CN102664903A - Network user identifying method and system - Google Patents
Network user identifying method and system Download PDFInfo
- Publication number
- CN102664903A CN102664903A CN2012101513316A CN201210151331A CN102664903A CN 102664903 A CN102664903 A CN 102664903A CN 2012101513316 A CN2012101513316 A CN 2012101513316A CN 201210151331 A CN201210151331 A CN 201210151331A CN 102664903 A CN102664903 A CN 102664903A
- Authority
- CN
- China
- Prior art keywords
- user
- access end
- information
- server
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Small-Scale Networks (AREA)
Abstract
The invention discloses a network user identifying method and system, which belong to the technical field of information safety. The system comprises an access terminal, a network server, a user identifying program and a user database, wherein the user identifying program is installed in a network server end. The method comprises the following steps: when the access terminal accesses the network server, the user identifying program compares relevant user information submitted by using access terminal input equipment of the access terminal with user information stored in the user database for identifying, acquires the identification information of network connecting equipment which is directly connected with the access terminal at present, and compares with relevant identification information of the network connecting equipment which is directly connected with the access terminal acquired by using the server during previous submission of user registration information by an access terminal stored in the user database for identifying; and the user identifying program performs corresponding preset operation on a data operation permission which can be acquired by the access terminal according to an identification result of the user registration information and an identification result of the identification information of the network connecting equipment which is directly connected with the access terminal. Due to the adoption of the system and the method, a user identifying interface is not displayed, input of secondary identifying information is hidden, a server user identifying program background is used for identifying input identifying information, and different user permissions are open to the user according to identification results.
Description
Technical field:
The present invention relates to field of information security technology, particularly a kind of network user authentication method and system.
Background technology:
Development along with Internet technology; The dependency network that People more and more is many carries out the application of various commercial affairs and amusement; The thing followed is the generation of various information leakage incidents; Existing network user authentication method mainly is to provide user password information by server identification end user identity by access end, but hackers can use the various technology of stealing secret information to obtain user's account number cipher, the life thereby the event frequency that makes the fake user identity be engaged in various information swindle and data theft takes place frequently; How taking precautions against the generation of this type security incident, is a letter problem to be solved.
Patent " verifying E-mail password the system and method " (patent No.: once announced a kind of two-pass cipher verification method that is used for mailbox 200810301774.0);, the user can also obtain more access rights after importing proper password to get into the interface for the first time at checking interface input two-pass cipher; But in any case; All need under explicit user is verified the prerequisite at interface, input password, this is easy to let the people discover more users authority and the data of hiding in addition, and its fail safe is reduced greatly.
Summary of the invention:
In view of this; Main purpose of the present invention is to provide a kind of more effectively network user authentication system and method; Except that using traditional user cipher verification method; The identification information that connects the network equipment according to the current online institute of user in addition is as confirming whether the user logins at home, even the user account password is stolen, but since the person of stealing secret information when using the account number login present position not the user before the home of setting do not land; Also can't obtain user's private data and the operation that obtains higher authority; The user can also be after non-home uses the log-on message login, does not hide input re-authentication information under the situation of explicit user checking frame in user interface once more, obtains higher user right.Thereby better protect the data of user on the webserver more easily.
For achieving the above object, technical scheme of the present invention is achieved in that and the invention provides a kind of new network user authentication method and system, comprises access end, and the webserver is installed in user au-thentication procedure, the customer data base of network server end; During the access end access web server; User au-thentication procedure stored user information in the pertinent user information of access end being used the access end input equipment submit to and customer data base compares the checking; User au-thentication procedure obtains the identification information of the direct-connected network access device of the current institute of access end, when before having submitted user's registration information with the access end of storing in the customer data base this access end of server acquisition the correlated identities information of direct-connected network access device compare checking; User au-thentication procedure according to the checking result of user's registration information and access end the checking result of identification information of direct-connected network access device, the obtainable data manipulation authority of access end is carried out corresponding predetermined registration operation.
In the such scheme; The user's registration information that user au-thentication procedure checking discovery access end is submitted is consistent with the corresponding user information in the customer data base; But access end current when the corresponding previously stored identification information of access end user is inconsistent in identification information and the server end customer data base of the direct-connected network equipment; Server thinks that the user lands in non-appointed place, and server allows the user to land but before set open portion access end user right and addressable data according to the user; User's registration information and the corresponding user information in the customer data base that user au-thentication procedure checking discovery access end is submitted are inconsistent; But access end current when the consistent and user au-thentication procedure checking of the corresponding previously stored identification information of access end user finds that user's registration information that access end submits and the current identification information that is connected the network equipment and the corresponding informance in the customer data base are all inconsistent in identification information and the server end customer data base of the direct-connected network equipment, server is refused this access end user and is logined; User au-thentication procedure checking finds that user's registration information that access end submits and current identification information that is connected the network equipment and the corresponding informance in the customer data base are equal when consistent; Server think the access end user in the appointed place sign-on access server, server is according to the open more users data manipulation of previous setting authority.
In the such scheme; The access end user is using right user log-on message logon server but access end currently connects that the network equipment identification information of storing in network equipment identification information and the user data is inconsistent, server is during to access end user open portion authority and addressable data; Access end user hidden input secondary authorization information and authorization information is delivered to the server user authentication program on the user interface that signs in to server; The secondary authorization information that is stored in the customer data base when by the server user authentication program secondary authorization information submitted and user being registered compares; If both are consistent, server had before been set open more users end authority and addressable data according to the access end user; Access end is using the right user log-on message and current to be connected network access device identification information that network equipment identification information and server user's database stored equal when consistent; Also can verify, obtain the more users operating right through submitting server end user accreditation process in the hidden input secondary of the user interface that signs in to server authorization information.
In the such scheme; The listed server user of access end secondary subscriber authentication window do not occur on the interface; User au-thentication procedure background monitoring access end user calls the secondary authorization information of access end input equipment input at listed server user interface; The secondary authorization information of access end input is for hiding input, and the user interface at access end and server end does not manifest.
In the such scheme; Access end is submitted the right user log-on message but the current identification information that connects network equipment identification information and server stores logon server when inconsistent; And when the secondary authorization information that the user interface input is hidden, the secondary authorization information of input error reaches preset times continuously, even import correct secondary authorization information once more; Server end automatically locks the respective user authority; The user reuses right user log-on message and network identification information logon server, and uses correct secondary authorization information login, and server is removed the user right locking.
In the such scheme, user au-thentication procedure is directly obtained the correlated identities information of the current institute of access end direct interconnection network equipment when access end uses the web technology to connect server through weblication; User au-thentication procedure obtains the correlated identities information of the current institute of access end direct interconnection network equipment through the client-side program that is installed in access end; The server requirement access end obtains the correlated identities information of the current institute of access end direct interconnection network equipment from server end downloading-running custom plug-in program.
In the such scheme, said server end customer data base is made up of one or several isolated user database; When forming by a plurality of customer data bases; Respective user log-on message, user are current respectively connects the identification information proving program of the network equipment, the storage of user's secondary authorization information for each customer data base, and user au-thentication procedure will pass to correspondence database and verify respectively from the relevant information that client obtains.
In the such scheme; During the access end access server; User au-thentication procedure obtain access end current the direct-connected network equipment identification information and be stored in customer data base in network equipment identification information to compare the result consistent; And when server was authorisation device through access end equipment mark information approval access end equipment, access end can be imported user's registration information and directly sign in to server according to the preset relative users operating right that obtains.
In the such scheme, the direct-connected network equipment of said access end comprises hub, switch, router, wireless router, wireless base station; The identification information of the direct-connected network equipment that is obtained include on spider lines devices exchange machine, hub, the router the mac address of the corresponding access end network port; The ip address of cable network equipment, device name information; The mac address of wireless router, IP address, SSID information, the base station location coordinate of wireless base station, base station type, base station title, base station model, mac address, base station, base station network information, base station LAC, base station CellID information; The input equipment of said access end comprises keyboard, mouse, touch-screen, microphone, human body biological characteristics identification sensor, the camera equipment on the access end; User's registration information of being inputed and secondary authorization information comprise safety verification information such as user name password, mouse action, touch-screen gesture; Also comprise human body biological characteristics information such as fingerprint, iris, voice, vein blood vessel, recognition of face, also comprise the authentication information that security token, security hardware, wireless identity identification card, pair wireless devices are sent; Said access end comprises the computer terminal that needs subscriber authentication, portable terminal, smart mobile phone, notebook computer, panel computer, palmtop PC, mp3, the portable digital equipment of mp4 class.
In the such scheme, this system can be used for using B/S, and the C/S framework need carry out the network platform of authenticating user identification; Embed existing software platform operation as middleware program; Be used for network payment system, financial office system, network instant communication class software, network mailbox, the user rs authentication of types of applications softwares such as cloud storage, cloud computing, fail-safe software.
Description of drawings:
Fig. 1 is the sketch map of the network user authentication method and system of the embodiment of the invention,
Fig. 2 is after server has judged that access end equipment is legitimate device, direct login process figure when network identification information is consistent.
Embodiment:
To combine the accompanying drawing in the embodiment of the invention below, the technical scheme in the embodiment of the invention is carried out clear, complete description, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on embodiments of the invention, this area ordinary person is not making all other embodiment that obtained under the creative work prerequisite, all belongs to the scope of the present invention's protection.
Fig. 1 is the sketch map of the network user authentication method and system of the embodiment of the invention, and is as shown in Figure 1, and this method comprises:
Step 101: access end is connected to server end through network.
Step 102: access end is submitted to server end with information of registered users
Step 103: server end is passed to user au-thentication procedure with access end user profile.
Step 104: user au-thentication procedure compares the respective user log-on message in access end user's registration information of submitting and the customer data base that stores user's registration information in advance; Consistent with each other like user's registration information; Change step 106 over to; If user profile that access end is submitted and the respective user log-on message in the customer data base are inconsistent; Change step 105 over to, stored user's registration information is at access end first during Connection Service device registered user in the customer data base, the log-on message of being submitted; When can being access end registrar user, uses user's registration information the keyboard equipment of access end or user name encrypted message or certain type of user biological characteristic information of submitting to by the biology sensor of access end.
Step 105: user au-thentication procedure disable access end game server.
Step 106: user au-thentication procedure from access end obtain access end current the identification information of the direct-connected network equipment; And change step 107 over to; Access end the identification information of the direct-connected network equipment can be the mac address information of the port of the corresponding connected reference end of certain network access device equipment; Also can be the identification informations such as mac address or SSID of the wireless router that connects of access end equipment wireless, the current direct-connected network equipment identification information of custom plug-in program acquisition access end of the server end that user au-thentication procedure can be directly downloaded through web routine call relative program parameter or the client-side program through operating in access end or access end.
Step 107: the current institute direct interconnection network equipment mark information that user au-thentication procedure is submitted access end compares with the identification information that is stored in access end user in the customer data base direct-connected network equipment of access end at that time that user au-thentication procedure is obtained when registering in advance; Consistent with each other like network identification information; Change step 108 over to; If network equipment identification information that access end is submitted and the map network equipment identification information in the customer data base are inconsistent, change step 109 over to.
Step 108: it is all consistent to connect network equipment identification information owing to user's registration information and access end are current; Server is thought the user in the home login of setting, and server allows the user login services device and opens the more users access rights according to being redefined for access end.
Step 109: because user's registration information is consistent; But it is inconsistent that access end connects network equipment identification information; Server thinks that the user logins at the home of non-setting, allows the user login services device, but only according to being redefined for access end open portion access privilege.
Step 110: if access end is in the legal login of non-setting home; When hoping to obtain the more users access rights; Access end uses the input equipment of access end on the server user interface of login, do not occur in user interface hiding input re-authentication information under the situation of safety verification window.
Step 111: user au-thentication procedure monitoring access end judges according to preset whether the information of access end input at the interface is the re-authentication information type in the relevant information of listed server user interface input; The re-authentication information type can be the cipher type re-authentication information that access end passes through the latent close input of user side keyboard, comprises that also mouse or the touch-screen of access end through access end hide the preset figure that draws as re-authentication information at the server interface ad-hoc location.Also comprise the human body biological characteristics information that various kinds of sensors is surveyed on the access end.
Step 112: user au-thentication procedure compares the re-authentication information of intercepting and capturing with corresponding authentication information in the customer data base that stores user's re-authentication information; If the re-authentication information of comparison is consistent; Change step 113 over to, the re-authentication information inconsistency like comparison changes 114 over to.
Step 113: server approval access end is complete validated user, is the open more users authority of access end.
Step 114: server still keeps the existing authority of user, but forbids for the open more users authority of access end, even access end is imported correct re-authentication information thereafter, server does not prompt for its open more authorities yet.
Step 115: access end is got back to home again during the Connection Service device; If the identification information of its user's registration information submitted to and the current network equipment that is connected is all consistent with the corresponding informance of server user's database storage, server unlocks and is the open more users authority of access end.
Fig. 2 is after server has judged that access end equipment is legitimate device, direct login process figure when network identification information is consistent.
Step 201: access end is connected to server end through network
Step 202: the unique identification information of service area through the judging access end for example information such as mac address or IP address of service end network card equipment judges whether the legal authenticating device into the service end approval; If the legitimate device of access end approval; Get into step 204; If access end equipment is not the legitimate device of service end approval, get into step 203.
Step 203: server disable access end device logs.
Step 204: user au-thentication procedure from access end obtain access end current the identification information of the direct-connected network equipment, and change step 205 over to,
Step 205: the current institute direct interconnection network equipment mark information that user au-thentication procedure is submitted access end compares with the identification information that is stored in access end user in the customer data base direct-connected network equipment of access end at that time that user au-thentication procedure is obtained when registering in advance; Consistent with each other like network identification information; Change step 207 over to; If network equipment identification information that access end is submitted and the map network equipment identification information in the customer data base are inconsistent, change step 206 over to.
Step 206: the identification information that connects network equipment identification information and server stores owing to access end is current is inconsistent, and server is thought the user not in the home login of setting, and server prompts access end input user's registration information is logined.
Step 207: access end is current, and to connect network equipment identification information consistent with the identification information of server stores; Server thinks that access end is legal authenticating device in home login and access end, does not need access end to provide the user profile can direct logon server and obtain the respective user authority.
It should be noted last that; Above embodiment is only unrestricted in order to technical scheme of the present invention to be described; Although invention is specified with reference to preferred embodiment; Those of ordinary skill in the art should be appreciated that and can change or be equal to replacement technical scheme of the present invention, and do not break away from the spirit and the category of technical scheme of the present invention.
Claims (10)
1. network user authentication method and system comprise access end, and the webserver is installed in user au-thentication procedure, the customer data base of network server end; During the access end access web server; The user's registration information that user au-thentication procedure is stored in associated user's log-on message that access end is used the access end input equipment submit to and customer data base compares the checking; User au-thentication procedure obtains the identification information of the direct-connected network access device of the current institute of access end, when before having submitted user's registration information with the access end of storing in the customer data base this access end of server acquisition the correlated identities information of direct-connected network access device compare checking; User au-thentication procedure according to the checking result of user's registration information and access end the checking result of identification information of direct-connected network access device, the obtainable data manipulation authority of access end is carried out corresponding predetermined registration operation.
2. network user authentication method and system according to claim 1; It is characterized in that; The user's registration information that user au-thentication procedure authentication-access end is submitted is consistent with the corresponding user information in the customer data base; But access end current when the corresponding previously stored identification information of access end user is inconsistent in identification information and the server end customer data base of the direct-connected network equipment; Server thinks that the user lands in non-appointed place, and server allows the user to land but before set open portion access end user right and addressable data according to the user; User's registration information and the corresponding user information in the customer data base that user au-thentication procedure checking discovery access end is submitted are inconsistent; But access end current when the consistent and user au-thentication procedure checking of the corresponding previously stored identification information of access end user finds that user's registration information that access end submits and the current identification information that is connected the network equipment and the corresponding informance in the customer data base are all inconsistent in identification information and the server end customer data base of the direct-connected network equipment, server is refused this access end user and is logined; User au-thentication procedure checking finds that user's registration information that access end submits and current identification information that is connected the network equipment and the corresponding informance in the customer data base are equal when consistent; Server think the access end user in the appointed place sign-on access server, server is according to the open more users data manipulation of previous setting authority.
3. network user authentication method and system according to claim 2; It is characterized in that; Access end is using right user log-on message logon server but access end currently connects that the network equipment identification information of storing in network equipment identification information and the user data is inconsistent, server is during to access end user open portion authority and addressable data; Access end hidden input secondary authorization information and authorization information is delivered to the server user authentication program on the user interface that signs in to server; The secondary authorization information that is stored in the customer data base when by the server user authentication program secondary authorization information submitted and user being registered compares; If both are consistent, server had before been set open more users end authority and addressable data according to access end; Access end is using the right user log-on message and current to be connected network access device identification information that network equipment identification information and server user's database stored equal when consistent; Also can verify, obtain the more users operating right through submitting server end user accreditation process in the hidden input secondary of the user interface that signs in to server authorization information.
4. network user authentication method and system according to claim 3; It is characterized in that; The listed server user of access end the secondary identity authentication window do not occur on the interface; User au-thentication procedure background monitoring access end user calls the secondary authorization information of access end input equipment input at listed server user interface, the secondary authorization information of access end input is for hiding input, and the user interface at access end and server end does not manifest.
5. network user authentication method and system according to claim 4; It is characterized in that access end is submitted the right user log-on message but the current identification information that connects network equipment identification information and server stores logon server when inconsistent, and when the secondary authorization information that the user interface input is hidden; The secondary authorization information of input error reaches preset times continuously; Even import correct secondary authorization information once more, server end automatically locks the respective user authority, and the user reuses right user log-on message and network identification information logon server; And using correct secondary authorization information login, server is removed the user right locking.
6. network user authentication method and system according to claim 1; It is characterized in that user au-thentication procedure is directly obtained the correlated identities information of the current institute of access end direct interconnection network equipment through weblication when access end uses the web technology to connect server; User au-thentication procedure obtains the correlated identities information of the current institute of access end direct interconnection network equipment through the client-side program that is installed in access end; The server requirement access end obtains the correlated identities information of the current institute of access end direct interconnection network equipment from server end downloading-running custom plug-in program.
7. network user authentication method and system according to claim 1 is characterized in that, said server end customer data base is made up of one or more isolated user database; When forming by a plurality of customer data bases; Respective user log-on message, user are current respectively connects the identification information proving program of the network equipment, the storage of user's secondary authorization information for each customer data base, and user au-thentication procedure will pass to correspondence database and verify respectively from the relevant information that client obtains; A user can corresponding one or more current identification informations that connect the network equipment.
8. network user authentication method and system according to claim 1; It is characterized in that; During the access end access server; User au-thentication procedure obtain access end current the direct-connected network equipment identification information and be stored in customer data base in network equipment identification information to compare the result consistent; And when server was authorisation device through access end equipment mark information approval access end equipment, access end need not be imported user's registration information and directly sign in to server according to the preset relative users authority that obtains.
9. network user authentication method and system according to claim 1 is characterized in that, the direct-connected network equipment of said access end comprises hub, switch, router, wireless router, wireless base station; The identification information of the direct-connected network equipment that is obtained include on spider lines devices exchange machine, hub, the router the mac address of the corresponding access end network port; The ip address of cable network equipment, device name information; The mac address of wireless router, IP address, SSID information, the base station location coordinate of wireless base station, base station type, base station title, base station model, mac address, base station, base station network information, base station LAC, base station CellID information; The input equipment of said access end comprises keyboard, mouse, touch-screen, microphone, human body biological characteristics identification sensor, the camera equipment on the access end; User's registration information of being inputed and secondary authorization information comprise safety verification information such as user name password, mouse action, touch-screen gesture; Also comprise human body biological characteristics information such as fingerprint, iris, voice, vein blood vessel, recognition of face, also comprise the authentication information that security token, security hardware, wireless identity identification card, pair wireless devices are sent; Said access end comprises the computer terminal that needs subscriber authentication, portable terminal, smart mobile phone, notebook computer, panel computer, palmtop PC, mp3, the portable digital equipment of mp4 class.
10. network user authentication method and system according to claim 1 is characterized in that this system can be used for using B/S, and the C/S framework need carry out the network platform of authenticating user identification; Embed existing software platform operation as middleware program; Be used for network payment system, financial office system, network instant communication class software, network mailbox, secured user's checking of types of applications softwares such as cloud storage, cloud computing, fail-safe software.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012101513316A CN102664903A (en) | 2012-05-16 | 2012-05-16 | Network user identifying method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012101513316A CN102664903A (en) | 2012-05-16 | 2012-05-16 | Network user identifying method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102664903A true CN102664903A (en) | 2012-09-12 |
Family
ID=46774313
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012101513316A Pending CN102664903A (en) | 2012-05-16 | 2012-05-16 | Network user identifying method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102664903A (en) |
Cited By (71)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102821112A (en) * | 2012-09-14 | 2012-12-12 | 深圳中兴网信科技有限公司 | Mobile equipment, server and mobile equipment data verification method |
CN102905260A (en) * | 2012-09-18 | 2013-01-30 | 北京天威诚信电子商务服务有限公司 | Safety and certification system for data transmission of mobile terminal |
CN103268549A (en) * | 2013-04-24 | 2013-08-28 | 徐明亮 | Mobile payment verification system based on facial features |
CN103297235A (en) * | 2013-05-08 | 2013-09-11 | 无锡北邮感知技术产业研究院有限公司 | Method and server for identification in batches based on biological characteristics |
CN103685231A (en) * | 2013-11-06 | 2014-03-26 | 百度在线网络技术(北京)有限公司 | Position-based operation verification method, server, and client |
WO2014044052A1 (en) * | 2012-09-21 | 2014-03-27 | 华为技术有限公司 | Validation processing method, user equipment, and server |
CN103731413A (en) * | 2013-11-18 | 2014-04-16 | 广州多益网络科技有限公司 | Abnormal login handling method |
CN103825886A (en) * | 2014-02-14 | 2014-05-28 | 昆山中创软件工程有限责任公司 | Cloud data security access method and device |
CN103841107A (en) * | 2014-03-11 | 2014-06-04 | 网神信息技术(北京)股份有限公司 | Method and device for identity authentication of security gateway administrator |
CN103841105A (en) * | 2014-03-04 | 2014-06-04 | 上海地慧光电科技有限公司 | Network user verification and authorization system |
CN103856556A (en) * | 2012-11-30 | 2014-06-11 | 联想(新加坡)私人有限公司 | Cloud-based application account management |
CN104023008A (en) * | 2014-05-16 | 2014-09-03 | 小米科技有限责任公司 | Method and device for downloading and starting tool kit |
CN104123506A (en) * | 2013-04-28 | 2014-10-29 | 北京壹人壹本信息科技有限公司 | Data access method and device and data encryption storage and access method and device |
CN104320389A (en) * | 2014-10-11 | 2015-01-28 | 南京邮电大学 | Fusion identify protection system and fusion identify protection method based on cloud computing |
CN104320391A (en) * | 2014-10-22 | 2015-01-28 | 南京绿云信息技术有限公司 | Cloud authentication method and system |
CN104333538A (en) * | 2014-10-22 | 2015-02-04 | 杭州盈高科技有限公司 | Network device access method |
CN104423938A (en) * | 2013-08-26 | 2015-03-18 | 联想(北京)有限公司 | Information processing method and electronic device |
CN104573437A (en) * | 2013-10-23 | 2015-04-29 | 深圳市腾讯计算机系统有限公司 | Information authentication method, device and terminal |
CN104580102A (en) * | 2013-10-23 | 2015-04-29 | 北大方正集团有限公司 | Protecting method of client procedure and service platform |
CN104765998A (en) * | 2015-04-16 | 2015-07-08 | 国家电网公司 | User identity reliably-verifying system based on face identification and using method thereof |
CN104794608A (en) * | 2015-05-07 | 2015-07-22 | 苏州首旗信息科技有限公司 | Terminal office system software |
CN104834678A (en) * | 2015-04-10 | 2015-08-12 | 深圳市创梦天地科技有限公司 | Method for positioning according to information and server |
CN104883293A (en) * | 2015-04-30 | 2015-09-02 | 广东欧珀移动通信有限公司 | Message interaction method, relevant apparatus and communication system |
CN104917848A (en) * | 2015-07-03 | 2015-09-16 | 成都怡云科技有限公司 | Smart cloud platform for enterprises based on enterprise management and service |
CN104967553A (en) * | 2015-04-30 | 2015-10-07 | 广东欧珀移动通信有限公司 | Message interaction method, related device and communication system |
CN104994490A (en) * | 2015-06-30 | 2015-10-21 | 北京奇虎科技有限公司 | Method of operating database for mobile terminal to access network, and database |
CN105046484A (en) * | 2015-06-25 | 2015-11-11 | 广东欧珀移动通信有限公司 | Mobile payment method and system and mobile terminal |
CN105141642A (en) * | 2015-10-23 | 2015-12-09 | 北京京东尚科信息技术有限公司 | Method of preventing illegal user behavior and device |
CN105162757A (en) * | 2015-07-03 | 2015-12-16 | 成都怡云科技有限公司 | External network log-in method for multi-authentication government virtual office platform |
CN105184606A (en) * | 2015-08-25 | 2015-12-23 | 山东开创集团有限公司 | Method for carrying out data communication between sub systems of distribution system and server |
CN105225328A (en) * | 2015-08-25 | 2016-01-06 | 浙江工业大学 | Based on mobile terminal electronic voting method and the system of face characteristic identification |
CN105306204A (en) * | 2014-07-04 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Security verification method, device and system |
CN105337941A (en) * | 2014-08-04 | 2016-02-17 | 阿里巴巴集团控股有限公司 | Method and device for providing device identifier |
CN105389319A (en) * | 2014-09-09 | 2016-03-09 | 中兴通讯股份有限公司 | Database operation method and device |
CN105471839A (en) * | 2015-11-11 | 2016-04-06 | 中国人民解放军信息工程大学 | Method for judging whether router data is tampered |
CN105934784A (en) * | 2013-11-28 | 2016-09-07 | 科泰克工业私人有限公司 | Modular wireless power, light and automation control with user verification |
CN105933346A (en) * | 2016-06-27 | 2016-09-07 | 安徽科成信息科技有限公司 | Network patrolman |
CN105978900A (en) * | 2016-06-27 | 2016-09-28 | 安徽科成信息科技有限公司 | Novel network monitoring device |
WO2016165537A1 (en) * | 2015-04-13 | 2016-10-20 | 阿里巴巴集团控股有限公司 | Method for controlling intelligent terminal and apparatus for controlling intelligent terminal |
CN106098070A (en) * | 2016-06-21 | 2016-11-09 | 佛山科学技术学院 | A kind of identity identifying method and network system |
WO2017028247A1 (en) * | 2015-08-18 | 2017-02-23 | 张焰焰 | Method and mobile terminal for logging in to account with combination of voice, numeric password and fingerprint |
WO2017028251A1 (en) * | 2015-08-18 | 2017-02-23 | 张焰焰 | Method and mobile terminal for indicating information after authenticating account login with voice and fingerprint |
WO2017028250A1 (en) * | 2015-08-18 | 2017-02-23 | 张焰焰 | Method and mobile terminal for authenticating account login via voice and fingerprint |
WO2017028248A1 (en) * | 2015-08-18 | 2017-02-23 | 张焰焰 | Method and mobile terminal for indicating patent information upon voice login to account |
WO2017071074A1 (en) * | 2015-10-29 | 2017-05-04 | 小米科技有限责任公司 | Method and apparatus for establishing connection |
CN106716429A (en) * | 2016-08-31 | 2017-05-24 | 深圳前海达闼云端智能科技有限公司 | Monitoring method and device, and electronic equipment |
CN106779701A (en) * | 2016-11-22 | 2017-05-31 | 中国银联股份有限公司 | A kind of method of payment and device |
CN106921626A (en) * | 2015-12-25 | 2017-07-04 | 阿里巴巴集团控股有限公司 | A kind of user registering method and device |
CN107018132A (en) * | 2017-03-29 | 2017-08-04 | 宁夏煜隆科技有限公司 | Cloud platform encrypting and decrypting method and system based on open network environment |
CN107276962A (en) * | 2016-04-07 | 2017-10-20 | 北京得意音通技术有限责任公司 | A kind of dynamic password voice Verification System and method with reference to any gesture |
CN107342998A (en) * | 2017-07-04 | 2017-11-10 | 四川云物益邦科技有限公司 | The personal information extracting method realized by movable storage device |
CN107645521A (en) * | 2016-07-21 | 2018-01-30 | 平安科技(深圳)有限公司 | Functional unit installation method, terminal and server |
CN107851458A (en) * | 2015-06-23 | 2018-03-27 | 奥帕斯卡有限公司 | For verifying the method for patient and the equipment using this method |
CN107924453A (en) * | 2016-05-03 | 2018-04-17 | 宋惠先 | Utilize the online record management system of the individual of network and method |
CN107979571A (en) * | 2016-10-25 | 2018-05-01 | 中国移动通信有限公司研究院 | A kind of file uses processing method, terminal and server |
CN108023865A (en) * | 2016-10-28 | 2018-05-11 | 上海行邑信息科技有限公司 | A kind of verification method |
CN108063770A (en) * | 2017-12-26 | 2018-05-22 | 重庆硕德信息技术有限公司 | Intranet safety management system |
CN108900963A (en) * | 2018-05-31 | 2018-11-27 | 郑州村村联网络技术有限公司 | A kind of cut-in method and device |
CN108989291A (en) * | 2018-06-25 | 2018-12-11 | 阿里巴巴集团控股有限公司 | Login validation method, the verification method of automated log on, server-side and client |
CN109218318A (en) * | 2018-09-25 | 2019-01-15 | 北京镇远网安科技有限公司 | A kind of things-internet gateway login detecting method based on equipment knowledge |
CN109583186A (en) * | 2018-12-04 | 2019-04-05 | 江西财经大学 | A kind of cloud computing formula image processing system |
CN109657442A (en) * | 2018-12-03 | 2019-04-19 | 浙江万里学院 | A kind of computer user's identification system |
CN109781134A (en) * | 2018-12-29 | 2019-05-21 | 百度在线网络技术(北京)有限公司 | Navigation control method, device, engine end and storage medium |
CN105577611B (en) * | 2014-10-10 | 2019-05-24 | 广州联奕信息科技有限公司 | A kind of computer security implementation method and device based on hardware and server authentication |
CN110222531A (en) * | 2019-05-31 | 2019-09-10 | 阿里巴巴集团控股有限公司 | A kind of method, system and equipment accessing database |
CN110225003A (en) * | 2019-05-24 | 2019-09-10 | 青岛海尔科技有限公司 | A kind of device authorization and method for authenticating, system and server |
CN110620781A (en) * | 2019-09-27 | 2019-12-27 | 深圳市大头互动文化传播有限公司 | User registration login management system based on game platform |
CN111698224A (en) * | 2020-05-22 | 2020-09-22 | 张焱 | Water quality monitoring terminal user verification method and system and water quality monitoring internet of things terminal |
TWI707285B (en) * | 2018-04-20 | 2020-10-11 | 兆豐國際商業銀行股份有限公司 | A system and a method for mobile transaction in enterprise |
CN112351421A (en) * | 2020-09-14 | 2021-02-09 | 深圳Tcl新技术有限公司 | Control method, control device and computer storage medium for data transmission |
WO2021159940A1 (en) * | 2020-02-14 | 2021-08-19 | 深圳壹账通智能科技有限公司 | Report generation and management method and apparatus, computer device, and storage medium |
-
2012
- 2012-05-16 CN CN2012101513316A patent/CN102664903A/en active Pending
Cited By (96)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102821112A (en) * | 2012-09-14 | 2012-12-12 | 深圳中兴网信科技有限公司 | Mobile equipment, server and mobile equipment data verification method |
CN102905260A (en) * | 2012-09-18 | 2013-01-30 | 北京天威诚信电子商务服务有限公司 | Safety and certification system for data transmission of mobile terminal |
CN102905260B (en) * | 2012-09-18 | 2015-04-01 | 北京天威诚信电子商务服务有限公司 | Safety and certification system for data transmission of mobile terminal |
WO2014044052A1 (en) * | 2012-09-21 | 2014-03-27 | 华为技术有限公司 | Validation processing method, user equipment, and server |
CN103856556A (en) * | 2012-11-30 | 2014-06-11 | 联想(新加坡)私人有限公司 | Cloud-based application account management |
CN103856556B (en) * | 2012-11-30 | 2017-07-21 | 联想(新加坡)私人有限公司 | Application program account management based on cloud |
CN103268549A (en) * | 2013-04-24 | 2013-08-28 | 徐明亮 | Mobile payment verification system based on facial features |
CN104123506B (en) * | 2013-04-28 | 2018-03-09 | 北京壹人壹本信息科技有限公司 | Data access method, device, data encryption, storage and access method, device |
CN104123506A (en) * | 2013-04-28 | 2014-10-29 | 北京壹人壹本信息科技有限公司 | Data access method and device and data encryption storage and access method and device |
CN103297235A (en) * | 2013-05-08 | 2013-09-11 | 无锡北邮感知技术产业研究院有限公司 | Method and server for identification in batches based on biological characteristics |
CN103297235B (en) * | 2013-05-08 | 2016-01-20 | 无锡北邮感知技术产业研究院有限公司 | Based on method and the server of the batch certification of biological characteristic |
CN104423938A (en) * | 2013-08-26 | 2015-03-18 | 联想(北京)有限公司 | Information processing method and electronic device |
CN104580102B (en) * | 2013-10-23 | 2019-03-05 | 北大方正集团有限公司 | A kind of guard method of client-side program and service platform |
CN104573437A (en) * | 2013-10-23 | 2015-04-29 | 深圳市腾讯计算机系统有限公司 | Information authentication method, device and terminal |
CN104580102A (en) * | 2013-10-23 | 2015-04-29 | 北大方正集团有限公司 | Protecting method of client procedure and service platform |
CN104573437B (en) * | 2013-10-23 | 2018-12-28 | 深圳市腾讯计算机系统有限公司 | Information authentication method, device and terminal |
CN103685231B (en) * | 2013-11-06 | 2018-05-01 | 百度在线网络技术(北京)有限公司 | Location-based operation demonstration method and server, client |
CN103685231A (en) * | 2013-11-06 | 2014-03-26 | 百度在线网络技术(北京)有限公司 | Position-based operation verification method, server, and client |
CN103731413B (en) * | 2013-11-18 | 2017-08-04 | 广州多益网络科技有限公司 | A kind of method for handling abnormal login |
CN103731413A (en) * | 2013-11-18 | 2014-04-16 | 广州多益网络科技有限公司 | Abnormal login handling method |
CN105934784A (en) * | 2013-11-28 | 2016-09-07 | 科泰克工业私人有限公司 | Modular wireless power, light and automation control with user verification |
CN103825886A (en) * | 2014-02-14 | 2014-05-28 | 昆山中创软件工程有限责任公司 | Cloud data security access method and device |
CN103841105A (en) * | 2014-03-04 | 2014-06-04 | 上海地慧光电科技有限公司 | Network user verification and authorization system |
CN103841105B (en) * | 2014-03-04 | 2017-02-08 | 上海地慧光电科技有限公司 | Network user verification and authorization system |
CN103841107A (en) * | 2014-03-11 | 2014-06-04 | 网神信息技术(北京)股份有限公司 | Method and device for identity authentication of security gateway administrator |
CN104023008A (en) * | 2014-05-16 | 2014-09-03 | 小米科技有限责任公司 | Method and device for downloading and starting tool kit |
CN105306204A (en) * | 2014-07-04 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Security verification method, device and system |
CN105337941B (en) * | 2014-08-04 | 2019-01-15 | 阿里巴巴集团控股有限公司 | A kind of device identification providing method and device |
CN105337941A (en) * | 2014-08-04 | 2016-02-17 | 阿里巴巴集团控股有限公司 | Method and device for providing device identifier |
CN105389319A (en) * | 2014-09-09 | 2016-03-09 | 中兴通讯股份有限公司 | Database operation method and device |
CN105577611B (en) * | 2014-10-10 | 2019-05-24 | 广州联奕信息科技有限公司 | A kind of computer security implementation method and device based on hardware and server authentication |
CN104320389A (en) * | 2014-10-11 | 2015-01-28 | 南京邮电大学 | Fusion identify protection system and fusion identify protection method based on cloud computing |
CN104320389B (en) * | 2014-10-11 | 2018-04-27 | 南京邮电大学 | A kind of fusion identity protection system and method based on cloud computing |
CN104320391A (en) * | 2014-10-22 | 2015-01-28 | 南京绿云信息技术有限公司 | Cloud authentication method and system |
CN104333538A (en) * | 2014-10-22 | 2015-02-04 | 杭州盈高科技有限公司 | Network device access method |
CN104333538B (en) * | 2014-10-22 | 2018-05-11 | 杭州盈高科技有限公司 | A kind of network equipment access method |
CN104834678A (en) * | 2015-04-10 | 2015-08-12 | 深圳市创梦天地科技有限公司 | Method for positioning according to information and server |
WO2016165537A1 (en) * | 2015-04-13 | 2016-10-20 | 阿里巴巴集团控股有限公司 | Method for controlling intelligent terminal and apparatus for controlling intelligent terminal |
CN104765998A (en) * | 2015-04-16 | 2015-07-08 | 国家电网公司 | User identity reliably-verifying system based on face identification and using method thereof |
CN104967553A (en) * | 2015-04-30 | 2015-10-07 | 广东欧珀移动通信有限公司 | Message interaction method, related device and communication system |
CN104967553B (en) * | 2015-04-30 | 2018-03-02 | 广东欧珀移动通信有限公司 | Method for message interaction and relevant apparatus and communication system |
CN104883293A (en) * | 2015-04-30 | 2015-09-02 | 广东欧珀移动通信有限公司 | Message interaction method, relevant apparatus and communication system |
CN104794608A (en) * | 2015-05-07 | 2015-07-22 | 苏州首旗信息科技有限公司 | Terminal office system software |
CN107851458A (en) * | 2015-06-23 | 2018-03-27 | 奥帕斯卡有限公司 | For verifying the method for patient and the equipment using this method |
CN105046484A (en) * | 2015-06-25 | 2015-11-11 | 广东欧珀移动通信有限公司 | Mobile payment method and system and mobile terminal |
CN104994490B (en) * | 2015-06-30 | 2019-03-01 | 北京奇虎科技有限公司 | A kind of database operation method and database for mobile terminal network visiting |
CN104994490A (en) * | 2015-06-30 | 2015-10-21 | 北京奇虎科技有限公司 | Method of operating database for mobile terminal to access network, and database |
CN104917848A (en) * | 2015-07-03 | 2015-09-16 | 成都怡云科技有限公司 | Smart cloud platform for enterprises based on enterprise management and service |
CN105162757A (en) * | 2015-07-03 | 2015-12-16 | 成都怡云科技有限公司 | External network log-in method for multi-authentication government virtual office platform |
WO2017028247A1 (en) * | 2015-08-18 | 2017-02-23 | 张焰焰 | Method and mobile terminal for logging in to account with combination of voice, numeric password and fingerprint |
WO2017028248A1 (en) * | 2015-08-18 | 2017-02-23 | 张焰焰 | Method and mobile terminal for indicating patent information upon voice login to account |
WO2017028250A1 (en) * | 2015-08-18 | 2017-02-23 | 张焰焰 | Method and mobile terminal for authenticating account login via voice and fingerprint |
WO2017028251A1 (en) * | 2015-08-18 | 2017-02-23 | 张焰焰 | Method and mobile terminal for indicating information after authenticating account login with voice and fingerprint |
CN105225328A (en) * | 2015-08-25 | 2016-01-06 | 浙江工业大学 | Based on mobile terminal electronic voting method and the system of face characteristic identification |
CN105184606A (en) * | 2015-08-25 | 2015-12-23 | 山东开创集团有限公司 | Method for carrying out data communication between sub systems of distribution system and server |
CN105141642B (en) * | 2015-10-23 | 2019-05-03 | 北京京东尚科信息技术有限公司 | A kind of method and device preventing illegal user's behavior |
CN105141642A (en) * | 2015-10-23 | 2015-12-09 | 北京京东尚科信息技术有限公司 | Method of preventing illegal user behavior and device |
WO2017071074A1 (en) * | 2015-10-29 | 2017-05-04 | 小米科技有限责任公司 | Method and apparatus for establishing connection |
US10291608B2 (en) | 2015-10-29 | 2019-05-14 | Xiaomi Inc. | Method and device for establishing wireless connection |
CN105471839A (en) * | 2015-11-11 | 2016-04-06 | 中国人民解放军信息工程大学 | Method for judging whether router data is tampered |
CN105471839B (en) * | 2015-11-11 | 2018-05-08 | 中国人民解放军信息工程大学 | A kind of method for judging router data and whether being tampered |
CN106921626B (en) * | 2015-12-25 | 2020-03-31 | 阿里巴巴集团控股有限公司 | User registration method and device |
CN106921626A (en) * | 2015-12-25 | 2017-07-04 | 阿里巴巴集团控股有限公司 | A kind of user registering method and device |
CN107276962A (en) * | 2016-04-07 | 2017-10-20 | 北京得意音通技术有限责任公司 | A kind of dynamic password voice Verification System and method with reference to any gesture |
CN107276962B (en) * | 2016-04-07 | 2023-04-07 | 北京得意音通技术有限责任公司 | Dynamic password voice authentication system capable of combining any gesture |
CN107924453A (en) * | 2016-05-03 | 2018-04-17 | 宋惠先 | Utilize the online record management system of the individual of network and method |
CN106098070B (en) * | 2016-06-21 | 2019-12-17 | 佛山科学技术学院 | identity authentication method and network system |
CN106098070A (en) * | 2016-06-21 | 2016-11-09 | 佛山科学技术学院 | A kind of identity identifying method and network system |
CN105978900A (en) * | 2016-06-27 | 2016-09-28 | 安徽科成信息科技有限公司 | Novel network monitoring device |
CN105933346A (en) * | 2016-06-27 | 2016-09-07 | 安徽科成信息科技有限公司 | Network patrolman |
CN107645521A (en) * | 2016-07-21 | 2018-01-30 | 平安科技(深圳)有限公司 | Functional unit installation method, terminal and server |
CN106716429A (en) * | 2016-08-31 | 2017-05-24 | 深圳前海达闼云端智能科技有限公司 | Monitoring method and device, and electronic equipment |
CN107979571A (en) * | 2016-10-25 | 2018-05-01 | 中国移动通信有限公司研究院 | A kind of file uses processing method, terminal and server |
CN108023865A (en) * | 2016-10-28 | 2018-05-11 | 上海行邑信息科技有限公司 | A kind of verification method |
WO2018095171A1 (en) * | 2016-11-22 | 2018-05-31 | 中国银联股份有限公司 | Payment method and device |
US11250434B2 (en) | 2016-11-22 | 2022-02-15 | China Unionpay Co., Ltd. | Payment method and device |
CN106779701A (en) * | 2016-11-22 | 2017-05-31 | 中国银联股份有限公司 | A kind of method of payment and device |
CN107018132A (en) * | 2017-03-29 | 2017-08-04 | 宁夏煜隆科技有限公司 | Cloud platform encrypting and decrypting method and system based on open network environment |
CN107342998A (en) * | 2017-07-04 | 2017-11-10 | 四川云物益邦科技有限公司 | The personal information extracting method realized by movable storage device |
CN108063770A (en) * | 2017-12-26 | 2018-05-22 | 重庆硕德信息技术有限公司 | Intranet safety management system |
TWI707285B (en) * | 2018-04-20 | 2020-10-11 | 兆豐國際商業銀行股份有限公司 | A system and a method for mobile transaction in enterprise |
CN108900963A (en) * | 2018-05-31 | 2018-11-27 | 郑州村村联网络技术有限公司 | A kind of cut-in method and device |
CN108989291A (en) * | 2018-06-25 | 2018-12-11 | 阿里巴巴集团控股有限公司 | Login validation method, the verification method of automated log on, server-side and client |
CN108989291B (en) * | 2018-06-25 | 2021-02-05 | 创新先进技术有限公司 | Login verification method, automatic login verification method, server side and client side |
CN109218318A (en) * | 2018-09-25 | 2019-01-15 | 北京镇远网安科技有限公司 | A kind of things-internet gateway login detecting method based on equipment knowledge |
CN109657442A (en) * | 2018-12-03 | 2019-04-19 | 浙江万里学院 | A kind of computer user's identification system |
CN109583186A (en) * | 2018-12-04 | 2019-04-05 | 江西财经大学 | A kind of cloud computing formula image processing system |
CN109781134A (en) * | 2018-12-29 | 2019-05-21 | 百度在线网络技术(北京)有限公司 | Navigation control method, device, engine end and storage medium |
CN110225003A (en) * | 2019-05-24 | 2019-09-10 | 青岛海尔科技有限公司 | A kind of device authorization and method for authenticating, system and server |
CN110222531A (en) * | 2019-05-31 | 2019-09-10 | 阿里巴巴集团控股有限公司 | A kind of method, system and equipment accessing database |
CN110620781A (en) * | 2019-09-27 | 2019-12-27 | 深圳市大头互动文化传播有限公司 | User registration login management system based on game platform |
WO2021159940A1 (en) * | 2020-02-14 | 2021-08-19 | 深圳壹账通智能科技有限公司 | Report generation and management method and apparatus, computer device, and storage medium |
CN111698224A (en) * | 2020-05-22 | 2020-09-22 | 张焱 | Water quality monitoring terminal user verification method and system and water quality monitoring internet of things terminal |
CN111698224B (en) * | 2020-05-22 | 2022-02-22 | 张焱 | Water quality monitoring terminal user verification method and system and water quality monitoring internet of things terminal |
CN112351421A (en) * | 2020-09-14 | 2021-02-09 | 深圳Tcl新技术有限公司 | Control method, control device and computer storage medium for data transmission |
CN112351421B (en) * | 2020-09-14 | 2024-02-06 | 深圳Tcl新技术有限公司 | Control method, control device and computer storage medium for data transmission |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102664903A (en) | Network user identifying method and system | |
CN110213246B (en) | Wide-area multi-factor identity authentication system | |
US9769655B2 (en) | Sharing security keys with headless devices | |
WO2017197974A1 (en) | Biometric characteristic-based security authentication method, device and electronic equipment | |
US8041954B2 (en) | Method and system for providing a secure login solution using one-time passwords | |
CN108650212A (en) | A kind of Internet of Things certification and access control method and Internet of Things security gateway system | |
EP2732400B1 (en) | Method and system for verifying an access request | |
CN110149328B (en) | Interface authentication method, device, equipment and computer readable storage medium | |
Parmar et al. | A comprehensive study on passwordless authentication | |
US10219154B1 (en) | Frictionless or near-frictionless 3 factor user authentication method and system by use of triad network | |
EP2775417A1 (en) | Computer implemented multi-factor authentication | |
CN111903104A (en) | Method and system for performing user authentication | |
US20130223696A1 (en) | System and method for providing secure access to an electronic device using facial biometric identification and screen gesture | |
KR101451359B1 (en) | User account recovery | |
WO2013101358A1 (en) | System and method for secure network login | |
CN110545274A (en) | Method, device and system for UMA service based on people and evidence integration | |
CN105703910A (en) | Dynamic password verifying method based on Wechat service number | |
Kwon et al. | CCTV-based multi-factor authentication system | |
CN103428698B (en) | Mobile interchange participant's identity strong authentication method | |
Papaioannou et al. | User authentication and authorization for next generation mobile passenger ID devices for land and sea border control | |
CN104703180A (en) | Implicit multiple authentication method based on mobile Internet and intelligent terminal | |
CN110516427B (en) | Terminal user identity authentication method and device, storage medium and computer equipment | |
CN105262747A (en) | Polymorphic terminal identity verification system and method based on biological characteristic recognition | |
CN109933974A (en) | Cryptographic initialization method, apparatus, computer equipment and storage medium | |
CN109218318A (en) | A kind of things-internet gateway login detecting method based on equipment knowledge |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120912 |