摘要:
Disclosed in the present invention are a wireless network access method and an apparatus, and the method includes: obtaining the identification information of a client to be accessed; according to the identification information, querying a communication terminal having a binding relationship with the identification information; generating a matching verification code; transmitting the matching verification code to the communication terminal; receiving a return verification code transmitted from the client to be accessed; and according to the matching verification code and the return verification code, allowing or refusing the access of the client to be accessed. Meanwhile, the present invention also discloses a computer storage medium.
摘要:
The present invention relates to a method for verifying the validity of a ticket (11), in which method information is transmitted by a checking entity (16) to a mobile device (10). A code (13) is calculated on the basis of this information, of a derived key and also of a characteristic specific to the mobile device (10), the code being subsequently verified by the checking entity (16).
摘要:
A communication method performed at an electronic device includes receiving first identification information through an auxiliary device which is connectable with the electronic device, comparing the received first identification information with second identification information stored in the electronic device, and connecting with an external electronic device through local communication based on at least one of the first identification information or the second identification information, if the first identification information and the second identification information are different from each other. An electronic device includes a processor configured to control the display, the memory, or the communication module, and connect with an external electronic device through local communication based on at least one of first identification information received through the auxiliary device or second identification information stored in the memory.
摘要:
An application management system, especially a web application management system, for enabling different clients to access specific versions of an application, includes means for identifying at least one specific marker associated to the clients or to client requests, means for selecting a specific version of the application for a requesting client based on at least one identified marker, and means for delivering the selected specific version of the application to the requesting client.
摘要:
In general, embodiments of the present invention provide systems, methods and computer readable media for providing a user verification service based on analyzing digital fingerprint signals derived from out-of-band data (i.e., data not directly supplied by the user). In some embodiments, a digital fingerprint engine embedded in an app hosted on a client device being accessed by a user reads various device or user data and then creates a set of encoded user verification data representing out-of-band data stored locally on that device. In some embodiments, the user verification data are encoded as hashes generated by a hash function. In some embodiments, the app is configured to contact a business server via the cloud, and the set of digital fingerprints are included in an authorization request transmitted from the client device to the business server. In some embodiments, a digital fingerprint verification service verifies the set of digital fingerprints by determining whether they match any of a stored set of digital fingerprints representing a group of previously verified users.
摘要:
The invention is a method for managing a response generated by an application embedded in a secure token in response to a command requesting opening a proactive session. An applicative server relies on an OTA server to securely send the command to the application. The method comprises the steps of: - the application retrieves a data from the command and derives a key using a preset function, - the application generates the response to the command, builds a secured response packet comprising the response secured with the derived key and sends the secured response packet to the applicative server.
摘要:
A connection establishment method, a device, and a system are disclosed to resolve a problem in the prior art that because first user equipment is connected to any user equipment, security of a relay service function is poor. A specific solution is: receiving, by first user equipment, a served object group identifier sent by a network device (301); receiving discovery information sent by second user equipment (302); and when determining that an identifier of a second group is included in the served object group identifier, establishing a connection between the first user equipment and the second user equipment according to a data link layer ID of the second user equipment (304).
摘要:
Techniques are provided for generating a logical application by grouping multiple physical distributions of an application for programming a plurality of electronic devices. A logical application can run separate commands through a single interface, lessening the number of connections needed between different user's electronic devices (e.g., smart phones, tablets, workstations, wearable computers) and a company's various servers. In certain embodiments, different physical distributions of the application may correspond to different operating systems versions of the application. Compiled code for each of these operating systems and device types is controlled and assigned to select users' devices from vastly different distribution architectures. In certain embodiments, a particular version (i.e., physical distribution) of the logical application to be installed to the device is determined based on the operating system of the device and the appropriate version of the logical application is installed on the device.
摘要:
An access management account that includes an access identifier may be used to control access to telecommunications services or applications. An access identifier is designated for obtaining access to multiple telecommunications services or applications, in which the multiple telecommunications services or applications are accessible to a user through multiple user accounts that are protected by account credentials. Once the access credential is designated, the access credential may be used to determine whether access to the one or more telecommunications services or applications is to be granted instead of using the account credentials of the multiple user accounts.