[go: up one dir, main page]

CN106453327B - Log in the method and mobile terminal for needing the computer application of authenticating identity - Google Patents

Log in the method and mobile terminal for needing the computer application of authenticating identity Download PDF

Info

Publication number
CN106453327B
CN106453327B CN201610906485.XA CN201610906485A CN106453327B CN 106453327 B CN106453327 B CN 106453327B CN 201610906485 A CN201610906485 A CN 201610906485A CN 106453327 B CN106453327 B CN 106453327B
Authority
CN
China
Prior art keywords
mobile terminal
computer application
application
login
characteristic information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610906485.XA
Other languages
Chinese (zh)
Other versions
CN106453327A (en
Inventor
孙吉平
史继超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senseshield Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senseshield Technology Co Ltd filed Critical Beijing Senseshield Technology Co Ltd
Priority to CN201610906485.XA priority Critical patent/CN106453327B/en
Publication of CN106453327A publication Critical patent/CN106453327A/en
Application granted granted Critical
Publication of CN106453327B publication Critical patent/CN106453327B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0492Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses methods and mobile terminal that a kind of login needs the computer application of authenticating identity, in the application that mobile terminal setting can obtain mobile terminal features information and encrypt, the application guarantee mobile terminal features information uniqueness and can not being tampered property, when the computer application for wanting the server of logging in network side to provide, mobile terminal features information needed for the application being arranged as mobile terminal directly acquires computer application, encryption are logged in after being sent to the computer application verifying of server offer.It is simple and easy using mode provided by the invention, and no matter the computer application can be successfully logged in which kind of mobile communications network.

Description

Method for logging in computer application needing identity authentication and mobile terminal
Technical Field
The invention relates to the technical field of mobile communication, in particular to a method for logging in a computer application needing identity authentication and a mobile terminal.
Background
With the development of mobile communication technology, a mobile terminal can be used as a platform to log in various computer applications provided by a server on a network side, so that various functions are realized. Before the mobile terminal is adopted to log in the computer application through the mobile communication network, the computer application needs to perform identity authentication on a user using the mobile terminal, and can access the computer application to realize various functions after verification. There are many ways in which computer applications authenticate users using mobile terminals.
In the first mode, when logging in a computer application provided by a server on a network side each time, after a user inputs a user name and password information at a computer application client of a mobile terminal and uploads the user name and password information to the computer application of the server, the computer application performs validity verification according to the user name and password information, and after the user name and password information passes the validity verification, the mobile terminal logs in the computer application through a mobile communication network and the computer application provides various functions;
in the second mode, after the user name and the password information are prestored by the mobile terminal, when the user name and the password information are required to log in the computer application provided by the server on the network side, the mobile terminal directly calls the prestored user name and the password information, inputs the user name and the password information into a computer application client of the mobile terminal, uploads the user name and the password information to the computer application of the server, carries out legal verification, enables the mobile terminal to log in the computer application through the mobile communication network after the user name and the password information are passed, and provides various functions by the computer application;
in the third mode, the computer application provides two-dimension code scanning login, when the computer application provided by the server on the network side needs to be logged in, the mobile terminal scans the two-dimension code provided by the computer application and uploads the scanned two-dimension code information to the computer application of the server for verification, and after identity verification is completed, the mobile terminal can log in the computer application through the mobile communication network, and the computer application provides various functions.
By adopting the first mode, the problems of complicated operation, easy forgetting of passwords and the like exist, the application process of logging in a computer is complicated, and the management cost is increased; the second mode leaves potential safety hazards when logging in the computer application, namely anyone can directly log in the computer application through the mobile communication network by operating the mobile terminal, and the mode only aims at the authorization authority of the mobile terminal for logging in the computer application through the mobile communication network, but cannot aim at the authorization authority of a user for logging in the computer application through the mobile communication network, and brings great inconvenience and low safety in the use process; by adopting the third mode, the security of the computer application can be improved, and the problem that the verification information of the computer application is easy to forget is solved, but the two-dimensional code of the computer application needs to be scanned when the computer application is accessed every time, so that the computer application is still complicated, and the computer application cannot be used even in a mobile communication network environment under the condition that the mobile communication network environment is poor, and the application scene is limited.
Disclosure of Invention
In view of this, the embodiments of the present invention provide a method for logging in a computer application requiring identity authentication, which makes it easy to log in the computer application requiring identity authentication, and enables the computer application to be successfully logged in any mobile communication network.
The embodiment of the invention provides a mobile terminal for logging in computer application needing identity authentication, which enables the computer application needing identity authentication to be simple and easy to log in, and the computer application can be successfully logged in no matter in any mobile communication network.
According to the above object, the present invention is achieved by:
a method of logging into a computer application requiring identity authentication, comprising:
setting an application capable of acquiring and encrypting the characteristic information of the mobile terminal at the mobile terminal, wherein the application ensures the uniqueness and the non-falsification of the characteristic information of the mobile terminal;
when the computer application provided by the server on the network side is to be logged in, the application set by the mobile terminal directly acquires the mobile terminal characteristic information required by the computer application, encrypts and sends the information to the server to log in after the computer application provided by the server is verified.
The encrypted mobile terminal characteristic information is sent to the computer application by the mobile terminal through a login message;
the method further comprises the following steps:
the computer application has the function of binding the characteristic information of the mobile terminal and monitors the login message sent by the mobile terminal.
The process that the application set by the mobile terminal directly obtains the characteristic information of the mobile terminal required by the computer application, encrypts and sends the characteristic information to the server to provide the computer application for login after verification is as follows:
the application set by the mobile terminal sends the position information of the mobile terminal to a server where the computer application is located in real time;
when the server judges that the mobile terminal is in the set login range, the server sends a mobile terminal reached message to the computer application, and the mobile terminal directly logs in the computer application; otherwise, indicating that the computer application is in an activated state, and logging in the computer application after the position information sent by the mobile terminal is in the logging range.
The application set by the mobile terminal directly obtains the mobile terminal characteristic information required by the computer application, and the login process after the computer application is verified and sent to the server by encryption is as follows:
the application setting of the mobile terminal sets the information of a mobile communication network for logging in the computer application and a server for logging in the computer application;
after the mobile terminal accesses to the set mobile communication network for logging in the computer application, the application set by the mobile terminal sends login information to the server, and the login information carries information of the server where the login computer application is located;
and after receiving the login information, the server logs the mobile terminal into the computer application after verification.
The method further comprises the following steps:
the computer application maintains the set heartbeat time, whether the mobile terminal is in the set mobile communication network for logging in the computer application is determined within the time exceeding the heartbeat time, and if not, the mobile terminal is logged out;
when the mobile terminal leaves the set mobile communication network for logging in the computer application, the mobile terminal sends log-out to the server, and the server actively enables the mobile terminal to log out the logged-in computer application.
The application set by the mobile terminal directly obtains the mobile terminal characteristic information required by the computer application, and the login process after the computer application is verified and sent to the server by encryption is as follows:
the computer application opens the automatic access function and sets the associated mobile terminal characteristic information;
the mobile terminal sets an application and is in an open state;
when the computer application is started before the mobile terminal is accessed to a set internal network, the mobile terminal is accessed to the internal network, the application set by the mobile terminal sends the characteristic information of the mobile terminal through broadcasting, and after the computer application receives the characteristic information, the characteristic information is decrypted and verified to be consistent with the set bound characteristic information of the mobile terminal, so that the mobile terminal is logged in;
when the computer application is started after the mobile terminal is accessed to the set internal network, the computer application sends a computer application started message in the internal network through broadcasting, after the application of the mobile terminal receives the message, the login message is sent to the computer application, and the login is successful after the verification.
The method further comprises the following steps:
the application of the mobile terminal continuously sends heartbeat messages to the logged computer application within the range exceeding the set heartbeat time, the mobile terminal is confirmed to log in the computer application for normal use, and the computer application still does not receive the heartbeat messages after the set heartbeat time is exceeded, so that the mobile terminal exits from the login;
when the mobile terminal leaves the internal network, the log-out message is sent, and the computer application receiving the message enables the mobile terminal to log out.
The application set by the mobile terminal directly obtains the mobile terminal characteristic information required by the computer application, and the login process after the computer application is verified and sent to the server by encryption is as follows:
when an application set by the mobile terminal is connected to a computer application through Bluetooth or USB, actively sending a login message carrying encrypted characteristic information of the mobile terminal;
and the computer application detects the login message and enables the mobile terminal to log in after verification.
The method further comprises the following steps:
the computer application monitors the access state of the logged mobile terminal in real time: when the mobile terminal is accessed and disconnected in a USB mode, the computer application enables the mobile terminal to log out; when the mobile terminal is accessed in a Bluetooth mode, the computer application is effective all the time in a heartbeat monitoring period, and when the mobile terminal closes the Bluetooth, the computer application enables the mobile terminal to quit logging in.
A mobile terminal for logging into a computer application requiring identity authentication, comprising: an application setting module and a login module, wherein,
the application setting module is used for setting an application which can acquire and encrypt the characteristic information of the mobile terminal, and the application ensures the uniqueness and the non-falsification of the characteristic information of the mobile terminal;
and the login module is used for directly acquiring the mobile terminal characteristic information required by the computer application by the set application when the computer application provided by the server on the network side is to be logged in, encrypting and sending the information to the server, and logging in after the computer application provided by the server is verified.
The login module is also used for monitoring the access state of the logged mobile terminal in real time: when the mobile terminal is accessed and disconnected in a USB mode, the computer application enables the mobile terminal to log out; when the mobile terminal is accessed in a Bluetooth mode, the computer application is effective all the time in a heartbeat monitoring period, and when the mobile terminal closes the Bluetooth mode, the computer application enables the mobile terminal to quit login;
and recording the login state in real time: when the computer logs in, recording the logged-in state and the basic information of the logged-in computer; if not, recording the unregistered state.
According to the scheme, the application capable of acquiring the characteristic information of the mobile terminal and encrypting is arranged on the mobile terminal, the application ensures the uniqueness and the non-falsification of the characteristic information of the mobile terminal, when the computer application provided by the server on the network side needs to be logged in, the application arranged on the mobile terminal directly acquires the characteristic information of the mobile terminal required by the computer application, encrypts and sends the characteristic information to the computer application provided by the server for verification, and then logs in. The method provided by the invention is simple and easy to implement, and the computer application can be successfully logged in any mobile communication network.
Drawings
FIG. 1 is a flowchart of a method for logging in a computer application requiring identity authentication according to an embodiment of the present invention;
FIG. 2 is a flowchart of an embodiment of a method for logging in a computer application requiring identity authentication according to the present invention;
FIG. 3 is a flowchart of a second example of a method for logging in a computer application requiring identity authentication according to an embodiment of the present invention;
FIG. 4 is a flowchart of an embodiment of a method for logging in a computer application requiring identity authentication;
FIG. 5 is a flowchart illustrating an example of a method for logging in a computer application requiring identity authentication according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a mobile terminal for logging in a computer application requiring identity authentication according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and examples.
In the embodiment of the invention, in order to make the login of the computer application needing identity authentication simple and easy, and successfully log in the computer application in any mobile communication network, the method for setting the application on the mobile terminal and automatically logging in the computer application is adopted. Specifically, the mobile terminal is provided with an application which can acquire and encrypt the characteristic information of the mobile terminal, the application ensures the uniqueness and the non-falsification of the characteristic information of the mobile terminal, when the computer application provided by a server on a network side is to be logged in, the application set by the mobile terminal directly acquires the characteristic information of the mobile terminal required by the computer application, encrypts and sends the characteristic information to the computer application provided by the server for logging in after verification. Here, the computer application verifies that the feature information of the mobile terminal has been bound and checks whether to log in by comparing the feature information with the bound feature information. One computer application may bind feature information of a plurality of mobile terminals. After logging in, the computer application sends the logged-in information to the server, the server forwards the logged-in information to the mobile terminal, and the mobile terminal is modified into a logged-in state.
In the embodiment of the present invention, in the process that one computer application can bind the feature information of a plurality of mobile terminals, for the case of automatic login conflict when a plurality of mobile terminals are bound, the following method can be adopted:
when two or more mobile terminals simultaneously meet the automatic login condition, automatic login is carried out based on the first detected mobile terminal or based on a set default mobile terminal, and if other equipment is to be switched, the connected mobile terminals are manually selected in a computer application.
Fig. 1 is a flowchart of a method for logging in a computer application requiring identity authentication according to an embodiment of the present invention, which includes the following specific steps:
step 101, setting an application capable of acquiring and encrypting the characteristic information of the mobile terminal at the mobile terminal, wherein the application ensures the uniqueness and the non-tampering property of the characteristic information of the mobile terminal;
and 102, when the computer application provided by the server on the network side is to be logged in, directly acquiring the mobile terminal characteristic information required by the computer application by the application set by the mobile terminal, encrypting and sending the information to the server, and logging in after the computer application provided by the server is verified.
In the method, the computer application has the function of binding the characteristic information of the mobile terminal, can open a mobile communication network port and monitor the login message sent by a mobile communication network or other modes, wherein the login message carries the encrypted characteristic information of the mobile terminal.
The embodiments of the present invention will be described in detail with reference to several specific examples.
Fig. 2 is a flowchart of an example of a method for logging in a computer application requiring identity authentication according to an embodiment of the present invention, where the example is a scheme in which a mobile terminal is located in a mobile communication network environment and logs in the computer application in a location mode, and the specific steps are as follows:
step 201, the application set by the mobile terminal sends the position information of the mobile terminal to a network side server where the computer application is located in real time;
in the step, the application set by the mobile terminal has a positioning function, can be realized by adopting positioning technologies such as GPS or WiFi and the like, and can accurately position the position of the mobile terminal;
step 202, the network side server determines whether the location information of the mobile terminal is in the set login range, if so, step 203 is executed; if not, go to step 204;
step 203, sending a message that the mobile terminal has reached to the computer application, logging in the computer application by the mobile terminal, and operating the computer application by the user through the mobile terminal;
and step 204, sending an activation state indication to the computer application, enabling the computer application to be in an activation state, and enabling the mobile terminal to log in the computer application after the position information of the mobile terminal is in the set login range.
Fig. 3 is a flowchart of an example of a method for logging in a computer application requiring identity authentication according to an embodiment of the present invention, where the example is a scheme in which a mobile terminal logs in the computer application through a set mobile communication network, and the specific steps are as follows:
step 301, setting information of a mobile communication network for logging in computer application and a server for logging in the computer application by an application set by the mobile terminal;
step 302, after the mobile terminal accesses to the set mobile communication network for logging in the computer application, the application set by the mobile terminal sends login information to the server, and the login information carries information of the server where the login computer application is located;
step 303, the server receives the login information, and sends the login information to the computer application after the login information is verified;
step 304, after the computer application receives the login information, the mobile terminal is logged in the computer application;
step 305, the computer application maintains the set heartbeat time, determines whether the mobile terminal is in the set mobile communication network for logging in the computer application within the time exceeding the heartbeat time, and if not, enables the mobile terminal to log out;
and step 306, when the mobile terminal leaves the set mobile communication network for logging in the computer application, sending log-out to the server, and actively enabling the mobile terminal to log out the logged-in computer application by the server.
Fig. 4 is a flowchart of a third example of a method for accessing a computer application requiring identity authentication according to an embodiment of the present invention, where a mobile communication network is an internal network, and a mobile terminal can access the internal network at any time, and the method includes the specific steps of:
step 401, the computer application opens the automatic access function and sets the associated mobile terminal characteristic information;
in the step, the mobile terminal characteristic information is the information after the unique identification authentication of the mobile terminal is encrypted;
step 402, the mobile terminal sets an application and is in an open state all the time;
step 403, when the computer application is started before the mobile terminal is accessed to the set internal network, the mobile terminal is accessed to the internal network, the application set by the mobile terminal sends the characteristic information of the mobile terminal through broadcasting, if the computer does not receive the characteristic information, the mobile terminal periodically retransmits the characteristic information until the network is disconnected or successfully logged in, and after the computer application receives the characteristic information, the characteristic information is decrypted and verified to be consistent with the set bound characteristic information of the mobile terminal, so that the mobile terminal is logged in;
when the computer application is started after the mobile terminal is accessed to a set internal network, the computer application sends a computer application started message in the internal network through broadcasting, after the application of the mobile terminal receives the message, the login message is sent to the computer application, and the login is successful after the verification;
step 404, the application of the mobile terminal continuously sends heartbeat messages to the logged computer application within the range exceeding the set heartbeat time, the mobile terminal is confirmed to log in the computer application for normal use, if the situation of direct network disconnection occurs, the computer application still does not receive the heartbeat messages after the set heartbeat time is exceeded, and the mobile terminal is logged out;
step 405, when the mobile terminal leaves the internal network, sending a log-out message, and enabling the mobile terminal to log out by the computer application receiving the message.
Fig. 5 is a flowchart of a fourth example of a method for logging in a computer application requiring identity authentication according to an embodiment of the present invention, where a mobile terminal is connected to a computer through bluetooth or a USB data line in an environment where a mobile communication network is disconnected, and the method includes the following specific steps:
step 501, when an application set by the mobile terminal is connected to a computer application through Bluetooth or USB, actively sending a login message carrying encrypted characteristic information of the mobile terminal;
step 502, the computer application detects the login message, and after verification, the mobile terminal logs in;
step 503, the computer application monitors the access state of the logged mobile terminal in real time:
when the mobile terminal is accessed and disconnected in a USB mode, the computer application enables the mobile terminal to log out;
when the mobile terminal is accessed in a Bluetooth mode, the computer application is effective all the time in a heartbeat monitoring period, and when the mobile terminal closes the Bluetooth, the computer application enables the mobile terminal to quit logging in.
Fig. 6 is a schematic structural diagram of a mobile terminal for logging in a computer application requiring identity authentication according to an embodiment of the present invention, where the schematic structural diagram includes: an application setting module and a login module, wherein,
the application setting module is used for setting an application which can acquire and encrypt the characteristic information of the mobile terminal, and the application ensures the uniqueness and the non-falsification of the characteristic information of the mobile terminal;
and the login module is used for directly acquiring the mobile terminal characteristic information required by the computer application by the set application when the computer application provided by the server on the network side is to be logged in, encrypting and sending the information to the server, and logging in after the computer application provided by the server is verified.
In this structure, the login module is further configured to monitor an access state of the logged-in mobile terminal in real time: when the mobile terminal is accessed and disconnected in a USB mode, the computer application enables the mobile terminal to log out; when the mobile terminal is accessed in a Bluetooth mode, the computer application is effective all the time in a heartbeat monitoring period, and when the mobile terminal closes the Bluetooth mode, the computer application enables the mobile terminal to quit login;
and recording the login state in real time: when the computer logs in, recording the logged-in state and the basic information of the logged-in computer; if not, recording the unregistered state.
In the invention, furthermore, after the mobile terminal is accessed to the network environment, such as the network through GPS or Wifi, the current position information of the mobile terminal is sent to the server at regular time, and the computer application acquires the position of the mobile device from the server at regular time, finds that the mobile terminal enters the automatic login range and automatically logs in. The verification process of the mobile terminal is realized at the server side, the server can complete the verification of the mobile terminal at the moment as the characteristic information of the mobile terminal is bound with the computer application and the binding relation is uploaded to the server, and the server sends an automatic login instruction to the computer application after confirming that the mobile terminal enters the automatic login range to complete the automatic login.
The objects, technical solutions and advantages of the present invention have been described in further detail with reference to the preferred embodiments, it should be understood that the above description is only illustrative of the preferred embodiments of the present invention, and should not be construed as limiting the present invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (7)

1. A method of logging into a computer application requiring identity authentication, comprising:
setting an application capable of acquiring and encrypting the characteristic information of the mobile terminal at the mobile terminal, wherein the application ensures the uniqueness and the non-falsification of the characteristic information of the mobile terminal;
when a computer application provided by a server on a network side is to be logged in, the application set by the mobile terminal directly acquires the mobile terminal characteristic information required by the computer application, and the process of logging in after the computer application provided by the server is encrypted and sent to be verified is as follows:
the application setting of the mobile terminal sets the information of a mobile communication network for logging in the computer application and a server for logging in the computer application;
after the mobile terminal accesses to the set mobile communication network for logging in the computer application, the application set by the mobile terminal sends login information to the server, and the login information carries information of the server where the login computer application is located;
after receiving the login information, the server logs the mobile terminal into the computer application after verification;
or,
the computer application opens the automatic access function and sets the associated mobile terminal characteristic information;
the mobile terminal sets an application and is in an open state;
when the computer application is started before the mobile terminal is accessed to a set internal network, the mobile terminal is accessed to the internal network, the application set by the mobile terminal sends the characteristic information of the mobile terminal through broadcasting, and after the computer application receives the characteristic information, the characteristic information is decrypted and verified to be consistent with the set bound characteristic information of the mobile terminal, so that the mobile terminal is logged in;
when the computer application is started after the mobile terminal is accessed to a set internal network, the computer application sends a computer application started message in the internal network through broadcasting, after the application of the mobile terminal receives the message, the login message is sent to the computer application, and the login is successful after the verification;
or,
when an application set by the mobile terminal is connected to a computer application through Bluetooth or USB, actively sending a login message carrying encrypted characteristic information of the mobile terminal;
and the computer application detects the login message and enables the mobile terminal to log in after verification.
2. The method of claim 1, wherein the encrypted mobile terminal characteristic information is sent by the mobile terminal to the computer application via a login message;
the method further comprises the following steps:
the computer application has the function of binding the characteristic information of the mobile terminal and monitors the login message sent by the mobile terminal.
3. The method of claim 1, further comprising:
the computer application maintains the set heartbeat time, whether the mobile terminal is in the set mobile communication network for logging in the computer application is determined within the time exceeding the heartbeat time, and if not, the mobile terminal is logged out;
when the mobile terminal leaves the set mobile communication network for logging in the computer application, the mobile terminal sends log-out to the server, and the server actively enables the mobile terminal to log out the logged-in computer application.
4. The method of claim 1, further comprising:
the application of the mobile terminal continuously sends heartbeat messages to the logged computer application within the range exceeding the set heartbeat time, the mobile terminal is confirmed to log in the computer application for normal use, and the computer application still does not receive the heartbeat messages after the set heartbeat time is exceeded, so that the mobile terminal exits from the login;
when the mobile terminal leaves the internal network, the log-out message is sent, and the computer application receiving the message enables the mobile terminal to log out.
5. The method of claim 1, further comprising:
the computer application monitors the access state of the logged mobile terminal in real time: when the mobile terminal is accessed and disconnected in a USB mode, the computer application enables the mobile terminal to log out; when the mobile terminal is accessed in a Bluetooth mode, the computer application is effective all the time in a heartbeat monitoring period, and when the mobile terminal closes the Bluetooth, the computer application enables the mobile terminal to quit logging in.
6. A mobile terminal for logging into a computer application requiring identity authentication, comprising: an application setting module and a login module, wherein,
the application setting module is used for setting an application which can acquire and encrypt the characteristic information of the mobile terminal, and the application ensures the uniqueness and the non-falsification of the characteristic information of the mobile terminal;
the login module is used for directly acquiring the mobile terminal characteristic information required by the computer application by the set application when the computer application provided by the server on the network side is to be logged in, encrypting and sending the information to the server for logging in after the computer application provided by the server is verified, and the process is as follows:
the application setting of the mobile terminal sets the information of a mobile communication network for logging in the computer application and a server for logging in the computer application;
after the mobile terminal accesses to the set mobile communication network for logging in the computer application, the application set by the mobile terminal sends login information to the server, and the login information carries information of the server where the login computer application is located;
after receiving the login information, the server logs the mobile terminal into the computer application after verification;
or,
the computer application opens the automatic access function and sets the associated mobile terminal characteristic information;
the mobile terminal sets an application and is in an open state;
when the computer application is started before the mobile terminal is accessed to a set internal network, the mobile terminal is accessed to the internal network, the application set by the mobile terminal sends the characteristic information of the mobile terminal through broadcasting, and after the computer application receives the characteristic information, the characteristic information is decrypted and verified to be consistent with the set bound characteristic information of the mobile terminal, so that the mobile terminal is logged in;
when the computer application is started after the mobile terminal is accessed to a set internal network, the computer application sends a computer application started message in the internal network through broadcasting, after the application of the mobile terminal receives the message, the login message is sent to the computer application, and the login is successful after the verification;
or,
when an application set by the mobile terminal is connected to a computer application through Bluetooth or USB, actively sending a login message carrying encrypted characteristic information of the mobile terminal;
and the computer application detects the login message and enables the mobile terminal to log in after verification.
7. The mobile terminal of claim 6, wherein the login module is further configured to monitor an access status of the logged-in mobile terminal in real time: when the mobile terminal is accessed and disconnected in a USB mode, the computer application enables the mobile terminal to log out; when the mobile terminal is accessed in a Bluetooth mode, the computer application is effective all the time in a heartbeat monitoring period, and when the mobile terminal closes the Bluetooth mode, the computer application enables the mobile terminal to quit login;
and recording the login state in real time: when the computer logs in, recording the logged-in state and the basic information of the logged-in computer; if not, recording the unregistered state.
CN201610906485.XA 2016-10-18 2016-10-18 Log in the method and mobile terminal for needing the computer application of authenticating identity Active CN106453327B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610906485.XA CN106453327B (en) 2016-10-18 2016-10-18 Log in the method and mobile terminal for needing the computer application of authenticating identity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610906485.XA CN106453327B (en) 2016-10-18 2016-10-18 Log in the method and mobile terminal for needing the computer application of authenticating identity

Publications (2)

Publication Number Publication Date
CN106453327A CN106453327A (en) 2017-02-22
CN106453327B true CN106453327B (en) 2018-12-18

Family

ID=58175307

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610906485.XA Active CN106453327B (en) 2016-10-18 2016-10-18 Log in the method and mobile terminal for needing the computer application of authenticating identity

Country Status (1)

Country Link
CN (1) CN106453327B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107657711A (en) * 2017-03-10 2018-02-02 沈阳中钞信达金融设备有限公司 Banknote or bill source Antiforge system and source method for anti-counterfeit
CN108183924A (en) * 2018-03-01 2018-06-19 深圳市买买提信息科技有限公司 A kind of login validation method and terminal device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8943561B2 (en) * 2011-08-17 2015-01-27 Textpower, Inc. Text message authentication system
CN104253801B (en) * 2013-06-28 2017-09-22 中国电信股份有限公司 Realize the methods, devices and systems of login authentication
CN103944877A (en) * 2014-03-02 2014-07-23 王恩惠 Method and system for safely logging on bank website based on two-dimension code
CN105635066B (en) * 2014-11-03 2019-06-28 天翼电子商务有限公司 A kind of management method and device of client application
CN105376257B (en) * 2015-12-09 2019-02-19 广东美的暖通设备有限公司 Login method, smart home system and the Cloud Server of smart home application program

Also Published As

Publication number Publication date
CN106453327A (en) 2017-02-22

Similar Documents

Publication Publication Date Title
US9268545B2 (en) Connecting mobile devices, internet-connected hosts, and cloud services
CN110035048B (en) Method for controlling access to in-vehicle wireless network
CN106233796B (en) Automatic user registration and unlocking of computing devices
US9693226B2 (en) Method and apparatus for securing a connection in a communications network
US10637650B2 (en) Active authentication session transfer
US20090240947A1 (en) System and method for securely accessing mobile data
CN105828332B (en) improved method of wireless local area network authentication mechanism
EP4344135A2 (en) Non-3gpp device access to core network
JP2018038068A (en) Method for confirming identification information of user of communication terminal and related system
WO2014183526A1 (en) Identity recognition method, device and system
JP2007323553A (en) Adapter device and IC card for performing encrypted communication on a network
CN105636037B (en) Authentication method, device and electronic equipment
CN114208113B (en) Method for accessing private key, first device, first server, second server and system
EP3618382A1 (en) Non-3gpp device access to core network
CN103780609A (en) Cloud data processing method and device and cloud data security gateway
CN104754571A (en) User authentication realizing method, device and system thereof for multimedia data transmission
CN106411884A (en) Method and device for data storage and encryption
CN112020716A (en) Remote biometric identification
CN106453327B (en) Log in the method and mobile terminal for needing the computer application of authenticating identity
US20220330020A1 (en) Methods and apparatus for automated multi-factor authentication
CN108989331B (en) Use authentication method of data storage device, device and storage medium thereof
DE102017121648B3 (en) METHOD FOR REGISTERING A USER AT A TERMINAL DEVICE
JP6829341B1 (en) Information processing systems, information processing methods, and programs
EP2961208A1 (en) Method for accessing a service and corresponding application server, device and system
EP2940618A1 (en) Method, system, user equipment and program for authenticating a user

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee after: Beijing Shendun Technology Co.,Ltd.

Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder