CN106060027A - Methods, devices, equipment and systems for verification based on verification codes - Google Patents

Methods, devices, equipment and systems for verification based on verification codes Download PDF

Info

Publication number
CN106060027A
CN106060027A CN201610354003.4A CN201610354003A CN106060027A CN 106060027 A CN106060027 A CN 106060027A CN 201610354003 A CN201610354003 A CN 201610354003A CN 106060027 A CN106060027 A CN 106060027A
Authority
CN
China
Prior art keywords
code
verified
identifying code
target
target verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610354003.4A
Other languages
Chinese (zh)
Other versions
CN106060027B (en
Inventor
高毅
王洪强
龙海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610354003.4A priority Critical patent/CN106060027B/en
Publication of CN106060027A publication Critical patent/CN106060027A/en
Application granted granted Critical
Publication of CN106060027B publication Critical patent/CN106060027B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key

Abstract

The disclosure is about methods, devices, equipment and systems for verification based on verification codes. One of the methods comprises obtaining a target verification code and a target hardware operation instruction corresponding to the target verification code, reminding a user of the target verification code and the target hardware operation instruction, obtaining a to-be-verified verification code and a to-be-verified hardware operation instruction which are input by the user, sending verification request information, which comprises the to-be-verified verification code and the to-be-verified hardware operation instruction and used in verification by a server according to the to-be-verified verification code and the to-be-verified hardware operation instruction, to the server, and receiving a verification result returned by the server. The methods of embodiments of the disclosure can improve safety.

Description

Method, device, equipment and the system verified is carried out based on identifying code
Technical field
It relates to internet arena, particularly relate to a kind of carry out verifying based on identifying code method, device, equipment and System.
Background technology
Identifying code be a kind of user of differentiation be the public full auto-programs of robot program or people, it is mutual by the overwhelming majority The Internet services, such as forum, microblogging etc., is used for evading security risk;Mainly evade service security aspect risk, as malice cracks Password, brush ticket, forum pour water.
In correlation technique, along with being widely used of identifying code, its safety issue is more and more prominent.Identifying code, user Account and password be the most all Word message, some bogusware on equipment can steal these information, the most directly carries out The operation not authorized by user, safety is relatively low.
Summary of the invention
For overcoming problem present in correlation technique, the disclosure provides a kind of method, dress carrying out verifying based on identifying code Put, equipment and system.
First aspect according to disclosure embodiment, it is provided that a kind of method carrying out based on identifying code verifying, including: obtain Target verification code and the target hardware operational order corresponding with this target verification code;Prompt the user with this target verification code and This target hardware operational order, and obtain identifying code to be verified and the hardware operation to be verified instruction of user's input;To service Device sends checking request message, and this checking request message includes that this identifying code to be verified and this hardware operation to be verified instruct, This checking request message is verified according to this identifying code to be verified and the instruction of this hardware operation to be verified for this server; Receive the result that this server returns.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect: prompt the user with mesh by terminal Mark identifying code and target hardware operational order, obtain identifying code to be verified and the hardware operation to be verified instruction of user's input, And the checking request message including that this identifying code to be verified and this hardware operation to be verified instruct, this checking is sent to server Request message is verified according to this identifying code to be verified and the instruction of this hardware operation to be verified for this server so that use Family also needs to input hardware operational order when input validation code, and rogue program cannot be simulated people and be completed hardware operation instruction Input, determine the result with correlation technique according only to identifying code compared with, it is to avoid Malware is by stealing target verification Directly carry out the operation not authorized by user after the information such as code, improve safety.
Further, this acquisition target verification code and the target hardware operational order corresponding with this target verification code, bag Include: receiving the identifying code response message that this server sends, this identifying code response message includes this target verification code and this mesh Mark hardware operation instruction.
Further, the method also includes: send identifying code request message, this identifying code request message bag to this server Include the instruction information for the input type indicating terminal to support that this target hardware operational order is corresponding.
Further, this acquisition target verification code and the target hardware operational order corresponding with this target verification code, bag Include: receiving the identifying code response message that server sends, this identifying code response message includes this target verification code;According to this target Identifying code, generates this target hardware operational order.
Further, the target hardware operational order that this target verification code is corresponding, including: the M bit code of this target verification code The corresponding target hardware operational order of the code value of each in value;Wherein, M is more than 0 and less than or equal to this target verification The integer of the figure place of code.
Further, this target hardware operational order is pressure rating.
Second aspect according to disclosure embodiment, it is provided that a kind of method carrying out based on identifying code verifying, including: receive The checking request message that terminal sends, this checking request message includes identifying code to be verified that user inputs and hardware to be verified Operational order;Refer to according to this checking request message, target verification code and the target hardware corresponding with this target verification code operation Order, determines the result;This result is returned to this terminal.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect: tested according to target by server It is to be verified that what the card code target hardware operational order corresponding with this target verification code and terminal sent includes that user inputs The checking request message of identifying code and hardware operation to be verified instruction, determines the result so that user is when input validation code Also need to input hardware operational order, and rogue program cannot be simulated people and be completed the input of hardware operation instruction, with correlation technique In determine that the result is compared according only to identifying code, it is to avoid Malware is by directly entering after stealing the information such as target verification code The operation that row is not authorized by user, improves safety.
Further, the method also includes: receive the identifying code request message that this terminal sends, this identifying code request message Including the instruction information for indicating input type that terminal supports that this target hardware operational order is corresponding;Please according to this identifying code Seeking message, send identifying code response message to this terminal, this identifying code response message includes this target verification code and this target Hardware operation instructs.
Further, the target hardware operational order that this target verification code is corresponding, including: the M bit code of this target verification code The corresponding target hardware operational order of the code value of each in value;Wherein, M is more than 0 and less than or equal to this target verification The integer of the figure place of code.
Further, this is according to this checking request message, target verification code and the target corresponding with this target verification code Hardware operation instructs, and determines the result, including: judge whether this identifying code to be verified mates with this target verification code;If This identifying code to be verified mates with this target verification code, then judge that the instruction of this hardware operation to be verified operates with this target hardware Whether instruction mates;If the instruction of this hardware operation to be verified is mated with this target hardware operational order, it is determined that this result For being proved to be successful.
Further, this judges whether this identifying code to be verified mates with this target verification code, including: to be verified to this Identifying code in the code value of each perform the first judgement operation, determine the judged result of this each code value;If this is every The judged result of the code value of is coupling, it is determined that this identifying code to be verified mates with this target verification code;
Wherein, this first judges that operation includes: judge code value and this target verification of the N position of this identifying code to be verified The code value of the N position of code is the most identical;If the code value of the N position of this identifying code to be verified and the N position of this target verification code Code value identical, it is determined that the judged result of the code value of the N position of this identifying code to be verified for coupling.
Further, this judges whether the instruction of this hardware operation to be verified mates with this target hardware operational order, including: The hardware operation to be verified instruction that each the code value in identifying code to be verified to this is corresponding performs the second judgement operation, really The judged result of the hardware operation to be verified instruction that fixed this each code value is corresponding;If corresponding to be tested of this each code value The judged result of card hardware operation instruction is coupling, it is determined that the instruction of this hardware operation to be verified refers to the operation of this target hardware Order coupling;
Wherein, this second judges that operation includes: judge corresponding to be verified of the code value of the N position of this identifying code to be verified It is the most identical that hardware operation instructs the target hardware operational order corresponding with the code value of the N position of this target verification code;If this is treated The code value of hardware operation to be verified instruction corresponding to the code value of N position of the identifying code of checking and the N position of this target verification code Corresponding target hardware operational order is identical, it is determined that the code value of the N position of this identifying code to be verified corresponding to be verified firmly The judged result of part operational order is coupling.
Further, this checking request message include this identifying code to be verified that user inputs N position code value and The to be verified hardware operation instruction corresponding with the code value of the N position of this identifying code to be verified;
This refers to according to this checking request message, target verification code and the target hardware corresponding with this target verification code operation Order, determines the result, including: judge the N position of code value and this target verification code of the N position of this identifying code to be verified Code value is the most identical, it is thus achieved that the first judged result of the code value of this N position;This N is more than 0 and less than or equal to this target verification The integer of the figure place of code;Judge hardware operation to be verified instruction that the code value of the N position of this identifying code to be verified is corresponding with should The target verification hardware operation instruction that the code value of the N position of target verification code is corresponding is the most identical, it is thus achieved that the code value of this N position Second judged result;If this first judged result and this second judged result are identical, and this N is equal to this target verification code Figure place, it is determined that this result is for being proved to be successful;If this first judged result and this second judged result are identical, and should N less than the figure place of this target verification code, then exports the first information to this user, and this first information is used for pointing out this use Family inputs the hardware operation to be verified instruction that the N+1 position of this identifying code to be verified is corresponding with the code value of this N+1 position;If should First judged result or this second judged result are for differing, it is determined that this result is authentication failed.
The third aspect according to disclosure embodiment, it is provided that a kind of device carrying out based on identifying code verifying, including: first Acquisition module, is configured to obtain target verification code and the target hardware operational order corresponding with this target verification code;Second Acquisition module, is configured to prompt the user with this target verification code and this target hardware operational order, and obtains user's input Identifying code to be verified and hardware operation to be verified instruction;First sending module, being configured to send checking to server please Seeking message, this checking request message includes that this identifying code to be verified and this hardware operation to be verified instruct, and this checking request disappears Breath is verified according to this identifying code to be verified and the instruction of this hardware operation to be verified for this server;Receiver module, quilt It is configured to receive the result that this server returns.
Further, this first acquisition module includes: first obtains submodule;This first acquisition submodule, is configured to Receiving the identifying code response message that this server sends, this identifying code response message includes that this target verification code and this target are hard Part operational order.
Further, this device also includes: the second sending module;This second sending module, is configured to this server Sending identifying code request message, this identifying code request message includes that this target hardware operational order is corresponding for indicating terminal to support The instruction information of input type.
Further, this first acquisition module includes: second obtains submodule;This second acquisition submodule, is configured to:
Receiving the identifying code response message that server sends, this identifying code response message includes this target verification code;According to This target verification code, generates this target hardware operational order.
Further, the target hardware operational order that this target verification code is corresponding, including: the M bit code of this target verification code The corresponding target hardware operational order of the code value of each in value;Wherein, M is more than 0 and less than or equal to this target verification The integer of the figure place of code.
Further, this target hardware operational order is pressure rating.
What each possible embodiment of the above-mentioned third aspect and the above-mentioned third aspect was provided is carried out based on identifying code The device of checking, its beneficial effect may refer to what each possible embodiment of above-mentioned first aspect and first aspect was brought Beneficial effect, does not repeats them here.
Fourth aspect according to disclosure embodiment, it is provided that a kind of device carrying out based on identifying code verifying, including: first Receiver module, is configured to receive the checking request message that terminal sends, and it is to be tested that this checking request message includes that user inputs The identifying code of card and hardware operation to be verified instruction;Determine module, be configured to ask message, target verification code according to this checking And the target hardware operational order corresponding with this target verification code, determine the result;First sending module, be configured to by This result returns to this terminal.
Further, this device also includes: the second receiver module and the second sending module;This second receiver module, is joined Being set to receive the identifying code request message that this terminal sends, this identifying code request message includes for indicating terminal to support this target The instruction information of the input type that hardware operation instruction is corresponding;This second sending module, is configured to ask according to this identifying code Message, sends identifying code response message to this terminal, and this identifying code response message includes that this target verification code and this target are hard Part operational order.
Further, the target hardware operational order that this target verification code is corresponding, including: the M bit code of this target verification code The corresponding target hardware operational order of the code value of each in value;Wherein, M is more than 0 and less than or equal to this target verification The integer of the figure place of code.
Further, this determines that module includes: first determines module;This first determines module, is configured to: judge that this is treated Whether the identifying code of checking mates with this target verification code;If this identifying code to be verified mates with this target verification code, then sentence Whether disconnected this hardware operation to be verified instruction mates with this target hardware operational order;If this hardware operation to be verified instructs and is somebody's turn to do Target hardware operational order mates, it is determined that this result is for being proved to be successful.
Further, this first determines that module includes that first determines submodule;This first determines submodule, is configured to:
The code value of each in the identifying code to be verified to this performs the first judgement operation, determines this each code value Judged result;If the judged result of this each code value is coupling, it is determined that this identifying code to be verified and this target Identifying code mates;
Wherein, this first judges that operation includes: judge code value and this target verification of the N position of this identifying code to be verified The code value of the N position of code is the most identical;If the code value of the N position of this identifying code to be verified and the N position of this target verification code Code value identical, it is determined that the judged result of the code value of the N position of this identifying code to be verified for coupling.
Further, this first determines that module includes that second determines submodule;This second determines submodule, is configured to:
The hardware operation to be verified instruction that each the code value in identifying code to be verified to this is corresponding performs second and sentences Disconnected operation, determines the judged result of the hardware operation to be verified instruction that this each code value is corresponding;If this each code value The judged result of corresponding hardware operation to be verified instruction is coupling, it is determined that the instruction of this hardware operation to be verified and this target Hardware operation instructions match;
Wherein, this second judges that operation includes: judge corresponding to be verified of the code value of the N position of this identifying code to be verified It is the most identical that hardware operation instructs the target hardware operational order corresponding with the code value of the N position of this target verification code;If this is treated The code value of hardware operation to be verified instruction corresponding to the code value of N position of the identifying code of checking and the N position of this target verification code Corresponding target hardware operational order is identical, it is determined that the code value of the N position of this identifying code to be verified corresponding to be verified firmly The judged result of part operational order is coupling.
Further, this checking request message include this identifying code to be verified that user inputs N position code value and The to be verified hardware operation instruction corresponding with the code value of the N position of this identifying code to be verified;This determines that module includes: second is true Cover half block;
This second determines module, is configured to: judge code value and this target verification of the N position of this identifying code to be verified The code value of the N position of code is the most identical, it is thus achieved that the first judged result of the code value of this N position;This N be more than 0 and less than or etc. Integer in the figure place of this target verification code;Judge the hardware to be verified that the code value of the N position of this identifying code to be verified is corresponding The target verification hardware operation instruction that operational order is corresponding with the code value of the N position of this target verification code is the most identical, it is thus achieved that should Second judged result of the code value of N position;If this first judged result and this second judged result are identical, and this N is equal to The figure place of this target verification code, it is determined that this result is for being proved to be successful;If this first judged result and this second judgement knot Fruit is identical, and this N is less than the figure place of this target verification code, then export the first information to this user, this first prompting To be verified corresponding with the code value of this N+1 position for the N+1 position of pointing out this user to input this identifying code to be verified of information Hardware operation instructs;If this first judged result or this second judged result are for differing, it is determined that this result is checking Failure.
What each possible embodiment of above-mentioned fourth aspect and above-mentioned fourth aspect was provided is carried out based on identifying code The device of checking, its beneficial effect may refer to what each possible embodiment of above-mentioned second aspect and second aspect was brought Beneficial effect, does not repeats them here.
The 5th aspect according to disclosure embodiment, it is provided that a kind of system carrying out based on identifying code verifying, including: the 3rd Aspect or each possible device involved by implementation of the third aspect, and fourth aspect or each of fourth aspect may realizations Device involved by mode.
The 6th aspect according to disclosure embodiment, it is provided that a kind of terminal, including: processor, transmitter, receptor and quilt It is configured to store the memorizer of processor executable;
Wherein, this processor is configured to: obtain target verification code and the target hardware corresponding with this target verification code Operational order;Prompt the user with this target verification code and this target hardware operational order, and obtain the to be verified of user's input Identifying code and hardware operation to be verified instruction;This transmitter is configured to: send checking request message, this checking to server Request message includes that this identifying code to be verified and this hardware operation to be verified instruct, and this checking request message is for this server Verify according to this identifying code to be verified and the instruction of this hardware operation to be verified;This receptor is configured to: receive this clothes The result that business device returns.
The 7th aspect according to disclosure embodiment, it is provided that a kind of server, including: processor, transmitter, receptor and It is configured to store the memorizer of processor executable;Wherein, this receptor is configured to: receive the checking that terminal sends Request message, this checking request message includes identifying code to be verified and the hardware operation to be verified instruction that user inputs;At this Reason device is configured to: according to this checking request message, target verification code and the target hardware corresponding with this target verification code behaviour Instruct, determine the result;This transmitter, is configured to return to this result this terminal.
It should be appreciated that it is only exemplary and explanatory, not that above general description and details hereinafter describe The disclosure can be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the enforcement of the present invention Example, and for explaining the principle of the present invention together with description.
Fig. 1 is according to a kind of method flow diagram carrying out based on identifying code verifying shown in an exemplary embodiment;
Fig. 2 is according to a kind of method flow diagram carrying out based on identifying code verifying shown in another exemplary embodiment;
Fig. 3 is according to a kind of method flow diagram carrying out based on identifying code verifying shown in another exemplary embodiment;
Fig. 4 is according to a kind of method flow diagram carrying out based on identifying code verifying shown in another exemplary embodiment;
Fig. 5 is according to a kind of block diagram carrying out the device verified based on identifying code shown in an exemplary embodiment;
Fig. 6 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment;
Fig. 7 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment;
Fig. 8 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment;
Fig. 9 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment;
Figure 10 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment;
Figure 11 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment;
Figure 12 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment;
Figure 13 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment;
Figure 14 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment;
Figure 15 is the block diagram of the entity according to the terminal shown in an exemplary embodiment;
Figure 16 is the block diagram according to the terminal 800 shown in another exemplary embodiment;
Figure 17 is the block diagram according to the server 1900 shown in another exemplary embodiment.
By above-mentioned accompanying drawing, it has been shown that the embodiment that the disclosure is clear and definite, hereinafter will be described in more detail.These accompanying drawings With word, the scope being not intended to be limited disclosure design by any mode is described, but by with reference to specific embodiment being Those skilled in the art illustrate the concept of the disclosure.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Explained below relates to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the present invention.On the contrary, they are only with the most appended The example of the apparatus and method that some aspects that described in detail in claims, the present invention are consistent.
Fig. 1 is according to a kind of method flow diagram carrying out based on identifying code verifying shown in an exemplary embodiment, the party Method can apply to need in any terminal that input validation code carries out verifying, such as mobile phone, panel computer etc., as it is shown in figure 1, Comprise the following steps:
In a step 101, target verification code and the target hardware operational order corresponding with this target verification code are obtained.
In this step, this target verification code is for indicating the identifying code needing user to input, and this target verification code can be Some unordered words, such as " FXCB ", " 0536 " etc..This target hardware operational order for instruction need that user inputs hard Part operational order, this target hardware operational order includes: pressure rating, rock number of times, trace information etc..Wherein, terminal obtains The mode of target verification code can be that terminal obtains from server.The mode that terminal obtains target hardware operational order is the most permissible For: terminal obtains from server or is generated by terminal oneself.
In a step 102, prompt the user with this target verification code and this target hardware operational order, and it is defeated to obtain user The identifying code to be verified entered and hardware operation to be verified instruction.
In this step, concrete, can by eject by the way of prompt window to this user point out this target verification code and This target hardware operational order;Or, it is also possible to by send by the way of short message to this user point out this target verification code and This target hardware operational order.Here, to this user point out the purpose of this target verification code and target hardware operational order be for User is allowed to input identifying code to be verified and hardware operation to be verified instruction according to prompting.In this step, user is inputted The order of identifying code to be verified and hardware operation to be verified instruction does not limit.Optionally, user can first input and treat The identifying code of checking inputs hardware operation to be verified instruction again, or user can also first input hardware operation to be verified and instruct Input identifying code to be verified, or user can also input hardware operation to be verified while inputting identifying code to be verified and refer to Order.
In step 103, sending checking request message to server, this checking request message includes this checking to be verified Code and this hardware operation to be verified instruct.
In this step, this checking request message is used for this server according to this identifying code to be verified and this hardware to be verified Operational order is verified so that this server obtain the result time, not only need according to user input to be verified Identifying code, in addition it is also necessary to according to the hardware operation to be verified instruction of user's input.It should be noted that according to identifying code to be verified The step carrying out verifying with hardware operation to be verified instruction can also be carried out by terminal.
At step 104, the result that this server returns is received.
In this step, it is specifically as follows and receives the authentication response information that this server returns, this identifying code response message bag Include this result.Wherein, this result is specifically as follows and is proved to be successful or authentication failed.Optionally, when the result it is During authentication failed, this authentication response information can also include the failure cause of authentication failed, and this failure cause can be such as to test Card code input error and/or hardware operation instruction input error.
The present embodiment carry out, based on identifying code, the method verified, prompt the user with target verification code and target by terminal Hardware operation instructs, and obtains identifying code to be verified and the hardware operation to be verified instruction of user's input, and sends to server Including the checking request message of this identifying code to be verified and the instruction of this hardware operation to be verified, this checking request message is used for should Server is verified according to this identifying code to be verified and the instruction of this hardware operation to be verified so that user is at input validation code Time also need to input hardware operational order, and rogue program cannot be simulated people and be completed the input of hardware operation instruction, to relevant skill According only to identifying code, art determines that the result is compared, it is to avoid Malware is by stealing after the information such as target verification code directly Carry out the operation not authorized by user, improve safety.
Fig. 2 is according to a kind of method flow diagram carrying out based on identifying code verifying shown in another exemplary embodiment, should Method can apply to use identifying code to carry out in any server verified, as in figure 2 it is shown, comprise the following steps:
In step 201, receiving the checking request message that terminal sends, this checking request message includes that what user inputted treats The identifying code of checking and hardware operation to be verified instruction.
In this step, interacting message can be carried out by cordless communication network between server and terminal, this radio communication Network can be such as global system for mobile communications (GSM, Global System for Mobile Communication) net Network, Long Term Evolution (LTE, Long Term Evolution) network, bluetooth (Bluetooth) network, Wireless Fidelity (WiFi, Wireless Fidelity) network etc..
In step 202., according to this checking request message, target verification code and the target corresponding with this target verification code Hardware operation instructs, and determines the result.
In this step, server, when determining the result, not only needs the identifying code to be verified according to user's input With target verification code, in addition it is also necessary to according to hardware operation to be verified instruction and the target hardware operational order of user's input.
In step 203, this result is returned to this terminal.
In this step, being specifically as follows server and send authentication response information to terminal, this authentication response information includes this The result.Wherein, this authentication response information may be considered the response message that above-mentioned checking request message is corresponding.
The present embodiment carry out, based on identifying code, the method verified, by server according to target verification code and this target What target hardware operational order that identifying code is corresponding and terminal sent include identifying code to be verified that user inputs and to be tested The checking request message of card hardware operation instruction, determines the result so that it is hard that user also needs to input when input validation code Part operational order, and rogue program cannot simulate people complete hardware operation instruction input, with correlation technique in according only to checking Code determines that the result is compared, it is to avoid Malware is by directly carrying out not awarded by user after stealing the information such as target verification code The operation of power, improves safety.
Fig. 3 is according to a kind of method flow diagram carrying out based on identifying code verifying shown in another exemplary embodiment, should Method, on the basis of Fig. 1 and embodiment illustrated in fig. 2, essentially describes the interaction of server and terminal, as it is shown on figure 3, Comprise the following steps:
In step 301, terminal to server sends identifying code request message.
In this step, this identifying code request message is for this server requests authentication code.Optionally, this identifying code request Message can include the instruction information for the input type indicating terminal to support that target hardware operational order is corresponding.Such as, when When object run instruction is for pressure rating, this checking request message such as can include for indicating terminal support pressure to input Instruction information.
In step 302, this server asks message according to this identifying code, sends identifying code response message to this terminal.
In this step, this identifying code response message includes target verification code.Optionally, this identifying code response message is all right Including the target hardware operational order that this target verification code is corresponding.Optionally, step 302 is specifically as follows server and tests according to this Card code request message, generates target verification code, generates the target hardware corresponding with this target verification code according to this target verification code Operational order, and the identifying code response message including this target verification code and this target hardware operational order is sent to terminal. Wherein, the target hardware operational order that this target verification code is corresponding, including: in the M bit code value of this target verification code each The corresponding target hardware operational order of code value, wherein, M is whole more than 0 and less than or equal to the figure place of this target verification code Number;Or, whole target verification code can a corresponding target hardware operational order.Such as, for target verification code " FXCB ", When M is equal to figure place (that is, 4) of target verification code, primary code value F can a corresponding target hardware operational order, the The code value X of two can a corresponding target hardware operate, and the code value C of the 3rd can refer in corresponding target hardware operation Order, the code value B of the 4th can a corresponding target hardware operational order.With target hardware operational order with pressure rating it is Example, server, when generating target hardware operational order according to target verification code, can determine according to the length of target verification code Pressure rating number, and randomly choose M pressure rating in this pressure rating number.It should be noted that when identifying code response disappears When not including target hardware operational order in breath, this target hardware operational order can also be generated by terminal, the specifically side of generation It is similar that formula generates target hardware operational order with server according to target verification code, repeats no more.In Fig. 3 with target verification code and As a example by target hardware operational order is all generated by server.
In step 303, this terminal prompts the user with this target verification code and this target hardware operational order, and obtains The identifying code to be verified of user's input and hardware operation to be verified instruction.
In this step, user can carry out input validation code by the identifying code input frame in terminal.Wherein, terminal can root According to the length of target verification code, identifying code input frame is divided into the input grid of respective amount.Such as, if target verification code A length of 6, then identifying code input frame is divided into 6 lattice, the corresponding target verification code of every lattice.Optionally, defeated acquisition user Before the identifying code to be verified entered and hardware operation to be verified instruction, it is also possible to including: recall entering method keyboard.
With target hardware operational order as pressure rating, and as a example by all corresponding pressure rating of the code value of each, use Family can input validation code and hardware operation instruct in the following way: user, after often inputting a bit code value, can test The grid position that in card code input frame, this bit code value is corresponding, the pressure rating using this bit code value corresponding presses this grid.Above-mentioned In mode, user is after entering method keyboard clicks on a bit code value, in addition it is also necessary to press screen in the grid that this bit code value is corresponding, this Identifying code that the understanding that sample can allow user clear and definite is currently entered or target hardware operational order, however it is necessary that user's finger Position is changed to identifying code input frame by entering method keyboard.In order to simplify the operation of user, user clicks on entering method keyboard Can press screen with the pressure rating that this bit code value is corresponding while one bit code value, after pressing terminates, terminal both can obtain Obtain this bit code value and can also obtain the pressure rating that this bit code value is corresponding.
In step 304, this terminal sends checking request message to this server, and this checking request message includes that this is to be tested The identifying code of card and this checking hardware operation instruct.
It should be noted that step 304 is similar with step 103, do not repeat them here.
In step 305, this server judges whether this identifying code to be verified mates with this target verification code.
In this step, if this identifying code to be verified mates with this target verification code, then perform step 306.If this is to be tested The identifying code of card does not mates with this target verification code, then perform step 308.Optionally, step 305 is specifically as follows: treat this The code value of each in the identifying code of checking performs the first judgement operation, determines the judged result of this each code value;If The judged result of this each code value is coupling, it is determined that this identifying code to be verified mates with this target verification code;Its In, this first judges that operation includes: judge the N position of code value and this target verification code of the N position of this identifying code to be verified Code value the most identical;If the code value phase of the code value of the N position of this identifying code to be verified and the N position of this target verification code With, it is determined that the judged result of the code value of the N position of this identifying code to be verified is coupling.
Within step 306, with this target hardware operational order whether this server judges the instruction of this hardware operation to be verified Coupling.
In this step, if the instruction of this hardware operation to be verified is mated with this target hardware operational order, then perform step 307;If the instruction of this hardware operation to be verified is not mated with this target hardware operational order, then perform step 308.Optionally, step Rapid 306 are specifically as follows: the hardware operation to be verified instruction that each the code value in identifying code to be verified to this is corresponding is held Row second judges operation, determines the judged result of the hardware operation to be verified instruction that this each code value is corresponding;If this is each Position code value corresponding hardware operation to be verified instruction judged result be coupling, it is determined that this hardware operation to be verified instruct Mate with this target hardware operational order;Wherein, this second judges that operation includes: judge the N position of this identifying code to be verified The hardware operation to be verified instruction target hardware corresponding with the code value of the N position of this target verification code corresponding to code value operate and refer to Make the most identical;If the hardware operation to be verified instruction that the code value of the N position of this identifying code to be verified is corresponding is tested with this target The target hardware operational order that the code value of the N position of card code is corresponding is identical, it is determined that the code of the N position of this identifying code to be verified The judged result of the hardware operation to be verified instruction that value is corresponding is coupling.
It should be noted that server can also first judge the hardware operation to be verified instruction that user inputs in the present embodiment Whether mate with this target hardware operational order, then judge whether are identifying code to be verified that user inputs and this target verification code Coupling, show that the Specific Principles of the result can be: if this identifying code to be verified mates with this target verification code, and this is treated Checking hardware operation instruction is mated with this target hardware operational order, then the result is for being proved to be successful;If this to be verified testing Card code does not mates with this target verification code, or the instruction of this hardware operation to be verified is not mated with this target hardware operational order, Then determine that the result is authentication failed.
In step 307, this server determines that the result is for being proved to be successful.
It should be noted that after step 307 has performed, perform step 309.
In step 308, this server determines that the result is authentication failed.
In a step 309, this result is returned to this terminal by this server.
In this step, when the result is authentication failed, terminal is after receiving this result that server returns Can also carry out: terminal is back to target pages and shows, this target pages can be such as homepage, identifying code input page etc. Step.
The present embodiment carry out, based on identifying code, the method verified, by inputting identifying code to be verified and to be tested user After card hardware operation instruction, if it is determined that the identifying code to be verified of user's input mates with this target verification code, and judge to be somebody's turn to do The hardware operation to be verified instruction of user's input is mated with this target hardware operational order, it is determined that is proved to be successful, otherwise determines Authentication failed so that user also needs to input hardware operational order when input validation code, and rogue program cannot to simulate people complete Become the input of hardware operation instruction, it is to avoid Malware is by directly carrying out not by user after stealing the information such as target verification code The operation authorized, improves safety.
Fig. 4 is according to a kind of method flow diagram carrying out based on identifying code verifying shown in another exemplary embodiment, should Method on the basis of embodiment illustrated in fig. 3, in step 304 checking request message can include that user inputs this is to be verified The code value of the N position of identifying code and the to be verified hardware operation corresponding with the code value of the N position of this identifying code to be verified instruction. As shown in Figure 4, step 305-step 308 could alternatively be following steps:
In step 401, this server judges code value and this target verification code of N position of this identifying code to be verified The code value of N position is the most identical, it is thus achieved that the first judged result of the code value of this N position.
In this step, N is the integer of the figure place more than 0 and less than or equal to this target verification code.
In step 402, this server judges the hardware to be verified that the code value of N position of this identifying code to be verified is corresponding The target verification hardware operation instruction that operational order is corresponding with the code value of the N position of this target verification code is the most identical, it is thus achieved that should Second judged result of the code value of N position.
It should be noted that do not have the restriction of sequencing between step 401 and step 402.
In step 403, this server judges whether this first judged result is identical with this second judged result.
In this step, if this first judged result is identical with this second judged result, then perform step 404.If should First judged result or this second judged result for differing, then perform step 407.Optionally, in the first judged result or When two judged results are for differing, it is also possible to including: this server exports the second information to this user, this second prompting letter Breath is for pointing out the reason of this user's authentication failed.Concrete, if this first judged result is for differing, then this authentication failed Reason is identifying code input error;If this second judged result is for differing, then the reason that this identifying code is failed is hardware operation Instruction input error.It should be noted that this server can be by being sent to this terminal by this second information, so that being somebody's turn to do Terminal exports the mode of this second information to this user, it is achieved this server exports the second information to this user.
In step 404, this server judges whether N is equal to the figure place of this target verification code.
In this step, if N is equal to the figure place of this target verification code, then perform step 405.If N is less than this target verification code Position, then perform step 406.
In step 405, this server determines that the result is for being proved to be successful.
It should be noted that step 405 terminates after having performed.
In a step 406, this server exports the first information to this user.
In this step, this first information for point out N+1 position that this user inputs this identifying code to be verified and The hardware operation to be verified that the code value of this N+1 position is corresponding instructs.It should be noted that this server can by by this first Information is sent to this terminal, to make this terminal in the way of this user exports this first information, it is achieved this server The first information is exported to this user.
It should be noted that after step 406 has performed, this server can be further to this identifying code to be verified The hardware operation to be verified instruction that the code value of N+1 position is corresponding with the code value of the N+1 position of this identifying code to be verified is tested Card, code value and this checking to be verified to the N position of this identifying code to be verified in detailed process and step 401-step 407 The process that the hardware operation to be verified instruction that the code value of N position of code is corresponding carries out verifying is similar to, and repeats no more.
In step 407, this server determines that the result is authentication failed.
It should be noted that differring primarily in that of the present embodiment and embodiment illustrated in fig. 3, defeated user in the present embodiment Enter identifying code and hardware operation instruction during verify, and embodiment illustrated in fig. 3 be inputted user all of Verify again after identifying code and hardware operation instruction.In the present embodiment, implementing of other parts is implemented with shown in Fig. 3 In example similar, therefore about the present embodiment not have the part of detailed description, specifically may refer to embodiment illustrated in fig. 3.
The present embodiment carry out, based on identifying code, the method verified, by instructing at user's input validation code and hardware operation During verify, determine the result so that user also needs to input hardware operational order when input validation code, and Rogue program cannot be simulated people and be completed the input of hardware operation instruction, it is to avoid Malware is by stealing the letters such as target verification code Directly carry out the operation not authorized by user after breath, improve safety.
Following for disclosure device embodiment, may be used for performing method of disclosure embodiment.Real for disclosure device Execute the details not disclosed in example, refer to method of disclosure embodiment.
Fig. 5 is according to a kind of block diagram carrying out the device verified based on identifying code shown in an exemplary embodiment.This dress Put can pass through software, hardware or both be implemented in combination with become the some or all of of terminal.With reference to Fig. 5, this device bag Include the first acquisition module the 501, second acquisition module the 502, first sending module 503 and receiver module 504.
Wherein, the first acquisition module 501, it is configured to obtain target verification code and the mesh corresponding with this target verification code Mark hardware operation instruction;
Second acquisition module 502, is configured to prompt the user with this target verification code that the first acquisition module 501 gets And this target hardware operational order, and obtain identifying code to be verified and the hardware operation to be verified instruction of user's input;
First sending module 503, is configured to send checking request message to server, and this checking request message includes the This identifying code to be verified that two acquisition modules 502 get and this hardware operation to be verified instruct, and this checking request message is used Verify according to this identifying code to be verified and the instruction of this hardware operation to be verified in this server;
Receiver module 504, is configured to receive the result that this server returns.
Optionally, the target hardware operational order that this target verification code is corresponding, including: the M bit code value of this target verification code In each the corresponding target hardware operational order of code value;Wherein, M is more than 0 and less than or equal to this target verification code The integer of figure place.
Optionally, this target hardware operational order is pressure rating.
In sum, what disclosure embodiment provided carries out, based on identifying code, the device verified, by the second acquisition module Prompt the user with target verification code and target hardware operational order, and obtain the identifying code to be verified of user's input and to be verified Hardware operation instructs, and the first sending module sends to server and includes that this identifying code to be verified and this hardware operation to be verified refer to The checking request message of order, this checking request message is used for this server according to this identifying code to be verified and this hardware to be verified Operational order is verified so that user also needs to input hardware operational order when input validation code, and rogue program cannot Simulation people completes the input of hardware operation instruction, determine the result with correlation technique according only to identifying code compared with, it is to avoid Malware, by the operation directly carrying out not authorized by user after stealing the information such as target verification code, improves safety.
Fig. 6 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment.Ginseng According to Fig. 6, this device on the basis of block diagram shown in Fig. 5, the first acquisition module 501, including: first obtain submodule 5011.Should First obtains submodule 5011, is configured to receive the identifying code response message that this server sends, this identifying code response message Including this target verification code and this target hardware operational order.
In sum, what disclosure embodiment provided carries out, based on identifying code, the device verified, obtains submodule by first Block receives the identifying code response message including target verification code and target hardware operational order that server sends so that terminal can To obtain target verification code and target hardware operational order.
Fig. 7 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment.Ginseng According to Fig. 7, this device is on the basis of block diagram shown in Fig. 6, and this device can also include: the second sending module 505.
This second sending module 505, is configured to send identifying code request message to this server, and the request of this identifying code disappears Breath includes the instruction information for the input type indicating terminal to support that this target hardware operational order is corresponding.
Fig. 8 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment.Ginseng According to Fig. 8, this device on the basis of block diagram shown in Fig. 5, the first acquisition module 501, including: second obtain submodule 5012.
This second acquisition submodule 5012, is configured to:
Receiving the identifying code response message that server sends, this identifying code response message includes this target verification code;According to This target verification code, generates this target hardware operational order.
In sum, what disclosure embodiment provided carries out, based on identifying code, the device verified, obtains submodule by second Block receives the identifying code response message including target verification code that server sends, and generates target hardware according to target verification code Operational order so that terminal can obtain target verification code and target hardware operational order.
Fig. 9 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment.Should Device can pass through software, hardware or both be implemented in combination with become the some or all of of server.With reference to Fig. 9, this dress Put and include: the first receiver module 901, determine module 902 and the first sending module 903.
Wherein, the first receiver module 901, it is configured to receive the checking request message that terminal sends, this checking request disappears Cease identifying code to be verified and the hardware operation to be verified instruction including that user inputs;
Determine module 902, be configured to ask message, target to be tested according to this checking that the first receiver module 901 receives Card code and the target hardware operational order corresponding with this target verification code, determine the result;
First sending module 903, is configured to determine that this result that module 902 determines returns to this terminal.
Optionally, the target hardware operational order that this target verification code is corresponding, including:
The corresponding target hardware operational order of the code value of each in the M bit code value of this target verification code;Wherein, M is The integer of the figure place more than 0 and less than or equal to this target verification code.
In sum, what disclosure embodiment provided carries out, based on identifying code, the device verified, be determined by module according to What target hardware operational order that target verification code is corresponding with this target verification code and terminal sent include, and user inputs treats The checking request message of the identifying code of checking and hardware operation to be verified instruction, determines the result so that user tests in input Also need to input hardware operational order during card code, and rogue program cannot be simulated people and be completed the input of hardware operation instruction, with phase According only to identifying code, pass technology determines that the result is compared, it is to avoid after Malware is by stealing the information such as target verification code Directly carry out the operation not authorized by user, improve safety.
Figure 10 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment.Ginseng According to Figure 10, this device is on the basis of block diagram shown in Fig. 9, and optionally, this device also includes the second receiver module 904 and second Send module 905.
Wherein, this second receiver module 904, it is configured to receive the identifying code request message that this terminal sends, this checking Code request message includes the instruction information for the input type indicating terminal to support that this target hardware operational order is corresponding;
This second sending module 905, is configured to ask message according to this identifying code, sends identifying code response to this terminal Message, this identifying code response message includes this target verification code and this target hardware operational order.
In sum, what disclosure embodiment provided carries out, based on identifying code, the device verified, by the second sending module The identifying code response message including target verification code and target hardware operational order is sent so that terminal can obtain to terminal This target verification code and target hardware operational order.
Figure 11 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment.Ginseng According to Figure 11, this device is on the basis of block diagram shown in Fig. 9, optionally, determines that module 902 includes that first determines module 9021;
Wherein, first determines module 9021, is configured to:
Judge whether this identifying code to be verified mates with this target verification code;
If this identifying code to be verified mates with this target verification code, then judge the instruction of this hardware operation to be verified and this mesh Whether mark hardware operation instruction mates;
If the instruction of this hardware operation to be verified is mated with this target hardware operational order, it is determined that this result is checking Success.
In sum, what disclosure embodiment provided carries out, based on identifying code, the device verified, determines module by first After user inputs identifying code to be verified and hardware operation to be verified instruction, if it is determined that the checking to be verified of user's input Code mates with this target verification code, and judges that the hardware operation to be verified that this user inputs instructs and this target hardware operational order Coupling, it is determined that be proved to be successful, otherwise determine authentication failed so that user also needs to input hardware operation when input validation code Instruction, and rogue program cannot be simulated people and be completed the input of hardware operation instruction, it is to avoid Malware is tested by stealing target Directly carry out the operation not authorized by user after the information such as card code, improve safety.
Figure 12 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment.Ginseng According to Figure 12, this device is on the basis of block diagram shown in Figure 11, and optionally, first determines that module 9021 includes that first determines submodule 90211。
Wherein, this first determines submodule 90211, is configured to: each the code in identifying code to be verified to this Value performs the first judgement operation, determines the judged result of this each code value;If the judged result of this each code value is equal For coupling, it is determined that this identifying code to be verified mates with this target verification code;
Wherein, this first judges that operation includes:
Judge that the code value of the N position of this identifying code to be verified is the most identical with the code value of the N position of this target verification code;
If the code value of the N position of this identifying code to be verified is identical with the code value of the N position of this target verification code, it is determined that The judged result of the code value of the N position of this identifying code to be verified is coupling.
Figure 13 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment.Ginseng According to Figure 13, this device is on the basis of block diagram shown in Figure 11, and optionally, first determines that module 9021 includes that second determines submodule 90212。
This second determines submodule 90212, is configured to: the code value of each in the identifying code to be verified to this is corresponding Hardware operation to be verified instruction perform the second judgement operation, determine that the hardware operation to be verified that this each code value is corresponding refers to The judged result of order;If the judged result of the hardware operation to be verified instruction that this each code value is corresponding is coupling, the most really Fixed this hardware operation to be verified instruction is mated with this target hardware operational order;
Wherein, this second judges that operation includes:
Judge hardware operation to be verified instruction and this target verification that the code value of the N position of this identifying code to be verified is corresponding The target hardware operational order that the code value of the N position of code is corresponding is the most identical;
If the hardware operation to be verified instruction that the code value of the N position of this identifying code to be verified is corresponding and this target verification code Target hardware operational order corresponding to the code value of N position identical, it is determined that the code value pair of the N position of this identifying code to be verified The judged result of the hardware operation to be verified instruction answered is coupling.
Figure 14 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment.Ginseng According to Figure 14, this device is on the basis of block diagram shown in Fig. 9, optionally, this checking request message include that user inputs this is to be tested The code value of the N position of the identifying code of card and the to be verified hardware operation corresponding with the code value of the N position of this identifying code to be verified Instruction;Determine that module 902 includes that second determines module 9022;
This second determines module 9022, is configured to:
Judge that the code value of the N position of this identifying code to be verified is the most identical with the code value of the N position of this target verification code, Obtain the first judged result of the code value of this N position;This N is more than 0 and less than or equal to figure place whole of this target verification code Number;
Judge hardware operation to be verified instruction and this target verification that the code value of the N position of this identifying code to be verified is corresponding The target verification hardware operation instruction that the code value of the N position of code is corresponding is the most identical, it is thus achieved that the second judgement of the code value of this N position Result;
If this first judged result and this second judged result are identical, and this N is equal to the figure place of this target verification code, Then determine that this result is for being proved to be successful;
If this first judged result and this second judged result are identical, and this N is less than the figure place of this target verification code, Then exporting the first information to this user, this first information is for pointing out this user to input this identifying code to be verified The hardware operation to be verified instruction that N+1 position is corresponding with the code value of this N+1 position;
If this first judged result or this second judged result are for differing, it is determined that this result is authentication failed.
In sum, what disclosure embodiment provided carries out, based on identifying code, the device verified, determines module by second Verify during user's input validation code and hardware operation instruct, determine the result so that user tests in input Also need to input hardware operation during card code, and rogue program cannot be simulated people and be completed the input of hardware operation, it is to avoid malice is the softest Part, by the operation directly carrying out not authorized by user after stealing the information such as target verification code, improves safety.
The disclosure also provides for a kind of system carrying out based on identifying code and verifying, including: above-mentioned Fig. 5-Fig. 8 is arbitrary based on checking Code carries out the device described in device embodiment verified, and the arbitrary device carrying out verifying of above-mentioned Fig. 9-Figure 14 based on identifying code Device described in embodiment.It is similar with said apparatus embodiment with effect that it realizes principle, does not repeats them here.
About the device in above-described embodiment, wherein modules performs the concrete mode of operation in relevant the method Embodiment in be described in detail, explanation will be not set forth in detail herein.
The foregoing describing and carry out, based on identifying code, the inner function module of device and the structural representation verified, Figure 15 is root According to the block diagram of the entity of the terminal shown in an exemplary embodiment, this terminal can be such as mobile phone or panel computer etc..Such as figure Shown in 15, this equipment may include that processor 1501, transmitter 1502, receptor 1503 and is configured to store processor The memorizer 1504 of the executable instruction of 1501.
Processor 1501 is configured to: obtain target verification code and the target hardware corresponding with this target verification code operation Instruction;Prompt the user with this target verification code and this target hardware operational order, and obtain to be verified the testing of user's input Card code and hardware operation to be verified instruction;
Transmitter 1502 is configured to: send checking request message to server, and this checking request message includes that this is to be tested The identifying code of card and this hardware operation to be verified instruct, and this checking request message is used for this server according to this checking to be verified Code and the instruction of this hardware operation to be verified are verified;
Receptor 1503 is configured to: receive the result that this server returns.
The block diagram of the entity of server is similar with the block diagram of the entity of terminal, equally includes: processor, transmitter, Receptor and the memorizer being configured to storage processor executable;
Wherein, described receptor is configured to: receive the checking request message that terminal sends, described checking request message bag Include identifying code to be verified and the hardware operation to be verified instruction of user's input;
Described processor is configured to: according to described checking request message, target verification code and with described target verification The target hardware operational order that code is corresponding, determines the result;
Described transmitter, is configured to described the result is returned to described terminal.
In the embodiment of above-mentioned terminal and server, it should be appreciated that this processor can be CPU (English: Central Processing Unit, is called for short: CPU), it is also possible to be other general processors, digital signal processor (English: Digital Signal Processor, is called for short: DSP), special IC (English: Application Specific Integrated Circuit, is called for short: ASIC) etc..General processor can be microprocessor, and this processor of person can also be to appoint The processor etc. what is conventional.And aforesaid memorizer can be read only memory (English: read-only memory, abbreviation: ROM), random access memory (English: random access memory, RAM), flash memory, hard disk or solid be called for short: State hard disk.SIM is also referred to as subscriber identification card, smart card, and digital mobile telephone must be loaded onto this card and can use.I.e. Computer chip stores the information of digital mobile phone client, the content such as the key of encryption and telephone directory of user.Before The receptor stated can be the element with receive capabilities, such as, have the antenna of receive capabilities.Aforesaid transmitter can be There is the element of sending function, such as, there is the antenna of sending function.Step in conjunction with the method disclosed in the embodiment of the present invention Hardware processor can be embodied directly in performed, or complete with the hardware in processor and software module combination execution.
Figure 16 is the block diagram according to the terminal 800 shown in another exemplary embodiment.Such as, terminal 800 can be mobile Phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, armarium, body-building equipment, Personal digital assistant etc..
With reference to Figure 16, terminal 800 can include following one or more assembly: processes assembly 802, memorizer 804, power supply Assembly 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor cluster 814, and Communications component 816.
Process assembly 802 and generally control the integrated operation of terminal 800, such as with display, call, data communication, phase The operation that machine operation and record operation are associated.Process assembly 802 and can include that one or more processor 820 performs to refer to Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 802 can include one or more module, just Mutual in process between assembly 802 and other assemblies.Such as, process assembly 802 and can include multi-media module, many to facilitate Media component 808 and process between assembly 802 mutual.
Memorizer 804 is configured to store various types of data to support the operation in terminal 800.Showing of these data Example includes any application program for operation in terminal 800 or the instruction of method, contact data, telephone book data, disappears Breath, picture, video etc..Memorizer 804 can be by any kind of volatibility or non-volatile memory device or their group Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable compile Journey read only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash Device, disk or CD.
The various assemblies that power supply module 806 is terminal 800 provide electric power.Power supply module 806 can include power management system System, one or more power supplys, and other generate, manage and distribute, with for terminal 800, the assembly that electric power is associated.
The screen of one output interface of offer that multimedia groupware 808 is included between this terminal 800 and user.At some In embodiment, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen May be implemented as touch screen, to receive the input signal from user.Touch panel includes one or more touch sensor With the gesture on sensing touch, slip and touch panel.This touch sensor can not only sense touch or the limit of sliding action Boundary, but also detect the persistent period relevant to this touch or slide and pressure.In certain embodiments, multimedia groupware 808 include a front-facing camera and/or post-positioned pick-up head.When equipment 800 is in operator scheme, such as screening-mode or video screen module During formula, front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Each front-facing camera and rearmounted take the photograph As head can be a fixing optical lens system or has focal length and optical zoom ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.Such as, audio-frequency assembly 810 includes a Mike Wind (MIC), when terminal 800 is in operator scheme, during such as call model, logging mode and speech recognition mode, mike is joined It is set to receive external audio signal.The audio signal received can be further stored at memorizer 804 or via communication set Part 816 sends.In certain embodiments, audio-frequency assembly 810 also includes a speaker, is used for exporting audio signal.
I/O interface 812 provides interface for processing between assembly 802 and peripheral interface module, above-mentioned peripheral interface module can To be keyboard, put striking wheel, button etc..These buttons may include but be not limited to: home button, volume button, start button and lock Set button.
Sensor cluster 814 includes one or more sensor, for providing the state of various aspects to comment for terminal 800 Estimate.Such as, what sensor cluster 814 can detect equipment 800 opens/closed mode, the relative localization of assembly, such as this group Part is display and the keypad of terminal 800, and sensor cluster 814 can also detect terminal 800 or 800 1 assemblies of terminal Position change, the presence or absence that user contacts with terminal 800, terminal 800 orientation or acceleration/deceleration and the temperature of terminal 800 Degree change.Sensor cluster 814 can include proximity transducer, is configured to detect when not having any physical contact attached The existence of nearly object.Sensor cluster 814 can also include optical sensor, such as CMOS or ccd image sensor, is used in imaging Application uses.In certain embodiments, this sensor cluster 814 can also include acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 816 is configured to facilitate the communication of wired or wireless mode between terminal 800 and other equipment.Terminal 800 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.An exemplary enforcement In example, communications component 816 receives the broadcast singal from external broadcasting management system or broadcast related information via broadcast channel. In one exemplary embodiment, this communications component 816 also includes near-field communication (NFC) module, to promote junction service.Example As, can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, Bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, terminal 800 can be by one or more application specific integrated circuits (ASIC), numeral letter Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components realize, be used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable recording medium including instruction, example are additionally provided As included the memorizer 804 of instruction, above-mentioned instruction can have been performed said method by the processor 820 of terminal 800.Such as, This non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and Optical data storage devices etc..
A kind of non-transitory computer-readable recording medium, when the instruction in storage medium is held by the processor of terminal 800 During row so that terminal 800 is able to carry out a kind of method carrying out based on identifying code and verifying, the method includes:
Obtain target verification code and the target hardware operational order corresponding with this target verification code;Prompt the user with this mesh Mark identifying code and this target hardware operational order, and obtain the identifying code to be verified of user's input and hardware operation to be verified Instruction;Sending checking request message to server, this checking request message includes that this identifying code to be verified and this are to be verified firmly Part operational order, this checking request message refers to according to this identifying code to be verified and this hardware operation to be verified for this server Order is verified;Receive the result that this server returns.
Further, this acquisition target verification code and the target hardware operational order corresponding with this target verification code, bag Include: receiving the identifying code response message that this server sends, this identifying code response message includes this target verification code and this mesh Mark hardware operation instruction.
Further, the method also includes: send identifying code request message, this identifying code request message bag to this server Include the instruction information for the input type indicating terminal to support that this target hardware operational order is corresponding.
Further, this acquisition target verification code and the target hardware operational order corresponding with this target verification code, bag Include: receiving the identifying code response message that server sends, this identifying code response message includes this target verification code;According to this target Identifying code, generates this target hardware operational order.
Further, the target hardware operational order that this target verification code is corresponding, including: the M bit code of this target verification code The corresponding target hardware operational order of the code value of each in value;Wherein, M is more than 0 and less than or equal to this target verification The integer of the figure place of code.
Further, this target hardware operational order is pressure rating.
Figure 17 is the block diagram according to the server 1900 shown in another exemplary embodiment.With reference to Figure 17, server 1900 Including processing assembly 1922, it farther includes one or more processor, and by the memorizer representated by memorizer 1932 Resource, can be by the instruction of the execution processing assembly 1922, such as application program for storage.The application of storage in memorizer 1932 Program can include one or more each corresponding to one group instruction module.Joined additionally, process assembly 1922 It is set to perform instruction, to perform said method.
Server 1900 can also include that a power supply module 1926 is configured to perform the power management of server 1900, One wired or wireless network interface 1950 is configured to be connected to server 1900 network, and an input and output (I/O) Interface 1958.Server 1900 can operate based on the operating system being stored in memorizer 1932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
In the exemplary embodiment, a kind of non-transitory computer-readable recording medium including instruction, example are additionally provided As included the memorizer 1932 of instruction, above-mentioned instruction can have been performed above-mentioned side by the process assembly 1922 of server 1900 Method.Such as, this non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, magnetic Band, floppy disk and optical data storage devices etc..
A kind of non-transitory computer-readable recording medium, when the instruction in storage medium is performed by the processor of server Time so that server is able to carry out a kind of method carrying out based on identifying code and verifying, the method includes:
Receiving the checking request message that terminal sends, this checking request message includes the identifying code to be verified that user inputs Instruct with hardware operation to be verified;According to this checking request message, target verification code and the mesh corresponding with this target verification code Mark hardware operation instruction, determines the result;This result is returned to this terminal.
Further, the method also includes: receive the identifying code request message that this terminal sends, this identifying code request message Including the instruction information for indicating input type that terminal supports that this target hardware operational order is corresponding;Please according to this identifying code Seeking message, send identifying code response message to this terminal, this identifying code response message includes this target verification code and this target Hardware operation instructs.
Further, the target hardware operational order that this target verification code is corresponding, including: the M bit code of this target verification code The corresponding target hardware operational order of the code value of each in value;Wherein, M is more than 0 and less than or equal to this target verification The integer of the figure place of code.
Further, this is according to this checking request message, target verification code and the target corresponding with this target verification code Hardware operation instructs, and determines the result, including: judge whether this identifying code to be verified mates with this target verification code;If This identifying code to be verified mates with this target verification code, then judge that the instruction of this hardware operation to be verified operates with this target hardware Whether instruction mates;If the instruction of this hardware operation to be verified is mated with this target hardware operational order, it is determined that this result For being proved to be successful.
Further, this judges whether this identifying code to be verified mates with this target verification code, including: to be verified to this Identifying code in the code value of each perform the first judgement operation, determine the judged result of this each code value;If this is every The judged result of the code value of is coupling, it is determined that this identifying code to be verified mates with this target verification code;
Wherein, this first judges that operation includes:
Judge that the code value of the N position of this identifying code to be verified is the most identical with the code value of the N position of this target verification code; If the code value of the N position of this identifying code to be verified is identical with the code value of the N position of this target verification code, it is determined that this is to be verified Identifying code N position code value judged result for coupling.
Further, this judges whether the instruction of this hardware operation to be verified mates with this target hardware operational order, including: The hardware operation to be verified instruction that each the code value in identifying code to be verified to this is corresponding performs the second judgement operation, really The judged result of the hardware operation to be verified instruction that fixed this each code value is corresponding;If corresponding to be tested of this each code value The judged result of card hardware operation instruction is coupling, it is determined that the instruction of this hardware operation to be verified refers to the operation of this target hardware Order coupling;
Wherein, this second judges that operation includes: judge corresponding to be verified of the code value of the N position of this identifying code to be verified It is the most identical that hardware operation instructs the target hardware operational order corresponding with the code value of the N position of this target verification code;If this is treated The code value of hardware operation to be verified instruction corresponding to the code value of N position of the identifying code of checking and the N position of this target verification code Corresponding target hardware operational order is identical, it is determined that the code value of the N position of this identifying code to be verified corresponding to be verified firmly The judged result of part operational order is coupling.
Further, this checking request message include this identifying code to be verified that user inputs N position code value and The to be verified hardware operation instruction corresponding with the code value of the N position of this identifying code to be verified;
This refers to according to this checking request message, target verification code and the target hardware corresponding with this target verification code operation Order, determines the result, including:
Judge that the code value of the N position of this identifying code to be verified is the most identical with the code value of the N position of this target verification code, Obtain the first judged result of the code value of this N position;This N is more than 0 and less than or equal to figure place whole of this target verification code Number;Judge hardware operation to be verified instruction and this target verification code that the code value of the N position of this identifying code to be verified is corresponding The target verification hardware operation instruction that the code value of N position is corresponding is the most identical, it is thus achieved that the second judgement knot of the code value of this N position Really;If this first judged result and this second judged result are identical, and this N is equal to the figure place of this target verification code, the most really This result fixed is for being proved to be successful;If this first judged result and this second judged result are identical, and this N is less than this mesh The figure place of mark identifying code, then export the first information to this user, and this first information is used for pointing out this user to input this The hardware operation to be verified that the N+1 position of identifying code to be verified is corresponding with the code value of this N+1 position instructs;If this first judgement Result or this second judged result are for differing, it is determined that this result is authentication failed.
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to its of the present invention Its embodiment.The application is intended to any modification, purposes or the adaptations of the present invention, these modification, purposes or Person's adaptations is followed the general principle of the present invention and includes the undocumented common knowledge in the art of the disclosure Or conventional techniques means.Description and embodiments is considered only as exemplary, and true scope and spirit of the invention are by following Claim is pointed out.
It should be appreciated that the invention is not limited in precision architecture described above and illustrated in the accompanying drawings, and And various modifications and changes can carried out without departing from the scope.The scope of the present invention is only limited by appended claim.

Claims (29)

1. the method carrying out verifying based on identifying code, it is characterised in that including:
Obtain target verification code and the target hardware operational order corresponding with described target verification code;
Prompt the user with described target verification code and described target hardware operational order, and obtain the to be verified of user's input Identifying code and hardware operation to be verified instruction;
Sending checking request message to server, described checking request message includes described identifying code to be verified and described to be tested Card hardware operation instruction, described checking request message for described server according to described identifying code to be verified and described to be tested Card hardware operation instruction is verified;
Receive the result that described server returns.
Method the most according to claim 1, it is characterised in that described acquisition target verification code and with described target verification The target hardware operational order that code is corresponding, including:
Receive described server send identifying code response message, described identifying code response message include described target verification code with And described target hardware operational order.
Method the most according to claim 2, it is characterised in that described method also includes:
Sending identifying code request message to described server, described identifying code request message includes for indicating terminal to support described The instruction information of the input type that target hardware operational order is corresponding.
Method the most according to claim 1, it is characterised in that described acquisition target verification code and with described target verification The target hardware operational order that code is corresponding, including:
Receiving the identifying code response message that server sends, described identifying code response message includes described target verification code;
According to described target verification code, generate described target hardware operational order.
Method the most according to claim 1, it is characterised in that the target hardware operation that described target verification code is corresponding refers to Order, including:
The corresponding target hardware operational order of the code value of each in the M bit code value of described target verification code;Wherein, M is big In 0 and less than or equal to the integer of figure place of described target verification code.
6. according to the method described in any one of claim 1-5, it is characterised in that described target hardware operational order is pressure etc. Level.
7. the method carrying out verifying based on identifying code, it is characterised in that including:
Receive the checking request message that terminal sends, described checking request message include identifying code to be verified that user inputs and Hardware operation to be verified instructs;
Refer to according to described checking request message, target verification code and the target hardware corresponding with described target verification code operation Order, determines the result;
Described the result is returned to described terminal.
Method the most according to claim 7, it is characterised in that described method also includes:
Receiving the identifying code request message that described terminal sends, described identifying code request message includes for indicating terminal to support institute State the instruction information of input type corresponding to target hardware operational order;
Ask message according to described identifying code, send identifying code response message, described identifying code response message bag to described terminal Include described target verification code and described target hardware operational order.
9. according to the method described in claim 7 or 8, it is characterised in that the target hardware operation that described target verification code is corresponding Instruction, including:
The corresponding target hardware operational order of the code value of each in the M bit code value of described target verification code;Wherein, M is big In 0 and less than or equal to the integer of figure place of described target verification code.
Method the most according to claim 9, it is characterised in that described according to described checking request message, target verification code And the target hardware operational order corresponding with described target verification code, determine the result, including:
Judge whether described identifying code to be verified mates with described target verification code;
If described identifying code to be verified mates with described target verification code, then judge the instruction of described hardware operation to be verified and institute State whether target hardware operational order mates;
If the instruction of described hardware operation to be verified is mated with described target hardware operational order, it is determined that described the result is for testing Demonstrate,prove successfully.
11. methods according to claim 10, it is characterised in that the described identifying code to be verified of described judgement and described mesh Whether mark identifying code mates, including:
The code value of each in described identifying code to be verified is performed the first judgement operation, determines each code value described Judged result;
If each the judged result of code value described is coupling, it is determined that described identifying code to be verified is tested with described target Card code coupling;
Wherein, described first judges that operation includes:
Judge that the code value of the N position of described identifying code to be verified is the most identical with the code value of the N position of described target verification code;
If the code value of the N position of described identifying code to be verified is identical with the code value of the N position of described target verification code, it is determined that The judged result of the code value of the N position of described identifying code to be verified is coupling.
12. methods according to claim 10, it is characterised in that the instruction of described judgement described hardware operation to be verified and institute State whether target hardware operational order mates, including:
Hardware operation to be verified instruction to the code value of each in described identifying code to be verified is corresponding performs the second judgement Operation, determines the judged result of the hardware operation to be verified instruction that each code value described is corresponding;
If the judged result of the hardware operation to be verified instruction that each code value described is corresponding is coupling, it is determined that described in treat Checking hardware operation instruction is mated with described target hardware operational order;
Wherein, described second judges that operation includes:
Judge hardware operation to be verified instruction that the code value of the N position of described identifying code to be verified is corresponding and described target verification The target hardware operational order that the code value of the N position of code is corresponding is the most identical;
If the hardware operation to be verified instruction that the code value of the N position of described identifying code to be verified is corresponding and described target verification code Target hardware operational order corresponding to the code value of N position identical, it is determined that the code value of the N position of described identifying code to be verified The judged result of corresponding hardware operation to be verified instruction is coupling.
13. methods according to claim 9, it is characterised in that it is described that described checking request message includes that user inputs The code value of the N position of identifying code to be verified and corresponding with the code value of the N position of described identifying code to be verified to be verified firmly Part operational order;
Described according to described checking request message, target verification code and the target hardware corresponding with described target verification code operation Instruction, determines the result, including:
Judge that the code value of the N position of described identifying code to be verified is the most identical with the code value of the N position of described target verification code, Obtain the first judged result of the code value of described N position;Described N is more than 0 and is less than or equal to the position of described target verification code The integer of number;
Judge hardware operation to be verified instruction that the code value of the N position of described identifying code to be verified is corresponding and described target verification The target verification hardware operation instruction that the code value of the N position of code is corresponding is the most identical, it is thus achieved that the second of the code value of described N position is sentenced Disconnected result;
If described first judged result and described second judged result are identical, and described N is equal to described target verification code Figure place, it is determined that described the result is for being proved to be successful;
If described first judged result and described second judged result are identical, and described N is less than described target verification code Figure place, then export the first information to described user, described first information be used for pointing out described user input described in treat The hardware operation to be verified that the N+1 position of the identifying code of checking is corresponding with the code value of described N+1 position instructs;
If described first judged result or described second judged result are for differing, it is determined that described the result loses for checking Lose.
14. 1 kinds of devices carrying out verifying based on identifying code, it is characterised in that including:
First acquisition module, is configured to obtain target verification code and the target hardware corresponding with described target verification code operation Instruction;
Second acquisition module, is configured to prompt the user with described target verification code and described target hardware operational order, and Obtain identifying code to be verified and the hardware operation to be verified instruction of user's input;
First sending module, is configured to verify that request message, described checking request message are treated described in including to server transmission Checking identifying code and described hardware operation to be verified instruction, described checking request message for described server according to described in treat The identifying code of checking and the instruction of described hardware operation to be verified are verified;
Receiver module, is configured to receive the result that described server returns.
15. devices according to claim 14, it is characterised in that described first acquisition module includes: first obtains submodule Block;
Described first obtains submodule, is configured to receive the identifying code response message that described server sends, described identifying code Response message includes described target verification code and described target hardware operational order.
16. devices according to claim 15, it is characterised in that described device also includes: the second sending module;
Described second sending module, is configured to send identifying code request message to described server, and the request of described identifying code disappears Breath includes the instruction information for the input type indicating terminal to support that described target hardware operational order is corresponding.
17. devices according to claim 14, it is characterised in that described first acquisition module includes: second obtains submodule Block;
Described second obtains submodule, is configured to:
Receiving the identifying code response message that server sends, described identifying code response message includes described target verification code;According to Described target verification code, generates described target hardware operational order.
18. devices according to claim 14, it is characterised in that the target hardware operation that described target verification code is corresponding refers to Order, including:
The corresponding target hardware operational order of the code value of each in the M bit code value of described target verification code;Wherein, M is big In 0 and less than or equal to the integer of figure place of described target verification code.
19. according to the device described in any one of claim 14-18, it is characterised in that described target hardware operational order is pressure Power grade.
20. 1 kinds of devices carrying out verifying based on identifying code, it is characterised in that including:
First receiver module, is configured to receive the checking request message that terminal sends, and described checking request message includes user The identifying code to be verified of input and hardware operation to be verified instruction;
Determine module, be configured to according to described checking request message, target verification code and corresponding with described target verification code Target hardware operational order, determine the result;
First sending module, is configured to described the result is returned to described terminal.
21. devices according to claim 20, it is characterised in that described device also includes: the second receiver module and second Sending module;
Described second receiver module, is configured to receive the identifying code request message that described terminal sends, and described identifying code is asked Message includes the instruction information for the input type indicating terminal to support that described target hardware operational order is corresponding;
Described second sending module, is configured to ask message according to described identifying code, sends identifying code response to described terminal Message, described identifying code response message includes described target verification code and described target hardware operational order.
22. according to the device described in claim 20 or 21, it is characterised in that the target hardware behaviour that described target verification code is corresponding Instruct, including:
The corresponding target hardware operational order of the code value of each in the M bit code value of described target verification code;Wherein, M is big In 0 and less than or equal to the integer of figure place of described target verification code.
23. devices according to claim 22, it is characterised in that described determine that module includes: first determines module;
Described first determines module, is configured to:
Judge whether described identifying code to be verified mates with described target verification code;
If described identifying code to be verified mates with described target verification code, then judge the instruction of described hardware operation to be verified and institute State whether target hardware operational order mates;
If the instruction of described hardware operation to be verified is mated with described target hardware operational order, it is determined that described the result is for testing Demonstrate,prove successfully.
24. devices according to claim 23, it is characterised in that described first determines that module includes that first determines submodule Block;
Described first determines submodule, is configured to:
The code value of each in described identifying code to be verified is performed the first judgement operation, determines each code value described Judged result;
If each the judged result of code value described is coupling, it is determined that described identifying code to be verified is tested with described target Card code coupling;
Wherein, described first judges that operation includes:
Judge that the code value of the N position of described identifying code to be verified is the most identical with the code value of the N position of described target verification code;
If the code value of the N position of described identifying code to be verified is identical with the code value of the N position of described target verification code, it is determined that The judged result of the code value of the N position of described identifying code to be verified is coupling.
25. devices according to claim 23, it is characterised in that described first determines that module includes that second determines submodule Block;
Described second determines submodule, is configured to:
Hardware operation to be verified instruction to the code value of each in described identifying code to be verified is corresponding performs the second judgement Operation, determines the judged result of the hardware operation to be verified instruction that each code value described is corresponding;
If the judged result of the hardware operation to be verified instruction that each code value described is corresponding is coupling, it is determined that described in treat Checking hardware operation instruction is mated with described target hardware operational order;
Wherein, described second judges that operation includes:
Judge hardware operation to be verified instruction that the code value of the N position of described identifying code to be verified is corresponding and described target verification The target hardware operational order that the code value of the N position of code is corresponding is the most identical;
If the hardware operation to be verified instruction that the code value of the N position of described identifying code to be verified is corresponding and described target verification code Target hardware operational order corresponding to the code value of N position identical, it is determined that the code value of the N position of described identifying code to be verified The judged result of corresponding hardware operation to be verified instruction is coupling.
26. devices according to claim 22, it is characterised in that it is described that described checking request message includes that user inputs The code value of the N position of identifying code to be verified and corresponding with the code value of the N position of described identifying code to be verified to be verified firmly Part operational order;
Described determine that module includes: second determines module;
Described second determines module, is configured to:
Judge that the code value of the N position of described identifying code to be verified is the most identical with the code value of the N position of described target verification code, Obtain the first judged result of the code value of described N position;Described N is more than 0 and is less than or equal to the position of described target verification code The integer of number;
Judge hardware operation to be verified instruction that the code value of the N position of described identifying code to be verified is corresponding and described target verification The target verification hardware operation instruction that the code value of the N position of code is corresponding is the most identical, it is thus achieved that the second of the code value of described N position is sentenced Disconnected result;
If described first judged result and described second judged result are identical, and described N is equal to described target verification code Figure place, it is determined that described the result is for being proved to be successful;
If described first judged result and described second judged result are identical, and described N is less than described target verification code Figure place, then export the first information to described user, described first information be used for pointing out described user input described in treat The hardware operation to be verified that the N+1 position of the identifying code of checking is corresponding with the code value of described N+1 position instructs;
If described first judged result or described second judged result are for differing, it is determined that described the result loses for checking Lose.
27. 1 kinds of systems carrying out verifying based on identifying code, it is characterised in that including: described in any one of claim 14-19 Device, and the device described in any one of claim 20-26.
28. 1 kinds of terminals, it is characterised in that including: processor, transmitter, receptor and be configured to store processor can hold The memorizer of row instruction;
Wherein, described processor is configured to: obtain target verification code and the target hardware corresponding with described target verification code Operational order;Prompt the user with described target verification code and described target hardware operational order, and obtain treating of user's input The identifying code of checking and hardware operation to be verified instruction;
Described transmitter is configured to: sending checking request message to server, described checking request message includes described to be tested The identifying code of card and the instruction of described hardware operation to be verified, described checking request message is used for described server according to described to be tested The identifying code of card and the instruction of described hardware operation to be verified are verified;
Described receptor is configured to: receive the result that described server returns.
29. 1 kinds of servers, it is characterised in that including: processor, transmitter, receptor and be configured to store processor can Perform the memorizer of instruction;
Wherein, described receptor is configured to: receive the checking request message that terminal sends, and described checking request message includes using The identifying code to be verified of family input and hardware operation to be verified instruction;
Described processor is configured to: according to described checking request message, target verification code and right with described target verification code The target hardware operational order answered, determines the result;
Described transmitter, is configured to described the result is returned to described terminal.
CN201610354003.4A 2016-05-25 2016-05-25 Method, apparatus, equipment and the system verified based on identifying code Active CN106060027B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610354003.4A CN106060027B (en) 2016-05-25 2016-05-25 Method, apparatus, equipment and the system verified based on identifying code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610354003.4A CN106060027B (en) 2016-05-25 2016-05-25 Method, apparatus, equipment and the system verified based on identifying code

Publications (2)

Publication Number Publication Date
CN106060027A true CN106060027A (en) 2016-10-26
CN106060027B CN106060027B (en) 2019-04-12

Family

ID=57174420

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610354003.4A Active CN106060027B (en) 2016-05-25 2016-05-25 Method, apparatus, equipment and the system verified based on identifying code

Country Status (1)

Country Link
CN (1) CN106060027B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108460268A (en) * 2017-02-20 2018-08-28 阿里巴巴集团控股有限公司 Verification method and device
CN108737346A (en) * 2017-04-21 2018-11-02 珠海格力电器股份有限公司 A kind of method of password authentication and its device, server, communication system
CN109446056A (en) * 2018-09-11 2019-03-08 平安科技(深圳)有限公司 Code verification method, apparatus, electronic equipment and medium
CN109697343A (en) * 2018-12-28 2019-04-30 联想(北京)有限公司 Verification method and system, computer system
CN109740323A (en) * 2018-10-26 2019-05-10 深圳壹账通智能科技有限公司 Verify code verification method, device, storage medium and computer equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120183270A1 (en) * 2011-01-14 2012-07-19 International Business Machines Corporation Webcam captcha
CN103065077A (en) * 2013-01-06 2013-04-24 于朔 Real user authentication method and real user authentication device
CN104023029A (en) * 2014-06-19 2014-09-03 百度在线网络技术(北京)有限公司 Method and device for verifying verification codes
CN104348617A (en) * 2013-07-26 2015-02-11 中兴通讯股份有限公司 Verification code processing method and device, and terminal and server
CN104836778A (en) * 2014-02-11 2015-08-12 腾讯科技(深圳)有限公司 Method, device and system for realizing identifying code

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120183270A1 (en) * 2011-01-14 2012-07-19 International Business Machines Corporation Webcam captcha
CN103065077A (en) * 2013-01-06 2013-04-24 于朔 Real user authentication method and real user authentication device
CN104348617A (en) * 2013-07-26 2015-02-11 中兴通讯股份有限公司 Verification code processing method and device, and terminal and server
CN104836778A (en) * 2014-02-11 2015-08-12 腾讯科技(深圳)有限公司 Method, device and system for realizing identifying code
CN104023029A (en) * 2014-06-19 2014-09-03 百度在线网络技术(北京)有限公司 Method and device for verifying verification codes

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108460268A (en) * 2017-02-20 2018-08-28 阿里巴巴集团控股有限公司 Verification method and device
CN108737346A (en) * 2017-04-21 2018-11-02 珠海格力电器股份有限公司 A kind of method of password authentication and its device, server, communication system
CN108737346B (en) * 2017-04-21 2020-06-19 珠海格力电器股份有限公司 Password verification method and device, server and communication system
CN109446056A (en) * 2018-09-11 2019-03-08 平安科技(深圳)有限公司 Code verification method, apparatus, electronic equipment and medium
CN109446056B (en) * 2018-09-11 2023-03-21 平安科技(深圳)有限公司 Code verification method and device, electronic equipment and medium
CN109740323A (en) * 2018-10-26 2019-05-10 深圳壹账通智能科技有限公司 Verify code verification method, device, storage medium and computer equipment
CN109697343A (en) * 2018-12-28 2019-04-30 联想(北京)有限公司 Verification method and system, computer system
CN109697343B (en) * 2018-12-28 2021-08-17 联想(北京)有限公司 Verification method and system and computer system

Also Published As

Publication number Publication date
CN106060027B (en) 2019-04-12

Similar Documents

Publication Publication Date Title
CN104202306B (en) Access authentication method, Apparatus and system
CN106453245B (en) Verify the method and device of identity
CN104125067B (en) Account and token secret key binding method and device
CN107241688A (en) Signature, verification method, device and the storage medium of application installation package
CN106060027A (en) Methods, devices, equipment and systems for verification based on verification codes
CN104283876A (en) Operation authorization method and device
CN104933351A (en) Information security processing method and information security processing device
CN104484593B (en) terminal verification method and device
CN106204046A (en) The method and device that order pays
CN105847243A (en) Method and device for accessing smart camera
CN106375096A (en) Short message verification method and device
CN104468581B (en) The method and device of login application program
CN104158665A (en) Method and device of verification
CN106204029A (en) The method and apparatus of Quick Response Code payment
CN105871913A (en) Identity authentication method and system
CN107729000A (en) Application program installation kit generation method and device
CN104639533A (en) Safety control method and device based on terminal
CN110049062A (en) Verify code check method, device, electronic equipment and storage medium
CN106446653A (en) Application authority management method and device and electronic equipment
CN104158659A (en) Anti-fake verifying method, device and system
CN107230060A (en) The method and apparatus that a kind of account is reported the loss
CN106022045A (en) Information processing device and method
CN107819740A (en) Verification method, terminal device, audio amplifier and the server of terminal device
CN107145771A (en) application program unlocking method, device and terminal
CN106775834A (en) Brush machine verification method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant