CN102195983A - Network terminal encryption authentication method and server - Google Patents
Network terminal encryption authentication method and server Download PDFInfo
- Publication number
- CN102195983A CN102195983A CN2011101223573A CN201110122357A CN102195983A CN 102195983 A CN102195983 A CN 102195983A CN 2011101223573 A CN2011101223573 A CN 2011101223573A CN 201110122357 A CN201110122357 A CN 201110122357A CN 102195983 A CN102195983 A CN 102195983A
- Authority
- CN
- China
- Prior art keywords
- dynamic key
- network terminal
- key
- dynamic
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000013507 mapping Methods 0.000 claims description 35
- 230000005540 biological transmission Effects 0.000 claims description 7
- 238000000151 deposition Methods 0.000 claims description 3
- 238000004321 preservation Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005303 weighing Methods 0.000 description 2
- 235000012364 Peperomia pellucida Nutrition 0.000 description 1
- 240000007711 Peperomia pellucida Species 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000010367 cloning Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to a network terminal encryption authentication method and a server. The method comprises the following steps of: acquiring a first ID (Identifier) and a first dynamic key when a network terminal logs on by using a server; authenticating the first dynamic key according to the first ID, a dynamic key pre-generation table and an ID corresponding relation table; when the authentication is successful, randomly acquiring a second dynamic key from the dynamic key pre-generation table and storing a second ID corresponding to the second dynamic key into the ID corresponding relation table; and transmitting the second dynamic key to the network terminal, wherein the second dynamic key is taken as a new first dynamic key, and the second ID corresponding to the second dynamic key is taken as an authentication key for the next log-on of the network terminal. According to the method disclosed by the invention, the dynamic keys are pre-generated, so that the quantity of the dynamic keys is controlled, the frequencies of generating the dynamic keys and storing the dynamic keys to hard disks are lowered for the server, and the resource consumption of the server is lowered.
Description
Technical field
The present invention relates to Internet technical field, relate in particular to a kind of network terminal encryption and authentication method and server.
Background technology
In daily life, along with the rise of internet television, the fail safe of internet television becomes more and more important.
At present, for preventing to clone, palm off the appearance of Web TV, the webserver has used dynamic key that Web TV is carried out encrypting and authenticating.That is: Web TV need be with one " dynamically key " as the certified information of secret key encryption, and after each server authentication success, server generates a new dynamic key in real time and returns to this Web TV, after Web TV is preserved new dynamic key success, server is preserved this new dynamic key simultaneously to database, uses when authenticating for this Web TV is next as new key.Like this, can not can think the Web TV cloning, palm off by the Web TV of new key authentication.
But, the method of the dynamic key of above-mentioned real-time generation need be transferred random number functions at server end, generates the new dynamic key with certain-length scale, and checking that dynamic key and already present dynamic key that this is new do not repeat, then that this is new dynamic key writes database.And when the Web TV quantity size was big, server need frequently repeat hard disk write operation, and was excessive when the hard disk resource consumption, and when becoming bottleneck, whole authentication process then can slow down, thereby influences user's operating experience.
Summary of the invention
Main purpose of the present invention is to provide a kind of network terminal encryption and authentication method and server, frequently writes hard disk with server in the solution network terminal verification process and causes the too much problem of network resource consumption.
In order to achieve the above object, the present invention proposes a kind of network terminal encryption and authentication method, may further comprise the steps:
An ID and the first dynamic key when server obtains network terminal login;
According to a described ID, dynamically key generation table and ID mapping table authenticate the described first dynamic key in advance;
When authentication success, obtain the second dynamic key at random the generation table in advance from described dynamic key, and deposit the 2nd ID of the described second dynamic key correspondence in described ID mapping table;
The described second dynamic key is sent to the described network terminal, as the first new dynamic key of this network terminal, and with the 2nd ID of the described second dynamic key correspondence authenticate key as this network terminal login next time.
Preferably, described dynamic key in advance the generation table comprise corresponding relation between the described second dynamic key and described the 2nd ID; Described ID mapping table comprises an ID of the described network terminal and the corresponding relation between described the 2nd ID.
Preferably, described according to an ID, dynamically key in advance generation table and ID mapping table the step that the described first dynamic key authenticates is comprised:
From described ID mapping table, obtain two ID corresponding with a described ID;
Obtain the second dynamic key corresponding the generation table in advance from described dynamic key with described the 2nd ID;
If the second dynamic key of more described correspondence and the described first dynamic key are both unanimities, then authentication success; Otherwise, authentification failure.
Preferably, described server also comprised obtain the step of the ID of the described network terminal and the first dynamic key when the network terminal is logined before:
Generate the second dynamic key of predetermined quantity and deposit described dynamic key in advance in the generation table, and make one the 2nd ID of each second dynamic key correspondence.
Preferably, also comprise: upgrade described dynamic key according to the predetermined refresh time interval and generate table in advance.
Preferably, also comprise: the transmission number of times that the described second dynamic key is sent to the described network terminal at server surpasses pre-determined number and this network terminal when successfully not preserving the described second dynamic key, does not upgrade the first dynamic key of the described network terminal.
The present invention also proposes a kind of network terminal encrypting and authenticating server, comprising:
First acquisition module, an ID and the first dynamic key when being used to obtain network terminal login;
Authentication module, be used for according to a described ID, dynamically key generation table and ID mapping table authenticate the described first dynamic key in advance;
First update module is used for when authentication success, obtains the second dynamic key at random the generation table in advance from described dynamic key, and deposits the 2nd ID of the described second dynamic key correspondence in described ID mapping table;
Second update module is used for the described second dynamic key is sent to the described network terminal, as the first new dynamic key of this network terminal, and with the 2nd ID of the described second dynamic key correspondence authenticate key as this network terminal login next time.
Preferably, described authentication module comprises:
The 2nd ID acquiring unit is used for obtaining two ID corresponding with a described ID from described ID mapping table;
The second dynamic key acquiring unit, be used for from described dynamic key in advance the generation table obtain the second dynamic key corresponding with described the 2nd ID;
Authentication ' unit is used for the second dynamic key and the described first dynamic key of more described correspondence, if both unanimities, then authentication success; Otherwise, authentification failure.
Preferably, also comprise:
Generation module is used for generating the second dynamic key of predetermined quantity and depositing described dynamic key generation table in advance in, and makes corresponding one the 2nd ID of each second dynamic key.
Preferably, described generation module also is used for upgrading described dynamic key generation table in advance according to the predetermined refresh time interval.
Preferably, when described second update module also is used for the transmission number of times that the described second dynamic key sends to the described network terminal surpassed pre-determined number and this network terminal and successfully do not preserve the described second dynamic key, do not upgrade the first dynamic key of the described network terminal.
A kind of network terminal encryption and authentication method and server that the present invention proposes, by the dynamic key of pre-generation and deposit dynamic key generation table in advance in, dynamically the quantity of key and the quantity of the network terminal no longer are man-to-man relations, make that the quantity of dynamic key is controlled, behind authentication success, server obtains a dynamic key at random the generation table in advance from dynamic key and returns to the network terminal, with the 2nd ID of this dynamic key correspondence of returning key as network terminal authentication next time, thereby alleviated the server generation and preserved the frequent degree of dynamic key, reduced the resource consumption of server to hard disk.
Description of drawings
Fig. 1 is network terminal encryption and authentication method one an embodiment schematic flow sheet of the present invention;
Fig. 2 is according to an ID, dynamic key generation table and ID mapping table schematic flow sheet that the first dynamic key is authenticated in advance among network terminal encryption and authentication method one embodiment of the present invention;
Fig. 3 is another embodiment schematic flow sheet of network terminal encryption and authentication method of the present invention;
Fig. 4 is network terminal encrypting and authenticating server one an example structure schematic diagram of the present invention;
Fig. 5 is the structural representation of authentication module among network terminal encrypting and authenticating server one embodiment of the present invention;
Fig. 6 is another example structure schematic diagram of network terminal encrypting and authenticating server of the present invention.
In order to make technical scheme of the present invention clearer, clear, be described in further detail below in conjunction with accompanying drawing.
Embodiment
Solution for embodiment of the invention mainly is by the dynamic key of pre-generation and deposits dynamic key generation table in advance in, behind authentication success, server obtains a dynamic key at random the generation table in advance from dynamic key and returns to the network terminal, with the 2nd ID of this dynamic key correspondence of returning key as network terminal authentication next time, generate and preserve the frequent degree of dynamic key to alleviate server, reduce the resource consumption of server to hard disk.
Authentication mode when the embodiment of the invention relates to network terminal logon server in the Internet, this network terminal can be Web TV etc.
As shown in Figure 1, one embodiment of the invention proposes a kind of network terminal encryption and authentication method, comprising:
An ID and the first dynamic key when step S101, server obtain network terminal login;
When network terminal logon server, send log-on message to server, include the ID (being the alleged ID of present embodiment) of the network terminal and the dynamic key (being the present embodiment alleged first dynamic key) that preserves thereof in this log-on message.Each network terminal all has unique identify label the one ID, when the network terminal logon server first time, and the initial dynamically key that presets when the first dynamic key that the network terminal is preserved dispatches from the factory for this network terminal.
The log-on message that server sends according to the network terminal gets access to an ID and the first dynamic key of this network terminal.
Step S102, according to an ID, dynamically key generation table and ID mapping table authenticate this first dynamic key in advance;
Server generates before network terminal login in advance N the second dynamic key, and N is a natural number.Corresponding one the 2nd ID of each second dynamic key, the 2nd ID be as the unique identification of the second dynamic key, and the corresponding relation of the second dynamic key and the 2nd ID is kept at dynamic key in advance in the generation table; Simultaneously, server also is provided with the ID that comprises the network terminal and the ID mapping table of the corresponding relation between the 2nd ID.The one ID of each network terminal corresponding one with the 2nd corresponding ID of the second dynamic key, after the first dynamic key renewal of the follow-up preservation of the network terminal, also can in the ID mapping table, preserve the 2nd ID of the renewal front and back second dynamic key correspondence.
Wherein, N can examine the weighing apparatus value according to system safety requirement and performance.For example: N=10, and suppose that the pregenerated second dynamic key does not upgrade, then Ke Long the network terminal has 1/10 probability successfully to login.If N reaches certain numerical value, can think that then clone's the network terminal can not successfully be logined.
In the present embodiment, server is searched the ID mapping table according to an ID of the network terminal that obtains, obtain two ID corresponding from the ID mapping table, then, search dynamic key generation table in advance according to the 2nd ID with an ID, from dynamic key in advance the generation table obtain the second dynamic key corresponding with the 2nd ID, the first dynamic key of the second dynamic key and network terminal preservation is compared, if both unanimities, then authentication success, otherwise, authentification failure.
Step S103 when authentication success, obtains the second dynamic key at random the generation table in advance from this dynamic key, and deposits the 2nd ID of this second dynamic key correspondence in this ID mapping table;
When authentication success, server generates among N the second dynamic key the table one second dynamic key of picking at random in advance from dynamic key, and with dynamic key in advance in the generation table two ID corresponding with the second dynamic key of picking be kept in the ID mapping table.In the ID mapping table, the 2nd ID of the second dynamic key correspondence of picking is corresponding with an ID of the network terminal of above-mentioned login at random for this.
Step S104 sends to this network terminal with this second dynamic key, as the first new dynamic key of this network terminal, and with the 2nd ID of this second dynamic key correspondence authenticate key as this network terminal login next time.
In this step, the server second dynamic key of picking at random sends to the network terminal, preserve by the network terminal, the original first dynamic key that preserves of alternate network terminal, promptly use this second dynamic key as the first new dynamic key of this network terminal, so that authenticate during next network terminal logon server.This verification process is with step S102.
If the network terminal is not the network terminal of clone or personation, then when next network terminal logon server, the first dynamic key that the network terminal is preserved is consistent in the value that dynamic key generates second corresponding in the table dynamic key in advance with server.
As shown in Figure 2, above-mentioned steps S102 comprises:
Step S1021 obtains two ID corresponding with an ID from this ID mapping table;
Step S1022 obtains the second dynamic key corresponding with the 2nd ID the generation table in advance from this dynamic key;
Step S1023, if the second dynamic key and this first dynamic key that relatively should correspondence be both unanimities, then authentication success; Otherwise, authentification failure.
Compared to existing technology, the dynamic key of present embodiment by preserving in advance the second dynamic key that generates be the generation table in advance, make that the quantity of dynamic key is controlled, behind authentication success, server obtains one second dynamic key at random the generation table in advance from dynamic key and returns to the network terminal, and with the 2nd ID of this second dynamic key correspondence of returning key as network terminal authentication next time, thereby alleviated the server generation and preserved the frequent degree of dynamic key, alleviated the resource consumption of server greatly to hard disk.
With the Web TV is example, if total M platform Web TV access server, and the dynamic key of server generates the storehouse in advance and only generates the dynamic key of N bar (General N<M).When certain Web TV A access server, server 1 of picking at random from the dynamic key of N bar returns to Web TV A.Adopt this mode, alleviated server and generated and preserve the frequency of dynamic key, therefore alleviated the resource consumption of server greatly to hard disk.
As shown in Figure 3, another embodiment of the present invention proposes a kind of network terminal encryption and authentication method, on the basis of the foregoing description, also comprises before step S101:
Step S100, server generate the second dynamic key of predetermined quantity and deposit dynamic key in advance in the generation table, and make one the 2nd ID of each second dynamic key correspondence.
The difference of present embodiment and the foregoing description is: second of the predetermined quantity dynamic key is generated by server self in the present embodiment, and is kept at dynamic key generation table in advance, corresponding one the 2nd ID of each second dynamic key.
In a further embodiment, server can also upgrade dynamic key according to the predetermined refresh time interval and generates table in advance.Dynamic key is generated the authenticated used second dynamic key deletion in the table in advance, to increase network terminal authenticating safety.
Further, Web TV sends a notification message to server after receiving and also successfully preserving this second dynamic key.Simultaneously, the transmission number of times that server sends to the second dynamic key network terminal can also be set, to confirm whether the network terminal successfully receives and preserve this second dynamic key, such as, setting and sending number of times is three times, if surpass three times, the network terminal does not successfully receive and preserve this second dynamic key yet, then server does not upgrade the first dynamic key of the network terminal, and promptly the network terminal still keeps the first original dynamic key for next login authentication.
Present embodiment uses the mode of the pre-dynamic key of generation, has alleviated the number of times of writing hard disk, reduces the resource consumption of server write hard disk with this; Use the mode of the corresponding ID of dynamic key simultaneously, encryption key by the ID corresponding with dynamic key that the dynamic key of long data becomes short data, is further reduced the resource consumption of writing hard disk.
As shown in Figure 4, one embodiment of the invention proposes a kind of network terminal encrypting and authenticating server, comprising: first acquisition module 401, authentication module 402, first update module 403 and second update module 404;
Wherein:
In the present embodiment, when network terminal logon server, send log-on message, include the ID (being the alleged ID of present embodiment) of the network terminal and the dynamic key (being the present embodiment alleged first dynamic key) that preserves thereof in this log-on message to server.Each network terminal all has unique identify label the one ID, when the network terminal logon server first time, and the initial dynamically key that presets when the first dynamic key that the network terminal is preserved dispatches from the factory for this network terminal.
The log-on message that server first acquisition module 401 sends according to the network terminal gets access to an ID and the first dynamic key of this network terminal.
Server generates before network terminal login in advance in the present embodiment N the second dynamic key, and N is a natural number.Corresponding one the 2nd ID of each second dynamic key, the 2nd ID be as the unique identification of the second dynamic key, and the corresponding relation of the second dynamic key and the 2nd ID is kept at dynamic key in advance in the generation table; Simultaneously, server also is provided with the ID that comprises the network terminal and the ID mapping table of the corresponding relation between the 2nd ID.The one ID of each network terminal corresponding one with the 2nd corresponding ID of the second dynamic key, after the first dynamic key renewal of the follow-up preservation of the network terminal, also can in the ID mapping table, preserve the 2nd ID of the renewal front and back second dynamic key correspondence.
Wherein, N can examine the weighing apparatus value according to system safety requirement and performance.For example: N=10, and suppose that the pregenerated second dynamic key does not upgrade, then Ke Long the network terminal has 1/10 probability successfully to login.If N reaches certain numerical value, can think that then clone's the network terminal can not successfully be logined.
When authentication success, first update module 403 generates among N the second dynamic key the table one second dynamic key of picking at random in advance from dynamic key, and with dynamic key in advance in the generation table two ID corresponding with the second dynamic key of picking be kept in the ID mapping table.In the ID mapping table, the 2nd ID of the second dynamic key correspondence of picking is corresponding with an ID of the network terminal of above-mentioned login at random for this.
If the network terminal is not the network terminal of clone or personation, then when next network terminal logon server, the first dynamic key that the network terminal is preserved is consistent in the value that dynamic key generates second corresponding in the table dynamic key in advance with server.
Further, when second update module 404 also is used for the transmission number of times that the second dynamic key sends to the network terminal surpassed pre-determined number and this network terminal and successfully do not preserve the second dynamic key, do not upgrade the first dynamic key of the network terminal.
As shown in Figure 5, authentication module 402 comprises: the 2nd ID acquiring unit 4021, second dynamic key acquiring unit 4022 and the authentication ' unit 4023, wherein:
The 2nd ID acquiring unit 4021 is used for obtaining two ID corresponding with an ID from the ID mapping table;
The second dynamic key acquiring unit 4022, be used for from dynamic key in advance the generation table obtain the second dynamic key corresponding with the 2nd ID;
Authentication ' unit 4023 is used for the second dynamic key and the described first dynamic key of comparison correspondence, if both unanimities, then authentication success; Otherwise, authentification failure.
As shown in Figure 6, another embodiment of the present invention proposes a kind of network terminal encrypting and authenticating server, on the basis of the foregoing description, also comprises:
Further, generation module 400 also is used for upgrading dynamic key generation table in advance according to the predetermined refresh time interval.
The difference of present embodiment and the foregoing description is: second of the predetermined quantity dynamic key is generated by server generation module 400 in the present embodiment, and is kept at dynamic key generation table in advance, corresponding one the 2nd ID of each second dynamic key.
In a further embodiment, server generation module 400 can also upgrade dynamic key according to the predetermined refresh time interval and generates table in advance.Dynamic key is generated the authenticated used second dynamic key deletion in the table in advance, to increase network terminal authenticating safety.
Further, Web TV sends a notification message to server after receiving and also successfully preserving this second dynamic key.Simultaneously, the transmission number of times that server sends to the second dynamic key network terminal can also be set, to confirm whether the network terminal successfully receives and preserve this second dynamic key, such as, setting and sending number of times is three times, if surpass three times, the network terminal does not successfully receive and preserve this second dynamic key yet, then server second update module 404 is not upgraded the first dynamic key of the network terminal, and promptly the network terminal still keeps the first original dynamic key for next login authentication.
Present embodiment uses the mode of the pre-dynamic key of generation, has alleviated the number of times of writing hard disk, reduces the resource consumption of server write hard disk with this; Use the mode of the corresponding ID of dynamic key simultaneously, encryption key by the ID corresponding with dynamic key that the dynamic key of long data becomes short data, is further reduced the resource consumption of writing hard disk.
The above only is the preferred embodiments of the present invention; be not so limit claim of the present invention; every equivalent structure or flow process conversion that utilizes specification of the present invention and accompanying drawing content to be done; or directly or indirectly be used in other relevant technical field, all in like manner be included in the scope of patent protection of the present invention.
Claims (11)
1. a network terminal encryption and authentication method is characterized in that, may further comprise the steps:
An ID and the first dynamic key when server obtains network terminal login;
According to a described ID, dynamically key generation table and ID mapping table authenticate the described first dynamic key in advance;
When authentication success, obtain the second dynamic key at random the generation table in advance from described dynamic key, and deposit the 2nd ID of the described second dynamic key correspondence in described ID mapping table;
The described second dynamic key is sent to the described network terminal, as the first new dynamic key of this network terminal, and with the 2nd ID of the described second dynamic key correspondence authenticate key as this network terminal login next time.
2. method according to claim 1 is characterized in that, described dynamic key generation table in advance comprises corresponding relation between the described second dynamic key and described the 2nd ID; Described ID mapping table comprises an ID of the described network terminal and the corresponding relation between described the 2nd ID.
3. method according to claim 2 is characterized in that, described according to an ID, dynamically key in advance generation table and ID mapping table the step that the described first dynamic key authenticates is comprised:
From described ID mapping table, obtain two ID corresponding with a described ID;
Obtain the second dynamic key corresponding the generation table in advance from described dynamic key with described the 2nd ID;
If the second dynamic key of more described correspondence and the described first dynamic key are both unanimities, then authentication success; Otherwise, authentification failure.
4. according to claim 1,2 or 3 described methods, it is characterized in that described server also comprised obtain the step of the ID of the described network terminal and the first dynamic key when the network terminal is logined before:
Generate the second dynamic key of predetermined quantity and deposit described dynamic key in advance in the generation table, and make one the 2nd ID of each second dynamic key correspondence.
5. method according to claim 4 is characterized in that, also comprises: upgrade described dynamic key according to the predetermined refresh time interval and generate table in advance.
6. method according to claim 1 is characterized in that, also comprises:
The transmission number of times that the described second dynamic key is sent to the described network terminal at server surpasses pre-determined number and this network terminal when successfully not preserving the described second dynamic key, does not upgrade the first dynamic key of the described network terminal.
7. a network terminal encrypting and authenticating server is characterized in that, comprising:
First acquisition module, an ID and the first dynamic key when being used to obtain network terminal login;
Authentication module, be used for according to a described ID, dynamically key generation table and ID mapping table authenticate the described first dynamic key in advance;
First update module is used for when authentication success, obtains the second dynamic key at random the generation table in advance from described dynamic key, and deposits the 2nd ID of the described second dynamic key correspondence in described ID mapping table;
Second update module is used for the described second dynamic key is sent to the described network terminal, as the first new dynamic key of this network terminal, and with the 2nd ID of the described second dynamic key correspondence authenticate key as this network terminal login next time.
8. server according to claim 7 is characterized in that, described authentication module comprises:
The 2nd ID acquiring unit is used for obtaining two ID corresponding with a described ID from described ID mapping table;
The second dynamic key acquiring unit, be used for from described dynamic key in advance the generation table obtain the second dynamic key corresponding with described the 2nd ID;
Authentication ' unit is used for the second dynamic key and the described first dynamic key of more described correspondence, if both unanimities, then authentication success; Otherwise, authentification failure.
9. according to claim 7 or 8 described servers, it is characterized in that, also comprise:
Generation module is used for generating the second dynamic key of predetermined quantity and depositing described dynamic key generation table in advance in, and makes corresponding one the 2nd ID of each second dynamic key.
10. server according to claim 9 is characterized in that, described generation module also is used for upgrading described dynamic key generation table in advance according to the predetermined refresh time interval.
11. server according to claim 7, it is characterized in that, when described second update module also is used for the transmission number of times that the described second dynamic key sends to the described network terminal surpassed pre-determined number and this network terminal and successfully do not preserve the described second dynamic key, do not upgrade the first dynamic key of the described network terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110122357.3A CN102195983B (en) | 2011-05-12 | 2011-05-12 | network terminal encryption authentication method and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110122357.3A CN102195983B (en) | 2011-05-12 | 2011-05-12 | network terminal encryption authentication method and server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102195983A true CN102195983A (en) | 2011-09-21 |
CN102195983B CN102195983B (en) | 2015-08-19 |
Family
ID=44603370
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110122357.3A Expired - Fee Related CN102195983B (en) | 2011-05-12 | 2011-05-12 | network terminal encryption authentication method and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102195983B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102882848A (en) * | 2012-08-28 | 2013-01-16 | 深圳Tcl新技术有限公司 | Login system and method |
CN109600354A (en) * | 2017-09-30 | 2019-04-09 | 优仕达资讯股份有限公司 | Network identity validation System and method for |
CN112601219A (en) * | 2021-03-03 | 2021-04-02 | 四川微巨芯科技有限公司 | Data encryption and decryption method and system, server, storage device and mobile device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002353959A (en) * | 2001-05-30 | 2002-12-06 | Nec Corp | System, method and program for authentication |
CN1768502A (en) * | 2002-06-19 | 2006-05-03 | 安全通信公司 | Inter-authentication method and device |
CN101291228A (en) * | 2008-06-18 | 2008-10-22 | 华为技术有限公司 | Generating, authenticating method for super code, system and device thereof |
CN101611631A (en) * | 2007-02-12 | 2009-12-23 | 索尼株式会社 | Use the key list of storage to carry out packaged media encryption |
CN101697540A (en) * | 2009-10-15 | 2010-04-21 | 浙江大学 | Method for authenticating user identity through P2P service request |
-
2011
- 2011-05-12 CN CN201110122357.3A patent/CN102195983B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002353959A (en) * | 2001-05-30 | 2002-12-06 | Nec Corp | System, method and program for authentication |
CN1768502A (en) * | 2002-06-19 | 2006-05-03 | 安全通信公司 | Inter-authentication method and device |
CN101611631A (en) * | 2007-02-12 | 2009-12-23 | 索尼株式会社 | Use the key list of storage to carry out packaged media encryption |
CN101291228A (en) * | 2008-06-18 | 2008-10-22 | 华为技术有限公司 | Generating, authenticating method for super code, system and device thereof |
CN101697540A (en) * | 2009-10-15 | 2010-04-21 | 浙江大学 | Method for authenticating user identity through P2P service request |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102882848A (en) * | 2012-08-28 | 2013-01-16 | 深圳Tcl新技术有限公司 | Login system and method |
CN109600354A (en) * | 2017-09-30 | 2019-04-09 | 优仕达资讯股份有限公司 | Network identity validation System and method for |
CN112601219A (en) * | 2021-03-03 | 2021-04-02 | 四川微巨芯科技有限公司 | Data encryption and decryption method and system, server, storage device and mobile device |
Also Published As
Publication number | Publication date |
---|---|
CN102195983B (en) | 2015-08-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106330850B (en) | Security verification method based on biological characteristics, client and server | |
US9654480B2 (en) | Systems and methods for profiling client devices | |
US8180054B2 (en) | Authenticating system, authenticating method, and authenticating program | |
CN101159715B (en) | Safety information checking method and safety information checking device and client terminal | |
US20120254622A1 (en) | Secure Access to Electronic Devices | |
CN101605108A (en) | A kind of method, system and device of instant messaging | |
US9544769B2 (en) | Method for providing application service | |
CN108632241B (en) | Unified login method and device for multiple application systems | |
CN103491084A (en) | Authentication processing method and device of client side | |
CN101179382B (en) | Login method and system | |
CN102143131B (en) | User logout method and authentication server | |
CN104320389A (en) | Fusion identify protection system and fusion identify protection method based on cloud computing | |
US20170279706A1 (en) | Link processing method, apparatus, and system | |
CN105072608B (en) | A kind of method and device of administrative authentication token | |
CN102801713A (en) | Website logging-in method and system as well as accessing management platform | |
CN113992408B (en) | Multi-system unified login information processing method and system | |
CN102833276A (en) | Webpage login system based on token | |
CN101557403A (en) | Website login method, device and system | |
CN111988275A (en) | Single sign-on method, single sign-on server cluster and electronic equipment | |
CN102970308A (en) | User authentication method and server | |
US9621349B2 (en) | Apparatus, method and computer-readable medium for user authentication | |
CN102769629A (en) | Client-side password storage method and service system | |
CN102195983A (en) | Network terminal encryption authentication method and server | |
JP6081857B2 (en) | Authentication system and authentication method | |
CN102801728A (en) | Management method and system for automatic login of client side |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150819 |