and terminal iidentification just can know the response message of needs input, make to crack more difficult, further increase the fail safe of checking.
In one embodiment, this verification method also comprises: corresponding upload user mark and terminal iidentification.In the present embodiment, user ID and terminal iidentification correspondence are uploaded onto the server by terminal in advance, to make server record and to store this user ID and the corresponding relation of this terminal iidentification, server can be convenient to and obtain terminal iidentification by user ID, and then utilize this terminal iidentification to verify.
As shown in Figure 6, in one embodiment, provide a kind of verification system, this system comprises server 602 and terminal 604.
Server 602 is for sending the authorization information relevant to the terminal iidentification of terminal 604 to terminal 604.
Terminal 604 when needs are verified, for sending checking request to server 602, server 602 for receiving this checking request, and for sending the authorization information relevant to the terminal iidentification of terminal 604 according to this checking request to terminal 604.Terminal iidentification is in order to identify each terminal 604.Terminal iidentification can be character string, and the character in this character string comprises at least one in numeral, letter, symbol and word.Server 602 can be used for prestoring terminal iidentification, directly reads when needs are verified.Terminal iidentification also can be stored by third party's service platform, and when needing to verify, server 602 is for obtaining terminal iidentification from third party's service platform.
In one embodiment, terminal iidentification can be IMEI, the telephone number or GUID etc. of this terminal 604.In the present embodiment, the IMEI of terminal 604, phone or GUID are used for checking as terminal iidentification, and its uniqueness or Local Steady make malicious user be difficult to forge or crack, and improve the fail safe of checking.
Terminal 604 is for sending the response message corresponding with authorization information to server 602, and response message is relevant to terminal iidentification.
Terminal 604 shows this authorization information after receiving authorization information, user is according to the terminal iidentification that this authorization information and terminal 604 store, input response message corresponding to this authorization information to terminal 604, then terminal 604 is for sending to server 602 to verify this response message.Authorization information comprises the prompting of the response message of requirement input, and this prompting is relevant to terminal iidentification.Concrete, the prompting in authorization information can be that in the character string of terminal iidentification, which or which figure place exists which or which character.User, according to the terminal iidentification that the prompting in authorization information and terminal 604 store, inputs the response message that this authorization information is corresponding.
Server 602 also for obtaining terminal iidentification, and is verified response message according to the terminal iidentification of authorization information and acquisition.
Server 602 can be used for prestoring terminal iidentification, directly reads this terminal iidentification when needing; Or prestore this terminal iidentification by third-party platform, to this this terminal iidentification of third-party platform acquisition request when server 602 can be used for needing.Server 602 can be used for determining the response message that input according to authorization information and terminal iidentification, and the response message then sent for the response message that this should be inputted and terminal 604 contrasts, if comparing result unanimously, by checking.
In one embodiment, server 602 is also for sending the authorization information of the terminal iidentification stochastic generation according to terminal 604 to terminal 604.
Server 602 can be used for the terminal iidentification first obtaining terminal 604, thus according to this terminal iidentification stochastic generation authorization information.Server 602 also can be used for random selecting authorization information from the authorization information storehouse relevant to terminal iidentification, and sends the authorization information chosen to terminal 604.Particularly, server 602 is for prestoring authorization information storehouse, and this authorization information storehouse comprises multinomial authorization information, and authorization information in this authorization information storehouse is all relevant to terminal iidentification.Server 602 is for sending the authorization information of the terminal iidentification stochastic generation according to terminal 604 to terminal 604, the authorization information that terminal 604 is received is random, adds the difficulty cracked, and improves the fail safe of checking.
In one embodiment, server 602 also for obtaining the terminal iidentification of terminal 602, and is verified according to terminal iidentification, is verified and then sends the authorization information relevant to the terminal iidentification of terminal 602 to terminal 602.
Particularly, server 604 can be used for the checking request of the carried terminal mark that receiving terminal 602 sends, thus for judging this terminal iidentification whether in the identification list prestored, if be then verified, and then for sending the authorization information relevant to terminal iidentification to terminal 602.Here the checking according to terminal iidentification can regard the checking whether terminal 602 to checking qualification as, if it does not have checking qualification, without the need to sending authorization information to this terminal 602, adds the fail safe of checking.
Above-mentioned verification system, because terminal iidentification has uniqueness, response message is relevant to terminal iidentification, if do not know terminal iidentification, just cannot know the response message corresponding with authorization information, also just cannot by server 602 according to authorization information and terminal iidentification to the checking of response message.Even if therefore authorization information is transmitted to a yard work by third party software by malicious user, and code work does not know terminal iidentification, just cannot crack, improve the fail safe of checking.
As shown in Figure 7, in one embodiment, server 602 comprises user ID acquisition module 602a, terminal iidentification acquisition module 602b and authentication module 602c.
The user ID that user ID acquisition module 602a sends for obtaining terminal 604.
User ID is in order to unique identification user identity, terminal 604 is used in carries user ID when server 602 sends checking request in checking request, or be used in when sending response message corresponding to authorization information to server 602, user ID is sent in the lump to server 602, or being used in when server 602 needs answers the instruction of server 602 to send user ID to server 602, user ID acquisition module 602a thus for obtain terminal 604 send user ID.
Terminal iidentification acquisition module 602b is for obtaining the terminal iidentification corresponding to user ID.
Terminal iidentification acquisition module 602b can be used for the corresponding relation prestoring user ID and terminal iidentification, can be used for the terminal iidentification corresponding to this corresponding relation acquisition user ID after terminal iidentification acquisition module 602b receives user ID.Also can prestore the corresponding relation of user ID and terminal 604 at third party's service platform, terminal iidentification acquisition module 602b can be used for utilizing the terminal iidentification of third party's service platform acquisition corresponding to user ID.
Authentication module 602c is used for verifying response message according to authorization information and terminal iidentification corresponding to user ID.
Authentication module 602c can be used for the authorization information according to sending to terminal 604, and the terminal iidentification corresponding to user ID, realizes the checking to the response message that terminal 604 sends.
In the present embodiment, prestore the corresponding relation of user ID and terminal iidentification, by user ID and terminal iidentification binding, needed during checking to know that user ID and terminal iidentification just can know the response message of needs input, make to crack more difficult, further increase the fail safe of checking.
In one embodiment, terminal 604 comprises transmission module 604a, for user ID and terminal iidentification correspondence are uploaded onto the server 602, records and store the corresponding relation of user ID and terminal iidentification to make server 604.In the present embodiment, upper transmission module 604a is used in advance user ID and terminal iidentification correspondence being uploaded onto the server 602, server 602 is for receiving the corresponding relation of this user ID of rear storage and this terminal iidentification, can be convenient to obtain terminal iidentification by user ID, and then utilize this terminal iidentification to verify.
As shown in Figure 8, in one embodiment, provide a kind of terminal 800, terminal 800 comprises authorization information receiver module 800a and response message sending module 800b.
Authorization information receiver module 800a is for receiving the authorization information relevant to terminal iidentification.
Terminal 800 is for when needs are verified, checking request is sent to server (not shown), server receives this checking request, and sends the authorization information relevant to terminal iidentification according to this checking request to terminal 800, and authorization information receiver module 800a is for receiving this authorization information.Terminal iidentification is in order to identify each terminal 800.Terminal iidentification can be character string, and the character in this character string comprises at least one in numeral, letter, symbol and word.Terminal iidentification can be prestored by server, and when needs are verified, server directly reads.Terminal iidentification also can be stored by third party's service platform, and when needing to verify, server obtains from third party's service platform.
In one embodiment, terminal iidentification can be IMEI, the telephone number or GUID etc. of this terminal 800.In the present embodiment, the IMEI of terminal 800, phone or GUID are used for checking as terminal iidentification, and its uniqueness or Local Steady make malicious user be difficult to forge or crack, and improve the fail safe of checking.
Response message sending module 800b is for sending the response message corresponding with authorization information, and response message is relevant to terminal iidentification; Response message is used for verifying response message according to authorization information and terminal iidentification.
Authorization information receiver module 800a shows this authorization information after being used for receiving authorization information, user is according to the terminal iidentification that this authorization information and terminal 800 store, input response message corresponding to this authorization information to terminal 800, then response message sending module 800b is used for this response message to send to server to verify.
Authorization information comprises the prompting of the response message of requirement input, and this prompting is relevant to terminal iidentification.Concrete, the prompting in authorization information can be that in the character string of terminal iidentification, which or which figure place exists which or which character.User, according to the terminal iidentification that the prompting in authorization information and terminal 800 store, inputs the response message that this authorization information is corresponding.
Response message is used for verifying response message according to authorization information and terminal iidentification.Particularly, server can be used for determining the response message that input according to authorization information and terminal iidentification, and then server is used for the response message that this response message that should input and terminal 800 send to contrast, if comparing result unanimously, by checking.
Above-mentioned terminal, because terminal iidentification has uniqueness, response message is relevant to terminal iidentification, if do not know terminal iidentification, just cannot know the response message corresponding with authorization information, also just cannot by server according to authorization information and terminal iidentification to the checking of response message.Even if therefore authorization information is transmitted to a yard work by third party software by malicious user, and code work does not know terminal iidentification, just cannot crack, improve the fail safe of checking.
In one embodiment, authorization information receiver module 800a also believes according to the checking of the terminal iidentification stochastic generation of terminal for receiving.Particularly, server can be used for prestoring the authorization information storehouse relevant to terminal iidentification, and this authorization information storehouse comprises multinomial authorization information, and authorization information in this authorization information storehouse is all relevant to terminal iidentification.Authorization information receiver module 800a believes according to the checking of the terminal iidentification stochastic generation of terminal for receiving, and the authorization information that terminal 800 is received is random, adds the difficulty cracked, and improves the fail safe of checking.
In one embodiment, authorization information receiver module 800a also carries out verifying according to the terminal iidentification of terminal 800 and the authorization information relevant to terminal iidentification returned after being verified for receiving.
In the present embodiment, server can be used for the checking request of the carried terminal mark that receiving terminal 800 sends, thus judge this terminal iidentification whether in the identification list prestored, if be then verified, and then send the authorization information relevant to terminal iidentification to terminal 800.Here the checking according to terminal iidentification can regard the checking whether terminal 800 to checking qualification as, if it does not have checking qualification, without the need to sending authorization information to this terminal 800, adds the fail safe of checking.
As shown in Figure 9, in one embodiment, terminal 800 also comprises user ID sending module 800c, for sending user ID; User ID is used for obtaining terminal iidentification according to user ID.
User ID is in order to unique identification user identity, user ID sending module 800c was used in and in checking request, carries user ID when server sends checking request, or when being used in the response message to server transmission authorization information is corresponding, send user ID to server in the lump, or be used in when server needs and answer the instruction of server to send user ID to server.
User ID is used for obtaining terminal iidentification according to user ID.Particularly, server can be used for the corresponding relation prestoring user ID and terminal iidentification, obtains the terminal iidentification corresponding to user ID after server can be used for receiving user ID according to this corresponding relation.Also can prestore the corresponding relation of user ID and terminal 800 at third party's service platform, server can be used for utilizing the terminal iidentification of third party's service platform acquisition corresponding to user ID.Server gets terminal iidentification corresponding to user ID, and this terminal iidentification just can be utilized to verify response message.
In the present embodiment, user ID sending module 800c is used for sending user ID to server, wherein user ID is used for obtaining terminal iidentification according to user ID, server needs when verifying to know that user ID and terminal iidentification just can know the response message of needs input, make to crack more difficult, further increase the fail safe of checking.
In one embodiment, terminal 800 also comprises transmission module 800d, for corresponding upload user mark and terminal iidentification.In the present embodiment, upper transmission module 800d is used for user ID and terminal iidentification correspondence being uploaded onto the server in advance, to make server record and to store the corresponding relation of this user ID and this terminal iidentification, server can be convenient to and obtain terminal iidentification by user ID, and then utilize this terminal iidentification to verify.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory, RAM) etc.
The above embodiment only have expressed several execution mode of the present invention, and it describes comparatively concrete and detailed, but therefore can not be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection range of patent of the present invention should be as the criterion with claims.
Claims (25)
1. a verification method, described method comprises:
Server sends the authorization information relevant to the terminal iidentification of described terminal to terminal;
Described terminal to server sends the response message corresponding with described authorization information, and described response message is relevant to described terminal iidentification;
Described server obtains described terminal iidentification, and verifies described response message according to the terminal iidentification of described authorization information and described acquisition.
2. method according to claim 1, is characterized in that, described server sends the authorization information relevant to the terminal iidentification of described terminal to terminal, comprising:
Server sends the authorization information according to the terminal iidentification stochastic generation of described terminal to terminal.
3. method according to claim 1 and 2, is characterized in that, described server also comprises before sending the step of the authorization information relevant to the terminal iidentification of described terminal to terminal:
Server obtains the terminal iidentification of terminal, and verifies according to described terminal iidentification, is verified, and performs described server sends step from the authorization information relevant to the terminal iidentification of described terminal to terminal.
4. method according to claim 1, is characterized in that, described server obtains described terminal iidentification, and verifies described response message according to the terminal iidentification of described authorization information and described acquisition, comprising:
Described server obtains the user ID that described terminal sends;
Described server obtains the terminal iidentification corresponding to described user ID;
Described server is verified described response message according to described authorization information and terminal iidentification corresponding to described user ID.
5. method according to claim 4, is characterized in that, described server also comprises before sending the authorization information relevant to the terminal iidentification of described terminal to terminal:
Described user ID and described terminal iidentification correspondence are uploaded to described server by described terminal, to make described server record and to store the corresponding relation of described user ID and described terminal iidentification.
6. a verification method, described method comprises:
The authorization information relevant to the terminal iidentification of described terminal is sent to terminal;
Receive the response message corresponding with described authorization information that described terminal sends, described response message is relevant to described terminal iidentification;
Obtain described terminal iidentification, and according to the terminal iidentification of described authorization information and described acquisition, described response message is verified.
7. method according to claim 6, is characterized in that, the described authorization information relevant to the terminal iidentification of described terminal to terminal transmission, comprising:
The authorization information according to the terminal iidentification stochastic generation of described terminal is sent to terminal.
8. the method according to claim 6 or 7, is characterized in that, before the step of the described authorization information relevant to the terminal iidentification of described terminal to terminal transmission, also comprises:
Obtain the terminal iidentification of terminal, and verify according to described terminal iidentification, be verified, perform the described step sending the authorization information relevant to the terminal iidentification of described terminal to terminal.
9. method according to claim 6, is characterized in that, the described terminal iidentification of described acquisition, and verifies described response message according to the terminal iidentification of described authorization information and described acquisition, comprising:
Obtain the user ID that described terminal sends;
Obtain the terminal iidentification corresponding to described user ID;
According to described authorization information and terminal iidentification corresponding to described user ID, described response message is verified.
10. method according to claim 9, is characterized in that, before the described authorization information relevant to the terminal iidentification of described terminal to terminal transmission, also comprises:
The user ID that receiving terminal sends and described terminal iidentification, and store the corresponding relation of described user ID and described terminal iidentification.
11. 1 kinds of verification methods, described method comprises:
Terminal receives the authorization information relevant to the terminal iidentification of described terminal;
Described terminal sends the response message corresponding with described authorization information, and described response message is relevant to described terminal iidentification;
Described response message is used for verifying described response message according to described authorization information and described terminal iidentification.
12. methods according to claim 11, is characterized in that, described terminal receives the step of the authorization information relevant to the terminal iidentification of described terminal, comprising:
Terminal receives the authorization information according to the terminal iidentification stochastic generation of described terminal.
13. methods according to claim 11 or 12, is characterized in that, described terminal receives the step of the authorization information relevant to the terminal iidentification of described terminal, comprising:
Terminal receives to be carried out verifying according to the terminal iidentification of described terminal and the authorization information relevant to described terminal iidentification returned after being verified.
14. methods according to claim 11, is characterized in that, described terminal also comprises before receiving the step of the authorization information relevant to the terminal iidentification of described terminal:
Send user ID; Described user ID is used for obtaining described terminal iidentification according to described user ID.
15. methods according to claim 14, is characterized in that, described method also comprises:
Correspondence uploads described user ID and described terminal iidentification.
16. 1 kinds of verification systems, is characterized in that, described system comprises server and terminal:
Described server is used for sending the authorization information relevant to terminal iidentification to described terminal;
Described terminal is used for sending the response message corresponding with described authorization information to described server, and described response message is relevant to described terminal iidentification;
Described server also for obtaining described terminal iidentification, and is verified described response message according to the terminal iidentification of described authorization information and described acquisition.
17. systems according to claim 16, is characterized in that, described server is also for sending the authorization information according to the terminal iidentification stochastic generation of described terminal to terminal.
18. systems according to claim 16 or 17, it is characterized in that, described server also for obtaining the terminal iidentification of terminal, and is verified according to described terminal iidentification, is verified and then sends the authorization information relevant to the terminal iidentification of described terminal to terminal.
19. systems according to claim 16, is characterized in that, described server comprises:
User ID acquisition module, for obtaining the user ID that described terminal sends;
Terminal iidentification acquisition module, for obtaining the terminal iidentification corresponding to described user ID;
Authentication module, for verifying described response message according to described authorization information and terminal iidentification corresponding to described user ID.
20. systems according to claim 19, is characterized in that, described terminal comprises:
Upper transmission module, for described user ID and described terminal iidentification correspondence are uploaded to described server, to make described server record and to store the corresponding relation of described user ID and described terminal iidentification.
21. 1 kinds of terminals, is characterized in that, described terminal comprises:
Authorization information receiver module, for receiving the authorization information relevant to the terminal iidentification of described terminal;
Response message sending module, for sending the response message corresponding with described authorization information, described response message is relevant to described terminal iidentification; Described response message is used for verifying described response message according to described authorization information and described terminal iidentification.
22. terminals according to claim 21, is characterized in that, described authorization information receiver module is also for receiving the authorization information of the terminal iidentification stochastic generation according to described terminal.
23. terminals according to claim 21 or 22, is characterized in that, described authorization information receiver module also carries out verifying according to the terminal iidentification of described terminal and the authorization information relevant to described terminal iidentification returned after being verified for receiving.
24. terminals according to claim 21, is characterized in that, described terminal also comprises:
User ID sending module, for sending user ID; Described user ID is used for obtaining described terminal iidentification according to described user ID.
25. terminals according to claim 24, is characterized in that, described terminal also comprises:
Upper transmission module, uploads described user ID and described terminal iidentification for correspondence.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310576558.XA CN104660401A (en) | 2013-11-15 | 2013-11-15 | Authentication method, authentication system and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310576558.XA CN104660401A (en) | 2013-11-15 | 2013-11-15 | Authentication method, authentication system and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104660401A true CN104660401A (en) | 2015-05-27 |
Family
ID=53251139
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310576558.XA Pending CN104660401A (en) | 2013-11-15 | 2013-11-15 | Authentication method, authentication system and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104660401A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106056408A (en) * | 2016-06-01 | 2016-10-26 | 网易无尾熊(杭州)科技有限公司 | Method and device for tracking promoter |
CN106650362A (en) * | 2016-09-08 | 2017-05-10 | 珠海格力电器股份有限公司 | Encryption method and device for mobile equipment |
CN107786569A (en) * | 2017-11-06 | 2018-03-09 | 维沃移动通信有限公司 | A kind of identifying code sending method, method of reseptance and relevant device |
WO2019033979A1 (en) * | 2017-08-15 | 2019-02-21 | 阿里巴巴集团控股有限公司 | Smart broadcasting method and apparatus |
CN110418331A (en) * | 2019-08-02 | 2019-11-05 | Oppo广东移动通信有限公司 | Unlocking method, tripper, mobile terminal and server |
CN111294981A (en) * | 2020-03-04 | 2020-06-16 | 郑州智利信信息技术有限公司 | Wireless network connection method |
US10828295B2 (en) | 2017-08-15 | 2020-11-10 | Alibaba Group Holding Limited | Smart broadcast device |
CN114978742A (en) * | 2022-06-08 | 2022-08-30 | 中国电信股份有限公司 | Verification information generation method, verification method and device |
US11663622B2 (en) | 2017-09-07 | 2023-05-30 | Advanced New Technologies Co., Ltd. | Offline information pushing method and apparatus |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020095482A1 (en) * | 2000-05-08 | 2002-07-18 | Shuster Gary Stephen | Method and apparatus for verifying the identity of individuals |
US20080301444A1 (en) * | 2005-12-07 | 2008-12-04 | Electronics & Telecommunications Research Institut | Apparatus and Method for Providing Personal Information Sharing Service Using Signed Callback Url Message |
CN101448257A (en) * | 2007-11-28 | 2009-06-03 | 陈静 | Control system for validating user terminal and control method thereof |
CN102064963A (en) * | 2010-12-03 | 2011-05-18 | 百度在线网络技术(北京)有限公司 | Method and equipment for managing a plurality of computing equipment |
CN102833248A (en) * | 2012-08-24 | 2012-12-19 | 东莞宇龙通信科技有限公司 | Method and system for eliminating terminal password |
CN103067340A (en) * | 2011-10-20 | 2013-04-24 | 中兴通讯股份有限公司 | Authentication method for remote control network information domestic appliance, and system and internet domestic gateway |
-
2013
- 2013-11-15 CN CN201310576558.XA patent/CN104660401A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020095482A1 (en) * | 2000-05-08 | 2002-07-18 | Shuster Gary Stephen | Method and apparatus for verifying the identity of individuals |
US20080301444A1 (en) * | 2005-12-07 | 2008-12-04 | Electronics & Telecommunications Research Institut | Apparatus and Method for Providing Personal Information Sharing Service Using Signed Callback Url Message |
CN101448257A (en) * | 2007-11-28 | 2009-06-03 | 陈静 | Control system for validating user terminal and control method thereof |
CN102064963A (en) * | 2010-12-03 | 2011-05-18 | 百度在线网络技术(北京)有限公司 | Method and equipment for managing a plurality of computing equipment |
CN103067340A (en) * | 2011-10-20 | 2013-04-24 | 中兴通讯股份有限公司 | Authentication method for remote control network information domestic appliance, and system and internet domestic gateway |
CN102833248A (en) * | 2012-08-24 | 2012-12-19 | 东莞宇龙通信科技有限公司 | Method and system for eliminating terminal password |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106056408A (en) * | 2016-06-01 | 2016-10-26 | 网易无尾熊(杭州)科技有限公司 | Method and device for tracking promoter |
CN106650362A (en) * | 2016-09-08 | 2017-05-10 | 珠海格力电器股份有限公司 | Encryption method and device for mobile equipment |
WO2019033979A1 (en) * | 2017-08-15 | 2019-02-21 | 阿里巴巴集团控股有限公司 | Smart broadcasting method and apparatus |
US10828295B2 (en) | 2017-08-15 | 2020-11-10 | Alibaba Group Holding Limited | Smart broadcast device |
US11007190B2 (en) | 2017-08-15 | 2021-05-18 | Advanced New Technologies Co., Ltd. | Smart broadcast device |
US11663622B2 (en) | 2017-09-07 | 2023-05-30 | Advanced New Technologies Co., Ltd. | Offline information pushing method and apparatus |
CN107786569A (en) * | 2017-11-06 | 2018-03-09 | 维沃移动通信有限公司 | A kind of identifying code sending method, method of reseptance and relevant device |
CN110418331A (en) * | 2019-08-02 | 2019-11-05 | Oppo广东移动通信有限公司 | Unlocking method, tripper, mobile terminal and server |
CN110418331B (en) * | 2019-08-02 | 2022-04-12 | Oppo广东移动通信有限公司 | Unlocking method, unlocking device, mobile terminal and server |
CN111294981A (en) * | 2020-03-04 | 2020-06-16 | 郑州智利信信息技术有限公司 | Wireless network connection method |
CN114978742A (en) * | 2022-06-08 | 2022-08-30 | 中国电信股份有限公司 | Verification information generation method, verification method and device |
CN114978742B (en) * | 2022-06-08 | 2024-04-23 | 中国电信股份有限公司 | Verification information generation method, verification method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104660401A (en) | Authentication method, authentication system and terminal | |
CN101867929B (en) | Authentication method, system, authentication server and terminal equipment | |
CN105099692B (en) | Security verification method and device, server and terminal | |
CN105188055A (en) | Wireless network access method, wireless access point and server | |
CN107426235B (en) | Authority authentication method, device and system based on equipment fingerprint | |
CN104618315B (en) | A kind of method, apparatus and system of verification information push and Information Authentication | |
CN108683667B (en) | Account protection method, device, system and storage medium | |
CN103188221A (en) | Application login method, application login device and mobile terminal | |
EP2692106A2 (en) | Continuous voice authentication for a mobile device | |
WO2008094725A1 (en) | Method for generating digital fingerprint using pseudo random number code | |
CN103249045A (en) | Identification method, device and system | |
CN107113613B (en) | Server, mobile terminal, network real-name authentication system and method | |
CN105024986A (en) | Account login method, device and system | |
CN109257391A (en) | A kind of access authority opening method, device, server and storage medium | |
CN103905194B (en) | Identity traceability authentication method and system | |
CN101051905A (en) | Agent identity certificiation method | |
CN102984335B (en) | Dial the identity identifying method of landline telephone, equipment and system | |
CN105208013A (en) | Cross-device high-security non-password login method | |
CN105871864A (en) | Mobile terminal identity authentication method and device | |
CN101909279A (en) | Authentication method for mobile phone video monitoring | |
CN104009850B (en) | A kind of method for authenticating user identity and system | |
CN105871903A (en) | Information security control method and system as well as mobile terminal | |
CN101552671A (en) | Network identity authentication method based on U-disk and dynamic differential password and system thereof | |
CN105471920A (en) | Identifying code processing method and device | |
CN109145543B (en) | Identity authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150527 |