CN103634294A - Information verifying method and device - Google Patents

Information verifying method and device Download PDF

Info

Publication number
CN103634294A
CN103634294A CN201310533351.4A CN201310533351A CN103634294A CN 103634294 A CN103634294 A CN 103634294A CN 201310533351 A CN201310533351 A CN 201310533351A CN 103634294 A CN103634294 A CN 103634294A
Authority
CN
China
Prior art keywords
terminal
information
assigned operation
verified
operation instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310533351.4A
Other languages
Chinese (zh)
Other versions
CN103634294B (en
Inventor
金凡
高应军
李创奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201310533351.4A priority Critical patent/CN103634294B/en
Publication of CN103634294A publication Critical patent/CN103634294A/en
Application granted granted Critical
Publication of CN103634294B publication Critical patent/CN103634294B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention relates to an information verifying method and an information verifying device, and belongs to the technical field of networks. The method comprises the steps that a first terminal receives specified operation instructions; according to the specified operation instructions, graphic codes are generated so that a second terminal displays an information input interface through scanning the graphic codes, in addition, information, input by users, to be checked is obtained, an verification request is sent to a server, and the server verifies whether a first terminal is allowed to execute the specified operation or not. The information verifying method and the information verifying device have the advantages that the input process of the information to be checked after the first terminal receives the specified operation instructions is transferred onto the second terminal, so the process for inputting the information to be checked is simpler and more convenient, the information verification process is simplified, the time for inputting the information to be checked is reduced, the information verification efficiency is improved, and in addition, a display screen of the second terminal is obviously smaller than that of the first terminal, the information leakage cannot be easily caused, and the safety is improved.

Description

Information Authentication method and apparatus
Technical field
The disclosure is directed to networking technology area, is about Information Authentication method and apparatus specifically.
Background technology
Along with the development of intelligent television, user can install multiple application software on intelligent television, to realize multiple intelligentized function, but in using the process of intelligent television, may need authentication of users authority, to guarantee fail safe.
As, user need to input login account and password when login application software, or when buying commodity, need to input the password of account, when paying, need to input payment cipher etc.
When user carries out Authority Verification on intelligent television, input password can use a teleswitch, but, the keyboard operated by rotary motion of remote controller comparatively simple, can only input numeral, and cannot input character, when password to be entered comprises character, virtual full keyboard can be provided on intelligent television, and user controls cursor by the direction key of clicking in remote controller, and selects the character in full keyboard to input by confirmation button.
In realizing process of the present invention, inventor finds at least defect of correlation technique, for example: Authority Verification process operation is loaded down with trivial details, Password Input is consuming time long, cause the efficiency of Authority Verification very low, and because the display screen of intelligent television is larger than the display screen of general terminal, easily cause information leakage, poor stability.
Summary of the invention
In order to solve the problem existing in correlation technique, the disclosure provides a kind of Information Authentication method and apparatus.Described technical scheme is as follows:
First aspect, the disclosure provides a kind of Information Authentication method, and described method comprises:
First terminal receives assigned operation instruction, and described assigned operation instruction is used to indicate described first terminal and carries out assigned operation, and described assigned operation need to carry out Information Authentication;
Described first terminal is according to described assigned operation instruction, generate graphic code, described graphic code at least carries the user account that described first terminal is used, described first terminal sign and described assigned operation instruction, make the second terminal by the described graphic code of scanning, show information input interface, and obtain the information to be verified of user input, to server, send checking request, described information to be verified is carried in described checking request, described user account, described first terminal sign and described assigned operation instruction, make described server authentication whether allow described first terminal to carry out described assigned operation.
First terminal receives assigned operation instruction and comprises:
Described first terminal receives logging request, and described logging request is used to indicate described first terminal and logins; Or,
Described first terminal receives payment request, and described payment request is carried the numbering of order, and is used to indicate described first terminal described order is paid the bill; Or,
Described first terminal receiving encryption key shows request, and described enciphered message shows that request carries enciphered message sign, and is used to indicate described first terminal and shows described enciphered message.
Second aspect, the disclosure provides a kind of Information Authentication method, and described method comprises:
Server receives the checking request that the second terminal sends, the assigned operation instruction that user account, described first terminal sign and described first terminal that graphic code that described the second terminal scanning first terminal generates obtains receive is carried in described checking request, and the information to be verified of the user input that gets of described the second terminal, described assigned operation instruction is used to indicate described first terminal and carries out assigned operation, and described assigned operation need to carry out Information Authentication;
Described server is according to described user account, described assigned operation instruction and described information to be verified, and whether checking allows described first terminal to carry out described assigned operation.
Described server is according to described user account, described assigned operation instruction and described information to be verified, and whether checking allows described first terminal to carry out described assigned operation comprises:
When described server is according to described user account and described assigned operation instruction, determine when described Information Authentication to be verified is passed through, carry out described assigned operation; Or,
When described server is according to described user account and described assigned operation instruction, determine when described Information Authentication to be verified is not passed through, do not allow described first terminal to carry out described assigned operation.
When described server is according to described user account and described assigned operation instruction, determine described Information Authentication to be verified by time, do not allow after described first terminal carries out described assigned operation, described method also comprises:
Described server sends authentication failed message to described the second terminal, makes described the second terminal again obtain the information to be verified of user's input.
The third aspect, the disclosure provides a kind of Information Authentication method, and described method comprises:
The graphic code that the second terminal scanning first terminal generates, obtains the assigned operation instruction that the user account of described first terminal use, described first terminal sign and described first terminal receive;
Show the information input interface of described user account based on described assigned operation instruction;
Obtain the information to be verified of user's input;
To server, send checking request, whether described information to be verified, described user account, described first terminal sign and described assigned operation instruction are carried in described checking request, make described server authentication allow described first terminal to carry out described assigned operation.
Described method also comprises:
When described the second terminal receives the authentication failed message of described server transmission, show described information input interface;
Again obtain the information to be verified of user's input.
Fourth aspect, the disclosure provides a kind of Information Authentication method, and described method comprises:
First terminal receives assigned operation instruction, and described assigned operation instruction is used to indicate described first terminal and carries out assigned operation, and described assigned operation need to carry out Information Authentication;
Described first terminal sends checking request to described server, user account and the described assigned operation instruction of described first terminal carried in described checking request, make described server determine the second terminal according to described user account, to described the second terminal, send information request to be verified, and when getting the information to be verified of described the second terminal transmission, whether checking allows described first terminal to carry out described assigned operation, and described the second terminal is in the logging status based on described user account and the terminal different from described first terminal.
The 5th aspect, the disclosure provides a kind of Information Authentication method, and described method comprises:
Server receives the checking request that first terminal sends, and the user account of described first terminal and the assigned operation instruction that described first terminal receives are carried in described checking request;
Described server, according to described user account, is determined the second terminal, and described the second terminal is in the logging status based on described user account and the terminal different from described first terminal;
Described server sends information request to be verified to described the second terminal, described information request to be verified is carried described user account and described assigned operation instruction, make described the second terminal show information input interface, and obtain the information to be verified of user's input, return to described server;
When described server receives the information to be verified of described the second terminal transmission, according to described user account, described assigned operation instruction and described information to be verified, whether checking allows described first terminal to carry out described assigned operation.
According to described user account, described assigned operation instruction and described information to be verified, whether checking allows described first terminal to carry out described assigned operation comprises:
When described server is according to described user account and described assigned operation instruction, determine when described Information Authentication to be verified is passed through, carry out described assigned operation; Or,
When described server is according to described user account and described assigned operation instruction, determine when described Information Authentication to be verified is not passed through, do not allow described first terminal to carry out described assigned operation.
When described server is according to described user account and described assigned operation instruction, determine described Information Authentication to be verified by time, do not allow after described first terminal carries out described assigned operation, described method also comprises:
Described server sends authentication failed message to described the second terminal, makes described the second terminal again obtain the information to be verified of user's input.
The 6th aspect, the disclosure provides a kind of Information Authentication device, and described device comprises:
Command reception module, for receiving assigned operation instruction, described assigned operation instruction is used to indicate local terminal and carries out assigned operation, and described assigned operation need to carry out Information Authentication;
Graphic code generation module, be used for according to described assigned operation instruction, generate graphic code, described graphic code at least carries the user account that described local terminal is used, described local terminal sign and described assigned operation instruction, make the second terminal by the described graphic code of scanning, show information input interface, and obtain the information to be verified of user input, to server, send checking request, described information to be verified is carried in described checking request, described user account, described local terminal sign and described assigned operation instruction, make described server authentication whether allow described local terminal to carry out described assigned operation.
Described command reception module comprises:
The first receiving element, for receiving logging request, described logging request is used to indicate described local terminal and logins; Or,
The second receiving element, receives payment request for described local terminal, and described payment request is carried the numbering of order, and is used to indicate described local terminal described order is paid the bill; Or,
The 3rd receiving element, shows request for described local terminal receiving encryption key, and described enciphered message shows that request carries enciphered message sign, and is used to indicate described local terminal and shows described enciphered message.
The 7th aspect, the disclosure provides a kind of Information Authentication device, and described device comprises:
Checking request receiving module, the checking request sending for receiving the second terminal, the assigned operation instruction that user account, described first terminal sign and described first terminal that graphic code that described the second terminal scanning first terminal generates obtains receive is carried in described checking request, and the information to be verified of the user input that gets of described the second terminal, described assigned operation instruction is used to indicate described first terminal and carries out assigned operation, and described assigned operation need to carry out Information Authentication;
Whether authentication module, for according to described user account, described assigned operation instruction and described information to be verified, verify and allow described first terminal to carry out described assigned operation.
Described authentication module comprises:
The first authentication unit, for when according to described user account and described assigned operation instruction, determines when described Information Authentication to be verified is passed through, and carries out described assigned operation; Or,
The second authentication unit, for when according to described user account and described assigned operation instruction, determines when described Information Authentication to be verified is not passed through, and does not allow described first terminal to carry out described assigned operation.
Described device also comprises:
Failed message sending module, for sending authentication failed message to described the second terminal, makes described the second terminal again obtain the information to be verified of user's input.
Eight aspect, the disclosure provides a kind of Information Authentication device, and described device comprises:
Graphic code scan module, the graphic code generating for scanning first terminal, obtains the assigned operation instruction that the user account of described first terminal use, described first terminal sign and described first terminal receive;
Interface display module, for showing the information input interface of described user account based on described assigned operation instruction;
Acquisition of information module to be verified, for obtaining the information to be verified of user's input;
Checking request sending module, for send checking request to server, whether described information to be verified, described user account, described first terminal sign and described assigned operation instruction are carried in described checking request, make described server authentication allow described first terminal to carry out described assigned operation.
Described device also comprises:
Authentication failed module, when receiving the authentication failed message that described server sends when described the second terminal, shows described information input interface;
Again acquisition module, for again obtaining the information to be verified of user's input.
The 9th aspect, the disclosure provides a kind of Information Authentication device, and described device comprises:
Command reception module, for receiving assigned operation instruction, described assigned operation instruction is used to indicate local terminal and carries out assigned operation, and described assigned operation need to carry out Information Authentication;
Checking request sending module, for send checking request to described server, user account and the described assigned operation instruction of described local terminal carried in described checking request, make described server determine the second terminal according to described user account, to described the second terminal, send information request to be verified, and when getting the information to be verified of described the second terminal transmission, whether checking allows described local terminal to carry out described assigned operation, and described the second terminal is in the logging status based on described user account and the terminal different from described local terminal.
The tenth aspect, the disclosure provides a kind of Information Authentication device, and described device comprises:
Checking request receiving module, receives the checking request that first terminal sends, and the user account of described first terminal and the assigned operation instruction that described first terminal receives are carried in described checking request;
The second terminal deciding module, for according to described user account, determines the second terminal, and described the second terminal is in the logging status based on described user account and the terminal different from described first terminal;
Information request sending module to be verified, for sending information request to be verified to described the second terminal, described information request to be verified is carried described user account and described assigned operation instruction, make described the second terminal show information input interface, and obtain the information to be verified of user's input, return to local terminal;
Authentication module, for when receiving the information to be verified of described the second terminal transmission, according to described user account, described assigned operation instruction and described information to be verified, whether checking allows described first terminal to carry out described assigned operation.
Described authentication module comprises:
The first authentication unit, for when according to described user account and described assigned operation instruction, determines when described Information Authentication to be verified is passed through, and carries out described assigned operation; Or,
The second authentication unit, for when according to described user account and described assigned operation instruction, determines when described Information Authentication to be verified is not passed through, and does not allow described first terminal to carry out described assigned operation.
Described device also comprises:
Failed message sending module, for sending authentication failed message to described the second terminal, makes described the second terminal again obtain the information to be verified of user's input.
Beneficial effects more of the present disclosure can comprise:
The method and apparatus that the embodiment of the present invention provides, by the Information Inputting Process to be verified first terminal being received after assigned operation instruction, transfer in the second terminal, can in this second terminal, input the required information to be verified of this first terminal, owing to comparing with this first terminal, the process that this second terminal is inputted information to be verified is easier, therefore, simplified Information Authentication process, saved the time of inputting information to be verified, thereby improved the efficiency of Information Authentication, and because the display screen of this second terminal is significantly less than this first terminal, be difficult for causing information leakage, improved fail safe.
Should be understood that, it is only exemplary that above general description and details are hereinafter described, and can not limit the disclosure.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the disclosure, below the accompanying drawing of required use during embodiment is described is briefly described, apparently, accompanying drawing in the following describes is only embodiment more of the present disclosure, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.Accompanying drawing described herein is used to provide further understanding of the disclosure, forms the application's a part, does not form restriction of the present disclosure.In the accompanying drawings:
Fig. 1 is the exemplary process diagram of Information Authentication method;
Fig. 2 is the exemplary process diagram of Information Authentication method;
Fig. 3 is the exemplary process diagram of Information Authentication method;
Fig. 4 a is the exemplary process diagram of Information Authentication method;
Fig. 4 b is first terminal schematic diagram;
Fig. 4 c is that graphic code generates schematic diagram;
Fig. 4 d is that information input interface shows schematic diagram;
Fig. 5 is the exemplary process diagram of Information Authentication method;
Fig. 6 is the exemplary process diagram of Information Authentication method;
Fig. 7 is the exemplary process diagram of Information Authentication method;
Fig. 8 is the example arrangement schematic diagram of Information Authentication device;
Fig. 9 is the example arrangement schematic diagram of Information Authentication device.
Figure 10 is the example arrangement schematic diagram of Information Authentication device;
Figure 11 is the example arrangement schematic diagram of Information Authentication device;
Figure 12 is the example arrangement schematic diagram of Information Authentication device;
Figure 13 is a kind of terminal equipment structural representation that the embodiment of the present invention provides;
Figure 14 is a kind of server architecture schematic diagram that the embodiment of the present invention provides.
By above-mentioned accompanying drawing, the embodiment that the disclosure is clear and definite has been shown, will there is more detailed description hereinafter.These accompanying drawings and text description are not in order to limit the scope of disclosure design by any mode, but by reference to specific embodiment for those skilled in the art illustrate concept of the present disclosure.
Embodiment
For making object of the present disclosure, technical scheme and advantage clearer, below in conjunction with execution mode and accompanying drawing, the disclosure is described in further details.At this, exemplary embodiment of the present disclosure and explanation thereof are used for explaining the disclosure, but not as to restriction of the present disclosure.
Disclosure embodiment provides a kind of Information Authentication method and apparatus, below in conjunction with accompanying drawing, the disclosure is elaborated.
In one embodiment, Fig. 1 is the exemplary process diagram of Information Authentication method, and referring to Fig. 1, described method comprises:
In step 101, receive assigned operation instruction, this assigned operation instruction is used to indicate this first terminal and carries out assigned operation, and this assigned operation need to carry out Information Authentication, and the method for the present embodiment is for first terminal;
In step 102, according to this assigned operation instruction, generate graphic code, this graphic code at least carries user account, this first terminal sign and this assigned operation instruction that this first terminal is used, make the second terminal by this graphic code of scanning, show information input interface, and obtain the information to be verified of user input, to server, send checking request, whether this information to be verified, this user account, this first terminal sign and this assigned operation instruction are carried in this checking request, make this server authentication allow this first terminal to carry out this assigned operation.
The display screen that the present embodiment is applied to this first terminal is obviously greater than the display screen of this second terminal, or this second terminal is than under the scenes such as the easier input character of this first terminal.If this first terminal is intelligent television, this second terminal is mobile phone.
The method that disclosure embodiment provides, by the Information Inputting Process to be verified first terminal being received after assigned operation instruction, transfer in the second terminal, can in this second terminal, input the required information to be verified of this first terminal, owing to comparing with this first terminal, the process that this second terminal is inputted information to be verified is easier, therefore, simplified Information Authentication process, saved the time of inputting information to be verified, thereby improved the efficiency of Information Authentication, and because the display screen of this second terminal is significantly less than this first terminal, be difficult for causing information leakage, improved fail safe.
First terminal receives assigned operation instruction and comprises:
This first terminal receives logging request, and this logging request is used to indicate this first terminal and logins; Or,
This first terminal receives payment request, and this payment request is carried the numbering of order, and is used to indicate this first terminal this order is paid the bill; Or,
This first terminal receiving encryption key shows request, and this enciphered message shows that request carries enciphered message sign, and is used to indicate this first terminal and shows this enciphered message.
Above-mentioned all optional technical schemes, can adopt any combination to form optional embodiment of the present invention, and this is no longer going to repeat them.
In one embodiment, Fig. 2 is the exemplary process diagram of Information Authentication method, and referring to Fig. 2, described method comprises:
In step 201, receive the checking request that the second terminal sends, the assigned operation instruction that the user account that the graphic code that this second terminal scanning first terminal generation is carried in this checking request obtains, this first terminal sign and this first terminal receive, and the information to be verified of the user input that gets of this second terminal, this assigned operation instruction is used to indicate this first terminal and carries out assigned operation, this assigned operation need to carry out Information Authentication, and the present embodiment is applied in server;
In step 202, according to this user account, this assigned operation instruction and this information to be verified, whether checking allows this first terminal to carry out this assigned operation.
The method that disclosure embodiment provides, by the Information Inputting Process to be verified first terminal being received after assigned operation instruction, transfer in the second terminal, can in this second terminal, input the required information to be verified of this first terminal, owing to comparing with this first terminal, the process that this second terminal is inputted information to be verified is easier, therefore, simplified Information Authentication process, saved the time of inputting information to be verified, thereby improved the efficiency of Information Authentication, and because the display screen of this second terminal is significantly less than this first terminal, be difficult for causing information leakage, improved fail safe.
This server is according to this user account, this assigned operation instruction and this information to be verified, and whether checking allows this first terminal to carry out this assigned operation comprises:
When this server is according to this user account and this assigned operation instruction, determine when this Information Authentication to be verified is passed through, carry out this assigned operation; Or,
When this server is according to this user account and this assigned operation instruction, determine when this Information Authentication to be verified is not passed through, do not allow this first terminal to carry out this assigned operation.
When this server is according to this user account and this assigned operation instruction, determine this Information Authentication to be verified by time, do not allow after this first terminal carries out this assigned operation, the method also comprises:
This server sends authentication failed message to this second terminal, makes this second terminal again obtain the information to be verified of user's input.
Above-mentioned all optional technical schemes, can adopt any combination to form optional embodiment of the present invention, and this is no longer going to repeat them.
In one embodiment, Fig. 3 is the exemplary process diagram of Information Authentication method, and referring to Fig. 3, described method comprises:
In step 301, the graphic code that scanning first terminal generates, obtains the user account of this first terminal use, the assigned operation instruction that this first terminal identifies and this first terminal receives, and the present embodiment is applied in the second terminal;
In step 302, show the information input interface of this user account based on this assigned operation instruction;
In step 303, obtain the information to be verified of user's input;
In step 304, to server, send checking request, whether this information to be verified, this user account, this first terminal sign and this assigned operation instruction are carried in this checking request, make this server authentication allow this first terminal to carry out this assigned operation.
The method that disclosure embodiment provides, by the Information Inputting Process to be verified first terminal being received after assigned operation instruction, transfer in the second terminal, can in this second terminal, input the required information to be verified of this first terminal, owing to comparing with this first terminal, the process that this second terminal is inputted information to be verified is easier, therefore, simplified Information Authentication process, saved the time of inputting information to be verified, thereby improved the efficiency of Information Authentication, and because the display screen of this second terminal is significantly less than this first terminal, be difficult for causing information leakage, improved fail safe.
The method also comprises:
When this second terminal receives the authentication failed message of this server transmission, show this information input interface;
Again obtain the information to be verified of user's input.
Above-mentioned all optional technical schemes, can adopt any combination to form optional embodiment of the present invention, and this is no longer going to repeat them.
In one embodiment, Fig. 4 a is the exemplary process diagram of Information Authentication method, and the interaction agent of the present embodiment is first terminal, the second terminal and server, and referring to Fig. 4 a, described method comprises:
In step 401, first terminal receives assigned operation instruction, and this assigned operation instruction is used to indicate this first terminal and carries out assigned operation, and this assigned operation need to carry out Information Authentication;
This first terminal of the present embodiment can be difficult for the terminal of input character for the large-screen terminals such as intelligent television or intelligent air condition etc., the present embodiment does not limit this first terminal.
Wherein, this assigned operation instruction is used to indicate this first terminal and carries out assigned operation, can trigger or automatically be triggered by this first terminal by user, as can clicking login option, user triggers logging request, or this first terminal does not trigger any operation user being detected in default duration, while having triggered afterwards arbitrary operation, automatically trigger this logging request, the present embodiment does not limit this.
It should be noted that, this assigned operation instruction is not to indicate this first terminal directly to carry out the instruction of this assigned operation, but need to carry out the instruction of Information Authentication, that is to say, when this first terminal receives this assigned operation instruction, can not directly carry out this assigned operation, but need to input information to be verified, by server, this information to be verified is carried out to Information Authentication, when server authentication is passed through, could on this first terminal, carry out this assigned operation.As, when this first terminal receives user's logging request, can not directly login, but the password that needs user to input account could successfully be logined.
In the present embodiment, according to the difference of this assigned operation instruction, this step 401 can comprise following any one:
(1) this first terminal receives logging request, and this logging request is used to indicate this first terminal and logins;
In the present embodiment, on the webpage of user's current accessed, provide login option, when this first terminal detects user to the clicking operation of login option, enter login interface, now, need to obtain user account and the password of user input, to login.
(2) this first terminal receives payment request, and this payment request is carried numbering or the transaction journal number of order, and is used to indicate this first terminal this order is paid the bill;
In the present embodiment, in this order, can provide Payment Options, when this first terminal detects user to the clicking operation of these Payment Options, enter payment interface, now, need to obtain the payment cipher of user's input so that this order is paid the bill.
As shown in Figure 4 b, take this first terminal as intelligent television be example, when this first terminal detects user, use a teleswitch while having clicked " payment " button, determine that this first terminal receives payment request, this payment request is used to indicate this first terminal current order is paid the bill.
(3) this first terminal receiving encryption key shows request, and this enciphered message shows that request carries enciphered message sign, and is used to indicate this first terminal and shows this enciphered message.
In the present embodiment, the information of having encrypted can be in cloud dish, stored, when this first terminal detects user to the open operation of enciphered message, the password of user's input need to be obtained, to show this enciphered message.
It should be noted that, the assigned operation instruction in the present embodiment is not limited to above-mentioned three kinds of listing, and can also wait other instructions for start request, and the present embodiment does not limit this.
In step 402, this first terminal, according to this assigned operation instruction, generates graphic code, and this graphic code at least carries user account, this first terminal sign and this assigned operation instruction that this first terminal is used;
Wherein, this graphic code can be bar code, Quick Response Code etc., and this first terminal sign can be for the terminal number of this first terminal etc.The present embodiment does not all limit this.
In the present embodiment, this graphic code carries user account, this first terminal sign and this assigned operation instruction that this first terminal is used, so that follow-up this server carries out Information Authentication according to this user account and this assigned operation instruction, and determine this first terminal according to this first terminal sign, to carry out this assigned operation on this first terminal.
Example based on Fig. 4 b, this first terminal, when receiving this payment request, generates graphic code, as shown in Fig. 4 c.
In step 403, the graphic code that this first terminal of the second terminal scanning generates, obtains the user account of this first terminal use, the assigned operation instruction that this first terminal identifies and this first terminal receives;
Wherein, this second terminal can and be easy to the terminal of input character for the small screen terminals such as mobile phone or panel computers, and the present embodiment does not limit this second terminal.
In the present embodiment, the graphic code generating by this first terminal of this second terminal scanning, the assigned operation instruction that this first terminal can be received is transferred in this second terminal, to input information to be verified in this second terminal, be convenient to follow-up this server and carry out Information Authentication, easy and simple to handle, safe.
In step 404, this second terminal shows the information input interface of this user account based on this assigned operation instruction;
For different assigned operation instructions, this information input interface is also different, and this step 404 can adopt following any mode:
(1) this assigned operation instruction is logging request, and, in step 404, this second terminal shows login interface, and this login interface at least comprises user account input field and login password input field;
(2) this assigned operation instruction is payment request, and, in step 404, this second terminal shows payment interface, and this payment interface at least comprises payment cipher input field;
Example based on Fig. 4 b and Fig. 4 c, this second terminal shows payment interface, this payment interface is as shown in Fig. 4 d.
(3) this assigned operation instruction is that enciphered message shows request, in step 404, and this second terminal display password inputting interface, this interface for password input at least comprises Password Input hurdle.
In addition, this information input interface can also comprise the title of this user account, this first terminal sign or this assigned operation instruction etc., and the present embodiment does not limit the particular content of this information input interface.
In step 405, this second terminal is obtained the information to be verified of user's input;
In the present embodiment, this information to be verified can be the information of the types such as character, fingerprint, sound, and different according to the type of the required information to be verified of this assigned operation instruction, this step 405 can comprise:
(1) this second terminal is obtained the character that user inputs in the input field of this information input interface, and using the character of this input as information to be verified; Or,
(2) this second terminal is obtained user at the finger print information of this information input interface input, and using this finger print information as information to be verified; Or,
(3) this second terminal is obtained user at the acoustic information of this information input interface typing, and using the acoustic information of this typing as information to be verified etc.
Certainly, the present embodiment does not limit the input mode of the type of this information to be verified and this information to be verified.
For example, this information to be verified can be password code, this second terminal shows the random password card coordinate generating of this server on this information input interface, make the user can be according to this password card coordinate, in password card, find the password code that this password card coordinate is corresponding, and input this password code at this information input interface.
In step 406, this second terminal to server sends checking request, and this information to be verified, this user account, this first terminal sign and this assigned operation instruction are carried in this checking request;
In the present embodiment, this server is for verifying this information to be verified, to determine whether allowing this first terminal to carry out this assigned operation.Wherein, this server can be any server in the website of this first terminal current accessed or the associated server cluster of software, can be the functional module in the website of this first terminal current accessed or the associated server of software, the present embodiment limit this yet.
In step 407, when this server receives this checking request, according to this user account and this assigned operation instruction, judge whether this information to be verified is verified, and if so, performs step 408, if not, performs step 409;
In the present embodiment, this user account is corresponding to different assigned operation instructions, different encrypted messages may be set, therefore, this server is when the encrypted message of this user account of storage, can store respectively the encrypted message of the assigned operation instruction of this user account based on different, as payment cipher of the login password of this this user account of server stores and this user account etc.
When this server receives this checking request, inquire about this server stores, the encrypted message of this user account based on this assigned operation instruction, and this information to be verified and this encrypted message are contrasted, when this information to be verified is mated with this encrypted message, be verified, when this server determines that this information to be verified is not mated with this encrypted message, determine the information errors to be verified of input, checking is not passed through.
According to the difference of this information type to be verified, the process that this information to be verified is contrasted from this encrypted message is also different, when information as to be verified in this and this encrypted message are character, can identify and contrast by word, when this information to be verified and this encrypted message are acoustic information, can contrast etc. by speech recognition, not repeat them here.
In step 408, this server is carried out this assigned operation, finishes;
In the present embodiment, when this server determines that this Information Authentication to be verified is passed through, allow this first terminal to carry out this assigned operation, now, this server can be carried out this assigned operation.
Wherein, according to the difference of this assigned operation instruction, the step that this server is carried out this assigned operation can adopt following any mode:
(1) this assigned operation instruction is logging request, and this first terminal of this server is set in the logging status based on this user account;
(2) this assigned operation instruction is payment request, and this server is paid the bill to this order;
(3) this assigned operation instruction is that enciphered message shows request, and this server shows this enciphered message on this first terminal.
In step 409, this server does not allow this first terminal to carry out this assigned operation;
In step 410, this server sends authentication failed message to this second terminal, makes this second terminal again obtain the information to be verified of user's input.
In the present embodiment, this server can send authentication failed message to this second terminal, notify this second terminal checking not pass through, make this second terminal when receiving this authentication failed message, show this information input interface, again to obtain the information to be verified of user's input, or this server can also, when the number of times of determining authentication failed reaches predetermined threshold value, directly be closed the authority that this first terminal is carried out this assigned operation.
The method that disclosure embodiment provides, by the Information Inputting Process to be verified first terminal being received after assigned operation instruction, transfer in the second terminal, can in this second terminal, input the required information to be verified of this first terminal, owing to comparing with this first terminal, the process that this second terminal is inputted information to be verified is easier, therefore, simplified Information Authentication process, saved the time of inputting information to be verified, thereby improved the efficiency of Information Authentication, and because the display screen of this second terminal is significantly less than this first terminal, be difficult for causing information leakage, improved fail safe.
In one embodiment, Fig. 5 is the exemplary process diagram of Information Authentication method, and referring to Fig. 5, the method comprises:
In step 501, receive assigned operation instruction, this assigned operation instruction is used to indicate this first terminal and carries out assigned operation, and this assigned operation need to carry out Information Authentication, and the present embodiment is applied in first terminal;
In step 502, to this server, send checking request, user account and this assigned operation instruction of this first terminal carried in this checking request, make this server determine the second terminal according to this user account, to this second terminal, send information request to be verified, and when getting the information to be verified of this second terminal transmission, whether checking allows this first terminal to carry out this assigned operation, and this second terminal is in the logging status based on this user account and the terminal different from this first terminal.
The method that disclosure embodiment provides, by the Information Inputting Process to be verified first terminal being received after assigned operation instruction, transfer in the second terminal, can in this second terminal, input the required information to be verified of this first terminal, owing to comparing with this first terminal, the process that this second terminal is inputted information to be verified is easier, therefore, simplified Information Authentication process, saved the time of inputting information to be verified, thereby improved the efficiency of Information Authentication, and because the display screen of this second terminal is significantly less than this first terminal, be difficult for causing information leakage, improved fail safe.
In one embodiment, Fig. 6 is the exemplary process diagram of Information Authentication method, and referring to Fig. 6, the method comprises:
In step 601, receive the checking request that first terminal sends, the user account of this first terminal and the assigned operation instruction that this first terminal receives are carried in this checking request, and the present embodiment is applied in server;
In step 602, according to this user account, determine the second terminal, this second terminal is in the logging status based on this user account and the terminal different from this first terminal;
In step 603, to this second terminal, send information request to be verified, this information request to be verified is carried this user account and this assigned operation instruction, makes this second terminal show information input interface, and obtain the information to be verified of user's input, return to this server;
In step 604, when receiving the information to be verified of this second terminal transmission, according to this user account, this assigned operation instruction and this information to be verified, whether checking allows this first terminal to carry out this assigned operation.
The method that disclosure embodiment provides, by the Information Inputting Process to be verified first terminal being received after assigned operation instruction, transfer in the second terminal, can in this second terminal, input the required information to be verified of this first terminal, owing to comparing with this first terminal, the process that this second terminal is inputted information to be verified is easier, therefore, simplified Information Authentication process, saved the time of inputting information to be verified, thereby improved the efficiency of Information Authentication, and because the display screen of this second terminal is significantly less than this first terminal, be difficult for causing information leakage, improved fail safe.
According to this user account, this assigned operation instruction and this information to be verified, whether checking allows this first terminal to carry out this assigned operation comprises:
When this server is according to this user account and this assigned operation instruction, determine when this Information Authentication to be verified is passed through, carry out this assigned operation; Or,
When this server is according to this user account and this assigned operation instruction, determine when this Information Authentication to be verified is not passed through, do not allow this first terminal to carry out this assigned operation.
When this server is according to this user account and this assigned operation instruction, determine this Information Authentication to be verified by time, do not allow after this first terminal carries out this assigned operation, the method also comprises:
This server sends authentication failed message to this second terminal, makes this second terminal again obtain the information to be verified of user's input.
Above-mentioned all optional technical schemes, can adopt any combination to form optional embodiment of the present invention, and this is no longer going to repeat them.
In one embodiment, Fig. 7 is the exemplary process diagram of Information Authentication method, and the interaction agent of the present embodiment is first terminal, the second terminal and server, and referring to Fig. 7, the method comprises:
In step 701, first terminal receives assigned operation instruction, and this assigned operation instruction is used to indicate this first terminal and carries out assigned operation, and this assigned operation need to carry out Information Authentication;
This step 701 and this step 401 in like manner, do not repeat them here.
In step 702, this first terminal sends checking request to this server, and user account and this assigned operation instruction of this first terminal carried in this checking request;
In the present embodiment, this server is for verifying this information to be verified, to determine whether allowing this first terminal to carry out this assigned operation.Wherein, this server can be any server in the website of this first terminal current accessed or the associated server cluster of software, can be the functional module in the website of this first terminal current accessed or the associated server of software, the present embodiment limit this yet.
In step 703, when this server receives this checking request, according to this user account, determine the second terminal, this second terminal is in the logging status based on this user account and the terminal different from this first terminal;
In the present embodiment, in the process of logining in each terminal user account, this server is preserved terminal iidentification corresponding to this user account of login, that is to say the terminal iidentification of preserving in the logging status based on this user account.Accordingly, this step 703 comprises: when this server receives this checking request, judging whether this server is preserved in the logging status based on this user account and from this first terminal identifies different terminal iidentifications, if, terminal by this under the logging status based on this user account and the terminal iidentification different from this first terminal is defined as this second terminal, if not, finish.
When this server determine exist a plurality of during in the logging status based on this user account and the terminal different from this first terminal, the terminal of display screen minimum in the plurality of terminal can be defined as to this second terminal, or, the terminal that full keyboard is provided is defined as to this second terminal.Wherein, this server can, according to information such as the model of each terminal in the plurality of terminal, terminal numbers, be determined the display screen size of each terminal, and then according to the display screen size of each terminal, determine the terminal of display screen minimum in the plurality of terminal.
Further, this server can also all be defined as the plurality of terminal this second terminal, and follow-up this server sends information request to be verified to each terminal in the plurality of terminal, by user, therefrom selects second terminal to input this information to be verified.The present embodiment does not limit this second terminal of How to choose.
In step 704, this server sends information request to be verified to this second terminal, and this information request to be verified is carried this user account and this assigned operation instruction;
In the present embodiment, this server is after determining this second terminal, to this second terminal, send this information request to be verified, to ask this second terminal to obtain this information to be verified, realized the Information Inputting Process to be verified that this first terminal is received after assigned operation instruction and transferred to the object in this second terminal.
In step 705, when this second terminal receives this information request to be verified, show the information input interface of this user account based on this assigned operation instruction;
In the present embodiment, when this second terminal receives this information request to be verified, obtain this user account and this assigned operation instruction, and according to this user account and this assigned operation instruction, show this information input interface.Wherein, the information input interface in this information input interface and step 404 in like manner, does not repeat them here.
In step 706, this second terminal is obtained the information to be verified of user's input;
This second terminal is obtained the process of this information to be verified and this step 405 in like manner, does not repeat them here.
In step 707, this second terminal sends to this server by this information to be verified;
In step 708, when this server receives this information to be verified, according to this user account and this assigned operation instruction, judge whether this information to be verified is verified, and if so, performs step 709, if not, performs step 710;
This step 708 and this step 407 in like manner, do not repeat them here.
In step 709, this server is carried out this assigned operation, finishes;
This step 709 and this step 408 in like manner, do not repeat them here.
In step 710, this server does not allow this first terminal to carry out this assigned operation;
In step 711, this server sends authentication failed message to this second terminal, makes this second terminal again obtain the information to be verified of user's input.
The method that disclosure embodiment provides, by the Information Inputting Process to be verified first terminal being received after assigned operation instruction, transfer in the second terminal, can in this second terminal, input the required information to be verified of this first terminal, owing to comparing with this first terminal, the process that this second terminal is inputted information to be verified is easier, therefore, simplified Information Authentication process, saved the time of inputting information to be verified, thereby improved the efficiency of Information Authentication, and because the display screen of this second terminal is significantly less than this first terminal, be difficult for causing information leakage, improved fail safe.
Fig. 8 is the example arrangement schematic diagram of Information Authentication device, and referring to Fig. 8, this device comprises:
Command reception module 801, for receiving assigned operation instruction, this assigned operation instruction is used to indicate local terminal and carries out assigned operation, and this assigned operation need to carry out Information Authentication;
Graphic code generation module 802 and instruction receiver modules 801 connect, be used for according to this assigned operation instruction, generate graphic code, this graphic code at least carries the user account that this local terminal is used, this local terminal sign and this assigned operation instruction, make the second terminal by this graphic code of scanning, show information input interface, and obtain the information to be verified of user input, to server, send checking request, this information to be verified is carried in this checking request, this user account, this local terminal sign and this assigned operation instruction, make this server authentication whether allow this local terminal to carry out this assigned operation.
This command reception module 801 comprises:
The first receiving element, for receiving logging request, this logging request is used to indicate this local terminal and logins; Or,
The second receiving element, receives payment request for this local terminal, and this payment request is carried the numbering of order, and is used to indicate this local terminal this order is paid the bill; Or,
The 3rd receiving element, shows request for this local terminal receiving encryption key, and this enciphered message shows that request carries enciphered message sign, and is used to indicate this local terminal and shows this enciphered message.
The device that disclosure embodiment provides, by the Information Inputting Process to be verified first terminal being received after assigned operation instruction, transfer in the second terminal, can in this second terminal, input the required information to be verified of this first terminal, owing to comparing with this first terminal, the process that this second terminal is inputted information to be verified is easier, therefore, simplified Information Authentication process, saved the time of inputting information to be verified, thereby improved the efficiency of Information Authentication, and because the display screen of this second terminal is significantly less than this first terminal, be difficult for causing information leakage, improved fail safe.
Fig. 9 is the example arrangement schematic diagram of Information Authentication device, and referring to Fig. 9, this device comprises:
Checking request receiving module 901, the checking request sending for receiving the second terminal, the assigned operation instruction that the user account that the graphic code that this second terminal scanning first terminal generation is carried in this checking request obtains, this first terminal sign and this first terminal receive, and the information to be verified of the user input that gets of this second terminal, this assigned operation instruction is used to indicate this first terminal and carries out assigned operation, and this assigned operation need to carry out Information Authentication;
Whether authentication module 902 is connected with checking request receiving module 901, for according to this user account, this assigned operation instruction and this information to be verified, verify and allow this first terminal to carry out this assigned operation.
This authentication module 902 comprises:
The first authentication unit, for when according to this user account and this assigned operation instruction, determines when this Information Authentication to be verified is passed through, and carries out this assigned operation; Or,
The second authentication unit, for when according to this user account and this assigned operation instruction, determines when this Information Authentication to be verified is not passed through, and does not allow this first terminal to carry out this assigned operation.
This device also comprises:
Failed message sending module, for sending authentication failed message to this second terminal, makes this second terminal again obtain the information to be verified of user's input.
The device that disclosure embodiment provides, by the Information Inputting Process to be verified first terminal being received after assigned operation instruction, transfer in the second terminal, can in this second terminal, input the required information to be verified of this first terminal, owing to comparing with this first terminal, the process that this second terminal is inputted information to be verified is easier, therefore, simplified Information Authentication process, saved the time of inputting information to be verified, thereby improved the efficiency of Information Authentication, and because the display screen of this second terminal is significantly less than this first terminal, be difficult for causing information leakage, improved fail safe.
Figure 10 is the example arrangement schematic diagram of Information Authentication device, and referring to Figure 10, this device comprises:
Graphic code scan module 1001, the graphic code generating for scanning first terminal, obtains the user account of this first terminal use, the assigned operation instruction that this first terminal identifies and this first terminal receives;
Interface display module 1002 is connected with graphic code scan module 1001, for showing the information input interface of this user account based on this assigned operation instruction;
Acquisition of information module 1003 to be verified is connected with interface display module 1002, for obtaining the information to be verified of user's input;
Checking request sending module 1004 is connected with acquisition of information module 1003 to be verified, for send checking request to server, whether this information to be verified, this user account, this first terminal sign and this assigned operation instruction are carried in this checking request, make this server authentication allow this first terminal to carry out this assigned operation.
This device also comprises:
Authentication failed module, when receiving the authentication failed message that this server sends when this second terminal, shows this information input interface;
Again acquisition module, for again obtaining the information to be verified of user's input.
The device that disclosure embodiment provides, by the Information Inputting Process to be verified first terminal being received after assigned operation instruction, transfer in the second terminal, can in this second terminal, input the required information to be verified of this first terminal, owing to comparing with this first terminal, the process that this second terminal is inputted information to be verified is easier, therefore, simplified Information Authentication process, saved the time of inputting information to be verified, thereby improved the efficiency of Information Authentication, and because the display screen of this second terminal is significantly less than this first terminal, be difficult for causing information leakage, improved fail safe.
Figure 11 is the example arrangement schematic diagram of Information Authentication device, and referring to Figure 11, this device comprises:
Command reception module 1101, for receiving assigned operation instruction, this assigned operation instruction is used to indicate local terminal and carries out assigned operation, and this assigned operation need to carry out Information Authentication;
Checking request sending module 1102 and instruction receiver modules 1101 connect, for send checking request to this server, user account and this assigned operation instruction of this local terminal carried in this checking request, make this server determine the second terminal according to this user account, to this second terminal, send information request to be verified, and when getting the information to be verified of this second terminal transmission, whether checking allows this local terminal to carry out this assigned operation, and this second terminal is in the logging status based on this user account and the terminal different from this local terminal.
The device that disclosure embodiment provides, by the Information Inputting Process to be verified first terminal being received after assigned operation instruction, transfer in the second terminal, can in this second terminal, input the required information to be verified of this first terminal, owing to comparing with this first terminal, the process that this second terminal is inputted information to be verified is easier, therefore, simplified Information Authentication process, saved the time of inputting information to be verified, thereby improved the efficiency of Information Authentication, and because the display screen of this second terminal is significantly less than this first terminal, be difficult for causing information leakage, improved fail safe.
Figure 12 is the example arrangement schematic diagram of Information Authentication device, and referring to Figure 12, this device comprises:
Checking request receiving module 1201, receives the checking request that first terminal sends, and the user account of this first terminal and the assigned operation instruction that this first terminal receives are carried in this checking request;
The second terminal deciding module 1202 is connected with checking request receiving module 1201, for according to this user account, determines the second terminal, and this second terminal is in the logging status based on this user account and the terminal different from this first terminal;
Information request sending module 1203 to be verified is connected with the second terminal deciding module 1202, for sending information request to be verified to this second terminal, this information request to be verified is carried this user account and this assigned operation instruction, make this second terminal show information input interface, and obtain the information to be verified of user's input, return to local terminal;
Authentication module 1204 is connected with information request sending module 1203 to be verified, for when receiving the information to be verified of this second terminal transmission, according to this user account, this assigned operation instruction and this information to be verified, whether checking allows this first terminal to carry out this assigned operation.
This authentication module 1204 comprises:
The first authentication unit, for when according to this user account and this assigned operation instruction, determines when this Information Authentication to be verified is passed through, and carries out this assigned operation; Or,
The second authentication unit, for when according to this user account and this assigned operation instruction, determines when this Information Authentication to be verified is not passed through, and does not allow this first terminal to carry out this assigned operation.
This device also comprises:
Failed message sending module, for sending authentication failed message to this second terminal, makes this second terminal again obtain the information to be verified of user's input.
The device that disclosure embodiment provides, by the Information Inputting Process to be verified first terminal being received after assigned operation instruction, transfer in the second terminal, can in this second terminal, input the required information to be verified of this first terminal, owing to comparing with this first terminal, the process that this second terminal is inputted information to be verified is easier, therefore, simplified Information Authentication process, saved the time of inputting information to be verified, thereby improved the efficiency of Information Authentication, and because the display screen of this second terminal is significantly less than this first terminal, be difficult for causing information leakage, improved fail safe.
It should be noted that: the Information Authentication device that above-described embodiment provides is when Information Authentication, only the division with above-mentioned each functional module is illustrated, in practical application, can above-mentioned functions be distributed and by different functional modules, completed as required, the internal structure that is about to terminal equipment is divided into different functional modules, to complete all or part of function described above.In addition, Information Authentication device and Information Authentication embodiment of the method that above-described embodiment provides belong to same design, and its specific implementation process refers to embodiment of the method, repeats no more here.
Figure 13 is a kind of terminal equipment (can be requesting party's terminal or associated terminal) structural representation that the embodiment of the present invention provides.Referring to Figure 13, the structure that the step that in above-described embodiment, the second terminal is carried out can be based on this terminal equipment.Preferred:
Terminal equipment 1300 can comprise communication unit 110, include the memory 120 of one or more computer-readable recording mediums, input unit 130, display unit 140, transducer 150, voicefrequency circuit 160, WIFI(Wireless Fidelity, Wireless Fidelity) module 170, include the parts such as the above processor 180 of processing core of or and power supply 190.It will be understood by those skilled in the art that the terminal equipment structure shown in figure does not form the restriction to terminal equipment, can comprise the parts more more or less than diagram, or combine some parts, or different parts are arranged.Wherein:
Communication unit 110 can be used for receiving and sending messages or communication process in, the reception of signal and transmission, this communication unit 110 can be RF(Radio Frequency, radio frequency) circuit, router, modulator-demodulator, etc. network communication equipment.Especially, when communication unit 110 is RF circuit, after the downlink information of base station is received, transfer to one or above processor 180 processing; In addition, by relating to up data, send to base station.Conventionally, RF circuit as communication unit includes but not limited to antenna, at least one amplifier, tuner, one or more oscillator, subscriber identity module (SIM) card, transceiver, coupler, LNA(Low Noise Amplifier, low noise amplifier), duplexer etc.In addition, communication unit 110 can also be by radio communication and network and other devices communicatings.Described radio communication can be used arbitrary communication standard or agreement, include but not limited to GSM(Global System of Mobile communication, global system for mobile communications), GPRS(General Packet Radio Service, general packet radio service), CDMA(Code Division Multiple Access, code division multiple access), WCDMA(Wideband Code Division Multiple Access, Wideband Code Division Multiple Access (WCDMA)), LTE(Long Term Evolution, Long Term Evolution), Email, SMS(Short Messaging Service, Short Message Service) etc.Memory 120 can be used for storing software program and module, and processor 180 is stored in software program and the module of memory 120 by operation, thereby carries out various function application and data processing.Memory 120 can mainly comprise storage program district and storage data field, wherein, and the application program (such as sound-playing function, image player function etc.) that storage program district can storage operation system, at least one function is required etc.; The data (such as voice data, phone directory etc.) that create according to the use of terminal equipment 1300 etc. can be stored in storage data field.In addition, memory 120 can comprise high-speed random access memory, can also comprise nonvolatile memory, for example at least one disk memory, flush memory device or other volatile solid-state parts.Correspondingly, memory 120 can also comprise Memory Controller, so that the access of processor 180 and 130 pairs of memories 120 of input unit to be provided.
Input unit 130 can be used for receiving numeral or the character information of input, and generation arranges with user and function is controlled relevant keyboard, mouse, action bars, optics or the input of trace ball signal.Preferably, input unit 130 can comprise touch-sensitive surperficial 131 and other input equipments 132.Touch-sensitive surperficial 131, also referred to as touch display screen or Trackpad, can collect user or near touch operation (using any applicable object or near the operations of annex on touch-sensitive surperficial 131 or touch-sensitive surperficial 131 such as finger, stylus such as user) thereon, and drive corresponding jockey according to predefined formula.Optionally, touch-sensitive surperficial 131 can comprise touch detecting apparatus and two parts of touch controller.Wherein, touch detecting apparatus detects user's touch orientation, and detects the signal that touch operation is brought, and sends signal to touch controller; Touch controller receives touch information from touch detecting apparatus, and converts it to contact coordinate, then gives processor 180, and the order that energy receiving processor 180 is sent is also carried out.In addition, can adopt the polytypes such as resistance-type, condenser type, infrared ray and surface acoustic wave to realize touch-sensitive surperficial 131.Except touch-sensitive surperficial 131, input unit 130 can also comprise other input equipments 132.Preferably, other input equipments 132 can include but not limited to one or more in physical keyboard, function key (controlling button, switch key etc. such as volume), trace ball, mouse, action bars etc.
Display unit 140 can be used for showing the information inputted by user or the various graphical user interface of the information that offers user and terminal equipment 1300, and these graphical user interface can consist of figure, text, icon, video and its combination in any.Display unit 140 can comprise display floater 141, optionally, can adopt LCD(Liquid Crystal Display, liquid crystal display), OLED(Organic Light-Emitting Diode, Organic Light Emitting Diode) etc. form configure display floater 141.Further, touch-sensitive surperficial 131 can cover display floater 141, when touch-sensitive surperficial 131 detect thereon or near touch operation after, send processor 180 to determine the type of touch event, corresponding vision output is provided according to the type of touch event with preprocessor 180 on display floater 141.Although in Figure 13, touch-sensitive surperficial 131 with display floater 141 be as two independently parts realize input and input function, in certain embodiments, can by touch-sensitive surperficial 131 and display floater 141 integrated and realize input and output function.
Terminal equipment 1300 also can comprise at least one transducer 150, such as optical sensor, motion sensor and other transducers.Optical sensor can comprise ambient light sensor and proximity transducer, wherein, ambient light sensor can regulate according to the light and shade of ambient light the brightness of display floater 141, and proximity transducer can, when terminal equipment 1300 moves in one's ear, cut out display floater 141 and/or backlight.A kind of as motion sensor, Gravity accelerometer can detect the size of the acceleration that (is generally three axles) in all directions, when static, can detect size and the direction of gravity, can be used for identifying application (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, knock) of mobile phone attitude etc.; As for terminal equipment 1300 other transducers such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor also, do not repeat them here.
Voicefrequency circuit 160, loud speaker 161, microphone 162 can provide the audio interface between user and terminal equipment 1300.Voicefrequency circuit 160 can be transferred to loud speaker 161 by the signal of telecommunication after the voice data conversion receiving, and is converted to voice signal exports by loud speaker 161; On the other hand, microphone 162 is converted to the signal of telecommunication by the voice signal of collection, after being received by voicefrequency circuit 160, be converted to voice data, after again voice data output processor 180 being processed, through RF circuit 110, to send to such as another terminal equipment, or export voice data to memory 120 to further process.Voicefrequency circuit 160 also may comprise earphone jack, so that communicating by letter of peripheral hardware earphone and terminal equipment 1300 to be provided.
In order to realize radio communication, on this terminal equipment, can dispose wireless communication unit 170, this wireless communication unit 170 can be WIFI module.WIFI belongs to short range wireless transmission technology, terminal equipment 1300 by wireless communication unit 170 can help that user sends and receive e-mail, browsing page and access streaming video etc., it provides wireless broadband internet access for user.Although there is shown wireless communication unit 170, be understandable that, it does not belong to must forming of terminal equipment 1300, completely can be as required in not changing the essential scope of invention and omit.
Processor 180 is control centres of terminal equipment 1300, utilize the various piece of various interface and the whole mobile phone of connection, by moving or carry out software program and/or the module being stored in memory 120, and call the data that are stored in memory 120, carry out various functions and the deal with data of terminal equipment 1300, thereby mobile phone is carried out to integral monitoring.Optionally, processor 180 can comprise one or more processing cores; Preferably, processor 180 can integrated application processor and modem processor, and wherein, application processor is mainly processed operating system, user interface and application program etc., and modem processor is mainly processed radio communication.Be understandable that, above-mentioned modem processor also can not be integrated in processor 180.
Terminal equipment 1300 also comprises that the power supply 190(powering to all parts is such as battery), preferably, power supply can be connected with processor 180 logics by power-supply management system, thereby realizes the functions such as management charging, electric discharge and power managed by power-supply management system.Power supply 190 can also comprise the random component such as one or more direct current or AC power, recharging system, power failure detection circuit, power supply changeover device or inverter, power supply status indicator.
Although not shown, terminal equipment 1300 can also comprise camera, bluetooth module etc., does not repeat them here.In the present embodiment, terminal equipment also includes memory, and one or more than one program, the above program of one of them or one is stored in memory, and is configured to carry out described one or above program package containing for carrying out the instruction of the method that the embodiment of the present invention provides by one or above processor.
Figure 14 is a kind of server architecture schematic diagram that the embodiment of the present invention provides.This server 1400 can because of configuration or performance is different produces larger difference, can comprise one or more central processing units (central processing units, CPU) 1422(for example, one or more processors) and memory 1432, the storage medium 1430(of one or more storage application programs 1442 or data 1444 one or more mass memory units for example).Wherein, memory 1432 and storage medium 1430 can be of short duration storage or storage lastingly.The program that is stored in storage medium 1430 can comprise one or more modules (diagram does not mark), and each module can comprise a series of command operatings in server.Further, central processing unit 1422 can be set to communicate by letter with storage medium 1430, carries out a series of command operatings in storage medium 1430 on server 1400.
Server 1400 can also comprise one or more power supplys 1426, one or more wired or wireless network interfaces 1450, one or more input/output interfaces 1458, one or more keyboards 1456, and/or, one or more operating systems 1441, Windows ServerTM for example, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc.
Described in above-described embodiment can be based on shown in this Figure 14 by the performed step of server server architecture.
In addition, typically, the terminal equipment described in the disclosure can be various hand-held mobile terminals, such as mobile phone, personal digital assistant (PDA) etc., and therefore protection range of the present disclosure should not be defined as the terminal equipment of certain particular type.
In addition, according to method of the present disclosure, can also be implemented as the computer program of being carried out by CPU.When this computer program is carried out by CPU, carry out the above-mentioned functions limiting in method of the present disclosure.
In addition, said method step and system unit also can utilize controller and realize for storing the computer readable storage devices of the computer program that makes controller realize above-mentioned steps or Elementary Function.
In addition, should be understood that, computer readable storage devices as herein described (for example, memory) can be volatile memory or nonvolatile memory, or can comprise volatile memory and nonvolatile memory.And nonrestrictive, nonvolatile memory can comprise read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM) or flash memory as an example.Volatile memory can comprise random access memory (RAM), and this RAM can serve as External Cache memory.As an example and nonrestrictive, RAM can obtain in a variety of forms, such as synchronous random access memory (DRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate SDRAM (DDR SDRAM), enhancing SDRAM (ESDRAM), synchronization link DRAM (SLDRAM) and direct RambusRAM (DRRAM).The memory device of disclosed aspect is intended to include but not limited to the memory of these and other suitable type.
Those skilled in the art will also understand is that, in conjunction with the described various illustrative logical blocks of disclosure herein, module, circuit and algorithm steps, may be implemented as electronic hardware, computer software or both combinations.For this interchangeability of hardware and software is clearly described, with regard to the function of various exemplary components, square, module, circuit and step, it has been carried out to general description.This function is implemented as software or is implemented as hardware and depends on concrete application and the design constraint that imposes on whole system.Those skilled in the art can realize described function in every way for every kind of concrete application, but this realization determines should not be interpreted as causing departing from the scope of the present disclosure.
In conjunction with the described various illustrative logical blocks of disclosure herein, module and circuit, can utilize the following parts that are designed to carry out function described here to realize or carry out: general processor, digital signal processor (DSP), application-specific integrated circuit (ASIC) (ASIC), field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete nextport hardware component NextPort or any combination of these parts.General processor can be microprocessor, but alternatively, processor can be any conventional processors, controller, microcontroller or state machine.Processor also may be implemented as the combination of computing equipment, and for example, the combination of DSP and microprocessor, multi-microprocessor, one or more microprocessor are in conjunction with DSP core or any other this configuration.
Step in conjunction with the described method of disclosure herein or algorithm can directly be included in the software module of carrying out in hardware, by processor or in the two combination.Software module can reside in the storage medium of RAM memory, flash memory, ROM memory, eprom memory, eeprom memory, register, hard disk, removable dish, CD-ROM or any other form known in the art.Exemplary storage medium is coupled to processor, make processor can be from this storage medium reading information or to this storage medium writing information.In an alternative, described storage medium can be integral to the processor together.Processor and storage medium can reside in ASIC.ASIC can reside in user terminal.In an alternative, processor and storage medium can be used as discrete assembly and reside in user terminal.
In one or more exemplary design, described function can realize in hardware, software, firmware or its combination in any.If realized in software, described function can be transmitted on computer-readable medium or by computer-readable medium as one or more instructions or code storage.Computer-readable medium comprises computer-readable storage medium and communication media, and this communication media comprises and contributes to computer program to be sent to from a position any medium of another position.Storage medium can be can be by any usable medium of universal or special computer access.As an example and nonrestrictive, this computer-readable medium can comprise RAM, ROM, EEPROM, CD-ROM or other optical disc memory apparatus, disk storage device or other magnetic storage apparatus, or can for carry or file layout be instruction or data structure required program code and can be by any other medium of universal or special computer or universal or special processor access.In addition, any connection can suitably be called computer-readable medium.For example, if use coaxial cable, optical fiber cable, twisted-pair feeder, digital subscriber line (DSL) or such as the wireless technology of infrared ray, radio and microwave come from website, server or other remote source send software, above-mentioned coaxial cable, optical fiber cable, twisted-pair feeder, DSL or include the definition at medium such as the wireless technology of infrared first, radio and microwave.As used herein, disk and CD comprise compact disk (CD), laser disk, CD, digital versatile disc (DVD), floppy disk, Blu-ray disc, disk rendering data magnetically conventionally wherein, and cd-rom using laser optics ground rendering data.The combination of foregoing also should be included in the scope of computer-readable medium.
Although disclosed content shows exemplary embodiment of the present disclosure above, it should be noted that under the prerequisite of the scope of the present disclosure that does not deviate from claim restriction, can carry out multiple change and modification.According to the function of the claim to a method of disclosed embodiment described herein, step and/or action, need not carry out with any particular order.In addition, although element of the present disclosure can be with individual formal description or requirement, also it is contemplated that a plurality of, unless be clearly restricted to odd number.
Above-described embodiment; object of the present disclosure, technical scheme and beneficial effect are further described; institute is understood that; the foregoing is only embodiment of the present disclosure; and be not used in and limit protection range of the present disclosure; all within spirit of the present disclosure and principle, any modification of making, be equal to replacement, improvement etc., within all should being included in protection range of the present disclosure.

Claims (22)

1. an Information Authentication method, is characterized in that, described method comprises:
First terminal receives assigned operation instruction, and described assigned operation instruction is used to indicate described first terminal and carries out assigned operation, and described assigned operation need to carry out Information Authentication;
Described first terminal is according to described assigned operation instruction, generate graphic code, described graphic code at least carries the user account that described first terminal is used, described first terminal sign and described assigned operation instruction, make the second terminal by the described graphic code of scanning, show information input interface, and obtain the information to be verified of user input, to server, send checking request, described information to be verified is carried in described checking request, described user account, described first terminal sign and described assigned operation instruction, make described server authentication whether allow described first terminal to carry out described assigned operation.
2. method according to claim 1, is characterized in that, first terminal receives assigned operation instruction and comprises:
Described first terminal receives logging request, and described logging request is used to indicate described first terminal and logins; Or,
Described first terminal receives payment request, and described payment request is carried the numbering of order, and is used to indicate described first terminal described order is paid the bill; Or,
Described first terminal receiving encryption key shows request, and described enciphered message shows that request carries enciphered message sign, and is used to indicate described first terminal and shows described enciphered message.
3. an Information Authentication method, is characterized in that, described method comprises:
Server receives the checking request that the second terminal sends, the assigned operation instruction that user account, described first terminal sign and described first terminal that graphic code that described the second terminal scanning first terminal generates obtains receive is carried in described checking request, and the information to be verified of the user input that gets of described the second terminal, described assigned operation instruction is used to indicate described first terminal and carries out assigned operation, and described assigned operation need to carry out Information Authentication;
Described server is according to described user account, described assigned operation instruction and described information to be verified, and whether checking allows described first terminal to carry out described assigned operation.
4. method according to claim 3, is characterized in that, described server is according to described user account, described assigned operation instruction and described information to be verified, and whether checking allows described first terminal to carry out described assigned operation comprises:
When described server is according to described user account and described assigned operation instruction, determine when described Information Authentication to be verified is passed through, carry out described assigned operation; Or,
When described server is according to described user account and described assigned operation instruction, determine when described Information Authentication to be verified is not passed through, do not allow described first terminal to carry out described assigned operation.
5. method according to claim 4, it is characterized in that, when described server is according to described user account and described assigned operation instruction, determine when described Information Authentication to be verified is not passed through, do not allow after described first terminal carries out described assigned operation, described method also comprises:
Described server sends authentication failed message to described the second terminal, makes described the second terminal again obtain the information to be verified of user's input.
6. an Information Authentication method, is characterized in that, described method comprises:
The graphic code that the second terminal scanning first terminal generates, obtains the assigned operation instruction that the user account of described first terminal use, described first terminal sign and described first terminal receive;
Show the information input interface of described user account based on described assigned operation instruction;
Obtain the information to be verified of user's input;
To server, send checking request, whether described information to be verified, described user account, described first terminal sign and described assigned operation instruction are carried in described checking request, make described server authentication allow described first terminal to carry out described assigned operation.
7. method according to claim 6, is characterized in that, described method also comprises:
When described the second terminal receives the authentication failed message of described server transmission, show described information input interface;
Again obtain the information to be verified of user's input.
8. an Information Authentication method, is characterized in that, described method comprises:
First terminal receives assigned operation instruction, and described assigned operation instruction is used to indicate described first terminal and carries out assigned operation, and described assigned operation need to carry out Information Authentication;
Described first terminal sends checking request to described server, user account and the described assigned operation instruction of described first terminal carried in described checking request, make described server determine the second terminal according to described user account, to described the second terminal, send information request to be verified, and when getting the information to be verified of described the second terminal transmission, whether checking allows described first terminal to carry out described assigned operation, and described the second terminal is in the logging status based on described user account and the terminal different from described first terminal.
9. an Information Authentication method, is characterized in that, described method comprises:
Server receives the checking request that first terminal sends, and the user account of described first terminal and the assigned operation instruction that described first terminal receives are carried in described checking request;
Described server, according to described user account, is determined the second terminal, and described the second terminal is in the logging status based on described user account and the terminal different from described first terminal;
Described server sends information request to be verified to described the second terminal, described information request to be verified is carried described user account and described assigned operation instruction, make described the second terminal show information input interface, and obtain the information to be verified of user's input, return to described server;
When described server receives the information to be verified of described the second terminal transmission, according to described user account, described assigned operation instruction and described information to be verified, whether checking allows described first terminal to carry out described assigned operation.
10. method according to claim 9, is characterized in that, according to described user account, described assigned operation instruction and described information to be verified, whether checking allows described first terminal to carry out described assigned operation comprises:
When described server is according to described user account and described assigned operation instruction, determine when described Information Authentication to be verified is passed through, carry out described assigned operation; Or,
When described server is according to described user account and described assigned operation instruction, determine when described Information Authentication to be verified is not passed through, do not allow described first terminal to carry out described assigned operation.
11. methods according to claim 10, it is characterized in that, when described server is according to described user account and described assigned operation instruction, determine when described Information Authentication to be verified is not passed through, do not allow after described first terminal carries out described assigned operation, described method also comprises:
Described server sends authentication failed message to described the second terminal, makes described the second terminal again obtain the information to be verified of user's input.
12. 1 kinds of Information Authentication devices, is characterized in that, described device comprises:
Command reception module, for receiving assigned operation instruction, described assigned operation instruction is used to indicate local terminal and carries out assigned operation, and described assigned operation need to carry out Information Authentication;
Graphic code generation module, be used for according to described assigned operation instruction, generate graphic code, described graphic code at least carries the user account that described local terminal is used, described local terminal sign and described assigned operation instruction, make the second terminal by the described graphic code of scanning, show information input interface, and obtain the information to be verified of user input, to server, send checking request, described information to be verified is carried in described checking request, described user account, described local terminal sign and described assigned operation instruction, make described server authentication whether allow described local terminal to carry out described assigned operation.
13. devices according to claim 12, is characterized in that, described command reception module comprises:
The first receiving element, for receiving logging request, described logging request is used to indicate described local terminal and logins; Or,
The second receiving element, receives payment request for described local terminal, and described payment request is carried the numbering of order, and is used to indicate described local terminal described order is paid the bill; Or,
The 3rd receiving element, shows request for described local terminal receiving encryption key, and described enciphered message shows that request carries enciphered message sign, and is used to indicate described local terminal and shows described enciphered message.
14. 1 kinds of Information Authentication devices, is characterized in that, described device comprises:
Checking request receiving module, the checking request sending for receiving the second terminal, the assigned operation instruction that user account, described first terminal sign and described first terminal that graphic code that described the second terminal scanning first terminal generates obtains receive is carried in described checking request, and the information to be verified of the user input that gets of described the second terminal, described assigned operation instruction is used to indicate described first terminal and carries out assigned operation, and described assigned operation need to carry out Information Authentication;
Whether authentication module, for according to described user account, described assigned operation instruction and described information to be verified, verify and allow described first terminal to carry out described assigned operation.
15. devices according to claim 14, is characterized in that, described authentication module comprises:
The first authentication unit, for when according to described user account and described assigned operation instruction, determines when described Information Authentication to be verified is passed through, and carries out described assigned operation; Or,
The second authentication unit, for when according to described user account and described assigned operation instruction, determines when described Information Authentication to be verified is not passed through, and does not allow described first terminal to carry out described assigned operation.
16. devices according to claim 15, is characterized in that, described device also comprises:
Failed message sending module, for sending authentication failed message to described the second terminal, makes described the second terminal again obtain the information to be verified of user's input.
17. 1 kinds of Information Authentication devices, is characterized in that, described device comprises:
Graphic code scan module, the graphic code generating for scanning first terminal, obtains the assigned operation instruction that the user account of described first terminal use, described first terminal sign and described first terminal receive;
Interface display module, for showing the information input interface of described user account based on described assigned operation instruction;
Acquisition of information module to be verified, for obtaining the information to be verified of user's input;
Checking request sending module, for send checking request to server, whether described information to be verified, described user account, described first terminal sign and described assigned operation instruction are carried in described checking request, make described server authentication allow described first terminal to carry out described assigned operation.
18. devices according to claim 17, is characterized in that, described device also comprises:
Authentication failed module, when receiving the authentication failed message that described server sends when described the second terminal, shows described information input interface;
Again acquisition module, for again obtaining the information to be verified of user's input.
19. 1 kinds of Information Authentication devices, is characterized in that, described device comprises:
Command reception module, for receiving assigned operation instruction, described assigned operation instruction is used to indicate local terminal and carries out assigned operation, and described assigned operation need to carry out Information Authentication;
Checking request sending module, for send checking request to described server, user account and the described assigned operation instruction of described local terminal carried in described checking request, make described server determine the second terminal according to described user account, to described the second terminal, send information request to be verified, and when getting the information to be verified of described the second terminal transmission, whether checking allows described local terminal to carry out described assigned operation, and described the second terminal is in the logging status based on described user account and the terminal different from described local terminal.
20. 1 kinds of Information Authentication devices, is characterized in that, described device comprises:
Checking request receiving module, receives the checking request that first terminal sends, and the user account of described first terminal and the assigned operation instruction that described first terminal receives are carried in described checking request;
The second terminal deciding module, for according to described user account, determines the second terminal, and described the second terminal is in the logging status based on described user account and the terminal different from described first terminal;
Information request sending module to be verified, for sending information request to be verified to described the second terminal, described information request to be verified is carried described user account and described assigned operation instruction, make described the second terminal show information input interface, and obtain the information to be verified of user's input, return to local terminal;
Authentication module, for when receiving the information to be verified of described the second terminal transmission, according to described user account, described assigned operation instruction and described information to be verified, whether checking allows described first terminal to carry out described assigned operation.
21. devices according to claim 20, is characterized in that, described authentication module comprises:
The first authentication unit, for when according to described user account and described assigned operation instruction, determines when described Information Authentication to be verified is passed through, and carries out described assigned operation; Or,
The second authentication unit, for when according to described user account and described assigned operation instruction, determines when described Information Authentication to be verified is not passed through, and does not allow described first terminal to carry out described assigned operation.
22. devices according to claim 21, is characterized in that, described device also comprises:
Failed message sending module, for sending authentication failed message to described the second terminal, makes described the second terminal again obtain the information to be verified of user's input.
CN201310533351.4A 2013-10-31 2013-10-31 Information verifying method and device Active CN103634294B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310533351.4A CN103634294B (en) 2013-10-31 2013-10-31 Information verifying method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310533351.4A CN103634294B (en) 2013-10-31 2013-10-31 Information verifying method and device

Publications (2)

Publication Number Publication Date
CN103634294A true CN103634294A (en) 2014-03-12
CN103634294B CN103634294B (en) 2017-02-08

Family

ID=50214922

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310533351.4A Active CN103634294B (en) 2013-10-31 2013-10-31 Information verifying method and device

Country Status (1)

Country Link
CN (1) CN103634294B (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104217328A (en) * 2014-08-12 2014-12-17 小米科技有限责任公司 Multi-verification payment method and multi-verification payment device
CN104394230A (en) * 2014-12-08 2015-03-04 网易有道信息技术(北京)有限公司 Method, device and system for presenting information
CN104484114A (en) * 2014-11-24 2015-04-01 腾讯科技(深圳)有限公司 Data transfer method, mobile terminal and data transfer system
CN104639533A (en) * 2014-12-30 2015-05-20 小米科技有限责任公司 Safety control method and device based on terminal
CN104915579A (en) * 2015-05-06 2015-09-16 腾讯科技(深圳)有限公司 Information processing method and device
CN104954126A (en) * 2014-03-26 2015-09-30 腾讯科技(深圳)有限公司 Sensitive operation verification method, device and system
CN104967586A (en) * 2014-05-04 2015-10-07 腾讯科技(深圳)有限公司 User identity authentication method, user identity authentication apparatus and user identity authentication system
CN105867317A (en) * 2015-01-21 2016-08-17 阿里巴巴集团控股有限公司 Method and device for issuing and receiving instruction and intelligent household system
CN105938527A (en) * 2016-06-02 2016-09-14 百度在线网络技术(北京)有限公司 Method and device for account-number verification
CN105989418A (en) * 2015-02-15 2016-10-05 中兴通讯股份有限公司 Internet access service remote reservation method and device
CN106161448A (en) * 2016-07-15 2016-11-23 珠海格力电器股份有限公司 The authority control method of large-sized unit air-conditioning, Apparatus and system
CN106204027A (en) * 2016-07-22 2016-12-07 珠海市魅族科技有限公司 A kind of method of payment and mobile terminal
CN106228364A (en) * 2016-07-15 2016-12-14 珠海市魅族科技有限公司 A kind of information demonstrating method and present device
CN106230702A (en) * 2016-08-29 2016-12-14 北京小米移动软件有限公司 Identity information verification method, Apparatus and system
CN106878018A (en) * 2016-12-30 2017-06-20 腾讯科技(深圳)有限公司 Operation demonstration method and device
CN107451813A (en) * 2016-06-01 2017-12-08 华为终端(东莞)有限公司 Method of payment, payment devices and paying server
CN107734036A (en) * 2017-10-19 2018-02-23 威盛电子股份有限公司 Communication means and the communication system using the method
CN109672941A (en) * 2018-12-29 2019-04-23 深圳Tcl新技术有限公司 Data inputting method, television set and computer readable storage medium
CN110321752A (en) * 2019-06-03 2019-10-11 阿里巴巴集团控股有限公司 The method of calibration and device of off-line graphical code
CN110417784A (en) * 2019-07-30 2019-11-05 腾讯科技(深圳)有限公司 The authorization method and device of access control equipment
CN113777909A (en) * 2021-09-06 2021-12-10 珠海格力电器股份有限公司 Master-slave communication control method, device, storage medium and master-slave communication control system
US11501294B2 (en) 2016-07-18 2022-11-15 Advanced New Technologies Co., Ltd. Method and device for providing and obtaining graphic code information, and terminal

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7043230B1 (en) * 2003-02-20 2006-05-09 Sprint Spectrum L.P. Method and system for multi-network authorization and authentication
CN101523859A (en) * 2006-10-19 2009-09-02 高通股份有限公司 System and method for authenticating remote server access
CN102842081A (en) * 2011-06-23 2012-12-26 上海易悠通信息科技有限公司 Method for generating two-dimensional code and implementing mobile payment by mobile phone
CN103020818A (en) * 2013-01-09 2013-04-03 重庆新亚盟电子科技有限公司 Payment system utilizing dynamic two-dimensional verification codes
CN103248680A (en) * 2013-04-26 2013-08-14 北京小米科技有限责任公司 Method and system for sharing network disk data
CN103297231A (en) * 2012-03-01 2013-09-11 盛大计算机(上海)有限公司 Identity authentication method and system
CN103366269A (en) * 2013-07-05 2013-10-23 李卓桓 Fast payment method, equipment and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7043230B1 (en) * 2003-02-20 2006-05-09 Sprint Spectrum L.P. Method and system for multi-network authorization and authentication
CN101523859A (en) * 2006-10-19 2009-09-02 高通股份有限公司 System and method for authenticating remote server access
CN102842081A (en) * 2011-06-23 2012-12-26 上海易悠通信息科技有限公司 Method for generating two-dimensional code and implementing mobile payment by mobile phone
CN103297231A (en) * 2012-03-01 2013-09-11 盛大计算机(上海)有限公司 Identity authentication method and system
CN103020818A (en) * 2013-01-09 2013-04-03 重庆新亚盟电子科技有限公司 Payment system utilizing dynamic two-dimensional verification codes
CN103248680A (en) * 2013-04-26 2013-08-14 北京小米科技有限责任公司 Method and system for sharing network disk data
CN103366269A (en) * 2013-07-05 2013-10-23 李卓桓 Fast payment method, equipment and system

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104954126A (en) * 2014-03-26 2015-09-30 腾讯科技(深圳)有限公司 Sensitive operation verification method, device and system
CN104967586A (en) * 2014-05-04 2015-10-07 腾讯科技(深圳)有限公司 User identity authentication method, user identity authentication apparatus and user identity authentication system
CN104217328A (en) * 2014-08-12 2014-12-17 小米科技有限责任公司 Multi-verification payment method and multi-verification payment device
CN104484114A (en) * 2014-11-24 2015-04-01 腾讯科技(深圳)有限公司 Data transfer method, mobile terminal and data transfer system
CN104394230A (en) * 2014-12-08 2015-03-04 网易有道信息技术(北京)有限公司 Method, device and system for presenting information
CN104394230B (en) * 2014-12-08 2018-03-23 网易有道信息技术(北京)有限公司 The method, apparatus and system that a kind of information is presented
CN104639533A (en) * 2014-12-30 2015-05-20 小米科技有限责任公司 Safety control method and device based on terminal
CN104639533B (en) * 2014-12-30 2018-09-04 小米科技有限责任公司 Method of controlling security based on terminal and device
CN105867317A (en) * 2015-01-21 2016-08-17 阿里巴巴集团控股有限公司 Method and device for issuing and receiving instruction and intelligent household system
CN105867317B (en) * 2015-01-21 2019-08-20 阿里巴巴集团控股有限公司 A kind of instruction issuing, method of reseptance, device and smart home system
CN105989418A (en) * 2015-02-15 2016-10-05 中兴通讯股份有限公司 Internet access service remote reservation method and device
CN104915579A (en) * 2015-05-06 2015-09-16 腾讯科技(深圳)有限公司 Information processing method and device
CN107451813A (en) * 2016-06-01 2017-12-08 华为终端(东莞)有限公司 Method of payment, payment devices and paying server
CN105938527A (en) * 2016-06-02 2016-09-14 百度在线网络技术(北京)有限公司 Method and device for account-number verification
CN105938527B (en) * 2016-06-02 2019-04-12 百度在线网络技术(北京)有限公司 A kind of method and apparatus of account verifying
CN106228364A (en) * 2016-07-15 2016-12-14 珠海市魅族科技有限公司 A kind of information demonstrating method and present device
CN106161448A (en) * 2016-07-15 2016-11-23 珠海格力电器股份有限公司 The authority control method of large-sized unit air-conditioning, Apparatus and system
US11501294B2 (en) 2016-07-18 2022-11-15 Advanced New Technologies Co., Ltd. Method and device for providing and obtaining graphic code information, and terminal
CN106204027A (en) * 2016-07-22 2016-12-07 珠海市魅族科技有限公司 A kind of method of payment and mobile terminal
CN106230702B (en) * 2016-08-29 2019-05-10 北京小米移动软件有限公司 Identity information verification method, apparatus and system
CN106230702A (en) * 2016-08-29 2016-12-14 北京小米移动软件有限公司 Identity information verification method, Apparatus and system
CN106878018A (en) * 2016-12-30 2017-06-20 腾讯科技(深圳)有限公司 Operation demonstration method and device
CN107734036A (en) * 2017-10-19 2018-02-23 威盛电子股份有限公司 Communication means and the communication system using the method
CN109672941A (en) * 2018-12-29 2019-04-23 深圳Tcl新技术有限公司 Data inputting method, television set and computer readable storage medium
CN109672941B (en) * 2018-12-29 2022-03-11 深圳Tcl新技术有限公司 Information input method, television and computer readable storage medium
CN110321752A (en) * 2019-06-03 2019-10-11 阿里巴巴集团控股有限公司 The method of calibration and device of off-line graphical code
CN110321752B (en) * 2019-06-03 2023-07-14 创新先进技术有限公司 Method and device for checking offline graphic codes
CN110417784A (en) * 2019-07-30 2019-11-05 腾讯科技(深圳)有限公司 The authorization method and device of access control equipment
CN110417784B (en) * 2019-07-30 2021-10-12 腾讯科技(深圳)有限公司 Authorization method and device of access control equipment
CN113777909A (en) * 2021-09-06 2021-12-10 珠海格力电器股份有限公司 Master-slave communication control method, device, storage medium and master-slave communication control system

Also Published As

Publication number Publication date
CN103634294B (en) 2017-02-08

Similar Documents

Publication Publication Date Title
CN103634294A (en) Information verifying method and device
CN103634109A (en) Operation right authentication method and device
US9703971B2 (en) Sensitive operation verification method, terminal device, server, and verification system
CN103729765B (en) A kind of authentication control method, terminal, server, terminal device and system
CN103716793B (en) Access-in point information sharing method and device
RU2628488C2 (en) Method, terminal device and server for nfc data transfer
CN103475667A (en) Method, device and system for controlling access router
CN103701926A (en) Method, device and system for obtaining fault reason information
CN104852885A (en) Method, device and system for verifying verification code
CN104796385A (en) Terminal binding method, device and system
CN105704123A (en) Business processing method, device and system
CN104468464A (en) Authentication method, device and system
CN103929796A (en) Access point sharing method and device
CN104518875A (en) Identity authentication method, account acquisition method and mobile terminal
CN103607713A (en) Method, apparatus, device and system for network access
CN105363201A (en) Prompt information display method and prompt information display device
CN105491067A (en) Key-based business security verification method and device
CN104519197A (en) User login method, user login device and terminal devices
CN104735657B (en) Security terminal verification method, wireless access point binding method, apparatus and system
CN103687063B (en) A kind of method of interconnection network, device and terminal equipment
CN103678605A (en) Information transmission method and device and terminal device
CN103516726A (en) Verification method, device, client side, server and equipment based on terminal behavior
CN103763112A (en) User identity protection method and apparatus
CN104901805A (en) Identity authentication method and device and system
CN104618223A (en) Information recommendation management method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant