CN105681261A - Security authentication method and apparatus - Google Patents
Security authentication method and apparatus Download PDFInfo
- Publication number
- CN105681261A CN105681261A CN201410666047.1A CN201410666047A CN105681261A CN 105681261 A CN105681261 A CN 105681261A CN 201410666047 A CN201410666047 A CN 201410666047A CN 105681261 A CN105681261 A CN 105681261A
- Authority
- CN
- China
- Prior art keywords
- authentication
- equipment
- identity
- information
- bound
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000012795 verification Methods 0.000 claims abstract description 41
- 230000001960 triggered effect Effects 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 20
- 238000004891 communication Methods 0.000 description 13
- 238000012545 processing Methods 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 8
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 230000001133 acceleration Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 239000004984 smart glass Substances 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Landscapes
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the invention provides a security authentication method and apparatus. The method comprises the steps of: receiving an access request of an object requiring security authentication; judging whether an identity verification device bound with a terminal device is detected; and if the identity verification device bound with the terminal device is detected, accessing the object through the recorded security authentication information. In the embodiment of the invention, the security authentication information will be recorded on the terminal device in advance. Thereafter, when the user accesses the application or the website again, the identity of the user is verified by a bracelet worn on the user and other identity verification devices, and if the user is verified, the previously recorded account, password or the like can be used for automatically filling to realize automatic security authentication. By means of this new security authentication scheme, the user does not need to carry out manual input, so the efficiency is improved, and meanwhile, the identity of the user is protected by the identity verification device, thus the security is protected.
Description
Technical Field
The present disclosure relates to the field of information security technologies, and in particular, to a security authentication method and apparatus.
Background
In daily life, people can not input information related to security authentication, such as an account number and a password, on a mobile phone, a tablet computer, a notebook computer, a personal computer and other terminal devices, for example, an unlocking password needs to be input when a mobile phone screen is unlocked, an account number and a password need to be input when a mailbox is logged in, and the like.
In a related art, the user manually inputs the information each time, which can ensure security and avoid leakage of information such as account numbers and passwords, but the input is troublesome and the input efficiency is low because the information needs to be manually input each time. In another related technology, information such as an account number and a password can be stored on the terminal device, and automatic filling is realized during use, however, although the input efficiency is improved, the method is unsafe and has potential safety hazards, because once the control right of the terminal device is obtained by others, the information such as the account number and the password stored on the terminal device can be directly used.
Disclosure of Invention
To overcome the problems in the related art, the present disclosure provides a security authentication method and apparatus to simultaneously improve the efficiency and security during security authentication.
According to a first aspect of the embodiments of the present disclosure, there is provided a security authentication method for a terminal device, the method including:
receiving an access request for an object requiring secure authentication;
judging whether the identity authentication equipment bound with the terminal equipment is detected;
and if the identity verification device bound with the terminal device is detected, accessing the object by using the recorded safety authentication information.
Optionally, the method further includes:
recording the input security authentication information when the object is accessed for the first time; or,
and recording the set safety authentication information according to the received setting instruction.
Optionally, the method further includes:
receiving a binding instruction bound with the identity verification equipment;
and sending authentication information to the authentication equipment according to the binding instruction.
Optionally, the authentication information includes a key, and the key is used to be stored in the authentication device and encrypt data sent by the authentication device to the terminal device.
Optionally, the determining whether the identity verification device bound to the terminal device is detected includes:
judging whether the identity authentication equipment is scanned within a specified distance;
if the identity authentication equipment is scanned, sending dynamic information to the identity authentication equipment;
receiving the dynamic information which is returned by the identity authentication equipment and encrypted by the secret key;
and verifying the dynamic information encrypted by the secret key, and if the dynamic information is verified, determining that the identity verification equipment bound with the terminal equipment is detected.
According to a second aspect of the embodiments of the present disclosure, there is provided a security authentication apparatus for a terminal device, the apparatus including:
the access request receiving module is used for receiving an access request aiming at an object needing security authentication;
the identity identification module is used for judging whether the identity authentication equipment bound with the terminal equipment is detected or not, and if the identity authentication equipment bound with the terminal equipment is detected, the automatic access module is triggered;
and the automatic access module is used for accessing the object by utilizing the recorded safety authentication information.
Optionally, the apparatus further comprises:
a security authentication information recording module for: when the object is accessed for the first time, the input safety authentication information is recorded, or the set safety authentication information is recorded according to the received setting instruction.
Optionally, the apparatus further comprises:
and the binding module is used for receiving a binding instruction bound with the identity verification equipment and sending identity verification information to the identity verification equipment according to the binding instruction.
Optionally, the authentication information includes a key, and the key is used to be stored in the authentication device and encrypt data sent by the authentication device to the terminal device.
Optionally, the identity module includes:
the identity authentication equipment scanning submodule is used for judging whether the identity authentication equipment is scanned within a specified distance, and if the identity authentication equipment is scanned, the dynamic information sending submodule is triggered;
the dynamic information sending submodule is used for sending dynamic information to the identity authentication equipment;
the dynamic information receiving submodule is used for receiving the dynamic information which is returned by the identity authentication equipment and encrypted by the secret key;
and the dynamic information verification sub-module is used for verifying the dynamic information encrypted by the secret key, and if the dynamic information passes the verification, the dynamic information verification sub-module determines that the identity verification equipment bound with the terminal equipment is detected and triggers the automatic access module.
According to a third aspect of the embodiments of the present disclosure, there is provided a security authentication apparatus including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
receiving an access request for an object requiring secure authentication;
judging whether the identity authentication equipment bound with the terminal equipment is detected;
and if the identity verification device bound with the terminal device is detected, accessing the object by using the recorded safety authentication information.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
in the embodiment of the present disclosure, security authentication information is recorded in advance on the terminal device. For example, when a user uses an application or logs in a website for the first time, the user can manually input security authentication information such as an account number and a password, and at the moment, the mobile phone can record the account number and the password and establish a corresponding relationship with the application or the website; or, the security authentication information can be preset directly on the terminal device according to the instruction of the user. Then, when the user visits the application or the website again, the user is authenticated through authentication equipment such as a bracelet worn by the user, if the authentication is passed, the user can use the account number, the password and the like recorded before to automatically fill, and automatic safety authentication is realized. Through the novel safety authentication scheme, the user does not need to carry out manual input, the efficiency is improved, and meanwhile, the identity of the user is protected by the identity verification equipment, so that the safety is ensured.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flow diagram illustrating a method of secure authentication in accordance with an exemplary embodiment;
FIG. 2 is a flow diagram illustrating a method of secure authentication in accordance with an exemplary embodiment;
FIG. 3 is a flow diagram illustrating a method of secure authentication in accordance with an exemplary embodiment;
fig. 4 is a diagram illustrating binding of a terminal device with an authentication device in accordance with an example embodiment;
fig. 5 is a diagram illustrating binding of a terminal device with an authentication device in accordance with an example embodiment;
fig. 6 is a diagram illustrating binding of a terminal device with an authentication device in accordance with an example embodiment;
FIG. 7 is a flow diagram illustrating a method of secure authentication in accordance with an exemplary embodiment;
FIG. 8 is a flow diagram illustrating a method of secure authentication in accordance with an exemplary embodiment;
FIG. 9 is a diagram illustrating a user accessing a website for a first time, according to an illustrative embodiment;
FIG. 10 is a diagram illustrating a user revisiting a website, according to an exemplary embodiment;
FIG. 11 is a schematic diagram illustrating an account number and password autofill interface, according to an exemplary embodiment;
FIG. 12 is a block diagram illustrating a secure authentication apparatus according to an example embodiment;
FIG. 13 is a block diagram illustrating a secure authentication apparatus according to an example embodiment;
FIG. 14 is a block diagram illustrating a secure authentication apparatus according to an example embodiment;
FIG. 15 is a block diagram illustrating a secure authentication apparatus according to an example embodiment;
fig. 16 is a block diagram illustrating an apparatus for secure authentication in accordance with an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
Fig. 1 is a flow diagram illustrating a method of secure authentication according to an example embodiment. The method can be used for terminal equipment such as mobile phones, tablet computers, notebook computers, PCs and the like. Referring to fig. 1, the method may include:
in step S101, an access request for an object requiring secure authentication is received.
The object may be an application or a website, as examples. For example, if a user wants to use an application that needs to input a password, or wants to log in a website that needs to log in an account and a password, an access request for accessing the application or the website may be issued to the mobile phone.
In step S102, it is determined whether an authentication device bound to the terminal device is detected.
As an example, the authentication device may be a wearable device such as a smart bracelet, smart glasses, smart necklace, smart brooch, smart ring, or the like. These authentication devices can establish communication with terminal devices such as mobile phones through some wireless communication methods, such as infrared, bluetooth, NFC (near field communication technology), and the like.
The authentication device needs to be bound with the terminal device in advance to represent the identity of a legal user.
In step S103, if an authentication device bound to the terminal device is detected, the object is accessed using the recorded security authentication information.
As an example, the secure authentication information may include account information and/or password information. Still taking the scenario mentioned in the above step as an example, when the user accesses the application or the website again, the user is authenticated through the authentication device such as the bracelet worn by the user, and if the previously bound authentication device can be detected, it can be determined that the current user is a valid user, and the authentication is passed, and the user can use the account number, the password, and the like stored in advance or recorded in advance to perform automatic filling, so that automatic security authentication is realized, and the application or the website is accessed smoothly.
The embodiment is not limited to how the security authentication information is recorded in the terminal device in advance. For example, as shown in fig. 2, in this embodiment or some other embodiments of the present disclosure, the method may further include:
in step S201, when the object is accessed for the first time, recording the input security authentication information; or, according to the received setting instruction, recording the set security authentication information.
For example, when a user uses an application or logs in a website for the first time, the user manually inputs security authentication information such as an account number and a password, and meanwhile, the mobile phone records the account number and the password and establishes a corresponding relationship with the application or the website. Of course, the user may also directly preset an account, a password, etc. corresponding to the application or the website on the mobile phone.
Referring to fig. 3, in this embodiment or some other embodiments of the present disclosure, the method may further include the following preprocessing steps:
in step S301, a binding instruction for binding with the authentication device is received.
In step S302, according to the binding instruction, identity verification information is sent to the identity verification device. To complete binding with the authentication device.
Before the steps shown in fig. 1, the terminal device needs to establish a binding relationship with the authentication device. The user can search the own identity authentication device on the mobile phone, send out a binding instruction, and then the mobile phone sends identity authentication information to the identity authentication device so as to complete the binding with the identity authentication device.
As an example, as shown in fig. 4, a user sends a binding request containing authentication information to a smart band 402 worn by the user through a mobile phone 401, and the smart band feeds back a message that the binding is successful after receiving and storing the authentication information.
In addition, in some other scenes, the authentication device bound to the mobile phone may be a device other than a smart band. For example, as shown in fig. 5, the user binds the smart glasses 502 worn by the user with the mobile phone 501, and as shown in fig. 6, the user binds the smart necklace 602 worn by the user with the mobile phone 601.
In this embodiment or some other embodiments of the present disclosure, the authentication information may include a key, where the key is used to be stored in the authentication device and encrypt data sent by the authentication device to the terminal device.
Therefore, after the identity authentication equipment is detected each time, the data sent by the identity authentication equipment can be verified according to the secret key, so that authenticity is identified, and counterfeit identity authentication equipment is avoided.
Referring to fig. 7, the determining whether the authentication device bound to the terminal device is detected may include:
in step S701, it is determined whether the authentication device is scanned within a specified distance;
in step S702, if the authentication device is scanned, sending dynamic information to the authentication device;
in step S703, receiving the dynamic information encrypted by the key and returned by the authentication device;
in step S704, the dynamic information encrypted by the key is verified, and if the verification is passed, it is determined that an authentication device bound to the terminal device is detected.
In order to ensure security and prevent counterfeit authentication devices, the detected distance may be specified, for example, to be within 10cm, that is, the authentication device is valid when the authentication device is within 10cm of the terminal device. The dynamic information may be a random number, or the current time, etc.
In this embodiment, the security authentication information is recorded in the terminal device in advance. For example, when a user uses an application or logs in a website for the first time, the user can manually input security authentication information such as an account number and a password, and at the moment, the mobile phone can record the account number and the password and establish a corresponding relationship with the application or the website; or, the security authentication information can be preset directly on the terminal device according to the instruction of the user. Then, when the user visits the application or the website again, the user is authenticated through authentication equipment such as a bracelet worn by the user, if the authentication is passed, the user can use the account number, the password and the like recorded before to automatically fill, and automatic safety authentication is realized. Through the novel safety authentication scheme, the user does not need to carry out manual input, the efficiency is improved, and meanwhile, the identity of the user is protected by the identity verification equipment, so that the safety is ensured.
The disclosed aspects are further described below in conjunction with the specific scenarios.
Fig. 8 is a flow diagram illustrating a method of secure authentication in accordance with an example embodiment.
In step S801, the user scans his/her smart bracelet through the mobile phone and issues a binding instruction.
In step S802, the mobile phone is bound to the smart band.
In step S803, at a certain time, the user accesses a certain website on the mobile phone for the first time, and the mobile phone records the account and the password that are input when the user logs in the website.
For example, as shown in fig. 9, in the scenario shown in fig. 9, the user accesses a website for the first time through the mobile phone, and manually inputs an account and a password, and the mobile phone records the account and the password.
In step S804, at another time, the user accesses the website again, and the mobile phone determines whether the previously bound smart band is detected. If detected, the process proceeds to step S805, and if not, the process proceeds to step S807.
In step S805, the mobile phone calls out the account and the password corresponding to the website recorded previously, and performs automatic filling.
See fig. 10 for an example. In the scenario shown in fig. 10, the user accesses the website again through the mobile phone, the mobile phone authenticates the user through the smart band worn by the user, and then the account and the password are automatically filled. As shown in fig. 11, after the mobile phone 1101 detects the bound smart band 1102, it automatically fills the account and the password, and then waits for the user to determine.
In step S806, the user clicks on the determination, and logs in to the website. The flow ends.
In step S807, the user is prompted to manually input an account and a password, or the user is prompted to not detect a previously bound authentication device. The flow ends.
In this embodiment, the security authentication information is recorded in the terminal device in advance. For example, when a user uses an application or logs in a website for the first time, the user can manually input security authentication information such as an account number and a password, and at the moment, the mobile phone can record the account number and the password and establish a corresponding relationship with the application or the website; or, the security authentication information can be preset directly on the terminal device according to the instruction of the user. Then, when the user visits the application or the website again, the user is authenticated through authentication equipment such as a bracelet worn by the user, if the authentication is passed, the user can use the account number, the password and the like recorded before to automatically fill, and automatic safety authentication is realized. Through the novel safety authentication scheme, the user does not need to carry out manual input, the efficiency is improved, and meanwhile, the identity of the user is protected by the identity verification equipment, so that the safety is ensured.
Fig. 12 is a block diagram illustrating a security authentication apparatus, which may be used for a terminal device, according to an exemplary embodiment, and referring to fig. 12, the apparatus may include:
an access request receiving module 1201, configured to receive an access request for an object requiring security authentication;
an identity recognition module 1202, configured to determine whether an identity verification device bound to the terminal device is detected, and if an identity verification device bound to the terminal device is detected, trigger an automatic access module;
an automatic access module 1203 is configured to access the object by using the recorded security authentication information.
Referring to fig. 13, in this embodiment or some other embodiments of the present disclosure, the apparatus may further include:
a security authentication information recording module 1204, configured to: when the object is accessed for the first time, the input safety authentication information is recorded, or the set safety authentication information is recorded according to the received setting instruction.
Referring to fig. 14, in this embodiment or some other embodiments of the present disclosure, the apparatus may further include:
a binding module 1205, configured to receive a binding instruction for binding with the identity verification device, and send identity verification information to the identity verification device according to the binding instruction.
In this embodiment or some other embodiments of the present disclosure, the authentication information includes a key, and the key is used to be stored in the authentication device and encrypt data sent by the authentication device to the terminal device.
Referring to fig. 15, in this embodiment or some other embodiments of the present disclosure, the identity module 1202 may include:
the identity authentication device scanning submodule 12021 is configured to determine whether the identity authentication device is scanned within a specified distance, and if the identity authentication device is scanned, trigger the dynamic information sending submodule;
a dynamic information sending submodule 12022, configured to send dynamic information to the authentication device;
a dynamic information receiving submodule 12023, configured to receive the dynamic information encrypted by the key and returned by the authentication device;
a dynamic information verification sub-module 12024, configured to verify the dynamic information encrypted by the key, and if the verification passes, determine that an authentication device bound to the terminal device is detected, and trigger an automatic access module.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
In this embodiment, the security authentication information is recorded in the terminal device in advance. For example, when a user uses an application or logs in a website for the first time, the user can manually input security authentication information such as an account number and a password, and at the moment, the mobile phone can record the account number and the password and establish a corresponding relationship with the application or the website; or, the security authentication information can be preset directly on the terminal device according to the instruction of the user. Then, when the user visits the application or the website again, the user is authenticated through authentication equipment such as a bracelet worn by the user, if the authentication is passed, the user can use the account number, the password and the like recorded before to automatically fill, and automatic safety authentication is realized. Through the novel safety authentication scheme, the user does not need to carry out manual input, the efficiency is improved, and meanwhile, the identity of the user is protected by the identity verification equipment, so that the safety is ensured.
Fig. 16 is a block diagram illustrating an apparatus for secure authentication in accordance with an example embodiment. For example, the apparatus 2800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and so forth.
Referring to fig. 16, apparatus 2800 may include one or more of the following components: processing component 2802, memory 2804, power component 2806, multimedia component 2808, audio component 2810, interface for input/output (I/O) 2812, sensor component 2814, and communications component 2816.
The processing component 2802 generally controls overall operation of the apparatus 2800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 2802 may include one or more processors 2820 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 2802 can include one or more modules that facilitate interaction between the processing component 2802 and other components. For example, the processing component 2802 can include a multimedia module to facilitate interaction between the multimedia component 2808 and the processing component 2802.
The memory 2804 is configured to store various types of data to support operation at the device 2800. Examples of such data include instructions for any application or method operating on device 2800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 2804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power supply components 2806 provide power to the various components of device 2800. The power components 2806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the apparatus 2800.
The multimedia component 2808 includes a screen that provides an output interface between the device 2800 and the user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 2808 includes a front facing camera and/or a rear facing camera. The front-facing camera and/or the back-facing camera may receive external multimedia data when the device 2800 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 2810 is configured to output and/or input audio signals. For example, audio component 2810 includes a Microphone (MIC) configured to receive external audio signals when apparatus 2800 is in operating modes, such as a call mode, a record mode, and a voice recognition mode. The received audio signals may further be stored in memory 2804 or transmitted via communications component 2816. In some embodiments, the audio component 2810 also includes a speaker for outputting audio signals.
I/O interface 2812 provides an interface between processing component 2802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
Sensor assembly 2814 includes one or more sensors for providing various aspects of state assessment for apparatus 2800. For example, sensor assembly 2814 may detect an open/closed state of device 2800, the relative positioning of components, such as a display and keypad of apparatus 2800, sensor assembly 2814 may also detect a change in position of apparatus 2800 or a component of apparatus 2800, the presence or absence of user contact with apparatus 2800, orientation or acceleration/deceleration of apparatus 2800, and a change in temperature of apparatus 2800. Sensor assembly 2814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 2814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 2814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 2816 is configured to facilitate communications between the apparatus 2800 and other devices in a wired or wireless manner. The apparatus 2800 may access a wireless network based on a communication standard, such as WiFi, 2G, or 3G, or a combination thereof. In an exemplary embodiment, the communication component 2816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communications component 2816 also includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an example embodiment, the apparatus 2800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors, or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as memory 2804 comprising instructions, executable by processor 2820 of apparatus 2800 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.
Claims (11)
1. A security authentication method, for a terminal device, the method comprising:
receiving an access request for an object requiring secure authentication;
judging whether the identity authentication equipment bound with the terminal equipment is detected;
and if the identity verification device bound with the terminal device is detected, accessing the object by using the recorded safety authentication information.
2. The method of claim 1, further comprising:
recording the input security authentication information when the object is accessed for the first time; or,
and recording the set safety authentication information according to the received setting instruction.
3. The method of claim 1, further comprising:
receiving a binding instruction bound with the identity verification equipment;
and sending authentication information to the authentication equipment according to the binding instruction.
4. The method of claim 3, wherein the authentication information comprises a key for storing on the authentication device for encrypting data sent by the authentication device to the terminal device.
5. The method of claim 4, wherein the determining whether the authentication device bound to the terminal device is detected comprises:
judging whether the identity authentication equipment is scanned within a specified distance;
if the identity authentication equipment is scanned, sending dynamic information to the identity authentication equipment;
receiving the dynamic information which is returned by the identity authentication equipment and encrypted by the secret key;
and verifying the dynamic information encrypted by the secret key, and if the dynamic information is verified, determining that the identity verification equipment bound with the terminal equipment is detected.
6. A security authentication apparatus, for a terminal device, the apparatus comprising:
the access request receiving module is used for receiving an access request aiming at an object needing security authentication;
the identity identification module is used for judging whether the identity authentication equipment bound with the terminal equipment is detected or not, and if the identity authentication equipment bound with the terminal equipment is detected, the automatic access module is triggered;
and the automatic access module is used for accessing the object by utilizing the recorded safety authentication information.
7. The apparatus of claim 6, further comprising:
a security authentication information recording module for: when the object is accessed for the first time, the input safety authentication information is recorded, or the set safety authentication information is recorded according to the received setting instruction.
8. The apparatus of claim 6, further comprising:
and the binding module is used for receiving a binding instruction bound with the identity verification equipment and sending identity verification information to the identity verification equipment according to the binding instruction.
9. The apparatus of claim 8, wherein the authentication information comprises a key for storing on the authentication device for encrypting data sent by the authentication device to the terminal device.
10. The apparatus of claim 9, wherein the identification module comprises:
the identity authentication equipment scanning submodule is used for judging whether the identity authentication equipment is scanned within a specified distance, and if the identity authentication equipment is scanned, the dynamic information sending submodule is triggered;
the dynamic information sending submodule is used for sending dynamic information to the identity authentication equipment;
the dynamic information receiving submodule is used for receiving the dynamic information which is returned by the identity authentication equipment and encrypted by the secret key;
and the dynamic information verification sub-module is used for verifying the dynamic information encrypted by the secret key, and if the dynamic information passes the verification, the dynamic information verification sub-module determines that the identity verification equipment bound with the terminal equipment is detected and triggers the automatic access module.
11. A security authentication apparatus, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
receiving an access request for an object requiring secure authentication;
judging whether the identity authentication equipment bound with the terminal equipment is detected;
and if the identity verification device bound with the terminal device is detected, accessing the object by using the recorded safety authentication information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410666047.1A CN105681261A (en) | 2014-11-19 | 2014-11-19 | Security authentication method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410666047.1A CN105681261A (en) | 2014-11-19 | 2014-11-19 | Security authentication method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105681261A true CN105681261A (en) | 2016-06-15 |
Family
ID=56957188
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410666047.1A Pending CN105681261A (en) | 2014-11-19 | 2014-11-19 | Security authentication method and apparatus |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105681261A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106028332A (en) * | 2016-07-12 | 2016-10-12 | 北京小米移动软件有限公司 | Security authentication method and device |
CN107592288A (en) * | 2016-07-08 | 2018-01-16 | 中国电信股份有限公司 | For the method for multiple terminals quick registration website, intelligent gateway and system |
CN108985039A (en) * | 2018-07-23 | 2018-12-11 | 北京小米移动软件有限公司 | Identity identifying method, device, terminal device and server-side |
CN109660348A (en) * | 2018-12-03 | 2019-04-19 | 东华大学 | A kind of cryptographic system |
CN110290526A (en) * | 2019-06-26 | 2019-09-27 | 北京小米移动软件有限公司 | A kind of data access method, device and medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060026669A1 (en) * | 2004-07-29 | 2006-02-02 | Zakas Phillip H | System and method of characterizing and managing electronic traffic |
CN101197710A (en) * | 2007-12-10 | 2008-06-11 | 华为技术有限公司 | Intelligent terminal and user maintenance method |
CN102802156A (en) * | 2012-08-31 | 2012-11-28 | 珠海市魅族科技有限公司 | Authentication method and relevant device |
CN102833074A (en) * | 2012-08-31 | 2012-12-19 | 珠海市魅族科技有限公司 | Authentication method and related equipment |
CN103888265A (en) * | 2014-04-11 | 2014-06-25 | 上海博路信息技术有限公司 | Login system and method based on mobile terminal |
CN103905401A (en) * | 2012-12-27 | 2014-07-02 | 中国移动通信集团公司 | Identity authentication method and device |
US20140282978A1 (en) * | 2013-03-15 | 2014-09-18 | Sergio Demian LERNER | Method and apparatus for secure interaction with a computer service provider |
CN104158666A (en) * | 2014-08-28 | 2014-11-19 | 电子科技大学 | Method of implementing binding and authentication of intelligent bracelet and intelligent mobile terminal |
-
2014
- 2014-11-19 CN CN201410666047.1A patent/CN105681261A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060026669A1 (en) * | 2004-07-29 | 2006-02-02 | Zakas Phillip H | System and method of characterizing and managing electronic traffic |
CN101197710A (en) * | 2007-12-10 | 2008-06-11 | 华为技术有限公司 | Intelligent terminal and user maintenance method |
CN102802156A (en) * | 2012-08-31 | 2012-11-28 | 珠海市魅族科技有限公司 | Authentication method and relevant device |
CN102833074A (en) * | 2012-08-31 | 2012-12-19 | 珠海市魅族科技有限公司 | Authentication method and related equipment |
CN103905401A (en) * | 2012-12-27 | 2014-07-02 | 中国移动通信集团公司 | Identity authentication method and device |
US20140282978A1 (en) * | 2013-03-15 | 2014-09-18 | Sergio Demian LERNER | Method and apparatus for secure interaction with a computer service provider |
CN103888265A (en) * | 2014-04-11 | 2014-06-25 | 上海博路信息技术有限公司 | Login system and method based on mobile terminal |
CN104158666A (en) * | 2014-08-28 | 2014-11-19 | 电子科技大学 | Method of implementing binding and authentication of intelligent bracelet and intelligent mobile terminal |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107592288A (en) * | 2016-07-08 | 2018-01-16 | 中国电信股份有限公司 | For the method for multiple terminals quick registration website, intelligent gateway and system |
CN107592288B (en) * | 2016-07-08 | 2020-10-09 | 中国电信股份有限公司 | Method, intelligent gateway and system for multi-terminal fast login of website |
CN106028332A (en) * | 2016-07-12 | 2016-10-12 | 北京小米移动软件有限公司 | Security authentication method and device |
CN108985039A (en) * | 2018-07-23 | 2018-12-11 | 北京小米移动软件有限公司 | Identity identifying method, device, terminal device and server-side |
CN109660348A (en) * | 2018-12-03 | 2019-04-19 | 东华大学 | A kind of cryptographic system |
CN110290526A (en) * | 2019-06-26 | 2019-09-27 | 北京小米移动软件有限公司 | A kind of data access method, device and medium |
CN110290526B (en) * | 2019-06-26 | 2023-10-24 | 北京小米移动软件有限公司 | Data access method, device and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3001640B1 (en) | Secure information exchange methods and wearable device | |
CN104869612B (en) | Access the method and device of network | |
CN106453052B (en) | Message interaction method and device | |
CN104933351B (en) | The treating method and apparatus of information security | |
CN105656948A (en) | Account login method and device | |
CN109146470B (en) | Method and device for generating payment code | |
US10313870B2 (en) | Identity verification method and apparatus, and storage medium | |
CN105847243B (en) | Method and device for accessing intelligent camera | |
CN106210238B (en) | Short message storage method and device | |
CN105491250B (en) | Recognition methods, device and the equipment of the incoming number true and false | |
CN104715337A (en) | Attendance method, and attendance management method and device | |
CN104376273A (en) | Data access control method and device | |
CN109039860B (en) | Method and device for sending and displaying message and method and device for identity authentication | |
US20180341953A1 (en) | Method and apparatus for reporting loss of card or device associated with account number or stolen of account number | |
CN110049062B (en) | Verification code verification method, device, system, server, electronic equipment and storage medium | |
US20160294805A1 (en) | Method and terminal device for accessing network | |
US9667784B2 (en) | Methods and devices for providing information in voice service | |
TW202101392A (en) | Access control method and device, electronic device and storage medium | |
CN105681261A (en) | Security authentication method and apparatus | |
CN106302528B (en) | Short message processing method and device | |
CN111917728A (en) | Password verification method and device | |
CN105046127A (en) | Encryption and decryption method and apparatus | |
CN104331672A (en) | Method and device for performing confidential treatment on pictures upon bracelet | |
CN106372943A (en) | Message processing method and device | |
CN106611112A (en) | Application program safe processing method, device and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160615 |
|
RJ01 | Rejection of invention patent application after publication |