CN106302493A - Method, system and the equipment of notes communication is realized by multiple-authentication - Google Patents

Method, system and the equipment of notes communication is realized by multiple-authentication Download PDF

Info

Publication number
CN106302493A
CN106302493A CN201610710108.9A CN201610710108A CN106302493A CN 106302493 A CN106302493 A CN 106302493A CN 201610710108 A CN201610710108 A CN 201610710108A CN 106302493 A CN106302493 A CN 106302493A
Authority
CN
China
Prior art keywords
address information
password
authentication
user name
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610710108.9A
Other languages
Chinese (zh)
Other versions
CN106302493B (en
Inventor
王志强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610710108.9A priority Critical patent/CN106302493B/en
Publication of CN106302493A publication Critical patent/CN106302493A/en
Application granted granted Critical
Publication of CN106302493B publication Critical patent/CN106302493B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a kind of method, system and equipment being realized notes communication by multiple-authentication, wherein method, including: S1, receive and handle a case the mac address information of terminal and IP address information and preserve the setting time, respectively mac address information and IP address information are verified, when being all verified, prompting user inputs username and password, performs S2;Otherwise, terminal of handling a case described in locking, terminates to access;S2, receives the username and password of user's input, and file is installed in request, respectively username and password and request is installed file and verifies, when all by checking, prompting user inserts optional equipment, performs S3;Otherwise, lock described user name, terminate to access;S3, it is judged that whether described optional equipment loads successfully, if it is, complete authentication, starts to perform described installation file, sets up with server and is connected;Otherwise, lock described user name, terminate to access.The present invention passes through multiple-authentication, it is ensured that the confidentiality of system.

Description

Method, system and the equipment of notes communication is realized by multiple-authentication
Technical field
The present invention relates to a kind of method, system and equipment being realized notes communication by multiple-authentication, particularly relate to one Method, system, mobile terminal and the server of notes communication is realized by multiple-authentication.
Background technology
Entering 21st century, in whole nation public security organs system, the various legal documents of computer manufacture are in routine work In sequential use, its effect have also been obtained the most certainly.Various law approval forms the most all begin to use computer manufacture.
In the law practising of present stage, notes are that public security organs' system handles a case the important component part of work and material carries Body, puts down in system of proof in occupation of very important status.For a long time, policeman takes when handling case and putting down more Traditional handwriting mode, working link repeats, inefficiency.Notes quality directly affects working quality of case handling, and reflects law enforcement matter Amount and policeman's level of law enforcement.Therefore, improve notes quality tool by the means of science and technology to be of great significance.
Summary of the invention
The technical problem to be solved is, handles a case in system for existing, for once verifies, cause confidentiality The problem of difference, the present invention proposes a kind of by multiple authentication, and the mode using software and hardware combining to verify reaches most preferably to maintain secrecy The method, system, mobile terminal and the server that are realized notes communication by multiple-authentication of performance.
The technical scheme is that a kind of side being realized notes communication by multiple-authentication Method, is applied to mobile terminal, comprises the following steps:
S1, receives and handles a case the mac address information of terminal and IP address information and preserve the setting time, respectively to MAC Address Information and IP address information are verified, when being all verified, prompting user inputs username and password, performs step S2;
S2, receive the username and password of user's input, and the request of user's input file is installed, respectively to user name and Password and request are installed file and are verified, when all by checking, prompting user inserts optional equipment, performs step S3; Otherwise, lock described user name, terminate to access;
S3, it is judged that whether described optional equipment loads successfully, if it is, complete authentication, starts to perform described installation File, sets up with server and is connected;Otherwise, lock described user name, terminate to access.
The invention has the beneficial effects as follows: pass through multiple-authentication, it is ensured that the confidentiality of system, to user's multiple-authentication, and Adding the checking of optional equipment, it is achieved the verification mode of software and hardware combining, its safety is far above other verification modes.
On the basis of technique scheme, the present invention can also do following improvement.
Further, described S1 specifically includes following steps:
S11, receives mac address information and the IP address information of terminal of handling a case, is prestored by mac address information in server All mac address informations mate, it may be judged whether can mate, if it is, perform step S12;Otherwise, do described in locking Case terminal, terminates to access;
S12, verifies that the described IP address information IP address information the most corresponding with the mac address information mated is identical, If it is, perform step S2;Otherwise, terminal of handling a case described in locking, terminates to access;
Above-mentioned further scheme is used to provide the benefit that, by the double checking of MAC Address and IP address, can be first Incongruent mobile terminal is isolated by the time, and the most double checking is all passed through to carry out user's checking, it is ensured that only There is specific mobile terminal can access writing-record system.
Further, described S2 specifically includes following steps:
S21, receives the username and password of user's input, all user names prestored is entered in user name and mobile terminal Row coupling, it may be judged whether can mate, if it is, perform step S12;Otherwise, lock described user name, terminate to access;
S22, verifies that the password that described password is the most corresponding with the user name mated is identical, if it is, perform step S23;Otherwise, lock described user name, terminate to access;
S23, the request receiving user's input is installed file, is obtained all requests and install the summary of file, it is judged that all institutes State whether summary exists the identical summary that prestores, if it is, prompting user inserts optional equipment, perform step S3;Otherwise, locking Described user name, terminates to access.
Above-mentioned further scheme is used to provide the benefit that, by the double checking of password and document, can be first Incongruent user is isolated by the time, and the most double checking is all passed through to insert accessory device, it is ensured that mobile whole End cleaning rather than anyone mobile terminal can be operated, prevent mobile terminal because accessory device insert The problems such as the poisoning entered and cause.
Further, described S22 use MD5 digest algorithm obtain the summary installing file.
Use above-mentioned further scheme to provide the benefit that, obtained the summary installing file by MD5 digest algorithm, by institute There is the summary installing file to mate with the summary that prestores, only can mate and just pass through to test when installing all summaries in file Card.
Further, described S3 specifically includes:
S31, it is judged that whether described optional equipment loads successfully, if it is, authentication is passed through, performs S32;Otherwise, lock Fixed described user name, terminates to access;
S32, the key of internal preset is inputted server, sets the corresponding adnexa prestored in server by described optional equipment Standby username and password is decrypted, and works as successful decryption, then set up the communication of mobile terminal and server;Otherwise, locking institute State user name and optional equipment, terminate.
Use above-mentioned further scheme to provide the benefit that, prestore in using the double secret key server preset in accessory device Username and password be decrypted, it is ensured that the correspondence of optional equipment, mobile terminal and server, an optional equipment is only Can a corresponding mobile terminal.
The technical scheme is that a kind of side being realized notes communication by multiple-authentication Method, is applied to server, it is characterised in that comprise the following steps:
Receive the mac address information of terminal of handling a case and IP address information that mobile terminal sends and verify, as by checking, Perform next step;Otherwise, terminate;
Receive the key that the optional equipment of mobile terminal forwarding is preset, the corresponding accessory device prestored according to described double secret key Username and password be decrypted, it may be judged whether successful decryption, if it is, set up the communication of server and mobile terminal;No Then, lock described mobile terminal, terminate.
The technical scheme is that a kind of mobile terminal, including:
Preliminary authentication module, receives and handles a case the mac address information of terminal and IP address information and preserve the setting time, respectively Verifying mac address information and IP address information, when being all verified, prompting user inputs username and password; Otherwise, terminal of handling a case described in locking, terminates to access;Receive the username and password of user's input, and the request peace of user's input Dress file, installs file to username and password and request respectively and verifies, when all by checking, prompting user inserts Optional equipment, triggers authentication module;Otherwise, lock described user name, terminate to access;
Authentication module, it is judged that whether described optional equipment loads successfully, if it is, complete authentication, starts to hold The described installation file of row, sets up with server and is connected;Otherwise, lock described user name, terminate to access.
The invention has the beneficial effects as follows: pass through multiple-authentication, it is ensured that the confidentiality of system, multiple to client and user Checking, and add the checking of optional equipment, it is achieved the verification mode of software and hardware combining, its safety is far above other authentications Formula.
On the basis of technique scheme, the present invention can also do following improvement.
Further, also include that address preserves module, handle a case the mac address information of terminal and IP address information also for receiving Preserve the setting time.
Further, described preliminary authentication module includes:
Address verifying module, receives and handles a case the mac address information of terminal and IP address information and preserve the setting time, respectively Verifying mac address information and IP address information, when being all verified, prompting user inputs username and password; Otherwise, terminal of handling a case described in locking, terminates to access;
User name authentication module, receives the username and password of user's input, by prestore in user name and mobile terminal All user names are mated, it may be judged whether can mate, if it is, trigger password authentication module;Otherwise, described user is locked Name, terminates to access;
Password authentication module, verifies that the password that described password is the most corresponding with the user name mated is identical, if it is, touch Send out Digest Authentication module;Otherwise, lock described user name, terminate to access;
Digest Authentication module, the request receiving user's input is installed file, is obtained all requests and install the summary of file, sentence Whether disconnected all described summaries exist the identical summary that prestores, if it is, prompting user inserts optional equipment, trigger authentication Module;Otherwise, lock described user name, terminate to access.
Further, described authentication module includes:
Load judge module, it is judged that whether described optional equipment loads successfully, if it is, authentication is passed through, trigger;No Then, lock described user name, terminate to access;
Cipher key decryption block, the key of internal preset is inputted server by described optional equipment, to prestore in server The username and password of corresponding accessory device is decrypted, and works as successful decryption, then sets up the communication of mobile terminal and server;No Then, lock described user name and optional equipment, terminate.
The technical scheme is that a kind of server, including:
Address verifying module, for receiving mac address information and the IP address information of the terminal of handling a case that mobile terminal sends And verify;
Deciphering module, the key that the optional equipment forwarded for receiving mobile terminal is preset, prestore according to described double secret key Username and password be decrypted, it may be judged whether successful decryption, if it is, set up the communication of server and mobile terminal;No Then, lock described mobile terminal, terminate.
The present invention allows to carry out on this basis Function Extension.
Accompanying drawing explanation
Fig. 1 is a kind of method flow diagram being realized notes communication by multiple-authentication described in the embodiment of the present invention 1;
Fig. 2 is a kind of mobile terminal structure schematic diagram described in the embodiment of the present invention 2.
In accompanying drawing, the list of parts representated by each label is as follows:
1, preliminary authentication module, 2, authentication module, 11, address verifying module, 12, user name authentication module, 13, close Code authentication module, 14, Digest Authentication module, 21, load judge module, 22, cipher key decryption block.
Detailed description of the invention
Being described principle and the feature of the present invention below in conjunction with accompanying drawing, example is served only for explaining the present invention, and Non-for limiting the scope of the present invention.
As it is shown in figure 1, for described in the embodiment of the present invention 1 a kind of by multiple-authentication realize notes communication method, should For mobile terminal, comprise the following steps:
S1, receives and handles a case the mac address information of terminal and IP address information and preserve the setting time, respectively to MAC Address Information and IP address information are verified, when being all verified, prompting user inputs username and password, performs step S2;
S2, receive the username and password of user's input, and the request of user's input file is installed, respectively to user name and Password and request are installed file and are verified, when all by checking, prompting user inserts optional equipment, performs step S3; Otherwise, lock described user name, terminate to access;
S3, it is judged that whether described optional equipment loads successfully, if it is, complete authentication, starts to perform described installation File, sets up with server and is connected;Otherwise, lock described user name, terminate to access.
Described S1 specifically includes following steps:
S11, receives mac address information and the IP address information of terminal of handling a case, is prestored by mac address information in server All mac address informations mate, it may be judged whether can mate, if it is, perform step S12;Otherwise, do described in locking Case terminal, terminates to access;
S12, verifies that the described IP address information IP address information the most corresponding with the mac address information mated is identical, If it is, perform step S2;Otherwise, terminal of handling a case described in locking, terminates to access;
Described S2 specifically includes following steps:
S21, receives the username and password of user's input, all user names prestored is entered in user name and mobile terminal Row coupling, it may be judged whether can mate, if it is, perform step S22;Otherwise, lock described user name, terminate to access;
S22, verifies that the password that described password is the most corresponding with the user name mated is identical, if it is, perform step S23;Otherwise, lock described user name, terminate to access;
S23, the request receiving user's input is installed file, is obtained all requests and install the summary of file, it is judged that all institutes State whether summary exists the identical summary that prestores, if it is, prompting user inserts optional equipment, perform step S3;Otherwise, locking Described user name, terminates to access.
Described S22 use MD5 digest algorithm obtain the summary installing file.
Described S3 specifically includes:
S31, it is judged that whether described optional equipment loads successfully, if it is, authentication is passed through, performs S32;Otherwise, lock Fixed described user name, terminates to access;
S32, the key of internal preset is inputted server, sets the corresponding adnexa prestored in server by described optional equipment Standby username and password is decrypted, and works as successful decryption, then set up the communication of mobile terminal and server;Otherwise, locking institute State user name and optional equipment, terminate.
A kind of method realizing notes communication by multiple-authentication, is applied to server, comprises the following steps:
Receive the mac address information of terminal of handling a case and IP address information that mobile terminal sends and verify, as by checking, Perform next step;Otherwise, terminate;
Receive the key that the optional equipment of mobile terminal forwarding is preset, the corresponding accessory device prestored according to described double secret key Username and password be decrypted, it may be judged whether successful decryption, if it is, set up the communication of server and mobile terminal;No Then, lock described mobile terminal, terminate.
As in figure 2 it is shown, for a kind of mobile terminal described in the embodiment of the present invention 2, including:
Preliminary authentication module 1, receives and handles a case the mac address information of terminal and IP address information and preserve the setting time, point Other verifying mac address information and IP address information, when being all verified, prompting user inputs user name and close Code;Receive user input username and password, and user input request install file, respectively to username and password and please Asking installation file to verify, when all by checking, prompting user inserts optional equipment, triggers authentication module 2;No Then, lock described user name, terminate to access;
Authentication module 2, it is judged that whether described optional equipment loads successfully, if it is, complete authentication, starts to hold The described installation file of row, sets up with server and is connected;Otherwise, lock described user name, terminate to access.
Also include that address preserves module, be used for receiving the mac address information of terminal of handling a case and IP address information and preservation sets Fix time.
Described preliminary authentication module 1 includes:
Address verifying module 11, receives mac address information and IP address information that terminal of handling a case sends, is believed by MAC Address Breath and IP address information are mated with the information prestored in server, it may be judged whether can mate, if it is, trigger user name Authentication module;Otherwise, terminal of handling a case described in locking, terminates to access;
User name authentication module 12, receives the username and password of user's input, user name is prestored in mobile terminal All user names mate, it may be judged whether can mate, if it is, trigger password authentication module;Otherwise, described use is locked Name in an account book, terminates to access;
Password authentication module 13, verifies that the password that described password is the most corresponding with the user name mated is identical, if it is, Trigger Digest Authentication module;Otherwise, lock described user name, terminate to access;
Digest Authentication module 14, receives the request installation file of user's input, obtains all requests and install the summary of file, Judge whether all described summaries exist the identical summary that prestores, if it is, prompting user inserts optional equipment, trigger identity and test Card module;Otherwise, lock described user name, terminate to access.
Described Digest Authentication module 14 use MD5 digest algorithm obtain the summary installing file.
Described authentication module 2 includes:
Load judge module 21, it is judged that whether described optional equipment loads successfully, if it is, authentication is passed through, trigger; Otherwise, lock described user name, terminate to access;
Cipher key decryption block 22, the key of internal preset is inputted server, prestores in server by described optional equipment The username and password of corresponding accessory device be decrypted, work as successful decryption, then set up the communication of mobile terminal and server; Otherwise, lock described user name and optional equipment, terminate.
A kind of server, including:
Address verifying module, for receiving mac address information and the IP address information of the terminal of handling a case that mobile terminal sends And verify;
Deciphering module, the key that the optional equipment forwarded for receiving mobile terminal is preset, prestore according to described double secret key Username and password be decrypted, it may be judged whether successful decryption, if it is, set up the communication of server and mobile terminal;No Then, lock described mobile terminal, terminate.
The present invention in the specific implementation, during handling a case, needs when inquiring or interrogate, personnel in charge of the case or have power The personnel in charge of the case of limit, when needing to conduct interviews certain inquiry unit or query unit constituting case, passes through mobile terminal Inquiry unit or query unit are conducted interviews, and when logging in mobile terminal, uses and of the present invention pass through multiple-authentication The method realizing notes communication, first verifies that whether whether its MAC Address and IP address mate with the information prestored in server, Coupling then by checking, otherwise locks its terminal of handling a case;Then, username and password is used to log in, when user name and close When code-phase meets, by checking, otherwise, (can limiting within a certain period of time as required, this user name cannot to lock this user name Log in, or the mobile terminal that repeatedly user name logs in is tracked, and prevents other people from usurping);For the user by checking, receive File is installed in the request of its input, request is installed file and is verified by digest algorithm, when all summary all passes through checking Time, prompting user inserts optional equipment;User inserts optional equipment (such as U-shield etc.), accessory device built-in key, and mobile terminal will This key sends to server, and server uses the username and password in this double secret key server to be decrypted, and obtains one group Username and password, is sent to mobile terminal by this username and password, and since then, mobile terminal obtains the authority accessing server (username and password that this authority specifically can be deciphered by the key in optional equipment determines).
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all spirit in the present invention and Within principle, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.

Claims (10)

1. the method realizing notes communication by multiple-authentication, is applied to mobile terminal, it is characterised in that include following step Rapid:
S1, receives and handles a case the mac address information of terminal and IP address information and preserve the setting time, respectively to mac address information And IP address information verifies, when being all verified, prompting user inputs username and password, performs step S2;
S2, receives the username and password of user's input, and the request of user's input installs file, respectively to username and password And ask installation file to be verified, when all by checking, prompting user inserts optional equipment, performs step S3;Otherwise, Lock described user name, terminate to access;
S3, it is judged that whether described optional equipment loads successfully, if it is, complete authentication, starts to perform described installation file, Set up with server and be connected;Otherwise, lock described user name, terminate to access.
A kind of method realizing notes communication by multiple-authentication the most according to claim 1, it is characterised in that
Described S1 specifically includes following steps:
S11, receives mac address information and the IP address information of terminal of handling a case, the institute that will prestore in mac address information and server Mac address information is had to mate, it may be judged whether can mate, if it is, perform step S12;Otherwise, handle a case end described in locking End, terminates to access;
S12, verifies that the described IP address information IP address information the most corresponding with the mac address information mated is identical, if It is to perform step S2;Otherwise, terminal of handling a case described in locking, terminates to access.
A kind of method realizing notes communication by multiple-authentication the most according to claim 1, it is characterised in that
Described S2 specifically includes following steps:
S21, receives the username and password of user's input, all user names prestored is carried out in user name and mobile terminal Join, it may be judged whether can mate, if it is, perform step S22;Otherwise, lock described user name, terminate to access;
S22, verifies that the password that described password is the most corresponding with the user name mated is identical, if it is, perform step S23;No Then, lock described user name, terminate to access;
S23, the request receiving user's input is installed file, is obtained all requests and install the summary of file, it is judged that pluck described in all Whether there is the identical summary that prestores, if it is, prompting user inserts optional equipment, perform step S3;Otherwise, locking is described User name, terminates to access.
A kind of method realizing notes communication by multiple-authentication the most according to claim 3, it is characterised in that described S22 use MD5 digest algorithm obtain the summary installing file.
5., according to a kind of method realizing notes communication by multiple-authentication described in any one of claim 1-4, its feature exists In, described S2 specifically includes:
S21, it is judged that whether described optional equipment loads successfully, if it is, authentication is passed through, performs S22;Otherwise, locking institute State user name, terminate to access;
S22, the key of internal preset is inputted server by described optional equipment, to the corresponding accessory device prestored in server Username and password is decrypted, and works as successful decryption, then set up the communication of mobile terminal and server;Otherwise, described use is locked Name in an account book and optional equipment, terminate.
6. the method realizing notes communication by multiple-authentication, is applied to server, it is characterised in that include following step Rapid:
Receive the mac address information of terminal of handling a case and IP address information that mobile terminal sends and verify, as by checking, performing Next step;Otherwise, terminate;
Receive the key that the optional equipment of mobile terminal forwarding is preset, according to the use of the corresponding accessory device that described double secret key prestores Name in an account book and password are decrypted, it may be judged whether successful decryption, if it is, set up the communication of server and mobile terminal;Otherwise, lock Fixed described mobile terminal, terminates.
7. a mobile terminal, it is characterised in that including:
Preliminary authentication module, receives mac address information and the IP address information of terminal of handling a case, respectively to mac address information and IP Address information is verified, when being all verified, prompting user inputs username and password;Otherwise, handle a case described in locking Terminal, terminates to access;Receive the username and password of user's input, and the request of user's input installs file, respectively to user Name and password and request are installed file and are verified, when all by checking, prompting user inserts optional equipment, triggers identity Authentication module;Otherwise, lock described user name, terminate to access;
Authentication module, it is judged that whether described optional equipment loads successfully, if it is, complete authentication, starts to perform institute State installation file, set up with server and be connected;Otherwise, lock described user name, terminate to access.
A kind of mobile terminal the most according to claim 6, it is characterised in that also include that address preserves module, be used for receiving The mac address information of terminal of handling a case and IP address information also preserve the setting time.
A kind of mobile terminal the most according to claim 6, it is characterised in that described preliminary authentication module includes:
User name authentication module, receives the username and password of user's input, all by prestore in user name and mobile terminal User name is mated, it may be judged whether can mate, if it is, trigger password authentication module;Otherwise, lock described user name, Terminate to access;
Password authentication module, verifies that the password that described password is the most corresponding with the user name mated is identical, plucks if it is, trigger Want authentication module;Otherwise, lock described user name, terminate to access;
Digest Authentication module, the request receiving user's input is installed file, is obtained all requests and install the summary of file, it is judged that institute Have whether described summary exists the identical summary that prestores, if it is, prompting user inserts optional equipment, trigger authentication mould Block;Otherwise, lock described user name, terminate to access.
10. a server, it is characterised in that including:
Address verifying module, is used for receiving the mac address information of the terminal of handling a case that mobile terminal sends and IP address information and testing Card;
Deciphering module, the key that the optional equipment forwarded for receiving mobile terminal is preset, the use prestored according to described double secret key Name in an account book and password are decrypted, it may be judged whether successful decryption, if it is, set up the communication of server and mobile terminal;Otherwise, lock Fixed described mobile terminal, terminates.
CN201610710108.9A 2016-08-23 2016-08-23 Method, system and equipment for realizing note-recording communication through multiple verification Expired - Fee Related CN106302493B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610710108.9A CN106302493B (en) 2016-08-23 2016-08-23 Method, system and equipment for realizing note-recording communication through multiple verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610710108.9A CN106302493B (en) 2016-08-23 2016-08-23 Method, system and equipment for realizing note-recording communication through multiple verification

Publications (2)

Publication Number Publication Date
CN106302493A true CN106302493A (en) 2017-01-04
CN106302493B CN106302493B (en) 2020-03-20

Family

ID=57614682

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610710108.9A Expired - Fee Related CN106302493B (en) 2016-08-23 2016-08-23 Method, system and equipment for realizing note-recording communication through multiple verification

Country Status (1)

Country Link
CN (1) CN106302493B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106897864A (en) * 2017-04-17 2017-06-27 黄跃明 A kind of writing-record system and its notes method based on mobile terminal
CN108154593A (en) * 2018-02-05 2018-06-12 宁波铁克机电有限公司 For unlocking the handheld device of safety box and its unlocking method
CN109299617A (en) * 2018-09-19 2019-02-01 中国农业银行股份有限公司贵州省分行 A kind of file encryption and decryption system
CN110149261A (en) * 2018-02-13 2019-08-20 致伸科技股份有限公司 Detection job network framework and the information management-control method being applied thereon
CN115174187A (en) * 2022-06-30 2022-10-11 济南浪潮数据技术有限公司 User secure login method, system and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103368942A (en) * 2013-05-25 2013-10-23 中山市中商港科技有限公司 Cloud data security storage and management method
CN105553752A (en) * 2015-12-02 2016-05-04 中国联合网络通信集团有限公司 Method of on-line speed measurement of home gateway, speed measurement platform and gateway device
CN105678188A (en) * 2016-01-07 2016-06-15 杨龙频 Anti-leakage protocol identification method and device for database
CN105763520A (en) * 2014-12-18 2016-07-13 阿里巴巴集团控股有限公司 Network account password recovery method and device, client terminal device and server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103368942A (en) * 2013-05-25 2013-10-23 中山市中商港科技有限公司 Cloud data security storage and management method
CN105763520A (en) * 2014-12-18 2016-07-13 阿里巴巴集团控股有限公司 Network account password recovery method and device, client terminal device and server
CN105553752A (en) * 2015-12-02 2016-05-04 中国联合网络通信集团有限公司 Method of on-line speed measurement of home gateway, speed measurement platform and gateway device
CN105678188A (en) * 2016-01-07 2016-06-15 杨龙频 Anti-leakage protocol identification method and device for database

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郝耀辉: "基于USB加密锁的软件防盗版方法", 《计算机工程》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106897864A (en) * 2017-04-17 2017-06-27 黄跃明 A kind of writing-record system and its notes method based on mobile terminal
CN108154593A (en) * 2018-02-05 2018-06-12 宁波铁克机电有限公司 For unlocking the handheld device of safety box and its unlocking method
CN110149261A (en) * 2018-02-13 2019-08-20 致伸科技股份有限公司 Detection job network framework and the information management-control method being applied thereon
CN109299617A (en) * 2018-09-19 2019-02-01 中国农业银行股份有限公司贵州省分行 A kind of file encryption and decryption system
CN115174187A (en) * 2022-06-30 2022-10-11 济南浪潮数据技术有限公司 User secure login method, system and device

Also Published As

Publication number Publication date
CN106302493B (en) 2020-03-20

Similar Documents

Publication Publication Date Title
CN106302493A (en) Method, system and the equipment of notes communication is realized by multiple-authentication
US7443986B2 (en) Key allocating method and key allocation system for encrypted communication
US9769655B2 (en) Sharing security keys with headless devices
US8272036B2 (en) Dynamic authentication in secured wireless networks
WO2018090183A1 (en) Identity authentication method, terminal device, authentication server and electronic device
EP3435591A1 (en) 1:n biometric authentication, encryption, signature system
US9445269B2 (en) Terminal identity verification and service authentication method, system and terminal
US20070288998A1 (en) System and method for biometric authentication
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
CN101297534A (en) Method and apparatus for secure network authentication
CN113221128B (en) Account and password storage method and registration management system
WO2022048589A1 (en) Data acquisition method, apparatus and device, and medium
CN108881222A (en) Strong identity authentication system and method based on PAM framework
CN109714170B (en) Data isolation method in alliance chain and corresponding alliance chain system
CN109474419A (en) A kind of living body portrait photo encryption and decryption method and encrypting and deciphering system
CN112383401B (en) User name generation method and system for providing identity authentication service
WO2022143498A1 (en) Access control method and apparatus, and network-side device, terminal and blockchain node
CN104753886B (en) It is a kind of to the locking method of remote user, unlocking method and device
JP6829341B1 (en) Information processing systems, information processing methods, and programs
CN111131140B (en) Method and system for enhancing login security of Windows operating system based on message pushing
JP6783527B2 (en) Electronic key re-registration system, electronic key re-registration method and program
KR101133210B1 (en) Mobile Authentication System and Central Control System
CN116506118A (en) Identity privacy protection method in PKI certificate transparentization service
CN106412904B (en) Method and system for preventing counterfeit user authentication authority
US11550932B2 (en) Method for a terminal to acquire and access data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200320

Termination date: 20200823

CF01 Termination of patent right due to non-payment of annual fee