CN101662458A - Authentication method - Google Patents

Authentication method Download PDF

Info

Publication number
CN101662458A
CN101662458A CN200810146953A CN200810146953A CN101662458A CN 101662458 A CN101662458 A CN 101662458A CN 200810146953 A CN200810146953 A CN 200810146953A CN 200810146953 A CN200810146953 A CN 200810146953A CN 101662458 A CN101662458 A CN 101662458A
Authority
CN
China
Prior art keywords
time password
user
session
authentication
certificate server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200810146953A
Other languages
Chinese (zh)
Inventor
郭代飞
隋爱芬
王涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens Ltd China
Original Assignee
Siemens Ltd China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens Ltd China filed Critical Siemens Ltd China
Priority to CN200810146953A priority Critical patent/CN101662458A/en
Publication of CN101662458A publication Critical patent/CN101662458A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides an authentication method, which comprises the following steps that: (1) a user sends an authentication request message to an authentication server; (2) the authentication serververifies the identity of the user, if the user is a valid user, a step (3) is performed; (3) the authentication server generates a one-time password, creates a session and sends the one-time passwordand a session identifier marking the session to the user through a wired network; (4) the user sends the obtained one-time password and the session identifier to the authentication server through a wireless network; and (5) the authentication server compares the received one-time password with the generated one-time password, if the received one-time password and the generated one-time password are the same, the authentication passes, and otherwise, the authentication does not pass. Compared with the one-time password authentication method in the prior art, the authentication method of the invention is safer in the authentication process.

Description

A kind of authentication method
Technical field
The present invention relates to a kind of authentication (Authentication) method, especially a kind of one-time password (One Time Password, OTP) authentication method.
Background technology
In present network, there is the weakness of anti-attack ability difference in some traditional authentication methods (for example authentication method of Chang Yong " user name+password ").These authentication methods use static password (or claiming password) usually, and password is constant in long a period of time.In network, transmit password owing to use expressly, so the assailant is easier to guess password or be easier to use the monitoring instrument to eavesdrop the transmission content, thereby realizes user password.In addition, under the content record that some wooden horse instruments also can knock the user when the user knocks keyboard, and then the identification user password.Have, even the user has used ciphertext transmission data sometimes, the assailant is difficult to crack user's password plaintext again, but the assailant still can obtain user's access rights by the packet that simulation transmission user has sent.
At the weakness in the above-mentioned authentication method, the higher authentication method of some fail safes has been proposed in the prior art, one of them is the one-time password method.In the one-time password method, user's password be not as traditional authentication method in a period of time password constant, but for each time the authentication all use a new password, so be called one-time password.
There have been many one-time password technology in the existing Verification System.For example, in some Web banks use one-time password is printed on the one-time password card, each is coated with the coating that can swipe above the password.The user can use an one-time password in the authentication that Web bank uses each time.Use this method relatively more cheap on price, but when the password on the one-time password card all used up, the user need buy new one-time password card.Again for example, some one-time password authentication systems use one-time password token (OTP Token) technology.This token is a hardware device, is used for carrying out synchronously with certificate server, and synchronized result is presented on the display screen of token.But the weakness of this method is that token has certain life cycle, surpass this life cycle and just need purchase token again because the price of this token is expensive, thus cause buying or the cost that upgrades higher.Again for example, can use challenge-response (Challenge-Response) technology to produce one-time password.This method is to send a random number to terminal by network side, and terminal is used the key of being stored that this random number is carried out computing and returned operation result and give network side, and whether the key of being stored in order to the verification terminal side identical with network side.
Along with popularizing of mobile phone, occurred that a kind of (Short Message Service SMS) transmits the one-time password technology of one-time password with Short Message Service.In this Verification System, there are following several SMS authentication methods at present:
First kind, when receiving the authentication request that the user sends, certificate server (also claiming authentication center) generates an one-time password, by SMS this password is passed to the user then.The user uses this password to land one and uses and this application is conducted interviews.
Because certificate server is by SMS message one-time password to be sent to the user, and SMS message is to transmit by air interface, the SMS message of interface transmission is aloft eavesdropped easily.That is to say, go-between (man-in-the-middle) thus can set up a base station between mobile phone and certificate server intercepts the SMS message of transmitting one-time password, and then land above-mentioned application and this application conducted interviews with eavesdropping the one-time password that obtains.Therefore, the fail safe of this verification process is relatively poor.
Second kind, when receiving the authentication request that the user sends, certificate server (also claiming authentication center) generates an one-time password, by SMS this password is passed to the user then.The user sends to certificate server with the one-time password that receives by SMS again and verifies.
This method all will use SMS to transmit one-time password on the both direction of a verification process, based on first kind of same reason, the fail safe of this verification process is also relatively poor.In addition, because it is limited to send the Radio Resource of SMS, will carry out the queuing of SMS at the SMS center, at a time if the SMS that sends is a lot, cause under the congested situation of SMS, SMS is easy to lose.
The third, when receiving the authentication request that the user sends, certificate server (also claiming authentication center) generates an one-time password, and this password carried out two-dimensional bar code coding, (Multimedia Messaging Sevice MMS) passes to the user to one-time password after will encoding then by MMS.The user receives and uses after this MMS message bar code decoder to decode, and takes out one-time password, re-uses this password and lands one and use and this application is conducted interviews.
Based on first kind of same reason, the fail safe of this verification process is also relatively poor.In addition, because MMS is a picture format, it is slower to use MMS to transmit one-time password speed, and price is also expensive than SMS, therefore this method and impracticable.
Summary of the invention
Main purpose of the present invention is to provide a kind of authentication method, can make that verification process is safer.
For achieving the above object, technical scheme of the present invention specifically is achieved in that a kind of authentication method, and the method includes the steps of:
(1) user sends authentication request message to a certificate server;
(2) described certificate server is verified described user's identity, if validated user then continues step (3);
(3) described certificate server generates an one-time password and creates a session, and the Session ID of described one-time password and the described session of sign is sent to described user by a cable network;
(4) described user sends to described certificate server with one-time password and the Session ID that obtains by a wireless network;
(5) described certificate server compares one-time password that is received and the one-time password that is generated, and is identical as if both, then authentication success; Otherwise authentification failure.
In the described step (1), described user sends to an authentication proxy by a client with described authentication request message, and described authentication proxy sends to described certificate server with described authentication request message again.Described authentication request message generally includes described user's user identifier, PIN and identifying code.
In the described step (2), cryptographic Hash and the described user identifier identity of verifying described user of described certificate server by checking described PIN.
In the described step (3), described certificate server is with described one-time password and described Session ID is encrypted and/or the back of encoding sends to described user by described cable network.Wherein, described certificate server is at first encrypted described one-time password, certificate server adopts symmetric cryptographic algorithm that described one-time password is encrypted, and key wherein is described user identifier, PIN, Session ID three's a cryptographic Hash.Then, one-time password and described Session ID after certificate server will be encrypted carry out two-dimensional bar code coding, and the message after will encoding again sends to described user by described cable network.
In the described step (4), described user carries out two-dimensional bar code decoding and deciphering to the message that receives, thereby obtains described Session ID and described one-time password.Wherein, described user at first uses a decoder that the message that receives is carried out the two-dimensional bar code decoding, obtain described Session ID, cryptographic Hash according to described user identifier, PIN, Session ID three calculates described key again, according to described key described one-time password is decrypted at last.At last, described user sends to described certificate server with one-time password and the Session ID that obtains by Short Message Service.
Adopt authentication method provided by the present invention, certificate server passes to the user with the one-time password that generates by cable network, and the user then by wireless network, especially passes to certificate server by Short Message Service with one-time password.In this process, at first cable network has guaranteed the fail safe that one-time password transmits effectively.Secondly, even the assailant has intercepted and captured one-time password in the process of cable network transmission, but because the assailant can't have user's mobile phone, therefore SIM card that can't analog subscriber also just can't pretend to be the user to go to send the checking of one-time password with the access authentication server.Once more, even in the worst case, the assailant has intercepted and captured one-time password in the process of cable network transmission, and the SIM card of analog subscriber removes to send one-time password, but because certificate server has been created a session and has been provided with a Session ID for this session for the user, and this Session ID and one-time password are one to one, the one-time password that the assailant sends can't be corresponding with user's Session ID, therefore also just can't land the also application of calling party.
In addition, in the authentication method provided by the present invention, certificate server with the one-time password that generates by cable network but not Short Message Service passes to the user.Because the bandwidth of cable network is greater than wireless network, when therefore sending one-time password to the user, have stable, fireballing advantage, and one-time password is difficult for losing the reliability height with cable network.
Description of drawings
Below in conjunction with accompanying drawing the specific embodiment of the present invention is described in further detail, wherein:
Fig. 1 is the flow chart of the authentication method of the embodiment of the invention;
Embodiment
Fig. 1 is the flow chart of the authentication method of the embodiment of the invention.In Verification System shown in Figure 1, comprise the employed mobile phone of user, user client, authentication proxy's (or claiming application server), SMS system and certificate server (or claiming authentication center).
The user must set up a session (session) with certificate server earlier before application of visit.The user initiates authentication request and receives one-time password OTP by client.Browser commonly used and server architecture (Browser/Server, B/S) in, client is the web application in authentication proxy normally.Client can be with its IP address designation, more accurately, and also available its IP address of client and port numbers sign.Authentication proxy initiates the user from client authentication request is transmitted to certificate server and one-time password OTP that certificate server is generated is transmitted to user client.Authentication center then is used for the user is verified, generates one-time password OTP and authenticating one-time password OTP.The decoder that can decode to two-dimensional bar code is installed in user's mobile phone or in the client, and this decoder can also be decrypted cryptographic algorithm.Decoder in user's the mobile phone can be the camera that is provided with in the mobile phone or one section decoding program on the mobile phone.
Specify authenticating step below:
The first step, before application of visit, the user sends authentication request message by client to certificate server.For example in a web application, the user is by a browser access authentication proxy.Authentication proxy then shows an interface by the browser of client, allows the user import its user identifier (userID), PIN (PIN code) and identifying code by client.Identifying code normally with a string numeral or symbol that produces at random, generates a width of cloth picture, adds some interference pixels in the picture, and by user's naked eyes identification verification code information wherein, the input list is submitted the website checking to, could use a certain function after being proved to be successful.The effect of identifying code is in order to prevent that the assailant from utilizing machine to register automatically, login, visit.
After the user imported its user identifier userID, PIN PIN code and identifying code by client, client sent an authentication request message to authentication proxy.Comprised above-mentioned user identifier userID in the authentication request message, the PIN PIN code is carried out the value HASH (PIN) of Hash operation and the IP address of identifying code and client, wherein HASH () is a hash function.For identifying user more accurately, can also comprise the employed port numbers of client in the authentication request message.Authentication proxy verifies identifying code wherein, is the request that user's request of sending or machine send with differentiation.If the former, authentication proxy with user identifier userID, to the PIN PIN code carry out the value HASH (PIN) of Hash operation, the IP address and the port numbers of client is transmitted to certificate server.
In second step, certificate server is verified described user's identity.Certificate server compares the cryptographic Hash HASH (PIN) of user identifier userID and PIN and the user identifier userID of its storage and the cryptographic Hash HASH (PIN) of PIN, if unanimity then carried out for the 3rd step.
In the 3rd step, certificate server uses random generator to generate an one-time password OTP and creates a session, and this session identifies with a Session ID SessionID.Session ID SessionID and this one-time password OTP binding, and also bind with the IP address and the port numbers of subscription client.That is to say, for a session, only to an IP address and a port numbers that should subscription client.This session is set to unactivated state, up to certificate server receive one-time password OTP that the user sends over and authentication by after this session just be activated.
Certificate server sends to described user with the Session ID SessionID of one-time password OTP and the described session of sign by a cable network.But from the angle of fail safe, under the more situation, encrypt or encode, perhaps both encrypt, encode again one-time password OTP and Session ID SessionID.This both sentenced one-time password OTP and Session ID SessionID was encrypted, and was encoded to example again and described.
Certificate server is at first encrypted one-time password OTP.Certificate server calculates encrypted secret key K earlier, and key K is the cryptographic Hash after user identifier userID, PIN PIN, Session ID SessionID three connect, and promptly is expressed as follows:
K=HASH(userID||PIN||SessionID)
Wherein, || expression is with both connect before and after this symbol.
Then, certificate server adopts symmetric cryptographic algorithm that described one-time password OTP is encrypted, and promptly calculates E K(OTP), E represents symmetric cryptographic algorithm, and K is a key.
At last, certificate server adopts one-time password OTP and Session ID SessionID after encrypting is carried out two-dimensional bar code coding, generates message Msg1.
Msg1=BarCode(E K(OTP)||SessionID)
Wherein, || both connect with these symbol front and back in expression, and BarCode represents the character string after connecting is carried out two-dimensional bar code coding.Here said two-dimensional bar code is the chequered with black and white graphic recording data symbol information that (on the two-dimensional directional) distributes on the plane according to certain rules with certain specific geometric figure, can therefore can in very little area, express a large amount of information in horizontal and vertical two orientation while expressing information.
Certificate server will encrypt and two-dimensional bar code coding after the message Msg1 that generates send to authentication proxy, authentication proxy further is transmitted to subscription client with this message again.
In the 4th step, after the user obtained message Msg1 by client, at first the message Msg1 that will be presented on the client with the camera on the mobile phone took pictures, and obtains the two-dimensional bar code pattern.The user utilizes can decoding to two-dimensional bar code to the decoder that two-dimensional bar code is decoded of installing in the mobile phone, obtains the one-time password E that encrypts K(OTP) and Session ID SessionID.Because the decoder on the mobile phone can also be decrypted cryptographic algorithm, therefore mobile phone calculates key K according to user identifier userID, PIN PIN, Session ID SessionID three's cryptographic Hash again, at last according to the one-time password E of key K to encrypting K(OTP) be decrypted, obtain one-time password OTP.
In another embodiment, client has decoder.Client directly utilizes its decoder that two-dimensional bar code is decoded in client after obtaining message Msg1, obtains the one-time password E that encrypts K(OTP) and Session ID SessionID.Client calculates key K according to user identifier userID, PIN PIN, Session ID SessionID three's cryptographic Hash again, at last according to the one-time password E of key K to encrypting K(OTP) be decrypted, obtain one-time password OTP.
The user utilizes mobile phone to edit short message SMS, comprises one-time password OTP and Session ID SessionID in the short message SMS, and this short message SMS is sent to the SMS gateway, and the SMS gateway is given certificate server with this forwards.
In the 5th step, one-time password OTP that certificate server will receive from SMS gateway place and the one-time password OTP that is generated compare, and be identical as if both, then authentication success; Otherwise authentification failure.In case authentication success, then certificate server will be with the session activation of Session ID SessionID sign.Like this, user and certificate server have successfully been set up session, and the user just can conduct interviews to the application that is positioned at client.
As can be seen, certificate server has been created a session earlier among the present invention from the process of the foregoing description, and this session is bound with the IP address (and port numbers) of client.The assailant has intercepted and captured one-time password in the process of one-time password even transmit to client at certificate server, the application that the assailant also can't login user will visit.This is because the person of casting the first stone can't have user's mobile phone, and therefore SIM card that can't analog subscriber also just can't pretend to be the user to go to send the checking of one-time password with the access authentication server.Once more, even in the worst case, the assailant has intercepted and captured one-time password, and the SIM card of analog subscriber removes to send one-time password, but because certificate server has been created a session and has been provided with a Session ID for this session for the user, and this Session ID and one-time password are one to one, and the one-time password that the assailant sends can't be corresponding with user's Session ID, therefore also just can't land the also application of calling party.

Claims (10)

1. authentication method is characterized in that the method includes the steps of:
(1) user sends authentication request message to a certificate server;
(2) described certificate server is verified described user's identity, if validated user then continues step (3);
(3) described certificate server generates an one-time password and creates a session, and the Session ID of described one-time password and the described session of sign is sent to described user by a cable network;
(4) described user sends to described certificate server with one-time password and the Session ID that obtains by a wireless network;
(5) described certificate server compares one-time password that is received and the one-time password that is generated, and is identical as if both, then authentication success; Otherwise authentification failure.
2. authentication method according to claim 1, it is characterized in that: in the described step (1), described user sends to an authentication proxy by a client with described authentication request message, and described authentication proxy sends to described certificate server with described authentication request message again.
3. authentication method according to claim 1 and 2 is characterized in that: described authentication request message comprises the IP address of described user's user identifier, PIN, identifying code and subscription client.
4. authentication method according to claim 3 is characterized in that: in the described step (2), and cryptographic Hash and the described user identifier identity of verifying described user of described certificate server by checking described PIN.
5. authentication method according to claim 1 is characterized in that: in the described step (3), described certificate server is with described one-time password and described Session ID is encrypted and/or the back of encoding sends to described user by described cable network.
6. authentication method according to claim 5, it is characterized in that: described certificate server is at first encrypted described one-time password, one-time password and described Session ID after will encrypting then carry out two-dimensional bar code coding, and the message after will encoding again sends to described user by described cable network.
7. authentication method according to claim 6, it is characterized in that: described certificate server adopts symmetric cryptographic algorithm that described one-time password is encrypted, and key wherein is described user identifier, PIN, Session ID three's a cryptographic Hash.
8. authentication method according to claim 6 is characterized in that: in the described step (4), described user carries out two-dimensional bar code decoding and deciphering to the message that receives, thereby obtains described Session ID and described one-time password.
9. authentication method according to claim 8, it is characterized in that: described user at first uses a decoder that the message that receives is carried out the two-dimensional bar code decoding, obtain described Session ID, cryptographic Hash according to described user identifier, PIN, Session ID three calculates described key again, according to described key described one-time password is decrypted at last.
10. authentication method according to claim 5 is characterized in that: in the described step (4), described user sends to described certificate server with one-time password and the Session ID that obtains by Short Message Service.
CN200810146953A 2008-08-28 2008-08-28 Authentication method Pending CN101662458A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810146953A CN101662458A (en) 2008-08-28 2008-08-28 Authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810146953A CN101662458A (en) 2008-08-28 2008-08-28 Authentication method

Publications (1)

Publication Number Publication Date
CN101662458A true CN101662458A (en) 2010-03-03

Family

ID=41790249

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810146953A Pending CN101662458A (en) 2008-08-28 2008-08-28 Authentication method

Country Status (1)

Country Link
CN (1) CN101662458A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102387016A (en) * 2010-08-26 2012-03-21 西门子公司 Authentication method, device and system
CN102576400A (en) * 2010-03-29 2012-07-11 乐天株式会社 Authentication server device, authentication server device-use program and authentication method
CN103986725A (en) * 2014-05-29 2014-08-13 中国农业银行股份有限公司 Client side, server side and identity authentication system and method
CN104519414A (en) * 2013-09-27 2015-04-15 北京新媒传信科技有限公司 Method and system for streaming media transmission
WO2015144066A1 (en) * 2014-03-26 2015-10-01 Tencent Technology (Shenzhen) Company Limited Sensitive operation verification method, apparatus, and system
CN105323251A (en) * 2015-11-13 2016-02-10 飞天诚信科技股份有限公司 Method for realizing voice broadcast authentication and cloud authentication server
CN105741116A (en) * 2014-12-11 2016-07-06 北京握奇智能科技有限公司 Fast payment method, apparatus and system
CN106161475A (en) * 2016-09-12 2016-11-23 沈书荣 The implementation method of subscription authentication and device
CN106549858A (en) * 2016-12-08 2017-03-29 深圳奥联信息安全技术有限公司 A kind of instant messaging encryption method based on id password
WO2019184206A1 (en) * 2018-03-26 2019-10-03 平安科技(深圳)有限公司 Identity authentication method and apparatus
CN110392998A (en) * 2017-05-09 2019-10-29 华为技术有限公司 A kind of data packet method of calibration and equipment
CN110572388A (en) * 2019-09-05 2019-12-13 北京宝兰德软件股份有限公司 method for connecting unified authentication server and unified authentication adapter
CN110933078A (en) * 2019-11-29 2020-03-27 交通银行股份有限公司 H5 unregistered user session tracking method
CN112202559A (en) * 2020-12-10 2021-01-08 飞天诚信科技股份有限公司 Method and system for automatically registering management server
US11445462B2 (en) * 2019-04-09 2022-09-13 Samsung Electronics Co., Ltd. Method and apparatus for performing communication in wireless communication system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1427609A (en) * 2001-12-20 2003-07-02 西北工业大学 Nonrecurring countersign and business confirmation method
CN1756148A (en) * 2004-09-30 2006-04-05 阿尔卡特公司 Mobile authentication for network access
CN1759558A (en) * 2003-03-10 2006-04-12 汤姆森特许公司 An identity mapping mechanism in wlan access control with public authentication servers

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1427609A (en) * 2001-12-20 2003-07-02 西北工业大学 Nonrecurring countersign and business confirmation method
CN1759558A (en) * 2003-03-10 2006-04-12 汤姆森特许公司 An identity mapping mechanism in wlan access control with public authentication servers
CN1756148A (en) * 2004-09-30 2006-04-05 阿尔卡特公司 Mobile authentication for network access

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102576400A (en) * 2010-03-29 2012-07-11 乐天株式会社 Authentication server device, authentication server device-use program and authentication method
CN102576400B (en) * 2010-03-29 2015-03-11 乐天株式会社 Authentication server device, authentication server device-use program and authentication method
US9348986B2 (en) 2010-03-29 2016-05-24 Rakuten, Inc. Authentication server apparatus, authentication server apparatus-use program and authentication method
CN102387016A (en) * 2010-08-26 2012-03-21 西门子公司 Authentication method, device and system
CN104519414A (en) * 2013-09-27 2015-04-15 北京新媒传信科技有限公司 Method and system for streaming media transmission
WO2015144066A1 (en) * 2014-03-26 2015-10-01 Tencent Technology (Shenzhen) Company Limited Sensitive operation verification method, apparatus, and system
CN103986725A (en) * 2014-05-29 2014-08-13 中国农业银行股份有限公司 Client side, server side and identity authentication system and method
CN105741116A (en) * 2014-12-11 2016-07-06 北京握奇智能科技有限公司 Fast payment method, apparatus and system
CN105741116B (en) * 2014-12-11 2019-08-13 北京握奇智能科技有限公司 A kind of quick payment method, apparatus and system
CN105323251A (en) * 2015-11-13 2016-02-10 飞天诚信科技股份有限公司 Method for realizing voice broadcast authentication and cloud authentication server
CN106161475B (en) * 2016-09-12 2020-06-05 沈书荣 Method and device for realizing user authentication
CN106161475A (en) * 2016-09-12 2016-11-23 沈书荣 The implementation method of subscription authentication and device
CN106549858A (en) * 2016-12-08 2017-03-29 深圳奥联信息安全技术有限公司 A kind of instant messaging encryption method based on id password
CN106549858B (en) * 2016-12-08 2019-12-10 深圳奥联信息安全技术有限公司 Instant messaging encryption method based on identification password
CN110392998A (en) * 2017-05-09 2019-10-29 华为技术有限公司 A kind of data packet method of calibration and equipment
US11706618B2 (en) 2017-05-09 2023-07-18 Huawei Technologies Co., Ltd. Data packet verification method and device
WO2019184206A1 (en) * 2018-03-26 2019-10-03 平安科技(深圳)有限公司 Identity authentication method and apparatus
US11445462B2 (en) * 2019-04-09 2022-09-13 Samsung Electronics Co., Ltd. Method and apparatus for performing communication in wireless communication system
CN110572388A (en) * 2019-09-05 2019-12-13 北京宝兰德软件股份有限公司 method for connecting unified authentication server and unified authentication adapter
CN110933078A (en) * 2019-11-29 2020-03-27 交通银行股份有限公司 H5 unregistered user session tracking method
CN110933078B (en) * 2019-11-29 2022-04-05 交通银行股份有限公司 H5 unregistered user session tracking method
CN112202559A (en) * 2020-12-10 2021-01-08 飞天诚信科技股份有限公司 Method and system for automatically registering management server
CN112202559B (en) * 2020-12-10 2021-03-16 飞天诚信科技股份有限公司 Method and system for automatically registering management server

Similar Documents

Publication Publication Date Title
CN101662458A (en) Authentication method
CN105099692B (en) Security verification method and device, server and terminal
KR101508360B1 (en) Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer
CN105515783B (en) Identity identifying method, server and certification terminal
CN106304074B (en) Auth method and system towards mobile subscriber
CN105306211B (en) A kind of identity identifying method of client software
CN111615105B (en) Information providing and acquiring method, device and terminal
US8689339B2 (en) Method, system and apparatus for game data transmission
CN104883367B (en) A kind of method, system and applications client that auxiliary verification logs in
CN101631305B (en) Encryption method and system
US20140227999A1 (en) Method, server and system for authentication of a person
CN108322416B (en) Security authentication implementation method, device and system
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
KR20140134663A (en) Method for verifying the identity of a user of a communicating terminal and associated system
CN104917807A (en) Resource transfer method, apparatus and system
CN111131416A (en) Business service providing method and device, storage medium and electronic device
KR20110083886A (en) Apparatus and method for other portable terminal authentication in portable terminal
CN107094156A (en) A kind of safety communicating method and system based on P2P patterns
CN105323063B (en) The auth method of mobile terminal and fixed intelligent terminal based on two dimensional code
CN102404337A (en) Data encryption method and device
CN105024813B (en) A kind of exchange method of server, user equipment and user equipment and server
CN111130798A (en) Request authentication method and related equipment
CN109145628A (en) A kind of collecting method and system based on credible performing environment
CN106656955A (en) Communication method and system and user terminal
CN114390524B (en) Method and device for realizing one-key login service

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20100303