[go: up one dir, main page]

CN107222498A - The binding processing method of shared data - Google Patents

The binding processing method of shared data Download PDF

Info

Publication number
CN107222498A
CN107222498A CN201710524863.2A CN201710524863A CN107222498A CN 107222498 A CN107222498 A CN 107222498A CN 201710524863 A CN201710524863 A CN 201710524863A CN 107222498 A CN107222498 A CN 107222498A
Authority
CN
China
Prior art keywords
mobile terminal
server
authentication information
terminal
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710524863.2A
Other languages
Chinese (zh)
Other versions
CN107222498B (en
Inventor
崔卫洁
张利达
张振新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Borui Tongyun Technology Co.,Ltd.
Original Assignee
Jiangxi Borui Tongyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangxi Borui Tongyun Technology Co Ltd filed Critical Jiangxi Borui Tongyun Technology Co Ltd
Priority to CN201710524863.2A priority Critical patent/CN107222498B/en
Publication of CN107222498A publication Critical patent/CN107222498A/en
Application granted granted Critical
Publication of CN107222498B publication Critical patent/CN107222498B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a kind of binding processing method of shared data, second terminal number is sent to server by the first mobile terminal, first authentication information is sent to the second mobile terminal by server, and login password and the second authentication information are sent to server by the first mobile terminal;Login password is bound with second terminal number if if the second authentication information and the first authentication information, the match is successful;First mobile terminal sends bind request information, and server generation confirms website links address and is sent to the second mobile terminal;The access information that server is generated to the second mobile terminal recognizes validity and returns to binding acknowledgement message, second mobile terminal is returned after identifying code solicited message, server sends the 3rd authentication information and verifies its uniformity with the 4th authentication information, if consistent bind first terminal number and second terminal number-associated.The present invention can prevent that account is stolen to cause internal network to meet with risk.

Description

The binding processing method of shared data
Technical field
The present invention relates to the binding processing method of communication technical field, more particularly to a kind of shared data.
Background technology
Prior art realizes shared the taken method of internal privacy information, is voluntarily applied or noted by terminal to be associated Volume adds the internal network, during application or registration, it is not necessary to or seldom need other members' of the internal network Participate in, whole application or registration process are directly connected to, this method is although convenient by terminal to be associated and server, but not It can recognize whether the terminal to be associated is illegal or whether has illegal program to be operated by the terminal-pair server to be associated, It can not distinguish whether the terminal to be associated is authentic and valid., in the same old way can be with if there is the situation that terminal is stolen or account is stolen Smoothly set up the connection with the internal network.
The content of the invention
It is described the invention provides a kind of binding processing method of shared data to solve the problem of prior art is present Method includes:
The second terminal number of second mobile terminal is sent to server by the first mobile terminal;
Server generates the first authentication information corresponding with the second terminal number and sent to the described second movement Terminal;
First mobile terminal generates the corresponding login password of second mobile terminal, and by the login password and Second authentication information is sent to server;
Second authentication information described in the server authentication carries out uniformity with first authentication information and matched, if The login password and the second terminal number are then subjected to binding processing with success;
First mobile terminal sends bind request information to the server, and the bind request information includes institute State the first terminal number of the first mobile terminal, the second terminal number;
The server confirms website links addresses according to bind request information generation, and by the website links Location is sent to the second terminal;
The corresponding network address generation access information in website links address described in second mobile terminal accessing;
The validity that the server is recognized according to the access information, binding acknowledgement is sent to second mobile terminal Information;
Second mobile terminal sends identifying code solicited message according to the binding acknowledgement message to the server;
The server generates the 3rd authentication information and is sent to second mobile terminal;
Second mobile terminal sends the 4th authentication information to the server;
The uniformity of 3rd authentication information and the 4th authentication information described in the server authentication, if unanimously by described One termination number associates binding processing with second terminal number.
Further, processing is identified to second terminal number after receiving second terminal number in the server, if clothes The first authentication information corresponding with the second terminal number is then generated in the absence of second terminal number and be sent to institute in business device State the second mobile terminal.
Further, the server carries out binding before processing, the server to login password and second terminal number Processing is authenticated to the login password, if the login password meets certification rule, the login password passes through certification.
Further, the server will confirm that website links address sends second mobile terminal, and by first eventually End number, second terminal number and the confirmation website links address are sent to database purchase.
Further, the server sets the first mobile terminal to submit the of the second authentication information in Database field One effective time threshold value;Second mobile terminal submits the of the corresponding network address generation access information in the website links address Two effective time threshold values;Second mobile terminal submits the 3rd effective time threshold of the 4th authentication information to the server Value.
Further, the corresponding network address generation access information in second authentication information, the website links address and the Whether the submission time of four authentication informations is submitted into corresponding effective time threshold value if effective time threshold value is no more than Work(.
Further, the binding acknowledgement message that the server is sent to second mobile terminal includes first terminal number Code, identifying code input frame, identifying code obtain button and confirm binding button.
Further, the transmission of the first mobile terminal, which is checked, has bound mobile terminal request to server, and server is returned Bind information of mobile terminal;
Further, the first mobile terminal transmission acquisition has been bound mobile terminal data and asked to server, if server Judge that first terminal has been bound with the mobile terminal, then send the mobile terminal data to the first mobile terminal;If service Device judge mobile terminal not with the first mobile terminal binding, then send user error information to the first mobile terminal.
Further, the server is by the first authentication information, the second authentication information, the 3rd authentication information and the 4th certification Information is sent to database purchase.
The invention further relates to a kind of binding processing unit of shared data, described device includes the first mobile terminal, second Mobile terminal and server;
First mobile terminal is used to the second terminal number of the second mobile terminal being sent to server;It is additionally operable to life Server is sent into the corresponding login password of second mobile terminal, and by the login password and the second authentication information; First mobile terminal is additionally operable to send bind request information to the server, and the bind request information includes described The first terminal number of first mobile terminal, the second terminal number;
Second mobile terminal is used to access the corresponding network address generation access information in the website links address;It is additionally operable to Identifying code solicited message and the 4th authentication information are sent to the server according to the binding acknowledgement message;
The server is used to generate the first authentication information corresponding with the second terminal number and sent to described Second mobile terminal;It is additionally operable to match second authentication information and first authentication information progress uniformity, if The login password and the second terminal number are then subjected to binding processing with success;The server is used to tie up according to Determine solicited message generation and confirm website links address, and the website links address is sent to the second terminal, and recognize The validity of the access information, binding acknowledgement message is sent to second mobile terminal;The server is additionally operable to generation 3rd authentication information is simultaneously sent to second mobile terminal;The server is additionally operable to checking the 3rd authentication information and the The uniformity of four authentication informations, if consistent associate binding processing with second terminal number by the first terminal number.
The binding processing method of shared data provided in an embodiment of the present invention can prevent that account is stolen to cause internal network to meet with It is dangerous to the wind.
Brief description of the drawings
Fig. 1 is the flow chart of the binding processing method of shared data of the embodiment of the present invention;
Fig. 2 is the schematic diagram of the binding processing unit of shared data of the embodiment of the present invention.
Embodiment
Below by drawings and examples, technical scheme is described in further detail.
Fig. 1 is the flow chart of the binding processing method of shared data of the present invention, as illustrated, methods described includes:
Step 101:The second terminal number of second mobile terminal is sent to server by the first mobile terminal.
When the second mobile terminal needs to add local Intranet, the first mobile terminal of the local Intranet is had been added to by the Two mobile terminal numbers are sent to server, while sending the request that the second mobile terminal adds local Intranet.
Further, processing is identified to second terminal number after receiving second terminal number in the server, if clothes The first authentication information corresponding with the second terminal number is then generated in the absence of second terminal number and be sent to institute in business device State the second mobile terminal.If having existed for corresponding second terminal number in server, server returns to second terminal number The already present information of code.
Step 102:Server generates the first authentication information corresponding with the second terminal number and sent to described Second mobile terminal.
The second mobile terminal number and the second mobile terminal that server receives the transmission of the first mobile terminal add local During the request of Intranet, generation is directed to the first authentication information of second mobile terminal number and is sent to first authentication information Above-mentioned second mobile terminal, first authentication information is used to confirm whether the second mobile terminal number is authentic and valid.If First authentication information is sent to the first mobile terminal, then is likely to occur, and the first mobile terminal carries out illegal operation and fake registrations One the second mobile terminal number, so that the other users of local area Intranet cause damage.First authentication information is sent to Two mobile terminals are it is possible to prevente effectively from the generation of such case.
Step 103:First mobile terminal generates the corresponding login password of second mobile terminal, and is stepped on described Record password and the second authentication information are sent to server.
Second mobile terminal is received after the first authentication information of server transmission, and the is changed by the input of the first mobile terminal Corresponding second authentication information of one authentication information, the first mobile terminal generates the corresponding login of second mobile terminal simultaneously to be recognized Demonstrate,prove information, such as identity ID, login password etc..First mobile terminal is by the login authentication information and second certification Information is sent to server.
Step 104:Second authentication information described in the server authentication carries out uniformity with first authentication information Match somebody with somebody.
Server is received after the second authentication information of the first mobile terminal transmission, by the second authentication information and the first certification Information carries out matching certification.Second authentication information and the first authentication information implication that the match is successful are the second authentication information and first Authentication information is corresponding.And the second authentication information has several with the unmatched reason of the first authentication information, such as, and the second certification letter Typing mistake is ceased, the entry time of the second authentication information has exceeded effective time threshold value.
Further, the server sets the first mobile terminal to submit the of the second authentication information in Database field One effective time threshold value;The first effective time threshold value can be the time of a determination, such as 15min or 30min.When When the submission time of second authentication information exceeds the first effective time threshold value, it is believed that second authentication information is invalid, and returns Return the invalid information of second authentication information.
Step 105:The login password and the second terminal number are subjected to binding processing if the match is successful.
If server is to the second authentication information and the first authentication information, the match is successful, and server sends out the first mobile terminal The login authentication information sent and the second terminal number of most second mobile terminals are bound, that is, generate the second terminal number Log-on message in the local Intranet, i.e. the second mobile terminal succeed in registration in the local Intranet.If the second authentication information It is failed with the matching of the first authentication information, then the server information that returns to that it fails to match, and generate the transmission of the first authentication information again To the second mobile terminal or terminate this operation.
Further, the server carries out binding before processing, the server to login password and second terminal number Processing is authenticated to the login password, if the login password meets certification rule, the login password passes through certification. Such as, examine login password number of characters whether at 6-18 and whether comprising the spcial character and this account for not allowing to register whether It is existing, succeeded in registration if verification if, and receipt succeeds in registration information to the first mobile terminal in real time;It is real-time if failure Receipt gives the first mobile terminal registration failure information.
Step 106:First mobile terminal sends bind request information, the bind request information to the server Include the first terminal number of first mobile terminal, the second terminal number;
After the second mobile terminal successful registration enters the local Intranet, the first mobile terminal can initiate to move with described second It should include the first terminal of first mobile terminal in the solicited message that dynamic terminal is bound, the bind request information The second terminal number of number, second mobile terminal.The first terminal number and the second terminal number be in order to Server extracts the respective identity information of the two termination numbers and end message and bound.
Step 107:The server confirms website links addresses according to bind request information generation, and by the net Location chained address is sent to second mobile terminal.
The server is received after the bind request of the first mobile terminal transmission, generates corresponding confirmation, institute Stating the form of expression of confirmation has many kinds, such as confirms website links address, network validation identifying code, SMS confirmation checking Code etc., and the confirmation is sent to the second described mobile terminal.
Further, while the server will confirm that website links address sends second mobile terminal, will also First terminal number, second terminal number and the confirmation website links address are sent to database purchase.
Step 108:The corresponding network address generation access information in website links address described in second mobile terminal accessing.
Second mobile terminal is received after the confirmation that server is sent, and generates corresponding authentication information.Such as If it is confirmed that information is to confirm website links address, the corresponding network address access information in the website links address is generated;If really It is network validation identifying code to recognize information, generates corresponding network verification code;If it is confirmed that information is SMS confirmation identifying code, then give birth to Into corresponding short message verification code, if the confirmation of other forms, then the identifying code of its corresponding form is generated.
Step 109:The validity that the server is recognized according to the access information, sends to second mobile terminal Binding acknowledgement message.
If the success of the second mobile terminal such as confirms the corresponding network address in website links address to server return authentication information Access information, then confirm that the bind request is authentic and valid, that is, confirms whether the second mobile terminal is agreed to carry out this bindings.This The meaning of step operation is, if the first mobile terminal sends wrong binding instruction, the second mobile terminal can be refused, or second moves Dynamic terminal thinks to refuse to protect itself rights and interests not suffer a loss when binding instruction is illegal instruction.Server is to immediately Two mobile terminals send the binding acknowledgement message of the first mobile terminal.
Further, server presets second mobile terminal and submits the corresponding network address in the website links address Generate the second effective time threshold value of access information;The second effective time threshold value can be the time of a determination, such as 15min or 30min.When second mobile terminal submits the corresponding network address generation access information in the website links address When submission time exceeds the second effective time threshold value, it is believed that the access information is invalid, and it is invalid to return to the access information Information.
Step 110:Second mobile terminal sends identifying code according to the binding acknowledgement message to the server please Seek information.
Step 111:The server generates the 3rd authentication information and is sent to second mobile terminal.
Second mobile terminal receives the binding acknowledgement message of server transmission and agreed to after this bindings, to clothes Business device sends identifying code solicited message, and server, which is received, to be generated the 3rd authentication information and send after the identifying code solicited message To the second mobile terminal.3rd authentication information is used to reaffirm whether the second mobile terminal is agreed to and the first mobile terminal Bound, if the second mobile terminal agree to binding be not the first mobile terminal if can refuse this time bind.
Further, the binding acknowledgement message that the server is sent to second mobile terminal includes first terminal number Code, identifying code input frame, identifying code obtain button and confirm binding button.In order to remind the second shifting when sending first terminal number Dynamic terminal, the object that will be bound is the first mobile terminal, and it is then to be used for the second mobile terminal to clothes that identifying code, which obtains button, Device of being engaged in sends identifying code solicited message, and identifying code input frame is used for input validation code, confirms that binding button is then to agree to The bind request of first mobile terminal.
Step 112:Second mobile terminal sends the 4th authentication information to the server.
Second mobile terminal receives the 3rd authentication information of server transmission and agrees to enter with the first mobile terminal After row binding, then the second mobile terminal sends the 4th authentication information to server.
Step 113:The uniformity of 3rd authentication information and the 4th authentication information described in the server authentication.
Server is received after the 4th authentication information of the second mobile terminal transmission, and the 4th authentication information and the 3rd are recognized The uniformity of card information is judged, if the 4th authentication information is mismatched with the 3rd authentication information or the 4th authentication information is carried The friendship time is not in default effective time threshold value, then it is assumed that it fails to match, after it fails to match, and server can generate again Three authentication informations stop this operation.
Further, server presets second mobile terminal and submits the 4th authentication information to the server 3rd effective time threshold value.The 3rd effective time threshold value can be the time of a determination, such as 15min or 30min. When second mobile terminal submits the submission time of the 4th authentication information to exceed the 3rd effective time threshold value, it is believed that should 4th authentication information is invalid, and returns to the invalid information of the 4th authentication information.
Further, methods described also includes, and the server recognizes the first authentication information, the second authentication information, the 3rd Card information and the 4th authentication information are sent to database purchase.
Step 114:The first terminal number is associated binding processing with second terminal number by server.
When server judges the 4th authentication information and the 3rd authentication information the match is successful after, then it is assumed that second moves Dynamic terminal agrees to be associated binding with the first mobile terminal, will the first terminal number and second terminal number closed Join binding processing.
It should be noted that in this local Intranet, any one mobile terminal or terminal can be asked and other Mobile terminal or terminal set up association binding, and other mobile terminals such as the second mobile terminal request is built with the first mobile terminal The process of vertical association binding relationship sets up the process phase for associating binding relationship with the first mobile terminal request and the second mobile terminal It is similar.
Further, the transmission of the first mobile terminal, which is checked, has bound mobile terminal request to server, and server is returned Bind information of mobile terminal.
After the first mobile terminal and the second mobile terminal are successfully bound, it can send and check that the machine has bound mobile terminal Request is to server, and server receives the checking after request of the first mobile terminal, according to the identity information of the first mobile terminal Retrieved with end message in database, and the information of mobile terminal of binding retrieved is sent to the first movement eventually End.Similarly, other mobile terminals in this local Intranet can also carry out this operation.
Mobile terminal data has been bound in the transmission acquisition of first mobile terminal asks to server, if server judges first eventually End has been bound with the mobile terminal, then sends the mobile terminal data to the first mobile terminal;If server judges movement Terminal not with the first mobile terminal binding, then send user error information to the first mobile terminal.
Specifically, having been tied up when the first mobile terminal needs to obtain and bound the data of mobile terminal, it is necessary to send acquisition Determine mobile terminal data to ask to server, server is first carried out really the binding relationship of the first mobile terminal and the mobile terminal Recognize, if server confirms that the mobile terminal and the first mobile terminal had carried out binding, first is sent to the mobile terminal Acquisition for mobile terminal request of data, if the mobile terminal agrees to the request, server is by the data of the mobile terminal to first Mobile terminal;If the mobile terminal refuses the request, server sends refusal solicited message to the first mobile terminal.De- service Device judges that the mobile terminal is not bound with the first mobile terminal, then sends user error information or mobile terminal is not tied up Information is determined to the first mobile terminal, and the first mobile terminal can initiate the bind request with the mobile terminal.
Fig. 2 is the schematic diagram of the binding processing unit of shared data of the present invention, is moved as illustrated, described device includes first Dynamic terminal 2, the second mobile terminal 3 and server 1, there is electrical connection in first mobile terminal 2 and server 1, described There is electrical connection in the second mobile terminal 3 and server 1.
First mobile terminal 2 is used to the second terminal number of the second mobile terminal 3 being sent to server 1;Also use In the generation corresponding login password of second mobile terminal 3, and the login password and the second authentication information are sent to clothes Business device 1;First mobile terminal 2 is additionally operable to send in bind request information, the bind request information to the server 1 First terminal number including first mobile terminal 2, the second terminal number.
First mobile terminal 2 is the essential tool that the second mobile terminal 3 adds local Intranet, if without the first mobile terminal 2 cooperation, the second mobile terminal 3 is successfully joined local Intranet in the case of can not being set not changing server 1, is kept away with this Exempt from there is mobile terminal or terminal to add local Intranet by illegal operation, caused with other mobile terminals in local area Intranet Loss, or the data message of local area Intranet are stolen etc..
Second mobile terminal 3 is used to access the corresponding network address generation access information in the website links address;Also use In sending identifying code solicited message and the 4th authentication information to the server 1 according to the binding acknowledgement message.
After the second mobile terminal 3 is successfully joined local Intranet, it can be set up with other mobile terminals and associate binding relationship, When set up association binding relationship when, by Requested Party, i.e., the primary operational that the second mobile terminal 3 is bound, such as agree to and The associative operation that first mobile terminal 2 is bound.
The server 1 is used to generate the first authentication information corresponding with the second terminal number and sent to described Second mobile terminal 3;It is additionally operable to match second authentication information and first authentication information progress uniformity, if The login password and the second terminal number are then subjected to binding processing with success;The server 1 is used for according to described The generation of bind request information confirms website links address, and the website links address is sent into the second terminal, and knows The validity of not described access information, binding acknowledgement message is sent to second mobile terminal 3;The server 1 is additionally operable to Generate the 3rd authentication information and be sent to second mobile terminal 3;The server 1 is additionally operable to checking the 3rd certification letter The uniformity of breath and the 4th authentication information, if unanimously associated the first terminal number at binding with second terminal number Reason.
Professional should further appreciate that, each example described with reference to the embodiments described herein Unit and algorithm steps, can be realized with electronic hardware, computer software or the combination of the two, hard in order to clearly demonstrate The interchangeability of part and software, generally describes the composition and step of each example according to function in the above description. These functions are performed with hardware or software mode actually, depending on the application-specific and design constraint of technical scheme. Professional and technical personnel can realize described function to each specific application using distinct methods, but this realize It is not considered that beyond the scope of this invention.
The method that is described with reference to the embodiments described herein can use hardware, computing device the step of algorithm Software module, or the two combination are implemented.Software module can be placed in random access memory (RAM), internal memory, read-only storage (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field In any other form of storage medium well known to interior.
Above-described embodiment, has been carried out further to the purpose of the present invention, technical scheme and beneficial effect Describe in detail, should be understood that the embodiment that the foregoing is only the present invention, be not intended to limit the present invention Protection domain, within the spirit and principles of the invention, any modification, equivalent substitution and improvements done etc. all should be included Within protection scope of the present invention.

Claims (10)

1. the binding processing method of a kind of shared data, it is characterised in that methods described includes:
The second terminal number of second mobile terminal is sent to server by the first mobile terminal;
Server generates the first authentication information corresponding with the second terminal number and sent to second mobile terminal;
First mobile terminal generates the corresponding login password of second mobile terminal, and by the login password and second Authentication information is sent to server;
Second authentication information described in the server authentication carries out uniformity with first authentication information and matched, if matched into The login password and the second terminal number are then carried out binding processing by work(;
First mobile terminal sends bind request information to the server, and the bind request information includes described the The first terminal number of one mobile terminal, the second terminal number;
The server confirms website links address according to bind request information generation, and the website links address is sent out Give second mobile terminal;
The corresponding network address generation access information in website links address described in second mobile terminal accessing;
The validity that the server is recognized according to the access information, binding acknowledgement letter is sent to second mobile terminal Breath;
Second mobile terminal sends identifying code solicited message according to the binding acknowledgement message to the server;
The server generates the 3rd authentication information and is sent to second mobile terminal;
Second mobile terminal sends the 4th authentication information to the server;
The uniformity of 3rd authentication information and the 4th authentication information described in the server authentication, if unanimously by described first eventually End number associates binding processing with second terminal number.
2. according to the method described in claim 1, it is characterised in that methods described also includes, the server receives second eventually Processing is identified to second terminal number after the number of end, if in server in the absence of generating if second terminal number and described the Corresponding first authentication information of two termination numbers is simultaneously sent to second mobile terminal.
3. according to the method described in claim 1, it is characterised in that methods described also includes, the server is to login password Binding before processing is carried out with second terminal number, the server is authenticated processing to the login password, if described log in Password meets certification rule, then the login password passes through certification.
4. according to the method described in claim 1, it is characterised in that methods described also includes, the server will confirm that network address Chained address sends second mobile terminal, and by first terminal number, second terminal number and the confirmation website links Address is sent to database purchase.
5. according to the method described in claim 1, it is characterised in that methods described also includes, the server is in database word The first mobile terminal is set to submit the first effective time threshold value of the second authentication information in section;Second mobile terminal submits institute State the second effective time threshold value that the corresponding network address in website links address generates access information;Second mobile terminal is to described Server submits the 3rd effective time threshold value of the 4th authentication information.
It is second authentication information, described 6. method according to claim 5, it is characterised in that methods described also includes Whether the submission time of website links address corresponding network address generation access information and the 4th authentication information is when corresponding effective Between in threshold value, if no more than submitting success if effective time threshold value.
7. according to the method described in claim 1, it is characterised in that methods described also includes, the server is to described second The binding acknowledgement message that mobile terminal is sent includes first terminal number, identifying code input frame, identifying code and obtains button and confirmation Bind button.
8. according to the method described in claim 1, it is characterised in that methods described also includes, the first mobile terminal sends and checked Mobile terminal request is bound to server, server returns and bound information of mobile terminal;
First mobile terminal sends to obtain and has bound mobile terminal data and asks to server, if server judge first terminal with The mobile terminal has been bound, then sends the mobile terminal data to the first mobile terminal;If server judges mobile terminal Not with the first mobile terminal binding, then user error information is sent to the first mobile terminal.
9. according to the method described in claim 1, it is characterised in that methods described also includes, the server is by the first certification Information, the second authentication information, the 3rd authentication information and the 4th authentication information are sent to database purchase.
10. the binding processing unit of a kind of shared data, it is characterised in that described device includes the first mobile terminal, the second shifting Dynamic terminal and server;
First mobile terminal is used to the second terminal number of the second mobile terminal being sent to server;It is additionally operable to generate institute The corresponding login password of the second mobile terminal is stated, and the login password and the second authentication information are sent to server;It is described First mobile terminal is additionally operable to send bind request information to the server, and the bind request information includes described first The first terminal number of mobile terminal, the second terminal number;
Second mobile terminal is used to access the corresponding network address generation access information in the website links address;It is additionally operable to basis The binding acknowledgement message sends identifying code solicited message and the 4th authentication information to the server;
The server is used to generate the first authentication information corresponding with the second terminal number and sent to described second Mobile terminal;It is additionally operable to match second authentication information and first authentication information progress uniformity, if matched into The login password and the second terminal number are then carried out binding processing by work(;The server is used for please according to the binding Ask information generation to confirm website links address, and the website links address is sent to the second terminal, and recognize described The validity of access information, binding acknowledgement message is sent to second mobile terminal;The server is additionally operable to generation the 3rd Authentication information is simultaneously sent to second mobile terminal;The server, which is additionally operable to checking the 3rd authentication information and the 4th, to be recognized The uniformity of information is demonstrate,proved, if consistent associate binding processing with second terminal number by the first terminal number.
CN201710524863.2A 2017-06-30 2017-06-30 Binding processing method for shared data Active CN107222498B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710524863.2A CN107222498B (en) 2017-06-30 2017-06-30 Binding processing method for shared data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710524863.2A CN107222498B (en) 2017-06-30 2017-06-30 Binding processing method for shared data

Publications (2)

Publication Number Publication Date
CN107222498A true CN107222498A (en) 2017-09-29
CN107222498B CN107222498B (en) 2020-02-21

Family

ID=59951827

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710524863.2A Active CN107222498B (en) 2017-06-30 2017-06-30 Binding processing method for shared data

Country Status (1)

Country Link
CN (1) CN107222498B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112311730A (en) * 2019-07-29 2021-02-02 西安中兴新软件有限责任公司 Pairing information uploading, connection and authentication method, terminal and server

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104519485A (en) * 2013-09-29 2015-04-15 腾讯科技(深圳)有限公司 Communication method between terminals, devices and system
CN104766209A (en) * 2014-01-07 2015-07-08 腾讯科技(深圳)有限公司 Data batch processing method and system
CN104796385A (en) * 2014-01-20 2015-07-22 腾讯科技(深圳)有限公司 Terminal binding method, device and system
CN105207867A (en) * 2015-10-30 2015-12-30 北京奇艺世纪科技有限公司 Equipment connecting method and equipment connecting device
CN105530222A (en) * 2014-09-29 2016-04-27 腾讯科技(深圳)有限公司 Method for establishing connection among terminals, and device and system
CN105812413A (en) * 2014-12-29 2016-07-27 深圳市腾讯计算机系统有限公司 Communication method and device
US20160314084A1 (en) * 2015-04-24 2016-10-27 Primax Electronics Ltd. Input system and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104519485A (en) * 2013-09-29 2015-04-15 腾讯科技(深圳)有限公司 Communication method between terminals, devices and system
CN104766209A (en) * 2014-01-07 2015-07-08 腾讯科技(深圳)有限公司 Data batch processing method and system
CN104796385A (en) * 2014-01-20 2015-07-22 腾讯科技(深圳)有限公司 Terminal binding method, device and system
CN105530222A (en) * 2014-09-29 2016-04-27 腾讯科技(深圳)有限公司 Method for establishing connection among terminals, and device and system
CN105812413A (en) * 2014-12-29 2016-07-27 深圳市腾讯计算机系统有限公司 Communication method and device
US20160314084A1 (en) * 2015-04-24 2016-10-27 Primax Electronics Ltd. Input system and method
CN105207867A (en) * 2015-10-30 2015-12-30 北京奇艺世纪科技有限公司 Equipment connecting method and equipment connecting device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112311730A (en) * 2019-07-29 2021-02-02 西安中兴新软件有限责任公司 Pairing information uploading, connection and authentication method, terminal and server
CN112311730B (en) * 2019-07-29 2023-10-20 西安中兴新软件有限责任公司 Pairing information uploading, connecting and authenticating method, terminal and server

Also Published As

Publication number Publication date
CN107222498B (en) 2020-02-21

Similar Documents

Publication Publication Date Title
CN107426235B (en) Authority authentication method, device and system based on equipment fingerprint
CN104077689B (en) A kind of method of Information Authentication, relevant apparatus and system
CN1852094B (en) Method and system for protecting network business application accounts
US11900453B2 (en) Digital identity sign-in
CN102542453B (en) Mobile payment identity verification method
CN112118269A (en) Identity authentication method, system, computing equipment and readable storage medium
CN103905194B (en) Identity traceability authentication method and system
CN101448001A (en) System for realizing WAP mobile banking transaction security control and method thereof
CN113132404A (en) Identity authentication method, terminal and storage medium
CN107241329A (en) Account login process method and device
US20240129311A1 (en) Digital identity step-up
CN107196914A (en) Identity identifying method and device
CN108156169A (en) Account login validation method, system and computer readable storage medium
CN105429928A (en) Data communication method and system, and client and server
CN109587683B (en) Method and system, application program and terminal information database for SMS anti-monitoring
CN115086042A (en) User identity authentication method, user identity authentication system and computer storage medium
KR101133167B1 (en) Method and apparatus for user verifing process with enhanced security
CN114844644A (en) Resource request method, device, electronic equipment and storage medium
CN110968632B (en) Method and system for unified data exchange
KR101583698B1 (en) Authentication system and method for device attempting connection
CN107222498A (en) The binding processing method of shared data
CN104252676A (en) System and method for using real-time communication and digital certificate to authenticate Internet bank account identity
CN116707844A (en) Behavior tracking method, device, electronic device and medium based on public account
US20090165108A1 (en) Method for verifying server end apparatus
CN108574657A (en) Method, apparatus, system and the computing device and server of access server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200916

Address after: 100020 Beijing, East Third Ring Road, North Road, a building, floor 1702, room 17, room 26

Patentee after: Beijing Borui Tongyun Technology Co.,Ltd.

Address before: 330000 Jiangxi province Nanchang City Airport Economic Zone Confucianism Le Hu Street No. 399

Patentee before: JIANGXI BORUITONGYUN TECHNOLOGY Co.,Ltd.

CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Shi Lihong

Inventor after: Cui Weijie

Inventor after: Zhang Lida

Inventor after: Zhang Zhenxin

Inventor before: Cui Weijie

Inventor before: Zhang Lida

Inventor before: Zhang Zhenxin