[go: up one dir, main page]

CN101764823A - Authentication method, electronic equipment and authentication server - Google Patents

Authentication method, electronic equipment and authentication server Download PDF

Info

Publication number
CN101764823A
CN101764823A CN201010104173A CN201010104173A CN101764823A CN 101764823 A CN101764823 A CN 101764823A CN 201010104173 A CN201010104173 A CN 201010104173A CN 201010104173 A CN201010104173 A CN 201010104173A CN 101764823 A CN101764823 A CN 101764823A
Authority
CN
China
Prior art keywords
information
binary
authentication
module
binary information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201010104173A
Other languages
Chinese (zh)
Inventor
何瑞芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Device Co Ltd
Original Assignee
Huawei Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Device Co Ltd filed Critical Huawei Device Co Ltd
Priority to CN201010104173A priority Critical patent/CN101764823A/en
Publication of CN101764823A publication Critical patent/CN101764823A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention provides an authentication method, electronic equipment and an authentication server. The authentication method includes the steps of receiving first biological information input by a user and transforming the first biological information into first binary information; obtaining second binary information which is generated according to a user identification code corresponding to a password input by the user; generating to-be-authenticated information according to the first binary information and the second binary information; sending the to-be-authenticated information to the authentication server so as to authenticate the to-be-authenticated information according to stored authentication information. The embodiment of the invention realizes double-factor authentication based on the password and the biological information, thereby improving the security of a data card.

Description

Authentication method, electronic device and authentication server
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to an authentication method, electronic equipment and an authentication server.
Background
The data card can be used as a network device connected with a network, has the characteristic of plug and play, and can directly install application software on the data card by establishing a virtual layer technology on an operating system of a Personal Computer (PC). The software installed on the data card can be used at any time, at any place and on any PC, is plug-and-play, and has no privacy mark.
In addition, the data card itself has a storage function, and can be used to store personal data of the user, such as: personal photos or bank account numbers, etc. However, in the prior art, most data cards are authenticated by Personal Identification Number (PIN), and once a data card is lost, information in the data card is easily stolen by others.
Disclosure of Invention
The embodiment of the invention provides an authentication method, electronic equipment and an authentication server, and aims to improve the safety of a data card.
The embodiment of the invention provides an authentication method, which comprises the following steps:
receiving first biological information input by a user, and converting the first biological information into first binary information;
acquiring second binary information, wherein the second binary information is generated according to a user identification code corresponding to the password input by the user;
generating information to be authenticated according to the first binary information and the second binary information;
and sending the information to be authenticated to an authentication server so that the authentication server can authenticate the information to be authenticated according to the stored authentication information.
An embodiment of the present invention further provides an electronic device, including:
the receiving module is used for receiving first biological information input by a user;
the conversion module is used for converting the first biological information received by the receiving module into first binary information;
the acquisition module is used for acquiring second binary information, and the second binary information is generated according to a user identification code corresponding to the password input by the user;
the generating module is used for generating information to be authenticated according to the first binary information and the second binary information;
and the sending module is used for sending the information to be authenticated generated by the generating module to an authentication server so that the authentication server can authenticate the information to be authenticated according to the stored authentication information.
An embodiment of the present invention further provides an authentication server, including:
the system comprises an information receiving module, a password obtaining module and a password obtaining module, wherein the information receiving module is used for receiving information to be authenticated sent by electronic equipment, the information to be authenticated is generated by the electronic equipment according to first binary information converted by first biological information input by a user and acquired second binary information, and the second binary information is generated according to a user identification code corresponding to the password input by the user;
and the information authentication module is used for authenticating the information to be authenticated received by the information receiving module according to the stored authentication information.
According to the embodiment of the invention, the electronic equipment converts the first biological information input by the user into the first binary information, generates the information to be authenticated according to the first binary information and the acquired second binary information, and generates the second binary information according to the user identification code corresponding to the password input by the user; and then the electronic equipment sends the information to be authenticated to an authentication server, and the authentication server authenticates the information to be authenticated according to the stored authentication information, so that the two-factor authentication based on the password and the biological information is realized, and the safety of the data card is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
FIG. 1 is a flow chart of one embodiment of an authentication method of the present invention;
FIG. 2 is a schematic structural diagram of an embodiment of an electronic device according to the invention;
fig. 3 is a schematic structural diagram of an authentication server according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
Fig. 1 is a flowchart of an embodiment of an authentication method of the present invention, and as shown in fig. 1, the embodiment may include:
step 101, the electronic device receives first biological information input by a user and converts the first biological information into first binary information.
In this embodiment, the electronic device may be any electronic device inserted with an identity module, such as a SIM card or a User Identity Module (UIM), for example: data card or mobile phone, etc.
The present embodiment takes the first biological information as the first fingerprint information as an example for explanation; however, the embodiment of the present invention is not limited thereto, and the first biological information may be other biological information, such as: eyeball iris, etc.
Step 102, the electronic device obtains second binary information, and the second binary information is generated according to a user identification code corresponding to a password input by a user.
Specifically, the electronic device may obtain the second binary information by: the electronic equipment can receive a password input by a user and convert a user identification code corresponding to the password into second binary information; or, the electronic device may obtain the second binary information that is pre-stored, that is, the electronic device may convert the user identification code corresponding to the password that is input by the user for the first time into the second binary information and store the second binary information, and the subsequent electronic device may directly obtain the second binary information that is pre-stored, and the user does not need to input the password any more.
In this embodiment, a password input by a user is taken as a PIN code for example, but the embodiment of the present invention is not limited thereto, and the password input by the user may also be a password in other forms as long as there is a corresponding relationship between the input password and a user identification code of an identification module of an electronic device.
In this embodiment, the Subscriber Identity may be an International Mobile Subscriber Identity (IMSI), and certainly, the Subscriber Identity may also be other identities as long as the Identity uniquely identifies an Identity module of the electronic device and corresponds to a password input by the user.
And 103, the electronic equipment generates information to be authenticated according to the first binary information and the second binary information.
Specifically, the electronic device may generate the information to be authenticated by a predetermined algorithm according to the first binary information and the second binary information. The predetermined algorithm includes: a binary synthesis algorithm or a hash algorithm, etc., and the algorithm used in the embodiment of the present invention is not limited, but the embodiment of the present invention is described by taking a predetermined algorithm as the binary synthesis algorithm as an example. The binary synthesis algorithm comprises an AND, OR, or, unequal operation.
For example, when the first binary information converted by the first fingerprint information is 001101 and the second binary information converted by the IMSI is 011001, the information to be authenticated generated by the binary synthesis algorithm according to 011001 and 001101 may be 100101.
And 104, the electronic equipment sends the information to be authenticated to an authentication server so that the authentication server authenticates the information to be authenticated according to the stored authentication information.
In this embodiment, the authentication information is generated by the electronic device and sent to the authentication server. Specifically, the electronic device may receive second biometric information, convert the second biometric information into third binary information, and generate authentication information according to the third binary information and the second binary information; the electronic device then sends the authentication information to an authentication server, which stores the authentication information. After the subsequent electronic device sends the information to be authenticated to the authentication server, the authentication server can authenticate the information to be authenticated according to the stored authentication information so as to determine whether the identity of the user inputting the first biological information is legal or not; if the information to be authenticated is successfully matched with the authentication information, the authentication server can determine that the identity of the user inputting the first biological information is legal; if the information to be authenticated fails to match the authentication information, the authentication server may determine that the identity of the user who inputs the first biometric information is illegal.
After the authentication server determines that the identity of the user inputting the first biological information is legal, the user inputting the first biological information can access or use the electronic device, for example: accessing data in a data card, a SIM card or a UIM card; alternatively, application software in a data card or the like is used.
When the electronic device generates the authentication information according to the third binary information and the second binary information, the algorithm used by the electronic device is the same as the algorithm used when the information to be authenticated is generated in step 103, and details are not repeated here.
The second biometric information may be the second fingerprint information, but the embodiment of the present invention is not limited thereto, and the second biometric information may also be other biometric information, for example: eyeball iris, etc.
In this embodiment, the first biometric information may be the same as or different from the second biometric information, and it is obvious that the user who inputs the first biometric information can pass the authentication only if the first biometric information is the same as the second biometric information.
The authentication server in this embodiment may be an authentication gateway, for example: the PIN code, the fingerprint authentication gateway, and the like may also be other authentication servers, which is not limited in the embodiment of the present invention.
In the above embodiment, the electronic device converts the first biological information input by the user into the first binary information, generates the information to be authenticated according to the first binary information and the acquired second binary information, and generates the second binary information according to the user identification code corresponding to the password input by the user; then the electronic equipment sends the information to be authenticated to an authentication server, and the authentication server authenticates the information to be authenticated according to the stored authentication information, so that the two-factor authentication based on the password and the biological information is realized, and the safety of the data card is improved; even if the data card is lost, the information stored in the data card is not lost.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Fig. 2 is a schematic structural diagram of an embodiment of an electronic device of the present invention, where the electronic device in this embodiment may implement the process of the embodiment shown in fig. 1 of the present invention, and as shown in fig. 2, the electronic device may include: a receiving module 21, a converting module 22, an obtaining module 23, a generating module 24 and a sending module 25.
The receiving module 21 is configured to receive first biological information input by a user.
A converting module 22, configured to convert the first biological information received by the receiving module 21 into first binary information.
The obtaining module 23 is configured to obtain second binary information, where the second binary information is generated according to a user identification code corresponding to a password input by a user; specifically, the obtaining module 23 may receive a password input by a user, and convert a user identification code corresponding to the password into second binary information; alternatively, the obtaining module 23 may obtain pre-saved second binary information.
The generating module 24 is configured to generate information to be authenticated according to the first binary information and the second binary information; specifically, the generation module 24 may generate the information to be authenticated through a predetermined algorithm according to the first binary information and the second binary information. The predetermined algorithm includes: a binary synthesis algorithm or a hash algorithm, etc., and the algorithm used in the embodiment of the present invention is not limited, but the embodiment of the present invention is described by taking a predetermined algorithm as the binary synthesis algorithm as an example. The binary synthesis algorithm comprises an AND, OR, or, unequal operation.
And a sending module 25, configured to send the information to be authenticated, generated by the generating module 24, to the authentication server, so that the authentication server authenticates the information to be authenticated according to the stored authentication information.
In this embodiment, the receiving module 21 may further receive second biological information;
the conversion module 22 may also convert the second biological information received by the reception module 21 into third binary information;
the generating module 24 may further generate the authentication information according to the third binary information and the second binary information;
the sending module 25 is further configured to send the authentication information generated by the generating module 24 to an authentication server, and the authentication server stores the authentication information.
The electronic device in this embodiment may be any electronic device into which an identity module such as a SIM card or a UIM card is inserted, for example: data card or mobile phone, etc.
The authentication server in this embodiment may be an authentication gateway, for example: the PIN code, the fingerprint authentication gateway, and the like may also be other authentication servers, which is not limited in the embodiment of the present invention.
In the above embodiment, the conversion module 22 converts the first biological information input by the user into the first binary information, and the generation module 24 generates the information to be authenticated according to the first binary information and the second binary information acquired by the acquisition module 23, where the second binary information is generated according to the user identification code corresponding to the password input by the user; then the sending module 25 sends the information to be authenticated to an authentication server, and the authentication server authenticates the information to be authenticated according to the stored authentication information, thereby realizing the two-factor authentication based on the password and the biological information and improving the safety of the data card; even if the data card is lost, the information stored in the data card is not lost.
Fig. 3 is a schematic structural diagram of an authentication server according to an embodiment of the present invention, and as shown in fig. 3, the authentication server may include: an information receiving module 31 and an information authentication module 32.
The information receiving module 31 is configured to receive information to be authenticated sent by the electronic device, where the information to be authenticated is generated by the electronic device according to first binary information converted by first biological information input by a user and acquired second binary information, and the second binary information is generated according to a user identification code corresponding to a password input by the user;
specifically, the manner of generating the information to be authenticated by the electronic device is the same as the manner described in step 101 to step 103 in the embodiment shown in fig. 1 of the present invention, and is not described again here.
The information authentication module 32 is configured to authenticate the information to be authenticated, which is received by the information receiving module 31, according to the stored authentication information;
in this embodiment, the authentication information is generated by the electronic device and sent to the authentication server, where a manner of generating the authentication information by the electronic device is the same as that described in step 104 in the embodiment shown in fig. 1 of the present invention, and is not described herein again.
The electronic device in this embodiment may be any electronic device into which an identity module such as a SIM card or a UIM card is inserted, for example: data card or mobile phone, etc.
The authentication server in this embodiment may be an authentication gateway, for example: the PIN code, the fingerprint authentication gateway, and the like may also be other authentication servers, which is not limited in the embodiment of the present invention.
In the above embodiment, the information receiving module 31 receives information to be authenticated sent by the electronic device, where the information to be authenticated is generated by the electronic device according to the first binary information converted by the first biological information input by the user and the acquired second binary information, the second binary information is generated according to the user identification code corresponding to the password input by the user, and then the information authentication module 32 authenticates the information to be authenticated according to the stored authentication information, thereby implementing two-factor authentication based on the password and the biological information, and improving the security of the data card; even if the data card is lost, the information stored in the data card is not lost.
Those skilled in the art will appreciate that the drawings are merely schematic representations of one preferred embodiment and that the blocks or flow diagrams in the drawings are not necessarily required to practice the present invention.
It should be noted that, in the above embodiments, the terms "first", "second", and "third" are used for convenience of description, and are not intended to limit the embodiments of the present invention.
Those skilled in the art will appreciate that the modules in the devices in the embodiments may be distributed in the devices in the embodiments according to the description of the embodiments, and may be correspondingly changed in one or more devices different from the embodiments. The modules of the above embodiments may be combined into one module, or further split into multiple sub-modules.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. An authentication method, comprising:
receiving first biological information input by a user, and converting the first biological information into first binary information;
acquiring second binary information, wherein the second binary information is generated according to a user identification code corresponding to the password input by the user;
generating information to be authenticated according to the first binary information and the second binary information;
and sending the information to be authenticated to an authentication server so that the authentication server can authenticate the information to be authenticated according to the stored authentication information.
2. The method of claim 1, wherein the obtaining the second binary information comprises:
receiving a password input by the user, and converting a user identification code corresponding to the password into second binary information; or,
and acquiring the second binary information saved in advance.
3. The method according to claim 1 or 2, wherein the generating information to be authenticated according to the first binary information and the second binary information comprises:
and generating the information to be authenticated through a preset algorithm according to the first binary information and the second binary information.
4. The method of claim 1, wherein before receiving the first biological information input by the user, the method further comprises:
receiving second biological information, and converting the second biological information into third binary information;
generating the authentication information according to the third binary information and the second binary information;
and sending the authentication information to the authentication server so that the authentication server can store the authentication information.
5. The method of claim 4, wherein the password comprises a personal identification number; the first biological information comprises first fingerprint information; the second biological information includes second fingerprint information; the subscriber identity code comprises an international mobile subscriber identity code.
6. An electronic device, comprising:
the receiving module is used for receiving first biological information input by a user;
the conversion module is used for converting the first biological information received by the receiving module into first binary information;
the acquisition module is used for acquiring second binary information, and the second binary information is generated according to a user identification code corresponding to the password input by the user;
the generating module is used for generating information to be authenticated according to the first binary information and the second binary information;
and the sending module is used for sending the information to be authenticated generated by the generating module to an authentication server so that the authentication server can authenticate the information to be authenticated according to the stored authentication information.
7. The device according to claim 6, wherein the obtaining module is specifically configured to receive a password input by the user, and convert a user identification code corresponding to the password into second binary information; or, the obtaining module is specifically configured to obtain pre-stored second binary information.
8. The device according to claim 6 or 7, wherein the generating module is specifically configured to generate the information to be authenticated by a predetermined algorithm according to the first binary information and the second binary information.
9. The apparatus of claim 6,
the receiving module is further used for receiving second biological information;
the conversion module is further used for converting the second biological information received by the receiving module into third binary information;
the generating module is further configured to generate the authentication information according to the third binary information and the second binary information;
the sending module is further configured to send the authentication information generated by the generating module to the authentication server, so that the authentication server stores the authentication information.
10. An authentication server, comprising:
the system comprises an information receiving module, a password obtaining module and a password obtaining module, wherein the information receiving module is used for receiving information to be authenticated sent by electronic equipment, the information to be authenticated is generated by the electronic equipment according to first binary information converted by first biological information input by a user and acquired second binary information, and the second binary information is generated according to a user identification code corresponding to the password input by the user;
and the information authentication module is used for authenticating the information to be authenticated received by the information receiving module according to the stored authentication information.
CN201010104173A 2010-01-28 2010-01-28 Authentication method, electronic equipment and authentication server Pending CN101764823A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010104173A CN101764823A (en) 2010-01-28 2010-01-28 Authentication method, electronic equipment and authentication server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010104173A CN101764823A (en) 2010-01-28 2010-01-28 Authentication method, electronic equipment and authentication server

Publications (1)

Publication Number Publication Date
CN101764823A true CN101764823A (en) 2010-06-30

Family

ID=42495806

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010104173A Pending CN101764823A (en) 2010-01-28 2010-01-28 Authentication method, electronic equipment and authentication server

Country Status (1)

Country Link
CN (1) CN101764823A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012022078A1 (en) * 2010-08-18 2012-02-23 中兴通讯股份有限公司 Data card and using method thereof
CN102811206A (en) * 2011-05-31 2012-12-05 凹凸电子(武汉)有限公司 Electronic device used for digital information transmission and processing method of electronic device content
CN103067397A (en) * 2012-12-31 2013-04-24 华为技术有限公司 Security authentication method, access gateway and authentication server of desktop cloud system
CN103237030A (en) * 2013-04-25 2013-08-07 深圳市中兴移动通信有限公司 Biological recognition-based user authentication method and system
CN104660613A (en) * 2015-03-16 2015-05-27 联想(北京)有限公司 Authentication method of user identification module and electronic equipment
CN105184126A (en) * 2015-08-27 2015-12-23 广东欧珀移动通信有限公司 A password setting method, verification method and terminal
CN105335634A (en) * 2015-10-14 2016-02-17 上海斐讯数据通信技术有限公司 User ID card safety management method and system
CN105429761A (en) * 2015-12-29 2016-03-23 宇龙计算机通信科技(深圳)有限公司 A method and device for generating a key
CN106549759A (en) * 2015-09-16 2017-03-29 阿里巴巴集团控股有限公司 Identity identifying method and device
CN110460446A (en) * 2019-07-10 2019-11-15 北京信安世纪科技股份有限公司 The acquisition methods and device of message authentication code
WO2022105486A1 (en) * 2020-11-18 2022-05-27 International Business Machines Corporation Multi-factor fingerprint authenticator

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012022078A1 (en) * 2010-08-18 2012-02-23 中兴通讯股份有限公司 Data card and using method thereof
CN102811206A (en) * 2011-05-31 2012-12-05 凹凸电子(武汉)有限公司 Electronic device used for digital information transmission and processing method of electronic device content
CN103067397A (en) * 2012-12-31 2013-04-24 华为技术有限公司 Security authentication method, access gateway and authentication server of desktop cloud system
CN103067397B (en) * 2012-12-31 2017-06-13 华为技术有限公司 A kind of safety certifying method of desktop cloud system, access gateway and certificate server
CN103237030A (en) * 2013-04-25 2013-08-07 深圳市中兴移动通信有限公司 Biological recognition-based user authentication method and system
CN104660613A (en) * 2015-03-16 2015-05-27 联想(北京)有限公司 Authentication method of user identification module and electronic equipment
CN105184126A (en) * 2015-08-27 2015-12-23 广东欧珀移动通信有限公司 A password setting method, verification method and terminal
CN106549759A (en) * 2015-09-16 2017-03-29 阿里巴巴集团控股有限公司 Identity identifying method and device
CN105335634A (en) * 2015-10-14 2016-02-17 上海斐讯数据通信技术有限公司 User ID card safety management method and system
CN105429761A (en) * 2015-12-29 2016-03-23 宇龙计算机通信科技(深圳)有限公司 A method and device for generating a key
CN105429761B (en) * 2015-12-29 2018-12-25 宇龙计算机通信科技(深圳)有限公司 A kind of key generation method and device
CN110460446A (en) * 2019-07-10 2019-11-15 北京信安世纪科技股份有限公司 The acquisition methods and device of message authentication code
CN110460446B (en) * 2019-07-10 2022-03-18 北京信安世纪科技股份有限公司 Method and device for acquiring message authentication code
WO2022105486A1 (en) * 2020-11-18 2022-05-27 International Business Machines Corporation Multi-factor fingerprint authenticator
US11651060B2 (en) 2020-11-18 2023-05-16 International Business Machines Corporation Multi-factor fingerprint authenticator
GB2616376A (en) * 2020-11-18 2023-09-06 Ibm Multi-factor fingerprint authenticator
GB2616376B (en) * 2020-11-18 2025-02-26 Ibm Multi-factor fingerprint authenticator

Similar Documents

Publication Publication Date Title
CN101764823A (en) Authentication method, electronic equipment and authentication server
US11074033B2 (en) Access control and validation using sonic tones
US8606234B2 (en) Methods and apparatus for provisioning devices with secrets
CN103249045B (en) A kind of methods, devices and systems of identification
CN101051908B (en) Dynamic cipher certifying system and method
US8438385B2 (en) Method and apparatus for identity verification
Choi et al. A mobile based anti-phishing authentication scheme using QR code
US10050791B2 (en) Method for verifying the identity of a user of a communicating terminal and associated system
US20100293376A1 (en) Method for authenticating a clent mobile terminal with a remote server
EP2932428B1 (en) Method of allowing establishment of a secure session between a device and a server
US9639825B1 (en) Securing multifactor authentication
EP2404255A1 (en) Method and computer program for generation and verification of otp between server and mobile device using multiple channels
WO2009056897A1 (en) Method of authentication of users in data processing systems
WO2008149366A2 (en) Device method & system for facilitating mobile transactions
CN105164689A (en) User authentication
CN101420301A (en) Human face recognizing identity authentication system
WO2015039589A1 (en) User identity authorization system and authorization method based on bar codes
WO2018073681A1 (en) Device and methods for authenticating a user equipment
CN104767617A (en) Message processing method, system and related device
CN101951320A (en) Implementation method, device and system of dynamic password
CN104660401A (en) Authentication method, authentication system and terminal
CN112020716A (en) Remote biometric identification
CN106790138A (en) A kind of method of government affairs cloud application User logs in double factor checking
KR100858146B1 (en) Personal authentication method and device using mobile communication terminal and subscriber identification module
CN104182664A (en) Two-dimensional-code-based authentication method and system for non-networked environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20100630