Networking program user authentication method based on mobile terminal

A mobile terminal and user verification technology, applied in the field of computer communication, can solve problems such as password leakage, computer damage, information leakage, etc., and achieve the effect of convenient use and simple and reliable verification

Inactive Publication Date: 2012-08-01
苏州奇可思信息科技有限公司
View PDF2 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, with the randomness of employee network access, it is often easy to access some phishing and virus-related websites. These websites often contain malicious scripts, which often cause damage to computers or even leak information. They have special requirements for security and information confidentiality. For government agencies and enterprises, the consequences are often very serious
Many networked programs often need to log in, and during the login process, due to factors such as viruses, if a password needs to be entered, it is easy to cause the password to be leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Networking program user authentication method based on mobile terminal
  • Networking program user authentication method based on mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0020] Such as figure 1 As shown, the implementation steps of the mobile terminal-based network program user verification method in this embodiment are as follows:

[0021] 1) The networking program on the client side binds the mobile terminal on the server in advance;

[0022] 2) When logging into the networking program, the networking program requests the server to assign a unique random character string, and generates a barcode from the obtained random character string and the client's IP address;

[0023] 3) The mobile terminal captures the barcode and parses it into a character string to be verified and sends it to the server. The server re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a networking program user authentication method based on a mobile terminal. The networking program user authentication method includes the implementation steps: 1) binding the mobile terminal on a server by a networking program on a client in advance; 2) sending a request for distributing a unique random character string to a server by the networking program when the networking program is logged in, and generating a barcode by the aid of the acquired random character string and an IP (internet protocol) address of the client; 3) shooting the barcode by the mobile terminal, analyzing the barcode to generate a character string to be authenticated, transmitting the character string to be authenticated to the server, receiving the character string to be authenticated by the server, and analyzing the character string to be authenticated into a random character string to be authenticated and an IP address, to be authenticated, of the client; and 4) comparing the random character string to be authenticated with the random character string distributed to the corresponding IP address of the client, and returning authentication passing information to the networking program if the random character string to be authenticated matches with the random character strings distributed to the corresponding IP address of the client. The networking program user authentication method has the advantages that users of the networking program can be authenticated, authentication is simple and reliable, and utilization is convenient.

Description

technical field [0001] The invention relates to the field of computer communication, in particular to a method for verifying users of networking programs based on mobile terminals. Background technique [0002] At present, the Internet has become popular and has become a part of daily work and life. For example, the work of most government agencies and enterprises depends on the Internet at present, such as e-mail service, retrieval service, file sending and receiving service, customer online service, etc., all of which directly rely on the Internet for realization. [0003] However, with the randomness of employee network access, it is often easy to access some phishing and virus-related websites. These websites often contain malicious scripts, which often cause damage to computers or even leak information. They have special requirements for security and information confidentiality. For government agencies and enterprises, the consequences are often very serious. Many net...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 葛长伟冯春瑾
Owner 苏州奇可思信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products