CN101753305A - Network security certification method, device and system - Google Patents

Network security certification method, device and system Download PDF

Info

Publication number
CN101753305A
CN101753305A CN200810241491A CN200810241491A CN101753305A CN 101753305 A CN101753305 A CN 101753305A CN 200810241491 A CN200810241491 A CN 200810241491A CN 200810241491 A CN200810241491 A CN 200810241491A CN 101753305 A CN101753305 A CN 101753305A
Authority
CN
China
Prior art keywords
terminal
user profile
user
authentication
certificate server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200810241491A
Other languages
Chinese (zh)
Inventor
周胜杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Konka Group Co Ltd
Original Assignee
Konka Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Konka Group Co Ltd filed Critical Konka Group Co Ltd
Priority to CN200810241491A priority Critical patent/CN101753305A/en
Publication of CN101753305A publication Critical patent/CN101753305A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention discloses a network security certification method, a device and a system. The network security certification method comprises the following steps: receiving user information; binding the user information and a physical address of a terminal to generate certification information; sending the certification information to a network side certification server; certifying the certification information by the certification server; and receiving the certification results fed back by the certification server. When the network security certification method, the device and the system provided by the embodiment of the invention are used, the reliability of the network security certification can be improved, the trueness of the user identities can be ensured, and the network business security is improved.

Description

A kind of network security certification method, Apparatus and system
Technical field
The present invention relates to electronic technology field, relate in particular to a kind of network security certification method, Apparatus and system.
Background technology
In recent years, keen competition in the face of the financial market, every profession and trade businessman is when realizing traditional business, and ecommerce has become that businessman branches out, one of the main means of seeking development, and various operational lines such as Web bank, Web TV, shopping online, online secorities trading arise at the historic moment.Ecommerce can provide comprehensive, round-the-clock convenient service for the client because be to utilize network to commence business, and has efficient height, cost is low and flexibility is strong characteristics.
Electronic commerce times, safety is the problem of a key.Compare to traditional approach, though ecommerce has incomparable advantage at aspects such as speed, costs, but, make that sensitive informations such as client password, customer privacy are intercepted and captured, decoded, distort easily in transmission course because the Internet is the public network that adopts open protocol.At present, the businessman that great majority are carried out operational line takes " user name+password " these conventional authentication means, and promptly as long as the user name of user's input is corresponding with password, then businessman thinks that this user is validated user, by authentication.
The inventor finds that there is following shortcoming in prior art in implementing process of the present invention:
Still there is the lower problem of fail safe in existing network security certification method.A series of safety problems might occur, for example, user identity is palmed off, user profile is illegally stolen or distorted by other people, bank account capital is transferred etc.The existence of these network security certification problems has seriously hindered Development of E-business, becomes the bottleneck of e-commerce development.Because operational line provides customer-oriented service on the internet, therefore above-mentioned network security certification problem seems particularly important.
Summary of the invention
The network security certification method that the embodiment of the invention provides, system, and corresponding terminal, certificate server can improve the reliability of network security certification, guarantee the authenticity of user identity, and the fail safe of operational line is improved.
The network security certification method that the embodiment of the invention provides comprises:
Receive user profile;
Physical address binding with described user profile and terminal generates authentication information;
Send described authentication information to the network side certificate server, described authentication information is authenticated by described certificate server;
Receive the authentication result of described certificate server feedback.
Accordingly, the terminal that can realize said method that provides of the embodiment of the invention comprises:
The user profile receiver module is used to receive user profile;
The authentication information generation module is used for the physical address binding with the user profile and the terminal of described user profile receiver module reception, generates authentication information;
The authentication information sending module is used for sending the authentication information that described authentication information generation module generates to the network side certificate server;
The authentication result receiver module is used to receive the authentication result that described certificate server feeds back.
The network side certificate server corresponding with above-mentioned terminal comprises:
The subscriber data memory module is used for the subscriber data that storage terminal is registered;
The authentication information receiver module is used for the authentication information that receiving terminal sends;
Whether authentication module is used for judging the user profile that described authentication information comprises and the physical address of terminal, identical with the user profile and the physical address of terminal in the subscriber data memory module;
The authentication result feedback module is used for feeding back to described terminal the authentication result of described authentication module.
At last, the embodiment of the invention also provides network security authentication system, and this system comprises: terminal and certificate server;
Described terminal is used to receive user profile, and binds back generation authentication information with the physical address of described terminal, and the certificate server that sends to network side authenticates;
Whether described certificate server is used to judge the user profile that described authentication information comprises and the physical address of terminal, identical with the user profile and the physical address of terminal in the subscriber data of described endpoint registration, and authentication result is fed back to described terminal.
The network security certification method that the embodiment of the invention provides, system, and corresponding terminal, certificate server can improve the reliability of network security certification, guarantee the authenticity of user identity, and the fail safe of operational line is improved.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the network security certification method first embodiment schematic flow sheet provided by the invention;
Fig. 2 is the network security certification method second embodiment schematic flow sheet provided by the invention;
Fig. 3 is that terminal provided by the invention is carried out safety certification alarm embodiment schematic flow sheet;
Fig. 4 is the network security authentication system example structure schematic diagram that the embodiment of the invention provides;
Fig. 5 is a terminal example structure schematic diagram provided by the invention;
Fig. 6 is a safety certification alarm module structural representation provided by the invention;
Fig. 7 is a certificate server example structure schematic diagram provided by the invention.
Embodiment
The network security certification method that the embodiment of the invention provides, system, and corresponding terminal, certificate server can improve the reliability of network security certification, guarantee the authenticity of user identity, and the fail safe of operational line is improved.
Below in conjunction with accompanying drawing to the embodiment of the invention do further in detail, clearly explanation.
Referring to Fig. 1, be the network security certification method first embodiment schematic flow sheet provided by the invention.As shown in the figure:
At step S100, receive user profile.More specifically, this user profile can be user name, user cipher, user's the various information that are used to indicate user identity such as fingerprint, user's face recognition information.
At step S101, the physical address binding with user profile and terminal generates authentication information.
At step S102, the certificate server transmission authentication information to network side is authenticated authentication information by this certificate server.
At step S103, receive the authentication result of certificate server feedback.
Further, the certificate server in the embodiment of the invention not only can be that businessman provides, and also can be provided by the third party, to improve the reliability of authentication, the subscriber information message of more efficiently protection.
Implement the network security certification method that the embodiment of the invention provides, the physical address binding with user profile and terminal prevents that effectively other people from passing through other terminal fake user.Simultaneously, in embodiments of the present invention, except the mode that can adopt traditional user name encrypted code authenticates, can also adopt modes such as user fingerprints, user's face recognition information to authenticate, reliable more and safety than traditional authentication mode.Implement the network security certification method that the embodiment of the invention provides, the fail safe of operational line is effectively improved.
Referring to Fig. 2, be the network security certification method second embodiment schematic flow sheet provided by the invention.In the present embodiment, the idiographic flow of network security certification method will be set forth, and some can further improve the additional technical feature of this method reliability.
At step S200, the user is by terminal registered user's data on the certificate server of network side.
More specifically, this subscriber data can comprise: various and subscriber-related information such as user name, home address, phone number, individual mailbox, safe early warning threshold values; And the safety certification mode, when promptly the user logins later on, carry out authentication in which way; For example: user name and Web TV physical I D binding, fingerprint and Web TV physical I D binding, recognition of face and Web TV physical I D binding or do not need safety certification etc.The concrete subscriber data content and the selection of safety certification mode are by providing professional businessman and user to select according to self condition and needs.
At step S201, whether terminal judges user is for logining first, if login first then guides user registered user data; If not login first, execution in step S301 then.
At step S202, terminal provides the safety certification mode that can select for the user, and according to user's selection, receives corresponding user profile.
Further, this user profile can be user name, user fingerprints, user's recognition of face information etc.The safety certification mode of the actual use of user is when registered user's data, and the user is according to the hardware condition of terminal, has selected to determine.For example, the employed terminal of user can provide the function of finger scan, and then the user can be with its fingerprint as the user profile of carrying out safety certification; If the employed terminal of user does not provide user's recognition of face information, then the user can't use this safety certification mode.
At step S203, terminal generates authentication information with the physical I D binding of the user profile and the terminal self of reception.
More specifically, because the terminal physical I D that the general user uses determines,, can significantly reduce the possibility of other people fake user so the physical I D of user profile and terminal self is bound.Further, terminal can also be bound the more information relevant with user identity, to obtain better fail safe.
At step S204, terminal sends authentication information by network to certificate server.Carry the physical I D of user profile and terminal self in this authentication information, and other possible information of determining that user identity is relevant of being used for.
At step S205, whether the user profile of carrying in the certificate server judgement authentication information and the physical I D of terminal be identical with the physical I D of user profile of registering and terminal; If the physical I D of user profile and terminal is identical, then judges to authenticate and pass through, and carry out the preparation of other instruction of receiving terminal; Otherwise, judge authentification failure, refusing provides professional for it.
Further, if not only carry the physical I D of user profile and terminal in the authentication information, also have other information relevant with user identity, then these information all will be compared with the information in the subscriber data of registering before, have only these information all consistent, judge that just it passes through authentication.
At step S206, certificate server feeds back to terminal with authentication result, does respective handling by this terminal according to authentication result.Concrete, if authentication is passed through, the user can pass through terminal, sends further instruction, finishes the operation that it is wanted, and for example watches various operational lines such as Web TV, shopping online, online secorities trading.Certainly, the user can only select in the scope of business that businessman provides; If authentification failure, terminal will be pointed out user authentication failure.
Further, the user can be provided with the safety certification threshold value on terminal, promptly allows the number of times of continuous authentification failure, surpass this threshold value, terminal promptly locks this user, and service no longer is provided, can alarm to the user by mobile phone or the E-mail address of user in the user profile of registration simultaneously.This process is specifically referring to Fig. 3:
At step S300, the user is provided with the safety certification threshold value on terminal, promptly allows to occur continuously the number of times of authentification failure, and the alarm mode when the authentification failure number of times surpasses the safety certification threshold value, for example, by user's mobile phone in the user profile of registration, to user's alarm of sending short messages; Or by user's E-mail address in the user profile of registration, to user's alarm of sending e-mails.
At step S301, terminal begins counting after receiving for the first time the authentication failure notification that the network side certificate server sends, receive that whenever an authentication failure notification counter adds one, receives the then counter O reset of notice of authentication success.
At step S302, judge whether its Counter Value surpasses the safety certification threshold value that presets, if do not surpass, then continue counting; If surpass, execution in step S303 then.
At step S303, the terminal refusal is proceeded network security certification, and the alarm mode that presets according to the user is sent alarm to the user simultaneously.
The method can effectively avoid other people to utilize hacker software, by network security certification, steals user profile in exhaustive mode, brings loss to the user.
Implement the network security certification method that the embodiment of the invention provides, through safety certification confirm user's legitimacy; Can notify the user security state by presetting the safety certification threshold value; By binding physical I D can be on network the position of locating terminal.The method is more safe and reliable than traditional authentication mode.Implement the network security certification method that the embodiment of the invention provides, the fail safe of operational line is effectively improved, avoid the user to be palmed off, information is stolen, distort and loss that other causes thus, strengthens degree of belief and the sense of security of user to operational line.
Referring to Fig. 4, be the network security authentication system structural representation that the embodiment of the invention provides, as shown in the figure, this system comprises: be connected by network between terminal 1 and the certificate server 2, at least one terminal 1 and certificate server 2.
Terminal 1 is at first registered subscriber data on the certificate server 2 of network side.After this, terminal 1 is after receiving user profile, and with the physical I D binding generation authentication information of self, the certificate server 2 that sends to network side authenticates.
Whether certificate server 2 after receiving the authentication information that terminal 1 sends, is judged the user profile that comprises in this authentication information and the physical I D of terminal, identical with the physical I D of the user profile that writes down in the subscriber data of registration and terminal before the terminal 1; If identical, judge that then described authentication passes through; If inequality, then judge described authentification failure, and authentication result is fed back to described terminal 1.
Certificate server 2 can be simultaneously be connected by network with a plurality of terminal 1, and this certificate server 2 can be provided by the third party.Therefore reduced the production cost that professional provider brings because of the increase fail safe, but strengthened the degree of belief and the sense of security of user Web TV.
Implement the network security authentication system that the embodiment of the invention provides, can authenticate user identity by the third party, and physical I D binding with user profile and terminal, prevent that effectively other people from passing through other terminal fake user, user's information security is protected, strengthened the safety of subscriber data and operational line itself, for operational line has been set up fire compartment wall one.
Referring to Fig. 5, be terminal example structure schematic diagram provided by the invention, as shown in the figure, this terminal comprises:
User profile receiver module 10 is used to receive user profile.
Further, this user profile can be user name, user fingerprints, user's recognition of face information etc.Which kind of user profile of the actual use of user is carried out network security certification, is when registered user's data, and the user is according to the hardware condition of the user profile receiver module 10 of terminal, has selected to determine.
For example, user profile receiver module 10 can provide the function of finger scan, and then the user can be with its fingerprint as the user profile of carrying out safety certification; If user profile receiver module 10 does not provide user's recognition of face information, then the user can't end user's face identifying information as the user profile of carrying out safety certification.
Authentication information generation module 11 is used for the physical I D binding with the user profile and the terminal of described user profile receiver module reception, generates authentication information.More specifically, because the terminal physical I D that the general user uses determines, so after authentication information generation module 11 is bound the physical I D of user profile and terminal self, can significantly reduce the possibility of other people fake user.
Further, authentication information generation module 11 can also be bound the more information relevant with user identity, to obtain better fail safe.
Authentication information sending module 12 is used for sending the authentication information that described authentication information generation module generates to the network side certificate server.
Further, carry the physical I D of user profile and terminal self in this authentication information, and other is possible, by the information that definite user identity is correlated with that is used for of authentication information generation module 11 bindings.
Authentication result receiver module 13 is used to receive the authentication result that described certificate server feeds back.
Further, after certificate server fed back to authentication result receiver module 13 with authentication result, authentication result receiver module 13 was done respective handling according to authentication result.Concrete, if authentication is passed through, the user can pass through human-computer interaction interface, sends further instruction, finishes the operation that it is wanted, and for example watches various operational lines such as Web TV, shopping online, online secorities trading.Certainly, the user can only select in the scope of business that businessman provides; If authentification failure, terminal will be pointed out user authentication failure.
More specifically, the terminal that the embodiment of the invention provides can also comprise: subscriber data Registering modules 14, be used for data to network side certificate server registered user, and this subscriber data comprises: the physical I D of user profile and terminal.
Further, the subscriber data of subscriber data Registering modules 14 registrations can comprise: various and subscriber-related information such as user name, home address, phone number, individual mailbox, safe early warning threshold values; And the safety certification mode, when promptly the user logins later on, carry out authentication in which way; For example: user name and Web TV physical I D binding, fingerprint and Web TV physical I D binding, recognition of face and Web TV physical I D binding or do not need safety certification etc.The concrete subscriber data content and the selection of safety certification mode are by providing professional businessman and user to select according to self condition and needs.
For making the terminal provided by the invention can better protection user profile and data; the device that the embodiment of the invention provides can also comprise: safety certification alarm module 15; this module is provided with the safety certification threshold value according to the user on terminal; add up the number of times of continuous authentification failure; surpass this threshold value, safety certification alarm module 15 promptly locks this user, and service no longer is provided; can alarm to the user by mobile phone or the E-mail address of user in the user profile of registration simultaneously.
Referring to Fig. 6, be safety certification alarm module 15 structural representations, as shown in the figure, this module comprises:
Module 150 is set, be used for providing human-computer interaction interface to the user, for the user safety certification threshold value is set, promptly allow to occur continuously the number of times of authentification failure, and the alarm mode when the authentification failure number of times surpasses the safety certification threshold value, for example, by user's mobile phone in the user profile of registration, to user's alarm of sending short messages; Or by user's E-mail address in the user profile of registration, to user's alarm of sending e-mails.
Counting module 151, counting module 151 begins counting after terminal is received the authentication failure notification that the network side certificate server sends for the first time, whenever the counter of receiving an authentication failure notification counting module 151 adds one, receives the then counter O reset of notice of authentication success.
Judge module 152 judges whether the Counter Value of counting module 151 surpasses the safety certification threshold value that presets, if do not surpass, then continues counting; If surpass, then notify the terminal refusal to proceed network security certification, according to being set, the alarm mode that the user presets in the module 150 sends alarm simultaneously to the user.
Safety certification alarm module 15 is optional module, and this module can effectively avoid other people to utilize hacker software, by network security certification, steals user profile in exhaustive mode, brings loss to the user.
Implement the terminal that the embodiment of the invention provides, through safety certification confirm user's legitimacy; Can notify the user security state by presetting the safety certification threshold value.This terminal is more safe and reliable than traditional terminal.Implement the terminal that the embodiment of the invention provides, the fail safe when making the user carry out operational line effectively improves, and avoids the user to be palmed off, information is stolen, distort and loss that other causes thus, strengthens degree of belief and the sense of security of user to operational line.
Referring to Fig. 7, be certificate server example structure schematic diagram provided by the invention, as shown in the figure, this certificate server comprises:
Subscriber data memory module 20 is used for the subscriber data that storage terminal is registered.More specifically, the user is by terminal registered user's data on the certificate server of network side, and this subscriber data promptly is stored in the subscriber data memory module 20.
Further, this subscriber data can comprise: various and subscriber-related information such as user name, home address, phone number, individual mailbox, safe early warning threshold values; And the safety certification mode, when promptly the user logins later on, carry out various and subscriber-related information such as authentication in which way.
Authentication information receiver module 21 is used for the authentication information that receiving terminal sends.Further, carry the physical I D of user profile and terminal self in the authentication information that authentication information receiver module 21 is received, and other is possible, by the information of determining that user identity is relevant of being used for of terminal binding.
Whether authentication module 22 is used for judging the user profile that authentication information that authentication information receiver module 21 is received comprises and the physical I D of terminal, identical with the user profile and the physical I D of terminal in the subscriber data memory module 20; If the physical I D of user profile and terminal is identical, then judges to authenticate and pass through, and carry out the preparation of other instruction of receiving terminal; Otherwise, judge authentification failure, refusing provides professional for it.
Further, if not only carry the physical I D of user profile and terminal in the authentication information, also has other information relevant with user identity, then authentication module 22 need all will be compared these information with the subscriber data in the subscriber data memory module 20, have only these information all consistent, judge that just it passes through authentication.
Authentication result feedback module 23 is used for feeding back to described terminal the authentication result of described authentication module.
The certificate server that the embodiment of the invention provides is positioned at network side, can be provided by the third party, is connected by network with terminal.Therefore, reduced the production cost that professional provider brings because of the fail safe that increases operational line.Can pass through the position of physical I D locating terminal on network of terminal simultaneously, fail safe when making the user carry out operational line effectively improves, avoid the user to be palmed off, information is stolen, distort and loss that other causes thus, strengthens degree of belief and the sense of security of user to operational line.
Above disclosed is a kind of preferred embodiment of the present invention only, can not limit the present invention's interest field certainly with this, and therefore the equivalent variations of doing according to claim of the present invention still belongs to the scope that the present invention is contained.
Through the above description of the embodiments, those skilled in the art can be well understood to the present invention and can realize by the mode that software adds essential hardware platform, can certainly all implement by hardware.Based on such understanding, all or part of can the embodying that technical scheme of the present invention contributes to background technology with the form of software product, this computer software product can be stored in the storage medium, as ROM/RAM, magnetic disc, CD etc., comprise that some instructions are with so that a computer equipment (can be a personal computer, server, the perhaps network equipment etc.) carry out the described method of some part of each embodiment of the present invention or embodiment.

Claims (10)

1. a network security certification method is characterized in that, comprising:
Receive user profile;
Physical address binding with described user profile and terminal generates authentication information;
Send described authentication information to the network side certificate server, described authentication information is authenticated by described certificate server;
Receive the authentication result of described certificate server feedback.
2. network security certification method as claimed in claim 1 is characterized in that, described user profile comprises: user name or fingerprint or recognition of face information.
3. network security certification method as claimed in claim 2 is characterized in that, also comprises before the described reception user profile:
Terminal is registered user's data on the network side certificate server, and described subscriber data comprises: the physical address of user profile and terminal.
4. network security certification method as claimed in claim 3 is characterized in that, described certificate server authenticates described authentication information and comprises:
Whether certificate server is judged the user profile that comprises in the described authentication information and the physical address of terminal, identical with the user profile and the physical address of terminal in described registered user's data;
If identical, judge that then described authentication passes through;
If inequality, then judge described authentification failure.
5. a terminal is characterized in that, comprising:
The user profile receiver module is used to receive user profile;
The authentication information generation module is used for the physical address binding with the user profile and the terminal of described user profile receiver module reception, generates authentication information;
The authentication information sending module is used for sending the authentication information that is generated by described authentication information generation module to the network side certificate server;
The authentication result receiver module is used to receive the authentication result that described certificate server feeds back.
6. terminal as claimed in claim 5 is characterized in that, the user profile that described user profile receiver module is received comprises: user name or fingerprint or recognition of face information.
7. terminal as claimed in claim 6 is characterized in that, described terminal also comprises:
The subscriber data Registering modules is used for the data to network side certificate server registered user, and described subscriber data comprises: the physical address of user profile and terminal.
8. a certificate server is characterized in that, comprising:
The subscriber data memory module is used for the subscriber data that storage terminal is registered;
The authentication information receiver module is used for the authentication information that receiving terminal sends;
Whether authentication module is used for judging the user profile that described authentication information comprises and the physical address of terminal, identical with the user profile and the physical address of terminal in the subscriber data memory module;
The authentication result feedback module is used for feeding back to described terminal the authentication result of described authentication module.
9. certificate server as claimed in claim 8 is characterized in that, when the user profile in the user profile that described authentication module comprises in authentication information and the physical address of terminal and the subscriber data is all identical with the physical address of terminal, judges that authentication passes through;
Otherwise, judge authentification failure.
10. a network security authentication system is characterized in that, comprising: terminal and certificate server;
Described terminal is used to receive user profile, and binds back generation authentication information with the physical address of described terminal, and the certificate server that sends to network side authenticates;
Whether described certificate server is used to judge the user profile that described authentication information comprises and the physical address of terminal, identical with the user profile and the physical address of terminal in the subscriber data of described endpoint registration, and authentication result is fed back to described terminal.
CN200810241491A 2008-12-22 2008-12-22 Network security certification method, device and system Pending CN101753305A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810241491A CN101753305A (en) 2008-12-22 2008-12-22 Network security certification method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810241491A CN101753305A (en) 2008-12-22 2008-12-22 Network security certification method, device and system

Publications (1)

Publication Number Publication Date
CN101753305A true CN101753305A (en) 2010-06-23

Family

ID=42479748

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810241491A Pending CN101753305A (en) 2008-12-22 2008-12-22 Network security certification method, device and system

Country Status (1)

Country Link
CN (1) CN101753305A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102378063A (en) * 2010-08-20 2012-03-14 青岛海信电器股份有限公司 Television, and registration method and system for network user by using television
CN102790674A (en) * 2011-05-20 2012-11-21 阿里巴巴集团控股有限公司 Authentication method, equipment and system
CN103327019A (en) * 2013-06-18 2013-09-25 中国科学技术大学 Face recognition cloud authentication service method and system
CN103974108A (en) * 2013-12-20 2014-08-06 乐视网信息技术(北京)股份有限公司 Smart television control method and system thereof based on identity authentication
CN104410622A (en) * 2014-11-25 2015-03-11 珠海格力电器股份有限公司 Security Authentication Method, Client and System for Logging in Web System
CN105208011A (en) * 2015-08-31 2015-12-30 努比亚技术有限公司 Verification system and method
CN105550867A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Information authentication method and equipment
CN106599626A (en) * 2016-12-23 2017-04-26 武汉斗鱼网络科技有限公司 Application program authorization authentication method and system
CN103716161B (en) * 2012-10-04 2017-09-08 (株)庆东One It is capable of the method and device of smart machine certification in server of remote control
CN103684779B (en) * 2013-10-29 2018-02-02 北京智谷睿拓技术服务有限公司 communication network authentication method and system
CN107958239A (en) * 2018-01-03 2018-04-24 北京小米移动软件有限公司 Fingerprint identification method and device
CN114666129A (en) * 2022-03-23 2022-06-24 深圳供电局有限公司 Network security authentication method, system, computer device and storage medium

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102378063A (en) * 2010-08-20 2012-03-14 青岛海信电器股份有限公司 Television, and registration method and system for network user by using television
CN102790674A (en) * 2011-05-20 2012-11-21 阿里巴巴集团控股有限公司 Authentication method, equipment and system
CN102790674B (en) * 2011-05-20 2016-03-16 阿里巴巴集团控股有限公司 Auth method, equipment and system
CN103716161B (en) * 2012-10-04 2017-09-08 (株)庆东One It is capable of the method and device of smart machine certification in server of remote control
CN103327019A (en) * 2013-06-18 2013-09-25 中国科学技术大学 Face recognition cloud authentication service method and system
CN103684779B (en) * 2013-10-29 2018-02-02 北京智谷睿拓技术服务有限公司 communication network authentication method and system
CN103974108A (en) * 2013-12-20 2014-08-06 乐视网信息技术(北京)股份有限公司 Smart television control method and system thereof based on identity authentication
CN104410622A (en) * 2014-11-25 2015-03-11 珠海格力电器股份有限公司 Security Authentication Method, Client and System for Logging in Web System
CN105550867A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Information authentication method and equipment
CN105208011B (en) * 2015-08-31 2019-07-30 努比亚技术有限公司 A kind of verifying system and method
CN105208011A (en) * 2015-08-31 2015-12-30 努比亚技术有限公司 Verification system and method
CN106599626A (en) * 2016-12-23 2017-04-26 武汉斗鱼网络科技有限公司 Application program authorization authentication method and system
CN107958239A (en) * 2018-01-03 2018-04-24 北京小米移动软件有限公司 Fingerprint identification method and device
US11062119B2 (en) 2018-01-03 2021-07-13 Beijing Xiaomi Mobile Software Co., Ltd. Fingerprint recognition method and device
CN107958239B (en) * 2018-01-03 2021-07-27 北京小米移动软件有限公司 Fingerprint identification method and device
CN114666129A (en) * 2022-03-23 2022-06-24 深圳供电局有限公司 Network security authentication method, system, computer device and storage medium
CN114666129B (en) * 2022-03-23 2024-02-20 深圳供电局有限公司 Network security authentication method, system, computer device and storage medium

Similar Documents

Publication Publication Date Title
CN101753305A (en) Network security certification method, device and system
JP5231433B2 (en) System and method for authenticating remote server access
EP2859488B1 (en) Enterprise triggered 2chk association
US8666894B1 (en) Systems and methods for remotely authenticating credit card transactions
US8151326B2 (en) Using audio in N-factor authentication
US9426655B2 (en) Legal authentication message confirmation system and method
EP2859489B1 (en) Enhanced 2chk authentication security with query transactions
US8549594B2 (en) Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password
CN102790674A (en) Authentication method, equipment and system
JP2014524622A (en) Transaction payment method and system
WO2008146292A2 (en) System and method for security of sensitive information through a network connection
KR20130107188A (en) Server and method for authentication using sound code
WO2012004640A1 (en) Transaction authentication
US9137241B2 (en) Method and system using a cyber ID to provide secure transactions
WO2009048191A1 (en) Security authentication method and system
KR101195027B1 (en) System and method for service security
WO2007066994A1 (en) Apparatus and method for providing personal information sharing service using signed callback url message
JP2003264551A (en) Method for ensuring security between communication terminal and server
TWI459786B (en) Multi-channel active identityauthentication system and related computer program product and method
CN117714201A (en) Application program login method, device, terminal and storage medium
Cao et al. The infrastructure and security management of mobile banking system
CN117062077A (en) User information authentication method and device
CN102970136A (en) Authentication system and method
KR20120137065A (en) Method and system for authentication
TW201132100A (en) Method, apparatus and system for authenticating internet user identity

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20100623