CN105450416A - Security authentication method and apparatus - Google Patents

Security authentication method and apparatus Download PDF

Info

Publication number
CN105450416A
CN105450416A CN201410440275.7A CN201410440275A CN105450416A CN 105450416 A CN105450416 A CN 105450416A CN 201410440275 A CN201410440275 A CN 201410440275A CN 105450416 A CN105450416 A CN 105450416A
Authority
CN
China
Prior art keywords
user
information
cell
customer terminal
checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410440275.7A
Other languages
Chinese (zh)
Inventor
叶达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201410440275.7A priority Critical patent/CN105450416A/en
Publication of CN105450416A publication Critical patent/CN105450416A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a security authentication method, comprises the steps of receiving, by a server, authentication information of a user, the authentication information including a mobile phone number of the user and security information; and determining whether the authentication information is consistent with a previously stored binding information of the user and authenticating the user. The application also discloses a security authentication device.

Description

A kind of Thoughts on Safe Identity Verification method and apparatus
Technical field
This application discloses a kind of Thoughts on Safe Identity Verification method and apparatus.
Background technology
Carried out the checking of the sensitive informations such as identity by mobile phone, conveniently can confirm user identity, thus by extensively should in various internet, applications.If but there is hand-set from stolen, the implanted wooden horse of mobile phone, assault, the safety problem such as phone number is cloned, short-message verification is blocked time, whether the authorization information that verification method common is at present difficult to request of telling is true in the real owner, but not lawless person, cause the potential safety hazards such as user's fund security, leakage of personal information.
Checking client in prior art, realizes based on cell-phone number, only verifies the correctness of phone number.
And carry out checking client based on cell-phone number in prior art and there are some potential safety hazards: in the prior art when carrying out handset binding, need artificial input handset number, check code also needs manual input simultaneously, easily causes input error, affects Consumer's Experience; And be send identifying code by note mode expressly, fail safe, reliability and instantaneity can not ensure, and the operation cost of service provider is higher; In addition, owing to only just binding phone number when user registers, be easy to because phone number leaks like this, hand-set from stolen or phone number is cloned, and cause the safety verification based on phone number to there are security breaches.
Summary of the invention
This application provides a kind of Thoughts on Safe Identity Verification method and apparatus, in order to prevent hand-set from stolen, phone number is illegally used or clones the potential safety hazard caused, and ensures safety and reliability when carrying out authentication, improves the experience of user simultaneously.
This application discloses a kind of Thoughts on Safe Identity Verification method, comprising:
The authorization information of server receives user, described checking message comprises the cell-phone number of user, and security information;
Judge that whether described authorization information consistent with the binding information of the user prestored, described user verified, described in the binding information of user that prestores comprise cell-phone number and the security information of user's binding.
Wherein, described in the binding information of user that prestores, obtain especially by following steps:
The secure binding information that described server receives user sends, described secure binding information comprises cell-phone number and security information;
Cell-phone number and security information in described secure binding information are stored as binding information.
Preferably, the secure binding information that described server receives user sends, comprising:
When described server determines that user carries out secure binding, generate Quick Response Code;
Described server receives the secure binding information generated after described user scans described Quick Response Code by cell-phone customer terminal.
Wherein, described security information comprises: international movement arranges identification code IMEI and international mobile subscriber identity IMSI.
Before the authorization information of wherein said server receives user, also comprise:
When described server receives the subscriber authentication request of user's transmission, the checking sending authorization information to described user sends request;
Described server receives user sends request the authorization information of transmission based on described checking.
Preferably, described checking sends request and is specially Quick Response Code;
Described user, by the mode of cell-phone customer terminal scanning Quick Response Code, sends checking message to described server.
Wherein, described user is by cell-phone customer terminal or personal computer PC access services device;
Described server also comprises after verifying described user:
When user is by cell-phone customer terminal access services device, the result is informed to user by cell-phone customer terminal by described server, and to described cell-phone customer terminal mandate;
When user is by personal computer PC access services device, the result is informed to user by PC by described server, and authorizes described PC.
Disclosed herein as well is a kind of Thoughts on Safe Identity Verification equipment, comprising:
First receiver module, for receiving the authorization information of user, described checking message comprises the cell-phone number of user, and security information;
Judge module, for judging that whether described authorization information consistent with the binding information of the user prestored, verifies described user, described in the binding information of user that prestores comprise cell-phone number and the security information of user's binding.
Wherein, Thoughts on Safe Identity Verification equipment also comprises:
Second receiver module, for receiving the secure binding information that user sends, described secure binding information comprises cell-phone number and security information;
Memory module, for storing cell-phone number and security information in described secure binding information as binding information.
Preferably, described security information comprises: international movement arranges identification code IMEI and international mobile subscriber identity IMSI.
Preferably, described second receiver module, comprising:
Two-dimensional code generation module, for when determining that user carries out secure binding, generates Quick Response Code;
Second receives submodule, for receiving the secure binding information generated after described user scans described Quick Response Code by cell-phone customer terminal.
Wherein, Thoughts on Safe Identity Verification equipment, also comprises:
Sending module, for when receiving the subscriber authentication request that user sends, the checking sending authorization information to described user sends request;
Receiver module, sends request the authorization information of transmission based on described checking for user.
Preferably, described checking sends request and is specially Quick Response Code;
Described user, by the mode of cell-phone customer terminal scanning Quick Response Code, sends checking message to described server.
Wherein, preferably, Thoughts on Safe Identity Verification equipment, also comprises:
Authorization module, for when user is by cell-phone customer terminal access services device, informs to user by the result by cell-phone customer terminal, and to described cell-phone customer terminal mandate; Or
When user is by personal computer PC access services device, the result is informed to user by PC, and described PC is authorized.
The application is by the authorization information of server receives user, and described checking message comprises the cell-phone number of user, and security information; Judge that whether described authorization information is consistent with the binding information of the user prestored, described user is verified, can effectively prevent hand-set from stolen with this, phone number is illegally used or clones the potential safety hazard caused, improve the safety and reliability of authentication, improve the experience of user simultaneously.
Accompanying drawing explanation
Fig. 1 is a kind of Thoughts on Safe Identity Verification method flow structural representation in the embodiment of the present application;
Fig. 2 is a kind of Thoughts on Safe Identity Verification device structure schematic diagram in the embodiment of the present application.
Embodiment
The object of the application is to provide a kind of Thoughts on Safe Identity Verification method, and in order to prevent hand-set from stolen, phone number is illegally used or clones the potential safety hazard caused, and improves the safety and reliability of authentication.
For reaching above technical purpose; as shown in Figure 1; this application provides a kind of Thoughts on Safe Identity Verification method; under being applied to user's registration, cryptoguard scene; require and the situation of handset binding (when such as registering mobile-phone payment instrument and when cryptosecurity problem arranges); and need scene (such as: the situation such as mobile-phone payment, online payment) that user identity is verified, specifically comprise the following steps:
The authorization information of step 101, server receives user, described checking message comprises the cell-phone number of user, and security information;
Wherein, described security information specifically can comprise: international movement arranges identification code IMEI and international mobile subscriber identity IMSI, certainly this security information can also adjust as required, can be other information carrying out as required verifying, be not limited in IMEI and IMSI, as long as corresponding checking can be completed.
And the acquisition of authorization information can have multiple method and access, such as, to obtain phone number, IMSI and IMEI, for Android platform, specifically can obtain in the following manner:
IMEI=TelephonyManager.getDeviceId();
IMSI=TelephonyManager.getSimSerialNumber();
Cell-phone number=TelephonyManager.getLine1Number ();
But it should be noted that in the process obtained in this Android platform and need to arrange authority: also namely need to arrange android.permission.READ_PHONE_STATE.
In the embodiment of the present application, user sends authorization information by cell-phone customer terminal to server, and the information such as cell-phone number wherein, IMSI and/or IMEI, can be obtained by cell-phone customer terminal self, and those information are sent to server.Cell-phone customer terminal by user's operation thereon, or by scanning the mode of Quick Response Code, comes to send authorization information to server.
Step 102, judge that whether described authorization information consistent with the binding information of the user prestored, described user verified, described in the binding information of user that prestores comprise cell-phone number and the security information of user's binding;
Wherein, described in the binding information of user that prestores, specifically can be obtained by following steps:
The secure binding information that described server receives user sends, described secure binding information comprises cell-phone number and security information; Cell-phone number and security information in described secure binding information are stored as binding information.
Concrete, as required, the binding information of this user prestored can also comprise secure binding information (comprising cell-phone number and the security information of user's binding), the user account information preset, and the corresponding relation between this secure binding information and default user account information, if the information stored is like this, not only can to determine whether in follow-up query script bind by the account of any user, can also to determine bind by which concrete account.
And the secure binding information that described server receives user sends, specifically can comprise:
One, when holding triggering secure to bind event at PC (PersonalComputer, personal computer), when described server determines that user carries out secure binding, Quick Response Code is generated; Described server receives the secure binding information generated after described user scans described Quick Response Code by cell-phone customer terminal.
Wherein, the generation of described Quick Response Code, specifically can comprise: determine the information that needs transmit and two-dimensional code authentication information; Wherein this two-dimensional code authentication information comprises: identifying code, timestamp, function code; The described information of transmission and this two-dimensional code authentication information of needing is sorted according to ASCII (AmericanStandardCodeforInformationInterchange, ASCII) code; And be encrypted after sequence, obtain the information after encrypting; Use QR (QuickResponse, fast reaction) algorithm, generate Quick Response Code based on the information after described encryption simultaneously, like this, do not need the information of manual input associated verification, substantially increase Consumer's Experience, also can improve fail safe simultaneously.
Two, when when cell-phone customer terminal triggering secure binding event, described server receives described cell-phone customer terminal and initiatively sends described secure binding information.
Wherein, no matter be carry out transmission security binding information by scanning Quick Response Code or the mode directly sent, also can be encrypted transmission to this secure binding information, to avoid expressly sending the potential safety hazard brought, improve fail safe; The mode of wherein concrete encryption can comprise: after the information sorting encrypt needs, adopts the method for symmetrical (DataEncryptionStandard, DES) or asymmetric (Message-DigestAlgorithm5, MD5) to be encrypted.
In addition, after the secure binding information that server receives user sends, server can judge whether described secure binding information is bound by the account of any user;
If judged result is no, described secure binding information and the user account preset are bound by described server, and store corresponding binding information; If the determination result is YES, binding cannot be performed, end operation.
Binding result can be returned to described cell-phone customer terminal by server.By returning binding result to cell-phone customer terminal, user can be made to learn binding situation, to carry out follow-up operation.
Concrete, can also arrange and whether support cell-phone customer terminal authentication; A cell-phone customer terminal identification verification function switch such as can be set, carry out authentication control whether supporting to carry out cell-phone customer terminal, like this, can be in some special cases, the function of direct closedown authentication, make with this function (such as mobile-phone payment etc.) that needs to carry out authentication, cannot normally carry out.
Before step 101, i.e. before the authorization information of described server receives user, also comprise:
When described server receives the subscriber authentication request of user's transmission, the checking sending authorization information to described user sends request;
Wherein, when being when initiating authentication at PC end, it can be Quick Response Code that described checking sends request; Described user is by the mode of cell-phone customer terminal scanning Quick Response Code in this case, sends authorization information to described server; Certainly, other mode can also be had to initiate checking, such as, when being cell-phone customer terminal initiation authentication, the checking that described server sends authorization information sends request to user, returns authorization information to server to make user.
Wherein, can also carry during described checking sends request and comprise identifying code, and/or ageing, and/or optional safety instruction problem, situation about certainly wherein can also verify as required, adds other information, and combine as required, be not limited to above-mentioned several; Like this, user is receiving after this checking sends request, not only to send authorization information to server, the associated verification carried in also having needed its checking to send request, ageing information requirements are such as needed to return authorization information in 30 seconds, and identifying code can based on similar 1+2=? show etc. form, user can select one or more to reply, like this, in official hour, (such as 30 seconds) complete checking (returning identifying code 3) and send authorization information to server.
Described server receives user sends request the authorization information of transmission based on described checking.
In addition, after step 102, also namely after server is verified described user, also comprise:
Because user can pass through cell-phone customer terminal or personal computer PC access services device; Therefore after having verified, if checking is passed through, when user is by cell-phone customer terminal access services device, the result is informed to user by cell-phone customer terminal by described server, and to described cell-phone customer terminal mandate; And when user is by personal computer PC access services device, the result is informed to user by PC by described server, and authorizes described PC.
If checking is not passed through, when user is by cell-phone customer terminal access services device, the result is informed to user by cell-phone customer terminal by described server, will not authorize, end operation; And when user is by personal computer PC access services device, the result is informed to user by PC by described server, will not authorize, end operation.
Based on design same or similar with said method, the embodiment of the present application also discloses a kind of Thoughts on Safe Identity Verification equipment, as shown in Figure 2, comprising:
First receiver module 201, for receiving the authorization information of user, described checking message comprises the cell-phone number of user, and security information; Wherein, described security information comprises: international movement arranges identification code IMEI and international mobile subscriber identity IMSI.
Judge module 202, for judging that whether described authorization information consistent with the binding information of the user prestored, verifies described user, described in the binding information of user that prestores comprise cell-phone number and the security information of user's binding.
Concrete, this Thoughts on Safe Identity Verification equipment, also comprises:
Second receiver module 301, for receiving the secure binding information that user sends, described secure binding information comprises cell-phone number and security information;
Memory module 302, for storing cell-phone number and security information in described secure binding information as binding information.
Preferably, described second receiver module 301, comprising:
Two-dimensional code generation module 401, for when determining that user carries out secure binding, generates Quick Response Code;
Second receives submodule 402, for receiving the secure binding information generated after described user scans described Quick Response Code by cell-phone customer terminal.
Wherein, this Thoughts on Safe Identity Verification equipment, also comprises:
Sending module 501, for when receiving the subscriber authentication request that user sends, the checking sending authorization information to described user sends request;
3rd receiver module 502, sends request the authorization information of transmission based on described checking for user.
Wherein, described checking sends request and is specially Quick Response Code; Described user, by the mode of cell-phone customer terminal scanning Quick Response Code, sends checking message to described server.
This Thoughts on Safe Identity Verification equipment, also comprises:
Authorization module 601, for when user is by cell-phone customer terminal access services device, informs to user by the result by cell-phone customer terminal, and to described cell-phone customer terminal mandate; Or
When user is by personal computer PC access services device, the result is informed to user by PC, and described PC is authorized.
The equipment that the embodiment of the present application provides can realize above-mentioned various method steps, realizes the authentication to user, and its specific implementation process can see the explanation of said method embodiment.
The application is by the authorization information of server receives user, and described checking message comprises the cell-phone number of user, and security information; Judge that whether described authorization information is consistent with the binding information of the user prestored, described user is verified, can effectively prevent hand-set from stolen with this, phone number is illegally used or clones the potential safety hazard caused, improve the safety and reliability of authentication, improve the experience of user simultaneously.
Through the above description of the embodiments, those skilled in the art can be well understood to the mode that the application can add required general hardware platform by software and realize, and can certainly pass through hardware, but in a lot of situation, the former is better execution mode.Based on such understanding, the technical scheme of the application can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product is stored in a storage medium, comprising some instructions in order to make a computer equipment (can be personal computer, server, or the network equipment etc.) perform method described in each embodiment of the application.
It will be appreciated by those skilled in the art that accompanying drawing is a schematic diagram preferably implementing scene, the module in accompanying drawing or flow process might not be that enforcement the application is necessary.
It will be appreciated by those skilled in the art that the module in the device implemented in scene can carry out being distributed in the device of enforcement scene according to implementing scene description, also can carry out respective change and being arranged in the one or more devices being different from this enforcement scene.The module of above-mentioned enforcement scene can merge into a module, also can split into multiple submodule further.
Above-mentioned the application's sequence number, just to describing, does not represent the quality implementing scene.
Be only the several concrete enforcement scene of the application above, but the application is not limited thereto, the changes that any person skilled in the art can think of all should fall into protection range of the present utility model.

Claims (14)

1. a Thoughts on Safe Identity Verification method, is characterized in that, comprising:
The authorization information of server receives user, described checking message comprises the cell-phone number of user, and security information;
Judge that whether described authorization information consistent with the binding information of the user prestored, described user verified, described in the binding information of user that prestores comprise cell-phone number and the security information of user's binding.
2. the method for claim 1, is characterized in that, described in the binding information of user that prestores, obtain especially by following steps:
The secure binding information that described server receives user sends, described secure binding information comprises cell-phone number and security information;
Cell-phone number and security information in described secure binding information are stored as binding information.
3. method as claimed in claim 2, is characterized in that, the secure binding information that described server receives user sends comprises:
When described server determines that user carries out secure binding, generate Quick Response Code;
Described server receives the secure binding information generated after described user scans described Quick Response Code by cell-phone customer terminal.
4. the method as described in claim 1 or 2 or 3, it is characterized in that, described security information comprises: international movement arranges identification code IMEI and international mobile subscriber identity IMSI.
5. the method for claim 1, is characterized in that, before the authorization information of described server receives user, also comprises:
When described server receives the subscriber authentication request of user's transmission, the checking sending authorization information to described user sends request;
Described server receives user sends request the authorization information of transmission based on described checking.
6. method as claimed in claim 5, is characterized in that,
Described checking sends request and is specially Quick Response Code;
Described user, by the mode of cell-phone customer terminal scanning Quick Response Code, sends checking message to described server.
7. the method for claim 1, is characterized in that, described user is by cell-phone customer terminal or personal computer PC access services device;
Described server also comprises after verifying described user:
When user is by cell-phone customer terminal access services device, the result is informed to user by cell-phone customer terminal by described server, and to described cell-phone customer terminal mandate;
When user is by personal computer PC access services device, the result is informed to user by PC by described server, and authorizes described PC.
8. a Thoughts on Safe Identity Verification equipment, is characterized in that, comprising:
First receiver module, for receiving the authorization information of user, described checking message comprises the cell-phone number of user, and security information;
Judge module, for judging that whether described authorization information consistent with the binding information of the user prestored, verifies described user, described in the binding information of user that prestores comprise cell-phone number and the security information of user's binding.
9. equipment as claimed in claim 8, is characterized in that, also comprise:
Second receiver module, for receiving the secure binding information that user sends, described secure binding information comprises cell-phone number and security information;
Memory module, for storing cell-phone number and security information in described secure binding information as binding information.
10. the equipment as described in claim 8 or 9 or 10, it is characterized in that, described security information comprises: international movement arranges identification code IMEI and international mobile subscriber identity IMSI.
11. equipment as claimed in claim 9, it is characterized in that, described second receiver module, comprising:
Two-dimensional code generation module, for when determining that user carries out secure binding, generates Quick Response Code;
Second receives submodule, for receiving the secure binding information generated after described user scans described Quick Response Code by cell-phone customer terminal.
12. equipment as claimed in claim 8, is characterized in that, also comprise:
Sending module, for when receiving the subscriber authentication request that user sends, the checking sending authorization information to described user sends request;
Receiver module, sends request the authorization information of transmission based on described checking for user.
13. equipment as claimed in claim 12, is characterized in that,
Described checking sends request and is specially Quick Response Code;
Described user, by the mode of cell-phone customer terminal scanning Quick Response Code, sends checking message to described server.
14. equipment as claimed in claim 8, is characterized in that, also comprise:
Authorization module, for when user is by cell-phone customer terminal access services device, informs to user by the result by cell-phone customer terminal, and to described cell-phone customer terminal mandate; Or
When user is by personal computer PC access services device, the result is informed to user by PC, and described PC is authorized.
CN201410440275.7A 2014-09-01 2014-09-01 Security authentication method and apparatus Pending CN105450416A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410440275.7A CN105450416A (en) 2014-09-01 2014-09-01 Security authentication method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410440275.7A CN105450416A (en) 2014-09-01 2014-09-01 Security authentication method and apparatus

Publications (1)

Publication Number Publication Date
CN105450416A true CN105450416A (en) 2016-03-30

Family

ID=55560229

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410440275.7A Pending CN105450416A (en) 2014-09-01 2014-09-01 Security authentication method and apparatus

Country Status (1)

Country Link
CN (1) CN105450416A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106230597A (en) * 2016-07-28 2016-12-14 努比亚技术有限公司 Short message verification code checking device and method
CN106230824A (en) * 2016-07-29 2016-12-14 浙商银行股份有限公司 A kind of mobile device authentic authentication system and method
CN106453234A (en) * 2016-08-12 2017-02-22 北京东方车云信息技术有限公司 Identity authentication method, relevant server and client
CN106454800A (en) * 2016-11-21 2017-02-22 北京小米移动软件有限公司 Identity verification method, device and system
CN106504171A (en) * 2016-09-28 2017-03-15 深圳大学 A kind of public transport ticket checking method and system
CN106779718A (en) * 2016-11-30 2017-05-31 江苏省公用信息有限公司 A kind of mobile phone safe method of calibration based on intelligent network
CN106845655A (en) * 2016-12-19 2017-06-13 北京东方车云信息技术有限公司 A kind of data managing method and system
CN106845613A (en) * 2017-02-09 2017-06-13 金邦达有限公司 The contactless application module method for closing of smart card and device
CN107623672A (en) * 2016-12-15 2018-01-23 平安科技(深圳)有限公司 Short-message verification code verification method and system
CN108122108A (en) * 2016-11-30 2018-06-05 株式会社日立制作所 Mobile device authentication system and mobile equipment authentication method
CN108234411A (en) * 2016-12-15 2018-06-29 中国电信股份有限公司 Method, system and Internetbank Verification System based on Internetbank access registrar
CN108512660A (en) * 2018-03-28 2018-09-07 湖南东方华龙信息科技有限公司 The verification method of virtual card
CN108712435A (en) * 2018-05-25 2018-10-26 四川斐讯信息技术有限公司 A kind of verification system and method for login application program
CN108990059A (en) * 2017-06-02 2018-12-11 阿里巴巴集团控股有限公司 A kind of verification method and device
CN111583451A (en) * 2020-04-09 2020-08-25 惠州拓邦电气技术有限公司 Identity verification method and device of electronic lock, computer equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120102558A1 (en) * 2008-12-29 2012-04-26 Hirokazu Muraki System, server device, method, program, and recording medium that enable facilitation of user authentication
CN102821112A (en) * 2012-09-14 2012-12-12 深圳中兴网信科技有限公司 Mobile equipment, server and mobile equipment data verification method
CN103023918A (en) * 2012-12-26 2013-04-03 百度在线网络技术(北京)有限公司 Method, system and device for uniformly providing login for multiple network services
US20130167208A1 (en) * 2011-12-22 2013-06-27 Jiazheng Shi Smart Phone Login Using QR Code
CN103428699A (en) * 2013-07-16 2013-12-04 李锦风 Registration binding and identity authentication method based on mobile phone hardware feature information
CN103986584A (en) * 2014-06-11 2014-08-13 四川省宁潮科技有限公司 Double-factor identity verification method based on intelligent equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120102558A1 (en) * 2008-12-29 2012-04-26 Hirokazu Muraki System, server device, method, program, and recording medium that enable facilitation of user authentication
US20130167208A1 (en) * 2011-12-22 2013-06-27 Jiazheng Shi Smart Phone Login Using QR Code
CN102821112A (en) * 2012-09-14 2012-12-12 深圳中兴网信科技有限公司 Mobile equipment, server and mobile equipment data verification method
CN103023918A (en) * 2012-12-26 2013-04-03 百度在线网络技术(北京)有限公司 Method, system and device for uniformly providing login for multiple network services
CN103428699A (en) * 2013-07-16 2013-12-04 李锦风 Registration binding and identity authentication method based on mobile phone hardware feature information
CN103986584A (en) * 2014-06-11 2014-08-13 四川省宁潮科技有限公司 Double-factor identity verification method based on intelligent equipment

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106230597A (en) * 2016-07-28 2016-12-14 努比亚技术有限公司 Short message verification code checking device and method
CN106230824A (en) * 2016-07-29 2016-12-14 浙商银行股份有限公司 A kind of mobile device authentic authentication system and method
CN106453234A (en) * 2016-08-12 2017-02-22 北京东方车云信息技术有限公司 Identity authentication method, relevant server and client
CN106504171A (en) * 2016-09-28 2017-03-15 深圳大学 A kind of public transport ticket checking method and system
EP3324662A1 (en) * 2016-11-21 2018-05-23 Beijing Xiaomi Mobile Software Co., Ltd. Identity verification method, apparatus and system, computer program and recording medium
CN106454800A (en) * 2016-11-21 2017-02-22 北京小米移动软件有限公司 Identity verification method, device and system
US10313870B2 (en) 2016-11-21 2019-06-04 Beijing Xiaomi Mobile Software Co., Ltd. Identity verification method and apparatus, and storage medium
CN106454800B (en) * 2016-11-21 2018-07-27 北京小米移动软件有限公司 Auth method, apparatus and system
US20180146363A1 (en) * 2016-11-21 2018-05-24 Beijing Xiaomi Mobile Software Co., Ltd. Identity verification method and apparatus, and storage medium
CN106779718A (en) * 2016-11-30 2017-05-31 江苏省公用信息有限公司 A kind of mobile phone safe method of calibration based on intelligent network
CN108122108A (en) * 2016-11-30 2018-06-05 株式会社日立制作所 Mobile device authentication system and mobile equipment authentication method
CN107623672A (en) * 2016-12-15 2018-01-23 平安科技(深圳)有限公司 Short-message verification code verification method and system
CN107623672B (en) * 2016-12-15 2018-06-19 平安科技(深圳)有限公司 Short-message verification code verification method and system
CN108234411A (en) * 2016-12-15 2018-06-29 中国电信股份有限公司 Method, system and Internetbank Verification System based on Internetbank access registrar
CN106845655A (en) * 2016-12-19 2017-06-13 北京东方车云信息技术有限公司 A kind of data managing method and system
CN106845613A (en) * 2017-02-09 2017-06-13 金邦达有限公司 The contactless application module method for closing of smart card and device
CN108990059A (en) * 2017-06-02 2018-12-11 阿里巴巴集团控股有限公司 A kind of verification method and device
CN108512660A (en) * 2018-03-28 2018-09-07 湖南东方华龙信息科技有限公司 The verification method of virtual card
CN108512660B (en) * 2018-03-28 2021-03-16 湖南东方华龙信息科技有限公司 Virtual card verification method
CN108712435A (en) * 2018-05-25 2018-10-26 四川斐讯信息技术有限公司 A kind of verification system and method for login application program
CN111583451A (en) * 2020-04-09 2020-08-25 惠州拓邦电气技术有限公司 Identity verification method and device of electronic lock, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN105450416A (en) Security authentication method and apparatus
KR102229744B1 (en) Offline payment method and device
CN108156126B (en) Burning verification method and device and identity authentication method and device for Internet of things equipment
CN106657152B (en) Authentication method, server and access control device
US20170302451A1 (en) Method and device for identifying user identity
EP3487142A1 (en) Method and device for providing and obtaining graphic code information, and terminal
CN106559783B (en) Authentication method, device and system for WIFI network
CN105812332A (en) Data protection method
US9445269B2 (en) Terminal identity verification and service authentication method, system and terminal
CN103249045A (en) Identification method, device and system
WO2017157185A1 (en) Method and device for linking to account and providing service process
CN108228211B (en) Smart card, and method and system for safely updating data of smart card
CN112968892B (en) Information verification method, device, computing equipment and medium
CN107277017A (en) Purview certification method, apparatus and system based on encryption key and device-fingerprint
CN111161056A (en) Method, system and equipment for improving transaction security of digital assets
CN102821112A (en) Mobile equipment, server and mobile equipment data verification method
CN107204985A (en) Purview certification method based on encryption key, apparatus and system
CN103368735A (en) Authentication method, device and system of accessing application into intelligent card
CN104796262A (en) Data encryption method and terminal system
CN105471920A (en) Identifying code processing method and device
KR101604622B1 (en) Method for Processing Mobile Payment by Using Encryption Matrix Authentication
CN103559430B (en) application account management method and device based on Android system
CN104102858A (en) Application program encryption processing method, application program encryption processing device and terminal
CN103745364A (en) Scan code differential scanning-based anti-fake method and scan code differential scanning method
CN106941475B (en) Authentication method and device based on trust relationship

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160330