CN101764823A - Authentication method, electronic equipment and authentication server - Google Patents
Authentication method, electronic equipment and authentication server Download PDFInfo
- Publication number
- CN101764823A CN101764823A CN201010104173A CN201010104173A CN101764823A CN 101764823 A CN101764823 A CN 101764823A CN 201010104173 A CN201010104173 A CN 201010104173A CN 201010104173 A CN201010104173 A CN 201010104173A CN 101764823 A CN101764823 A CN 101764823A
- Authority
- CN
- China
- Prior art keywords
- information
- binary
- authentication
- module
- binary information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 18
- 238000006243 chemical reaction Methods 0.000 claims description 5
- 230000001131 transforming effect Effects 0.000 abstract 1
- 230000015572 biosynthetic process Effects 0.000 description 7
- 238000003786 synthesis reaction Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 5
- 210000005252 bulbus oculi Anatomy 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the invention provides an authentication method, electronic equipment and an authentication server. The authentication method includes the steps of receiving first biological information input by a user and transforming the first biological information into first binary information; obtaining second binary information which is generated according to a user identification code corresponding to a password input by the user; generating to-be-authenticated information according to the first binary information and the second binary information; sending the to-be-authenticated information to the authentication server so as to authenticate the to-be-authenticated information according to stored authentication information. The embodiment of the invention realizes double-factor authentication based on the password and the biological information, thereby improving the security of a data card.
Description
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to an authentication method, electronic equipment and an authentication server.
Background
The data card can be used as a network device connected with a network, has the characteristic of plug and play, and can directly install application software on the data card by establishing a virtual layer technology on an operating system of a Personal Computer (PC). The software installed on the data card can be used at any time, at any place and on any PC, is plug-and-play, and has no privacy mark.
In addition, the data card itself has a storage function, and can be used to store personal data of the user, such as: personal photos or bank account numbers, etc. However, in the prior art, most data cards are authenticated by Personal Identification Number (PIN), and once a data card is lost, information in the data card is easily stolen by others.
Disclosure of Invention
The embodiment of the invention provides an authentication method, electronic equipment and an authentication server, and aims to improve the safety of a data card.
The embodiment of the invention provides an authentication method, which comprises the following steps:
receiving first biological information input by a user, and converting the first biological information into first binary information;
acquiring second binary information, wherein the second binary information is generated according to a user identification code corresponding to the password input by the user;
generating information to be authenticated according to the first binary information and the second binary information;
and sending the information to be authenticated to an authentication server so that the authentication server can authenticate the information to be authenticated according to the stored authentication information.
An embodiment of the present invention further provides an electronic device, including:
the receiving module is used for receiving first biological information input by a user;
the conversion module is used for converting the first biological information received by the receiving module into first binary information;
the acquisition module is used for acquiring second binary information, and the second binary information is generated according to a user identification code corresponding to the password input by the user;
the generating module is used for generating information to be authenticated according to the first binary information and the second binary information;
and the sending module is used for sending the information to be authenticated generated by the generating module to an authentication server so that the authentication server can authenticate the information to be authenticated according to the stored authentication information.
An embodiment of the present invention further provides an authentication server, including:
the system comprises an information receiving module, a password obtaining module and a password obtaining module, wherein the information receiving module is used for receiving information to be authenticated sent by electronic equipment, the information to be authenticated is generated by the electronic equipment according to first binary information converted by first biological information input by a user and acquired second binary information, and the second binary information is generated according to a user identification code corresponding to the password input by the user;
and the information authentication module is used for authenticating the information to be authenticated received by the information receiving module according to the stored authentication information.
According to the embodiment of the invention, the electronic equipment converts the first biological information input by the user into the first binary information, generates the information to be authenticated according to the first binary information and the acquired second binary information, and generates the second binary information according to the user identification code corresponding to the password input by the user; and then the electronic equipment sends the information to be authenticated to an authentication server, and the authentication server authenticates the information to be authenticated according to the stored authentication information, so that the two-factor authentication based on the password and the biological information is realized, and the safety of the data card is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
FIG. 1 is a flow chart of one embodiment of an authentication method of the present invention;
FIG. 2 is a schematic structural diagram of an embodiment of an electronic device according to the invention;
fig. 3 is a schematic structural diagram of an authentication server according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
Fig. 1 is a flowchart of an embodiment of an authentication method of the present invention, and as shown in fig. 1, the embodiment may include:
In this embodiment, the electronic device may be any electronic device inserted with an identity module, such as a SIM card or a User Identity Module (UIM), for example: data card or mobile phone, etc.
The present embodiment takes the first biological information as the first fingerprint information as an example for explanation; however, the embodiment of the present invention is not limited thereto, and the first biological information may be other biological information, such as: eyeball iris, etc.
Specifically, the electronic device may obtain the second binary information by: the electronic equipment can receive a password input by a user and convert a user identification code corresponding to the password into second binary information; or, the electronic device may obtain the second binary information that is pre-stored, that is, the electronic device may convert the user identification code corresponding to the password that is input by the user for the first time into the second binary information and store the second binary information, and the subsequent electronic device may directly obtain the second binary information that is pre-stored, and the user does not need to input the password any more.
In this embodiment, a password input by a user is taken as a PIN code for example, but the embodiment of the present invention is not limited thereto, and the password input by the user may also be a password in other forms as long as there is a corresponding relationship between the input password and a user identification code of an identification module of an electronic device.
In this embodiment, the Subscriber Identity may be an International Mobile Subscriber Identity (IMSI), and certainly, the Subscriber Identity may also be other identities as long as the Identity uniquely identifies an Identity module of the electronic device and corresponds to a password input by the user.
And 103, the electronic equipment generates information to be authenticated according to the first binary information and the second binary information.
Specifically, the electronic device may generate the information to be authenticated by a predetermined algorithm according to the first binary information and the second binary information. The predetermined algorithm includes: a binary synthesis algorithm or a hash algorithm, etc., and the algorithm used in the embodiment of the present invention is not limited, but the embodiment of the present invention is described by taking a predetermined algorithm as the binary synthesis algorithm as an example. The binary synthesis algorithm comprises an AND, OR, or, unequal operation.
For example, when the first binary information converted by the first fingerprint information is 001101 and the second binary information converted by the IMSI is 011001, the information to be authenticated generated by the binary synthesis algorithm according to 011001 and 001101 may be 100101.
And 104, the electronic equipment sends the information to be authenticated to an authentication server so that the authentication server authenticates the information to be authenticated according to the stored authentication information.
In this embodiment, the authentication information is generated by the electronic device and sent to the authentication server. Specifically, the electronic device may receive second biometric information, convert the second biometric information into third binary information, and generate authentication information according to the third binary information and the second binary information; the electronic device then sends the authentication information to an authentication server, which stores the authentication information. After the subsequent electronic device sends the information to be authenticated to the authentication server, the authentication server can authenticate the information to be authenticated according to the stored authentication information so as to determine whether the identity of the user inputting the first biological information is legal or not; if the information to be authenticated is successfully matched with the authentication information, the authentication server can determine that the identity of the user inputting the first biological information is legal; if the information to be authenticated fails to match the authentication information, the authentication server may determine that the identity of the user who inputs the first biometric information is illegal.
After the authentication server determines that the identity of the user inputting the first biological information is legal, the user inputting the first biological information can access or use the electronic device, for example: accessing data in a data card, a SIM card or a UIM card; alternatively, application software in a data card or the like is used.
When the electronic device generates the authentication information according to the third binary information and the second binary information, the algorithm used by the electronic device is the same as the algorithm used when the information to be authenticated is generated in step 103, and details are not repeated here.
The second biometric information may be the second fingerprint information, but the embodiment of the present invention is not limited thereto, and the second biometric information may also be other biometric information, for example: eyeball iris, etc.
In this embodiment, the first biometric information may be the same as or different from the second biometric information, and it is obvious that the user who inputs the first biometric information can pass the authentication only if the first biometric information is the same as the second biometric information.
The authentication server in this embodiment may be an authentication gateway, for example: the PIN code, the fingerprint authentication gateway, and the like may also be other authentication servers, which is not limited in the embodiment of the present invention.
In the above embodiment, the electronic device converts the first biological information input by the user into the first binary information, generates the information to be authenticated according to the first binary information and the acquired second binary information, and generates the second binary information according to the user identification code corresponding to the password input by the user; then the electronic equipment sends the information to be authenticated to an authentication server, and the authentication server authenticates the information to be authenticated according to the stored authentication information, so that the two-factor authentication based on the password and the biological information is realized, and the safety of the data card is improved; even if the data card is lost, the information stored in the data card is not lost.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Fig. 2 is a schematic structural diagram of an embodiment of an electronic device of the present invention, where the electronic device in this embodiment may implement the process of the embodiment shown in fig. 1 of the present invention, and as shown in fig. 2, the electronic device may include: a receiving module 21, a converting module 22, an obtaining module 23, a generating module 24 and a sending module 25.
The receiving module 21 is configured to receive first biological information input by a user.
A converting module 22, configured to convert the first biological information received by the receiving module 21 into first binary information.
The obtaining module 23 is configured to obtain second binary information, where the second binary information is generated according to a user identification code corresponding to a password input by a user; specifically, the obtaining module 23 may receive a password input by a user, and convert a user identification code corresponding to the password into second binary information; alternatively, the obtaining module 23 may obtain pre-saved second binary information.
The generating module 24 is configured to generate information to be authenticated according to the first binary information and the second binary information; specifically, the generation module 24 may generate the information to be authenticated through a predetermined algorithm according to the first binary information and the second binary information. The predetermined algorithm includes: a binary synthesis algorithm or a hash algorithm, etc., and the algorithm used in the embodiment of the present invention is not limited, but the embodiment of the present invention is described by taking a predetermined algorithm as the binary synthesis algorithm as an example. The binary synthesis algorithm comprises an AND, OR, or, unequal operation.
And a sending module 25, configured to send the information to be authenticated, generated by the generating module 24, to the authentication server, so that the authentication server authenticates the information to be authenticated according to the stored authentication information.
In this embodiment, the receiving module 21 may further receive second biological information;
the conversion module 22 may also convert the second biological information received by the reception module 21 into third binary information;
the generating module 24 may further generate the authentication information according to the third binary information and the second binary information;
the sending module 25 is further configured to send the authentication information generated by the generating module 24 to an authentication server, and the authentication server stores the authentication information.
The electronic device in this embodiment may be any electronic device into which an identity module such as a SIM card or a UIM card is inserted, for example: data card or mobile phone, etc.
The authentication server in this embodiment may be an authentication gateway, for example: the PIN code, the fingerprint authentication gateway, and the like may also be other authentication servers, which is not limited in the embodiment of the present invention.
In the above embodiment, the conversion module 22 converts the first biological information input by the user into the first binary information, and the generation module 24 generates the information to be authenticated according to the first binary information and the second binary information acquired by the acquisition module 23, where the second binary information is generated according to the user identification code corresponding to the password input by the user; then the sending module 25 sends the information to be authenticated to an authentication server, and the authentication server authenticates the information to be authenticated according to the stored authentication information, thereby realizing the two-factor authentication based on the password and the biological information and improving the safety of the data card; even if the data card is lost, the information stored in the data card is not lost.
Fig. 3 is a schematic structural diagram of an authentication server according to an embodiment of the present invention, and as shown in fig. 3, the authentication server may include: an information receiving module 31 and an information authentication module 32.
The information receiving module 31 is configured to receive information to be authenticated sent by the electronic device, where the information to be authenticated is generated by the electronic device according to first binary information converted by first biological information input by a user and acquired second binary information, and the second binary information is generated according to a user identification code corresponding to a password input by the user;
specifically, the manner of generating the information to be authenticated by the electronic device is the same as the manner described in step 101 to step 103 in the embodiment shown in fig. 1 of the present invention, and is not described again here.
The information authentication module 32 is configured to authenticate the information to be authenticated, which is received by the information receiving module 31, according to the stored authentication information;
in this embodiment, the authentication information is generated by the electronic device and sent to the authentication server, where a manner of generating the authentication information by the electronic device is the same as that described in step 104 in the embodiment shown in fig. 1 of the present invention, and is not described herein again.
The electronic device in this embodiment may be any electronic device into which an identity module such as a SIM card or a UIM card is inserted, for example: data card or mobile phone, etc.
The authentication server in this embodiment may be an authentication gateway, for example: the PIN code, the fingerprint authentication gateway, and the like may also be other authentication servers, which is not limited in the embodiment of the present invention.
In the above embodiment, the information receiving module 31 receives information to be authenticated sent by the electronic device, where the information to be authenticated is generated by the electronic device according to the first binary information converted by the first biological information input by the user and the acquired second binary information, the second binary information is generated according to the user identification code corresponding to the password input by the user, and then the information authentication module 32 authenticates the information to be authenticated according to the stored authentication information, thereby implementing two-factor authentication based on the password and the biological information, and improving the security of the data card; even if the data card is lost, the information stored in the data card is not lost.
Those skilled in the art will appreciate that the drawings are merely schematic representations of one preferred embodiment and that the blocks or flow diagrams in the drawings are not necessarily required to practice the present invention.
It should be noted that, in the above embodiments, the terms "first", "second", and "third" are used for convenience of description, and are not intended to limit the embodiments of the present invention.
Those skilled in the art will appreciate that the modules in the devices in the embodiments may be distributed in the devices in the embodiments according to the description of the embodiments, and may be correspondingly changed in one or more devices different from the embodiments. The modules of the above embodiments may be combined into one module, or further split into multiple sub-modules.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (10)
1. An authentication method, comprising:
receiving first biological information input by a user, and converting the first biological information into first binary information;
acquiring second binary information, wherein the second binary information is generated according to a user identification code corresponding to the password input by the user;
generating information to be authenticated according to the first binary information and the second binary information;
and sending the information to be authenticated to an authentication server so that the authentication server can authenticate the information to be authenticated according to the stored authentication information.
2. The method of claim 1, wherein the obtaining the second binary information comprises:
receiving a password input by the user, and converting a user identification code corresponding to the password into second binary information; or,
and acquiring the second binary information saved in advance.
3. The method according to claim 1 or 2, wherein the generating information to be authenticated according to the first binary information and the second binary information comprises:
and generating the information to be authenticated through a preset algorithm according to the first binary information and the second binary information.
4. The method of claim 1, wherein before receiving the first biological information input by the user, the method further comprises:
receiving second biological information, and converting the second biological information into third binary information;
generating the authentication information according to the third binary information and the second binary information;
and sending the authentication information to the authentication server so that the authentication server can store the authentication information.
5. The method of claim 4, wherein the password comprises a personal identification number; the first biological information comprises first fingerprint information; the second biological information includes second fingerprint information; the subscriber identity code comprises an international mobile subscriber identity code.
6. An electronic device, comprising:
the receiving module is used for receiving first biological information input by a user;
the conversion module is used for converting the first biological information received by the receiving module into first binary information;
the acquisition module is used for acquiring second binary information, and the second binary information is generated according to a user identification code corresponding to the password input by the user;
the generating module is used for generating information to be authenticated according to the first binary information and the second binary information;
and the sending module is used for sending the information to be authenticated generated by the generating module to an authentication server so that the authentication server can authenticate the information to be authenticated according to the stored authentication information.
7. The device according to claim 6, wherein the obtaining module is specifically configured to receive a password input by the user, and convert a user identification code corresponding to the password into second binary information; or, the obtaining module is specifically configured to obtain pre-stored second binary information.
8. The device according to claim 6 or 7, wherein the generating module is specifically configured to generate the information to be authenticated by a predetermined algorithm according to the first binary information and the second binary information.
9. The apparatus of claim 6,
the receiving module is further used for receiving second biological information;
the conversion module is further used for converting the second biological information received by the receiving module into third binary information;
the generating module is further configured to generate the authentication information according to the third binary information and the second binary information;
the sending module is further configured to send the authentication information generated by the generating module to the authentication server, so that the authentication server stores the authentication information.
10. An authentication server, comprising:
the system comprises an information receiving module, a password obtaining module and a password obtaining module, wherein the information receiving module is used for receiving information to be authenticated sent by electronic equipment, the information to be authenticated is generated by the electronic equipment according to first binary information converted by first biological information input by a user and acquired second binary information, and the second binary information is generated according to a user identification code corresponding to the password input by the user;
and the information authentication module is used for authenticating the information to be authenticated received by the information receiving module according to the stored authentication information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010104173A CN101764823A (en) | 2010-01-28 | 2010-01-28 | Authentication method, electronic equipment and authentication server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010104173A CN101764823A (en) | 2010-01-28 | 2010-01-28 | Authentication method, electronic equipment and authentication server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101764823A true CN101764823A (en) | 2010-06-30 |
Family
ID=42495806
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010104173A Pending CN101764823A (en) | 2010-01-28 | 2010-01-28 | Authentication method, electronic equipment and authentication server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101764823A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012022078A1 (en) * | 2010-08-18 | 2012-02-23 | 中兴通讯股份有限公司 | Data card and using method thereof |
CN102811206A (en) * | 2011-05-31 | 2012-12-05 | 凹凸电子(武汉)有限公司 | Electronic device used for digital information transmission and processing method of electronic device content |
CN103067397A (en) * | 2012-12-31 | 2013-04-24 | 华为技术有限公司 | Security authentication method, access gateway and authentication server of desktop cloud system |
CN103237030A (en) * | 2013-04-25 | 2013-08-07 | 深圳市中兴移动通信有限公司 | Biological recognition-based user authentication method and system |
CN104660613A (en) * | 2015-03-16 | 2015-05-27 | 联想(北京)有限公司 | Authentication method of user identification module and electronic equipment |
CN105184126A (en) * | 2015-08-27 | 2015-12-23 | 广东欧珀移动通信有限公司 | A password setting method, verification method and terminal |
CN105335634A (en) * | 2015-10-14 | 2016-02-17 | 上海斐讯数据通信技术有限公司 | User ID card safety management method and system |
CN105429761A (en) * | 2015-12-29 | 2016-03-23 | 宇龙计算机通信科技(深圳)有限公司 | A method and device for generating a key |
CN106549759A (en) * | 2015-09-16 | 2017-03-29 | 阿里巴巴集团控股有限公司 | Identity identifying method and device |
CN110460446A (en) * | 2019-07-10 | 2019-11-15 | 北京信安世纪科技股份有限公司 | The acquisition methods and device of message authentication code |
WO2022105486A1 (en) * | 2020-11-18 | 2022-05-27 | International Business Machines Corporation | Multi-factor fingerprint authenticator |
-
2010
- 2010-01-28 CN CN201010104173A patent/CN101764823A/en active Pending
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012022078A1 (en) * | 2010-08-18 | 2012-02-23 | 中兴通讯股份有限公司 | Data card and using method thereof |
CN102811206A (en) * | 2011-05-31 | 2012-12-05 | 凹凸电子(武汉)有限公司 | Electronic device used for digital information transmission and processing method of electronic device content |
CN103067397A (en) * | 2012-12-31 | 2013-04-24 | 华为技术有限公司 | Security authentication method, access gateway and authentication server of desktop cloud system |
CN103067397B (en) * | 2012-12-31 | 2017-06-13 | 华为技术有限公司 | A kind of safety certifying method of desktop cloud system, access gateway and certificate server |
CN103237030A (en) * | 2013-04-25 | 2013-08-07 | 深圳市中兴移动通信有限公司 | Biological recognition-based user authentication method and system |
CN104660613A (en) * | 2015-03-16 | 2015-05-27 | 联想(北京)有限公司 | Authentication method of user identification module and electronic equipment |
CN105184126A (en) * | 2015-08-27 | 2015-12-23 | 广东欧珀移动通信有限公司 | A password setting method, verification method and terminal |
CN106549759A (en) * | 2015-09-16 | 2017-03-29 | 阿里巴巴集团控股有限公司 | Identity identifying method and device |
CN105335634A (en) * | 2015-10-14 | 2016-02-17 | 上海斐讯数据通信技术有限公司 | User ID card safety management method and system |
CN105429761A (en) * | 2015-12-29 | 2016-03-23 | 宇龙计算机通信科技(深圳)有限公司 | A method and device for generating a key |
CN105429761B (en) * | 2015-12-29 | 2018-12-25 | 宇龙计算机通信科技(深圳)有限公司 | A kind of key generation method and device |
CN110460446A (en) * | 2019-07-10 | 2019-11-15 | 北京信安世纪科技股份有限公司 | The acquisition methods and device of message authentication code |
CN110460446B (en) * | 2019-07-10 | 2022-03-18 | 北京信安世纪科技股份有限公司 | Method and device for acquiring message authentication code |
WO2022105486A1 (en) * | 2020-11-18 | 2022-05-27 | International Business Machines Corporation | Multi-factor fingerprint authenticator |
US11651060B2 (en) | 2020-11-18 | 2023-05-16 | International Business Machines Corporation | Multi-factor fingerprint authenticator |
GB2616376A (en) * | 2020-11-18 | 2023-09-06 | Ibm | Multi-factor fingerprint authenticator |
GB2616376B (en) * | 2020-11-18 | 2025-02-26 | Ibm | Multi-factor fingerprint authenticator |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101764823A (en) | Authentication method, electronic equipment and authentication server | |
US11074033B2 (en) | Access control and validation using sonic tones | |
US8606234B2 (en) | Methods and apparatus for provisioning devices with secrets | |
CN103249045B (en) | A kind of methods, devices and systems of identification | |
CN101051908B (en) | Dynamic cipher certifying system and method | |
US8438385B2 (en) | Method and apparatus for identity verification | |
Choi et al. | A mobile based anti-phishing authentication scheme using QR code | |
US10050791B2 (en) | Method for verifying the identity of a user of a communicating terminal and associated system | |
US20100293376A1 (en) | Method for authenticating a clent mobile terminal with a remote server | |
EP2932428B1 (en) | Method of allowing establishment of a secure session between a device and a server | |
US9639825B1 (en) | Securing multifactor authentication | |
EP2404255A1 (en) | Method and computer program for generation and verification of otp between server and mobile device using multiple channels | |
WO2009056897A1 (en) | Method of authentication of users in data processing systems | |
WO2008149366A2 (en) | Device method & system for facilitating mobile transactions | |
CN105164689A (en) | User authentication | |
CN101420301A (en) | Human face recognizing identity authentication system | |
WO2015039589A1 (en) | User identity authorization system and authorization method based on bar codes | |
WO2018073681A1 (en) | Device and methods for authenticating a user equipment | |
CN104767617A (en) | Message processing method, system and related device | |
CN101951320A (en) | Implementation method, device and system of dynamic password | |
CN104660401A (en) | Authentication method, authentication system and terminal | |
CN112020716A (en) | Remote biometric identification | |
CN106790138A (en) | A kind of method of government affairs cloud application User logs in double factor checking | |
KR100858146B1 (en) | Personal authentication method and device using mobile communication terminal and subscriber identification module | |
CN104182664A (en) | Two-dimensional-code-based authentication method and system for non-networked environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20100630 |