[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN102664903A - Network user identifying method and system - Google Patents

Network user identifying method and system Download PDF

Info

Publication number
CN102664903A
CN102664903A CN2012101513316A CN201210151331A CN102664903A CN 102664903 A CN102664903 A CN 102664903A CN 2012101513316 A CN2012101513316 A CN 2012101513316A CN 201210151331 A CN201210151331 A CN 201210151331A CN 102664903 A CN102664903 A CN 102664903A
Authority
CN
China
Prior art keywords
user
access end
information
server
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101513316A
Other languages
Chinese (zh)
Inventor
李明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2012101513316A priority Critical patent/CN102664903A/en
Publication of CN102664903A publication Critical patent/CN102664903A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Small-Scale Networks (AREA)

Abstract

The invention discloses a network user identifying method and system, which belong to the technical field of information safety. The system comprises an access terminal, a network server, a user identifying program and a user database, wherein the user identifying program is installed in a network server end. The method comprises the following steps: when the access terminal accesses the network server, the user identifying program compares relevant user information submitted by using access terminal input equipment of the access terminal with user information stored in the user database for identifying, acquires the identification information of network connecting equipment which is directly connected with the access terminal at present, and compares with relevant identification information of the network connecting equipment which is directly connected with the access terminal acquired by using the server during previous submission of user registration information by an access terminal stored in the user database for identifying; and the user identifying program performs corresponding preset operation on a data operation permission which can be acquired by the access terminal according to an identification result of the user registration information and an identification result of the identification information of the network connecting equipment which is directly connected with the access terminal. Due to the adoption of the system and the method, a user identifying interface is not displayed, input of secondary identifying information is hidden, a server user identifying program background is used for identifying input identifying information, and different user permissions are open to the user according to identification results.

Description

A kind of network user authentication method and system
Technical field:
The present invention relates to field of information security technology, particularly a kind of network user authentication method and system.
Background technology:
Development along with Internet technology; The dependency network that People more and more is many carries out the application of various commercial affairs and amusement; The thing followed is the generation of various information leakage incidents; Existing network user authentication method mainly is to provide user password information by server identification end user identity by access end, but hackers can use the various technology of stealing secret information to obtain user's account number cipher, the life thereby the event frequency that makes the fake user identity be engaged in various information swindle and data theft takes place frequently; How taking precautions against the generation of this type security incident, is a letter problem to be solved.
Patent " verifying E-mail password the system and method " (patent No.: once announced a kind of two-pass cipher verification method that is used for mailbox 200810301774.0);, the user can also obtain more access rights after importing proper password to get into the interface for the first time at checking interface input two-pass cipher; But in any case; All need under explicit user is verified the prerequisite at interface, input password, this is easy to let the people discover more users authority and the data of hiding in addition, and its fail safe is reduced greatly.
Summary of the invention:
In view of this; Main purpose of the present invention is to provide a kind of more effectively network user authentication system and method; Except that using traditional user cipher verification method; The identification information that connects the network equipment according to the current online institute of user in addition is as confirming whether the user logins at home, even the user account password is stolen, but since the person of stealing secret information when using the account number login present position not the user before the home of setting do not land; Also can't obtain user's private data and the operation that obtains higher authority; The user can also be after non-home uses the log-on message login, does not hide input re-authentication information under the situation of explicit user checking frame in user interface once more, obtains higher user right.Thereby better protect the data of user on the webserver more easily.
For achieving the above object, technical scheme of the present invention is achieved in that and the invention provides a kind of new network user authentication method and system, comprises access end, and the webserver is installed in user au-thentication procedure, the customer data base of network server end; During the access end access web server; User au-thentication procedure stored user information in the pertinent user information of access end being used the access end input equipment submit to and customer data base compares the checking; User au-thentication procedure obtains the identification information of the direct-connected network access device of the current institute of access end, when before having submitted user's registration information with the access end of storing in the customer data base this access end of server acquisition the correlated identities information of direct-connected network access device compare checking; User au-thentication procedure according to the checking result of user's registration information and access end the checking result of identification information of direct-connected network access device, the obtainable data manipulation authority of access end is carried out corresponding predetermined registration operation.
In the such scheme; The user's registration information that user au-thentication procedure checking discovery access end is submitted is consistent with the corresponding user information in the customer data base; But access end current when the corresponding previously stored identification information of access end user is inconsistent in identification information and the server end customer data base of the direct-connected network equipment; Server thinks that the user lands in non-appointed place, and server allows the user to land but before set open portion access end user right and addressable data according to the user; User's registration information and the corresponding user information in the customer data base that user au-thentication procedure checking discovery access end is submitted are inconsistent; But access end current when the consistent and user au-thentication procedure checking of the corresponding previously stored identification information of access end user finds that user's registration information that access end submits and the current identification information that is connected the network equipment and the corresponding informance in the customer data base are all inconsistent in identification information and the server end customer data base of the direct-connected network equipment, server is refused this access end user and is logined; User au-thentication procedure checking finds that user's registration information that access end submits and current identification information that is connected the network equipment and the corresponding informance in the customer data base are equal when consistent; Server think the access end user in the appointed place sign-on access server, server is according to the open more users data manipulation of previous setting authority.
In the such scheme; The access end user is using right user log-on message logon server but access end currently connects that the network equipment identification information of storing in network equipment identification information and the user data is inconsistent, server is during to access end user open portion authority and addressable data; Access end user hidden input secondary authorization information and authorization information is delivered to the server user authentication program on the user interface that signs in to server; The secondary authorization information that is stored in the customer data base when by the server user authentication program secondary authorization information submitted and user being registered compares; If both are consistent, server had before been set open more users end authority and addressable data according to the access end user; Access end is using the right user log-on message and current to be connected network access device identification information that network equipment identification information and server user's database stored equal when consistent; Also can verify, obtain the more users operating right through submitting server end user accreditation process in the hidden input secondary of the user interface that signs in to server authorization information.
In the such scheme; The listed server user of access end secondary subscriber authentication window do not occur on the interface; User au-thentication procedure background monitoring access end user calls the secondary authorization information of access end input equipment input at listed server user interface; The secondary authorization information of access end input is for hiding input, and the user interface at access end and server end does not manifest.
In the such scheme; Access end is submitted the right user log-on message but the current identification information that connects network equipment identification information and server stores logon server when inconsistent; And when the secondary authorization information that the user interface input is hidden, the secondary authorization information of input error reaches preset times continuously, even import correct secondary authorization information once more; Server end automatically locks the respective user authority; The user reuses right user log-on message and network identification information logon server, and uses correct secondary authorization information login, and server is removed the user right locking.
In the such scheme, user au-thentication procedure is directly obtained the correlated identities information of the current institute of access end direct interconnection network equipment when access end uses the web technology to connect server through weblication; User au-thentication procedure obtains the correlated identities information of the current institute of access end direct interconnection network equipment through the client-side program that is installed in access end; The server requirement access end obtains the correlated identities information of the current institute of access end direct interconnection network equipment from server end downloading-running custom plug-in program.
In the such scheme, said server end customer data base is made up of one or several isolated user database; When forming by a plurality of customer data bases; Respective user log-on message, user are current respectively connects the identification information proving program of the network equipment, the storage of user's secondary authorization information for each customer data base, and user au-thentication procedure will pass to correspondence database and verify respectively from the relevant information that client obtains.
In the such scheme; During the access end access server; User au-thentication procedure obtain access end current the direct-connected network equipment identification information and be stored in customer data base in network equipment identification information to compare the result consistent; And when server was authorisation device through access end equipment mark information approval access end equipment, access end can be imported user's registration information and directly sign in to server according to the preset relative users operating right that obtains.
In the such scheme, the direct-connected network equipment of said access end comprises hub, switch, router, wireless router, wireless base station; The identification information of the direct-connected network equipment that is obtained include on spider lines devices exchange machine, hub, the router the mac address of the corresponding access end network port; The ip address of cable network equipment, device name information; The mac address of wireless router, IP address, SSID information, the base station location coordinate of wireless base station, base station type, base station title, base station model, mac address, base station, base station network information, base station LAC, base station CellID information; The input equipment of said access end comprises keyboard, mouse, touch-screen, microphone, human body biological characteristics identification sensor, the camera equipment on the access end; User's registration information of being inputed and secondary authorization information comprise safety verification information such as user name password, mouse action, touch-screen gesture; Also comprise human body biological characteristics information such as fingerprint, iris, voice, vein blood vessel, recognition of face, also comprise the authentication information that security token, security hardware, wireless identity identification card, pair wireless devices are sent; Said access end comprises the computer terminal that needs subscriber authentication, portable terminal, smart mobile phone, notebook computer, panel computer, palmtop PC, mp3, the portable digital equipment of mp4 class.
In the such scheme, this system can be used for using B/S, and the C/S framework need carry out the network platform of authenticating user identification; Embed existing software platform operation as middleware program; Be used for network payment system, financial office system, network instant communication class software, network mailbox, the user rs authentication of types of applications softwares such as cloud storage, cloud computing, fail-safe software.
Description of drawings:
Fig. 1 is the sketch map of the network user authentication method and system of the embodiment of the invention,
Fig. 2 is after server has judged that access end equipment is legitimate device, direct login process figure when network identification information is consistent.
Embodiment:
To combine the accompanying drawing in the embodiment of the invention below, the technical scheme in the embodiment of the invention is carried out clear, complete description, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on embodiments of the invention, this area ordinary person is not making all other embodiment that obtained under the creative work prerequisite, all belongs to the scope of the present invention's protection.
Fig. 1 is the sketch map of the network user authentication method and system of the embodiment of the invention, and is as shown in Figure 1, and this method comprises:
Step 101: access end is connected to server end through network.
Step 102: access end is submitted to server end with information of registered users
Step 103: server end is passed to user au-thentication procedure with access end user profile.
Step 104: user au-thentication procedure compares the respective user log-on message in access end user's registration information of submitting and the customer data base that stores user's registration information in advance; Consistent with each other like user's registration information; Change step 106 over to; If user profile that access end is submitted and the respective user log-on message in the customer data base are inconsistent; Change step 105 over to, stored user's registration information is at access end first during Connection Service device registered user in the customer data base, the log-on message of being submitted; When can being access end registrar user, uses user's registration information the keyboard equipment of access end or user name encrypted message or certain type of user biological characteristic information of submitting to by the biology sensor of access end.
Step 105: user au-thentication procedure disable access end game server.
Step 106: user au-thentication procedure from access end obtain access end current the identification information of the direct-connected network equipment; And change step 107 over to; Access end the identification information of the direct-connected network equipment can be the mac address information of the port of the corresponding connected reference end of certain network access device equipment; Also can be the identification informations such as mac address or SSID of the wireless router that connects of access end equipment wireless, the current direct-connected network equipment identification information of custom plug-in program acquisition access end of the server end that user au-thentication procedure can be directly downloaded through web routine call relative program parameter or the client-side program through operating in access end or access end.
Step 107: the current institute direct interconnection network equipment mark information that user au-thentication procedure is submitted access end compares with the identification information that is stored in access end user in the customer data base direct-connected network equipment of access end at that time that user au-thentication procedure is obtained when registering in advance; Consistent with each other like network identification information; Change step 108 over to; If network equipment identification information that access end is submitted and the map network equipment identification information in the customer data base are inconsistent, change step 109 over to.
Step 108: it is all consistent to connect network equipment identification information owing to user's registration information and access end are current; Server is thought the user in the home login of setting, and server allows the user login services device and opens the more users access rights according to being redefined for access end.
Step 109: because user's registration information is consistent; But it is inconsistent that access end connects network equipment identification information; Server thinks that the user logins at the home of non-setting, allows the user login services device, but only according to being redefined for access end open portion access privilege.
Step 110: if access end is in the legal login of non-setting home; When hoping to obtain the more users access rights; Access end uses the input equipment of access end on the server user interface of login, do not occur in user interface hiding input re-authentication information under the situation of safety verification window.
Step 111: user au-thentication procedure monitoring access end judges according to preset whether the information of access end input at the interface is the re-authentication information type in the relevant information of listed server user interface input; The re-authentication information type can be the cipher type re-authentication information that access end passes through the latent close input of user side keyboard, comprises that also mouse or the touch-screen of access end through access end hide the preset figure that draws as re-authentication information at the server interface ad-hoc location.Also comprise the human body biological characteristics information that various kinds of sensors is surveyed on the access end.
Step 112: user au-thentication procedure compares the re-authentication information of intercepting and capturing with corresponding authentication information in the customer data base that stores user's re-authentication information; If the re-authentication information of comparison is consistent; Change step 113 over to, the re-authentication information inconsistency like comparison changes 114 over to.
Step 113: server approval access end is complete validated user, is the open more users authority of access end.
Step 114: server still keeps the existing authority of user, but forbids for the open more users authority of access end, even access end is imported correct re-authentication information thereafter, server does not prompt for its open more authorities yet.
Step 115: access end is got back to home again during the Connection Service device; If the identification information of its user's registration information submitted to and the current network equipment that is connected is all consistent with the corresponding informance of server user's database storage, server unlocks and is the open more users authority of access end.
Fig. 2 is after server has judged that access end equipment is legitimate device, direct login process figure when network identification information is consistent.
Step 201: access end is connected to server end through network
Step 202: the unique identification information of service area through the judging access end for example information such as mac address or IP address of service end network card equipment judges whether the legal authenticating device into the service end approval; If the legitimate device of access end approval; Get into step 204; If access end equipment is not the legitimate device of service end approval, get into step 203.
Step 203: server disable access end device logs.
Step 204: user au-thentication procedure from access end obtain access end current the identification information of the direct-connected network equipment, and change step 205 over to,
Step 205: the current institute direct interconnection network equipment mark information that user au-thentication procedure is submitted access end compares with the identification information that is stored in access end user in the customer data base direct-connected network equipment of access end at that time that user au-thentication procedure is obtained when registering in advance; Consistent with each other like network identification information; Change step 207 over to; If network equipment identification information that access end is submitted and the map network equipment identification information in the customer data base are inconsistent, change step 206 over to.
Step 206: the identification information that connects network equipment identification information and server stores owing to access end is current is inconsistent, and server is thought the user not in the home login of setting, and server prompts access end input user's registration information is logined.
Step 207: access end is current, and to connect network equipment identification information consistent with the identification information of server stores; Server thinks that access end is legal authenticating device in home login and access end, does not need access end to provide the user profile can direct logon server and obtain the respective user authority.
It should be noted last that; Above embodiment is only unrestricted in order to technical scheme of the present invention to be described; Although invention is specified with reference to preferred embodiment; Those of ordinary skill in the art should be appreciated that and can change or be equal to replacement technical scheme of the present invention, and do not break away from the spirit and the category of technical scheme of the present invention.

Claims (10)

1. network user authentication method and system comprise access end, and the webserver is installed in user au-thentication procedure, the customer data base of network server end; During the access end access web server; The user's registration information that user au-thentication procedure is stored in associated user's log-on message that access end is used the access end input equipment submit to and customer data base compares the checking; User au-thentication procedure obtains the identification information of the direct-connected network access device of the current institute of access end, when before having submitted user's registration information with the access end of storing in the customer data base this access end of server acquisition the correlated identities information of direct-connected network access device compare checking; User au-thentication procedure according to the checking result of user's registration information and access end the checking result of identification information of direct-connected network access device, the obtainable data manipulation authority of access end is carried out corresponding predetermined registration operation.
2. network user authentication method and system according to claim 1; It is characterized in that; The user's registration information that user au-thentication procedure authentication-access end is submitted is consistent with the corresponding user information in the customer data base; But access end current when the corresponding previously stored identification information of access end user is inconsistent in identification information and the server end customer data base of the direct-connected network equipment; Server thinks that the user lands in non-appointed place, and server allows the user to land but before set open portion access end user right and addressable data according to the user; User's registration information and the corresponding user information in the customer data base that user au-thentication procedure checking discovery access end is submitted are inconsistent; But access end current when the consistent and user au-thentication procedure checking of the corresponding previously stored identification information of access end user finds that user's registration information that access end submits and the current identification information that is connected the network equipment and the corresponding informance in the customer data base are all inconsistent in identification information and the server end customer data base of the direct-connected network equipment, server is refused this access end user and is logined; User au-thentication procedure checking finds that user's registration information that access end submits and current identification information that is connected the network equipment and the corresponding informance in the customer data base are equal when consistent; Server think the access end user in the appointed place sign-on access server, server is according to the open more users data manipulation of previous setting authority.
3. network user authentication method and system according to claim 2; It is characterized in that; Access end is using right user log-on message logon server but access end currently connects that the network equipment identification information of storing in network equipment identification information and the user data is inconsistent, server is during to access end user open portion authority and addressable data; Access end hidden input secondary authorization information and authorization information is delivered to the server user authentication program on the user interface that signs in to server; The secondary authorization information that is stored in the customer data base when by the server user authentication program secondary authorization information submitted and user being registered compares; If both are consistent, server had before been set open more users end authority and addressable data according to access end; Access end is using the right user log-on message and current to be connected network access device identification information that network equipment identification information and server user's database stored equal when consistent; Also can verify, obtain the more users operating right through submitting server end user accreditation process in the hidden input secondary of the user interface that signs in to server authorization information.
4. network user authentication method and system according to claim 3; It is characterized in that; The listed server user of access end the secondary identity authentication window do not occur on the interface; User au-thentication procedure background monitoring access end user calls the secondary authorization information of access end input equipment input at listed server user interface, the secondary authorization information of access end input is for hiding input, and the user interface at access end and server end does not manifest.
5. network user authentication method and system according to claim 4; It is characterized in that access end is submitted the right user log-on message but the current identification information that connects network equipment identification information and server stores logon server when inconsistent, and when the secondary authorization information that the user interface input is hidden; The secondary authorization information of input error reaches preset times continuously; Even import correct secondary authorization information once more, server end automatically locks the respective user authority, and the user reuses right user log-on message and network identification information logon server; And using correct secondary authorization information login, server is removed the user right locking.
6. network user authentication method and system according to claim 1; It is characterized in that user au-thentication procedure is directly obtained the correlated identities information of the current institute of access end direct interconnection network equipment through weblication when access end uses the web technology to connect server; User au-thentication procedure obtains the correlated identities information of the current institute of access end direct interconnection network equipment through the client-side program that is installed in access end; The server requirement access end obtains the correlated identities information of the current institute of access end direct interconnection network equipment from server end downloading-running custom plug-in program.
7. network user authentication method and system according to claim 1 is characterized in that, said server end customer data base is made up of one or more isolated user database; When forming by a plurality of customer data bases; Respective user log-on message, user are current respectively connects the identification information proving program of the network equipment, the storage of user's secondary authorization information for each customer data base, and user au-thentication procedure will pass to correspondence database and verify respectively from the relevant information that client obtains; A user can corresponding one or more current identification informations that connect the network equipment.
8. network user authentication method and system according to claim 1; It is characterized in that; During the access end access server; User au-thentication procedure obtain access end current the direct-connected network equipment identification information and be stored in customer data base in network equipment identification information to compare the result consistent; And when server was authorisation device through access end equipment mark information approval access end equipment, access end need not be imported user's registration information and directly sign in to server according to the preset relative users authority that obtains.
9. network user authentication method and system according to claim 1 is characterized in that, the direct-connected network equipment of said access end comprises hub, switch, router, wireless router, wireless base station; The identification information of the direct-connected network equipment that is obtained include on spider lines devices exchange machine, hub, the router the mac address of the corresponding access end network port; The ip address of cable network equipment, device name information; The mac address of wireless router, IP address, SSID information, the base station location coordinate of wireless base station, base station type, base station title, base station model, mac address, base station, base station network information, base station LAC, base station CellID information; The input equipment of said access end comprises keyboard, mouse, touch-screen, microphone, human body biological characteristics identification sensor, the camera equipment on the access end; User's registration information of being inputed and secondary authorization information comprise safety verification information such as user name password, mouse action, touch-screen gesture; Also comprise human body biological characteristics information such as fingerprint, iris, voice, vein blood vessel, recognition of face, also comprise the authentication information that security token, security hardware, wireless identity identification card, pair wireless devices are sent; Said access end comprises the computer terminal that needs subscriber authentication, portable terminal, smart mobile phone, notebook computer, panel computer, palmtop PC, mp3, the portable digital equipment of mp4 class.
10. network user authentication method and system according to claim 1 is characterized in that this system can be used for using B/S, and the C/S framework need carry out the network platform of authenticating user identification; Embed existing software platform operation as middleware program; Be used for network payment system, financial office system, network instant communication class software, network mailbox, secured user's checking of types of applications softwares such as cloud storage, cloud computing, fail-safe software.
CN2012101513316A 2012-05-16 2012-05-16 Network user identifying method and system Pending CN102664903A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012101513316A CN102664903A (en) 2012-05-16 2012-05-16 Network user identifying method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012101513316A CN102664903A (en) 2012-05-16 2012-05-16 Network user identifying method and system

Publications (1)

Publication Number Publication Date
CN102664903A true CN102664903A (en) 2012-09-12

Family

ID=46774313

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012101513316A Pending CN102664903A (en) 2012-05-16 2012-05-16 Network user identifying method and system

Country Status (1)

Country Link
CN (1) CN102664903A (en)

Cited By (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102821112A (en) * 2012-09-14 2012-12-12 深圳中兴网信科技有限公司 Mobile equipment, server and mobile equipment data verification method
CN102905260A (en) * 2012-09-18 2013-01-30 北京天威诚信电子商务服务有限公司 Safety and certification system for data transmission of mobile terminal
CN103268549A (en) * 2013-04-24 2013-08-28 徐明亮 Mobile payment verification system based on facial features
CN103297235A (en) * 2013-05-08 2013-09-11 无锡北邮感知技术产业研究院有限公司 Method and server for identification in batches based on biological characteristics
CN103685231A (en) * 2013-11-06 2014-03-26 百度在线网络技术(北京)有限公司 Position-based operation verification method, server, and client
WO2014044052A1 (en) * 2012-09-21 2014-03-27 华为技术有限公司 Validation processing method, user equipment, and server
CN103731413A (en) * 2013-11-18 2014-04-16 广州多益网络科技有限公司 Abnormal login handling method
CN103825886A (en) * 2014-02-14 2014-05-28 昆山中创软件工程有限责任公司 Cloud data security access method and device
CN103841107A (en) * 2014-03-11 2014-06-04 网神信息技术(北京)股份有限公司 Method and device for identity authentication of security gateway administrator
CN103841105A (en) * 2014-03-04 2014-06-04 上海地慧光电科技有限公司 Network user verification and authorization system
CN103856556A (en) * 2012-11-30 2014-06-11 联想(新加坡)私人有限公司 Cloud-based application account management
CN104023008A (en) * 2014-05-16 2014-09-03 小米科技有限责任公司 Method and device for downloading and starting tool kit
CN104123506A (en) * 2013-04-28 2014-10-29 北京壹人壹本信息科技有限公司 Data access method and device and data encryption storage and access method and device
CN104320389A (en) * 2014-10-11 2015-01-28 南京邮电大学 Fusion identify protection system and fusion identify protection method based on cloud computing
CN104320391A (en) * 2014-10-22 2015-01-28 南京绿云信息技术有限公司 Cloud authentication method and system
CN104333538A (en) * 2014-10-22 2015-02-04 杭州盈高科技有限公司 Network device access method
CN104423938A (en) * 2013-08-26 2015-03-18 联想(北京)有限公司 Information processing method and electronic device
CN104573437A (en) * 2013-10-23 2015-04-29 深圳市腾讯计算机系统有限公司 Information authentication method, device and terminal
CN104580102A (en) * 2013-10-23 2015-04-29 北大方正集团有限公司 Protecting method of client procedure and service platform
CN104765998A (en) * 2015-04-16 2015-07-08 国家电网公司 User identity reliably-verifying system based on face identification and using method thereof
CN104794608A (en) * 2015-05-07 2015-07-22 苏州首旗信息科技有限公司 Terminal office system software
CN104834678A (en) * 2015-04-10 2015-08-12 深圳市创梦天地科技有限公司 Method for positioning according to information and server
CN104883293A (en) * 2015-04-30 2015-09-02 广东欧珀移动通信有限公司 Message interaction method, relevant apparatus and communication system
CN104917848A (en) * 2015-07-03 2015-09-16 成都怡云科技有限公司 Smart cloud platform for enterprises based on enterprise management and service
CN104967553A (en) * 2015-04-30 2015-10-07 广东欧珀移动通信有限公司 Message interaction method, related device and communication system
CN104994490A (en) * 2015-06-30 2015-10-21 北京奇虎科技有限公司 Method of operating database for mobile terminal to access network, and database
CN105046484A (en) * 2015-06-25 2015-11-11 广东欧珀移动通信有限公司 Mobile payment method and system and mobile terminal
CN105141642A (en) * 2015-10-23 2015-12-09 北京京东尚科信息技术有限公司 Method of preventing illegal user behavior and device
CN105162757A (en) * 2015-07-03 2015-12-16 成都怡云科技有限公司 External network log-in method for multi-authentication government virtual office platform
CN105184606A (en) * 2015-08-25 2015-12-23 山东开创集团有限公司 Method for carrying out data communication between sub systems of distribution system and server
CN105225328A (en) * 2015-08-25 2016-01-06 浙江工业大学 Based on mobile terminal electronic voting method and the system of face characteristic identification
CN105306204A (en) * 2014-07-04 2016-02-03 腾讯科技(深圳)有限公司 Security verification method, device and system
CN105337941A (en) * 2014-08-04 2016-02-17 阿里巴巴集团控股有限公司 Method and device for providing device identifier
CN105389319A (en) * 2014-09-09 2016-03-09 中兴通讯股份有限公司 Database operation method and device
CN105471839A (en) * 2015-11-11 2016-04-06 中国人民解放军信息工程大学 Method for judging whether router data is tampered
CN105934784A (en) * 2013-11-28 2016-09-07 科泰克工业私人有限公司 Modular wireless power, light and automation control with user verification
CN105933346A (en) * 2016-06-27 2016-09-07 安徽科成信息科技有限公司 Network patrolman
CN105978900A (en) * 2016-06-27 2016-09-28 安徽科成信息科技有限公司 Novel network monitoring device
WO2016165537A1 (en) * 2015-04-13 2016-10-20 阿里巴巴集团控股有限公司 Method for controlling intelligent terminal and apparatus for controlling intelligent terminal
CN106098070A (en) * 2016-06-21 2016-11-09 佛山科学技术学院 A kind of identity identifying method and network system
WO2017028247A1 (en) * 2015-08-18 2017-02-23 张焰焰 Method and mobile terminal for logging in to account with combination of voice, numeric password and fingerprint
WO2017028251A1 (en) * 2015-08-18 2017-02-23 张焰焰 Method and mobile terminal for indicating information after authenticating account login with voice and fingerprint
WO2017028250A1 (en) * 2015-08-18 2017-02-23 张焰焰 Method and mobile terminal for authenticating account login via voice and fingerprint
WO2017028248A1 (en) * 2015-08-18 2017-02-23 张焰焰 Method and mobile terminal for indicating patent information upon voice login to account
WO2017071074A1 (en) * 2015-10-29 2017-05-04 小米科技有限责任公司 Method and apparatus for establishing connection
CN106716429A (en) * 2016-08-31 2017-05-24 深圳前海达闼云端智能科技有限公司 Monitoring method and device, and electronic equipment
CN106779701A (en) * 2016-11-22 2017-05-31 中国银联股份有限公司 A kind of method of payment and device
CN106921626A (en) * 2015-12-25 2017-07-04 阿里巴巴集团控股有限公司 A kind of user registering method and device
CN107018132A (en) * 2017-03-29 2017-08-04 宁夏煜隆科技有限公司 Cloud platform encrypting and decrypting method and system based on open network environment
CN107276962A (en) * 2016-04-07 2017-10-20 北京得意音通技术有限责任公司 A kind of dynamic password voice Verification System and method with reference to any gesture
CN107342998A (en) * 2017-07-04 2017-11-10 四川云物益邦科技有限公司 The personal information extracting method realized by movable storage device
CN107645521A (en) * 2016-07-21 2018-01-30 平安科技(深圳)有限公司 Functional unit installation method, terminal and server
CN107851458A (en) * 2015-06-23 2018-03-27 奥帕斯卡有限公司 For verifying the method for patient and the equipment using this method
CN107924453A (en) * 2016-05-03 2018-04-17 宋惠先 Utilize the online record management system of the individual of network and method
CN107979571A (en) * 2016-10-25 2018-05-01 中国移动通信有限公司研究院 A kind of file uses processing method, terminal and server
CN108023865A (en) * 2016-10-28 2018-05-11 上海行邑信息科技有限公司 A kind of verification method
CN108063770A (en) * 2017-12-26 2018-05-22 重庆硕德信息技术有限公司 Intranet safety management system
CN108900963A (en) * 2018-05-31 2018-11-27 郑州村村联网络技术有限公司 A kind of cut-in method and device
CN108989291A (en) * 2018-06-25 2018-12-11 阿里巴巴集团控股有限公司 Login validation method, the verification method of automated log on, server-side and client
CN109218318A (en) * 2018-09-25 2019-01-15 北京镇远网安科技有限公司 A kind of things-internet gateway login detecting method based on equipment knowledge
CN109583186A (en) * 2018-12-04 2019-04-05 江西财经大学 A kind of cloud computing formula image processing system
CN109657442A (en) * 2018-12-03 2019-04-19 浙江万里学院 A kind of computer user's identification system
CN109781134A (en) * 2018-12-29 2019-05-21 百度在线网络技术(北京)有限公司 Navigation control method, device, engine end and storage medium
CN105577611B (en) * 2014-10-10 2019-05-24 广州联奕信息科技有限公司 A kind of computer security implementation method and device based on hardware and server authentication
CN110222531A (en) * 2019-05-31 2019-09-10 阿里巴巴集团控股有限公司 A kind of method, system and equipment accessing database
CN110225003A (en) * 2019-05-24 2019-09-10 青岛海尔科技有限公司 A kind of device authorization and method for authenticating, system and server
CN110620781A (en) * 2019-09-27 2019-12-27 深圳市大头互动文化传播有限公司 User registration login management system based on game platform
CN111698224A (en) * 2020-05-22 2020-09-22 张焱 Water quality monitoring terminal user verification method and system and water quality monitoring internet of things terminal
TWI707285B (en) * 2018-04-20 2020-10-11 兆豐國際商業銀行股份有限公司 A system and a method for mobile transaction in enterprise
CN112351421A (en) * 2020-09-14 2021-02-09 深圳Tcl新技术有限公司 Control method, control device and computer storage medium for data transmission
WO2021159940A1 (en) * 2020-02-14 2021-08-19 深圳壹账通智能科技有限公司 Report generation and management method and apparatus, computer device, and storage medium

Cited By (96)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102821112A (en) * 2012-09-14 2012-12-12 深圳中兴网信科技有限公司 Mobile equipment, server and mobile equipment data verification method
CN102905260A (en) * 2012-09-18 2013-01-30 北京天威诚信电子商务服务有限公司 Safety and certification system for data transmission of mobile terminal
CN102905260B (en) * 2012-09-18 2015-04-01 北京天威诚信电子商务服务有限公司 Safety and certification system for data transmission of mobile terminal
WO2014044052A1 (en) * 2012-09-21 2014-03-27 华为技术有限公司 Validation processing method, user equipment, and server
CN103856556A (en) * 2012-11-30 2014-06-11 联想(新加坡)私人有限公司 Cloud-based application account management
CN103856556B (en) * 2012-11-30 2017-07-21 联想(新加坡)私人有限公司 Application program account management based on cloud
CN103268549A (en) * 2013-04-24 2013-08-28 徐明亮 Mobile payment verification system based on facial features
CN104123506B (en) * 2013-04-28 2018-03-09 北京壹人壹本信息科技有限公司 Data access method, device, data encryption, storage and access method, device
CN104123506A (en) * 2013-04-28 2014-10-29 北京壹人壹本信息科技有限公司 Data access method and device and data encryption storage and access method and device
CN103297235A (en) * 2013-05-08 2013-09-11 无锡北邮感知技术产业研究院有限公司 Method and server for identification in batches based on biological characteristics
CN103297235B (en) * 2013-05-08 2016-01-20 无锡北邮感知技术产业研究院有限公司 Based on method and the server of the batch certification of biological characteristic
CN104423938A (en) * 2013-08-26 2015-03-18 联想(北京)有限公司 Information processing method and electronic device
CN104580102B (en) * 2013-10-23 2019-03-05 北大方正集团有限公司 A kind of guard method of client-side program and service platform
CN104573437A (en) * 2013-10-23 2015-04-29 深圳市腾讯计算机系统有限公司 Information authentication method, device and terminal
CN104580102A (en) * 2013-10-23 2015-04-29 北大方正集团有限公司 Protecting method of client procedure and service platform
CN104573437B (en) * 2013-10-23 2018-12-28 深圳市腾讯计算机系统有限公司 Information authentication method, device and terminal
CN103685231B (en) * 2013-11-06 2018-05-01 百度在线网络技术(北京)有限公司 Location-based operation demonstration method and server, client
CN103685231A (en) * 2013-11-06 2014-03-26 百度在线网络技术(北京)有限公司 Position-based operation verification method, server, and client
CN103731413B (en) * 2013-11-18 2017-08-04 广州多益网络科技有限公司 A kind of method for handling abnormal login
CN103731413A (en) * 2013-11-18 2014-04-16 广州多益网络科技有限公司 Abnormal login handling method
CN105934784A (en) * 2013-11-28 2016-09-07 科泰克工业私人有限公司 Modular wireless power, light and automation control with user verification
CN103825886A (en) * 2014-02-14 2014-05-28 昆山中创软件工程有限责任公司 Cloud data security access method and device
CN103841105A (en) * 2014-03-04 2014-06-04 上海地慧光电科技有限公司 Network user verification and authorization system
CN103841105B (en) * 2014-03-04 2017-02-08 上海地慧光电科技有限公司 Network user verification and authorization system
CN103841107A (en) * 2014-03-11 2014-06-04 网神信息技术(北京)股份有限公司 Method and device for identity authentication of security gateway administrator
CN104023008A (en) * 2014-05-16 2014-09-03 小米科技有限责任公司 Method and device for downloading and starting tool kit
CN105306204A (en) * 2014-07-04 2016-02-03 腾讯科技(深圳)有限公司 Security verification method, device and system
CN105337941B (en) * 2014-08-04 2019-01-15 阿里巴巴集团控股有限公司 A kind of device identification providing method and device
CN105337941A (en) * 2014-08-04 2016-02-17 阿里巴巴集团控股有限公司 Method and device for providing device identifier
CN105389319A (en) * 2014-09-09 2016-03-09 中兴通讯股份有限公司 Database operation method and device
CN105577611B (en) * 2014-10-10 2019-05-24 广州联奕信息科技有限公司 A kind of computer security implementation method and device based on hardware and server authentication
CN104320389A (en) * 2014-10-11 2015-01-28 南京邮电大学 Fusion identify protection system and fusion identify protection method based on cloud computing
CN104320389B (en) * 2014-10-11 2018-04-27 南京邮电大学 A kind of fusion identity protection system and method based on cloud computing
CN104320391A (en) * 2014-10-22 2015-01-28 南京绿云信息技术有限公司 Cloud authentication method and system
CN104333538A (en) * 2014-10-22 2015-02-04 杭州盈高科技有限公司 Network device access method
CN104333538B (en) * 2014-10-22 2018-05-11 杭州盈高科技有限公司 A kind of network equipment access method
CN104834678A (en) * 2015-04-10 2015-08-12 深圳市创梦天地科技有限公司 Method for positioning according to information and server
WO2016165537A1 (en) * 2015-04-13 2016-10-20 阿里巴巴集团控股有限公司 Method for controlling intelligent terminal and apparatus for controlling intelligent terminal
CN104765998A (en) * 2015-04-16 2015-07-08 国家电网公司 User identity reliably-verifying system based on face identification and using method thereof
CN104967553A (en) * 2015-04-30 2015-10-07 广东欧珀移动通信有限公司 Message interaction method, related device and communication system
CN104967553B (en) * 2015-04-30 2018-03-02 广东欧珀移动通信有限公司 Method for message interaction and relevant apparatus and communication system
CN104883293A (en) * 2015-04-30 2015-09-02 广东欧珀移动通信有限公司 Message interaction method, relevant apparatus and communication system
CN104794608A (en) * 2015-05-07 2015-07-22 苏州首旗信息科技有限公司 Terminal office system software
CN107851458A (en) * 2015-06-23 2018-03-27 奥帕斯卡有限公司 For verifying the method for patient and the equipment using this method
CN105046484A (en) * 2015-06-25 2015-11-11 广东欧珀移动通信有限公司 Mobile payment method and system and mobile terminal
CN104994490B (en) * 2015-06-30 2019-03-01 北京奇虎科技有限公司 A kind of database operation method and database for mobile terminal network visiting
CN104994490A (en) * 2015-06-30 2015-10-21 北京奇虎科技有限公司 Method of operating database for mobile terminal to access network, and database
CN104917848A (en) * 2015-07-03 2015-09-16 成都怡云科技有限公司 Smart cloud platform for enterprises based on enterprise management and service
CN105162757A (en) * 2015-07-03 2015-12-16 成都怡云科技有限公司 External network log-in method for multi-authentication government virtual office platform
WO2017028247A1 (en) * 2015-08-18 2017-02-23 张焰焰 Method and mobile terminal for logging in to account with combination of voice, numeric password and fingerprint
WO2017028248A1 (en) * 2015-08-18 2017-02-23 张焰焰 Method and mobile terminal for indicating patent information upon voice login to account
WO2017028250A1 (en) * 2015-08-18 2017-02-23 张焰焰 Method and mobile terminal for authenticating account login via voice and fingerprint
WO2017028251A1 (en) * 2015-08-18 2017-02-23 张焰焰 Method and mobile terminal for indicating information after authenticating account login with voice and fingerprint
CN105225328A (en) * 2015-08-25 2016-01-06 浙江工业大学 Based on mobile terminal electronic voting method and the system of face characteristic identification
CN105184606A (en) * 2015-08-25 2015-12-23 山东开创集团有限公司 Method for carrying out data communication between sub systems of distribution system and server
CN105141642B (en) * 2015-10-23 2019-05-03 北京京东尚科信息技术有限公司 A kind of method and device preventing illegal user's behavior
CN105141642A (en) * 2015-10-23 2015-12-09 北京京东尚科信息技术有限公司 Method of preventing illegal user behavior and device
WO2017071074A1 (en) * 2015-10-29 2017-05-04 小米科技有限责任公司 Method and apparatus for establishing connection
US10291608B2 (en) 2015-10-29 2019-05-14 Xiaomi Inc. Method and device for establishing wireless connection
CN105471839A (en) * 2015-11-11 2016-04-06 中国人民解放军信息工程大学 Method for judging whether router data is tampered
CN105471839B (en) * 2015-11-11 2018-05-08 中国人民解放军信息工程大学 A kind of method for judging router data and whether being tampered
CN106921626B (en) * 2015-12-25 2020-03-31 阿里巴巴集团控股有限公司 User registration method and device
CN106921626A (en) * 2015-12-25 2017-07-04 阿里巴巴集团控股有限公司 A kind of user registering method and device
CN107276962A (en) * 2016-04-07 2017-10-20 北京得意音通技术有限责任公司 A kind of dynamic password voice Verification System and method with reference to any gesture
CN107276962B (en) * 2016-04-07 2023-04-07 北京得意音通技术有限责任公司 Dynamic password voice authentication system capable of combining any gesture
CN107924453A (en) * 2016-05-03 2018-04-17 宋惠先 Utilize the online record management system of the individual of network and method
CN106098070B (en) * 2016-06-21 2019-12-17 佛山科学技术学院 identity authentication method and network system
CN106098070A (en) * 2016-06-21 2016-11-09 佛山科学技术学院 A kind of identity identifying method and network system
CN105978900A (en) * 2016-06-27 2016-09-28 安徽科成信息科技有限公司 Novel network monitoring device
CN105933346A (en) * 2016-06-27 2016-09-07 安徽科成信息科技有限公司 Network patrolman
CN107645521A (en) * 2016-07-21 2018-01-30 平安科技(深圳)有限公司 Functional unit installation method, terminal and server
CN106716429A (en) * 2016-08-31 2017-05-24 深圳前海达闼云端智能科技有限公司 Monitoring method and device, and electronic equipment
CN107979571A (en) * 2016-10-25 2018-05-01 中国移动通信有限公司研究院 A kind of file uses processing method, terminal and server
CN108023865A (en) * 2016-10-28 2018-05-11 上海行邑信息科技有限公司 A kind of verification method
WO2018095171A1 (en) * 2016-11-22 2018-05-31 中国银联股份有限公司 Payment method and device
US11250434B2 (en) 2016-11-22 2022-02-15 China Unionpay Co., Ltd. Payment method and device
CN106779701A (en) * 2016-11-22 2017-05-31 中国银联股份有限公司 A kind of method of payment and device
CN107018132A (en) * 2017-03-29 2017-08-04 宁夏煜隆科技有限公司 Cloud platform encrypting and decrypting method and system based on open network environment
CN107342998A (en) * 2017-07-04 2017-11-10 四川云物益邦科技有限公司 The personal information extracting method realized by movable storage device
CN108063770A (en) * 2017-12-26 2018-05-22 重庆硕德信息技术有限公司 Intranet safety management system
TWI707285B (en) * 2018-04-20 2020-10-11 兆豐國際商業銀行股份有限公司 A system and a method for mobile transaction in enterprise
CN108900963A (en) * 2018-05-31 2018-11-27 郑州村村联网络技术有限公司 A kind of cut-in method and device
CN108989291A (en) * 2018-06-25 2018-12-11 阿里巴巴集团控股有限公司 Login validation method, the verification method of automated log on, server-side and client
CN108989291B (en) * 2018-06-25 2021-02-05 创新先进技术有限公司 Login verification method, automatic login verification method, server side and client side
CN109218318A (en) * 2018-09-25 2019-01-15 北京镇远网安科技有限公司 A kind of things-internet gateway login detecting method based on equipment knowledge
CN109657442A (en) * 2018-12-03 2019-04-19 浙江万里学院 A kind of computer user's identification system
CN109583186A (en) * 2018-12-04 2019-04-05 江西财经大学 A kind of cloud computing formula image processing system
CN109781134A (en) * 2018-12-29 2019-05-21 百度在线网络技术(北京)有限公司 Navigation control method, device, engine end and storage medium
CN110225003A (en) * 2019-05-24 2019-09-10 青岛海尔科技有限公司 A kind of device authorization and method for authenticating, system and server
CN110222531A (en) * 2019-05-31 2019-09-10 阿里巴巴集团控股有限公司 A kind of method, system and equipment accessing database
CN110620781A (en) * 2019-09-27 2019-12-27 深圳市大头互动文化传播有限公司 User registration login management system based on game platform
WO2021159940A1 (en) * 2020-02-14 2021-08-19 深圳壹账通智能科技有限公司 Report generation and management method and apparatus, computer device, and storage medium
CN111698224A (en) * 2020-05-22 2020-09-22 张焱 Water quality monitoring terminal user verification method and system and water quality monitoring internet of things terminal
CN111698224B (en) * 2020-05-22 2022-02-22 张焱 Water quality monitoring terminal user verification method and system and water quality monitoring internet of things terminal
CN112351421A (en) * 2020-09-14 2021-02-09 深圳Tcl新技术有限公司 Control method, control device and computer storage medium for data transmission
CN112351421B (en) * 2020-09-14 2024-02-06 深圳Tcl新技术有限公司 Control method, control device and computer storage medium for data transmission

Similar Documents

Publication Publication Date Title
CN102664903A (en) Network user identifying method and system
CN110213246B (en) Wide-area multi-factor identity authentication system
US9769655B2 (en) Sharing security keys with headless devices
WO2017197974A1 (en) Biometric characteristic-based security authentication method, device and electronic equipment
US8041954B2 (en) Method and system for providing a secure login solution using one-time passwords
CN108650212A (en) A kind of Internet of Things certification and access control method and Internet of Things security gateway system
EP2732400B1 (en) Method and system for verifying an access request
CN110149328B (en) Interface authentication method, device, equipment and computer readable storage medium
Parmar et al. A comprehensive study on passwordless authentication
US10219154B1 (en) Frictionless or near-frictionless 3 factor user authentication method and system by use of triad network
EP2775417A1 (en) Computer implemented multi-factor authentication
CN111903104A (en) Method and system for performing user authentication
US20130223696A1 (en) System and method for providing secure access to an electronic device using facial biometric identification and screen gesture
KR101451359B1 (en) User account recovery
WO2013101358A1 (en) System and method for secure network login
CN110545274A (en) Method, device and system for UMA service based on people and evidence integration
CN105703910A (en) Dynamic password verifying method based on Wechat service number
Kwon et al. CCTV-based multi-factor authentication system
CN103428698B (en) Mobile interchange participant's identity strong authentication method
Papaioannou et al. User authentication and authorization for next generation mobile passenger ID devices for land and sea border control
CN104703180A (en) Implicit multiple authentication method based on mobile Internet and intelligent terminal
CN110516427B (en) Terminal user identity authentication method and device, storage medium and computer equipment
CN105262747A (en) Polymorphic terminal identity verification system and method based on biological characteristic recognition
CN109933974A (en) Cryptographic initialization method, apparatus, computer equipment and storage medium
CN109218318A (en) A kind of things-internet gateway login detecting method based on equipment knowledge

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120912