CN106060027A - Methods, devices, equipment and systems for verification based on verification codes - Google Patents
Methods, devices, equipment and systems for verification based on verification codes Download PDFInfo
- Publication number
- CN106060027A CN106060027A CN201610354003.4A CN201610354003A CN106060027A CN 106060027 A CN106060027 A CN 106060027A CN 201610354003 A CN201610354003 A CN 201610354003A CN 106060027 A CN106060027 A CN 106060027A
- Authority
- CN
- China
- Prior art keywords
- code
- verified
- identifying code
- target
- target verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
Abstract
The disclosure is about methods, devices, equipment and systems for verification based on verification codes. One of the methods comprises obtaining a target verification code and a target hardware operation instruction corresponding to the target verification code, reminding a user of the target verification code and the target hardware operation instruction, obtaining a to-be-verified verification code and a to-be-verified hardware operation instruction which are input by the user, sending verification request information, which comprises the to-be-verified verification code and the to-be-verified hardware operation instruction and used in verification by a server according to the to-be-verified verification code and the to-be-verified hardware operation instruction, to the server, and receiving a verification result returned by the server. The methods of embodiments of the disclosure can improve safety.
Description
Technical field
It relates to internet arena, particularly relate to a kind of carry out verifying based on identifying code method, device, equipment and
System.
Background technology
Identifying code be a kind of user of differentiation be the public full auto-programs of robot program or people, it is mutual by the overwhelming majority
The Internet services, such as forum, microblogging etc., is used for evading security risk;Mainly evade service security aspect risk, as malice cracks
Password, brush ticket, forum pour water.
In correlation technique, along with being widely used of identifying code, its safety issue is more and more prominent.Identifying code, user
Account and password be the most all Word message, some bogusware on equipment can steal these information, the most directly carries out
The operation not authorized by user, safety is relatively low.
Summary of the invention
For overcoming problem present in correlation technique, the disclosure provides a kind of method, dress carrying out verifying based on identifying code
Put, equipment and system.
First aspect according to disclosure embodiment, it is provided that a kind of method carrying out based on identifying code verifying, including: obtain
Target verification code and the target hardware operational order corresponding with this target verification code;Prompt the user with this target verification code and
This target hardware operational order, and obtain identifying code to be verified and the hardware operation to be verified instruction of user's input;To service
Device sends checking request message, and this checking request message includes that this identifying code to be verified and this hardware operation to be verified instruct,
This checking request message is verified according to this identifying code to be verified and the instruction of this hardware operation to be verified for this server;
Receive the result that this server returns.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect: prompt the user with mesh by terminal
Mark identifying code and target hardware operational order, obtain identifying code to be verified and the hardware operation to be verified instruction of user's input,
And the checking request message including that this identifying code to be verified and this hardware operation to be verified instruct, this checking is sent to server
Request message is verified according to this identifying code to be verified and the instruction of this hardware operation to be verified for this server so that use
Family also needs to input hardware operational order when input validation code, and rogue program cannot be simulated people and be completed hardware operation instruction
Input, determine the result with correlation technique according only to identifying code compared with, it is to avoid Malware is by stealing target verification
Directly carry out the operation not authorized by user after the information such as code, improve safety.
Further, this acquisition target verification code and the target hardware operational order corresponding with this target verification code, bag
Include: receiving the identifying code response message that this server sends, this identifying code response message includes this target verification code and this mesh
Mark hardware operation instruction.
Further, the method also includes: send identifying code request message, this identifying code request message bag to this server
Include the instruction information for the input type indicating terminal to support that this target hardware operational order is corresponding.
Further, this acquisition target verification code and the target hardware operational order corresponding with this target verification code, bag
Include: receiving the identifying code response message that server sends, this identifying code response message includes this target verification code;According to this target
Identifying code, generates this target hardware operational order.
Further, the target hardware operational order that this target verification code is corresponding, including: the M bit code of this target verification code
The corresponding target hardware operational order of the code value of each in value;Wherein, M is more than 0 and less than or equal to this target verification
The integer of the figure place of code.
Further, this target hardware operational order is pressure rating.
Second aspect according to disclosure embodiment, it is provided that a kind of method carrying out based on identifying code verifying, including: receive
The checking request message that terminal sends, this checking request message includes identifying code to be verified that user inputs and hardware to be verified
Operational order;Refer to according to this checking request message, target verification code and the target hardware corresponding with this target verification code operation
Order, determines the result;This result is returned to this terminal.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect: tested according to target by server
It is to be verified that what the card code target hardware operational order corresponding with this target verification code and terminal sent includes that user inputs
The checking request message of identifying code and hardware operation to be verified instruction, determines the result so that user is when input validation code
Also need to input hardware operational order, and rogue program cannot be simulated people and be completed the input of hardware operation instruction, with correlation technique
In determine that the result is compared according only to identifying code, it is to avoid Malware is by directly entering after stealing the information such as target verification code
The operation that row is not authorized by user, improves safety.
Further, the method also includes: receive the identifying code request message that this terminal sends, this identifying code request message
Including the instruction information for indicating input type that terminal supports that this target hardware operational order is corresponding;Please according to this identifying code
Seeking message, send identifying code response message to this terminal, this identifying code response message includes this target verification code and this target
Hardware operation instructs.
Further, the target hardware operational order that this target verification code is corresponding, including: the M bit code of this target verification code
The corresponding target hardware operational order of the code value of each in value;Wherein, M is more than 0 and less than or equal to this target verification
The integer of the figure place of code.
Further, this is according to this checking request message, target verification code and the target corresponding with this target verification code
Hardware operation instructs, and determines the result, including: judge whether this identifying code to be verified mates with this target verification code;If
This identifying code to be verified mates with this target verification code, then judge that the instruction of this hardware operation to be verified operates with this target hardware
Whether instruction mates;If the instruction of this hardware operation to be verified is mated with this target hardware operational order, it is determined that this result
For being proved to be successful.
Further, this judges whether this identifying code to be verified mates with this target verification code, including: to be verified to this
Identifying code in the code value of each perform the first judgement operation, determine the judged result of this each code value;If this is every
The judged result of the code value of is coupling, it is determined that this identifying code to be verified mates with this target verification code;
Wherein, this first judges that operation includes: judge code value and this target verification of the N position of this identifying code to be verified
The code value of the N position of code is the most identical;If the code value of the N position of this identifying code to be verified and the N position of this target verification code
Code value identical, it is determined that the judged result of the code value of the N position of this identifying code to be verified for coupling.
Further, this judges whether the instruction of this hardware operation to be verified mates with this target hardware operational order, including:
The hardware operation to be verified instruction that each the code value in identifying code to be verified to this is corresponding performs the second judgement operation, really
The judged result of the hardware operation to be verified instruction that fixed this each code value is corresponding;If corresponding to be tested of this each code value
The judged result of card hardware operation instruction is coupling, it is determined that the instruction of this hardware operation to be verified refers to the operation of this target hardware
Order coupling;
Wherein, this second judges that operation includes: judge corresponding to be verified of the code value of the N position of this identifying code to be verified
It is the most identical that hardware operation instructs the target hardware operational order corresponding with the code value of the N position of this target verification code;If this is treated
The code value of hardware operation to be verified instruction corresponding to the code value of N position of the identifying code of checking and the N position of this target verification code
Corresponding target hardware operational order is identical, it is determined that the code value of the N position of this identifying code to be verified corresponding to be verified firmly
The judged result of part operational order is coupling.
Further, this checking request message include this identifying code to be verified that user inputs N position code value and
The to be verified hardware operation instruction corresponding with the code value of the N position of this identifying code to be verified;
This refers to according to this checking request message, target verification code and the target hardware corresponding with this target verification code operation
Order, determines the result, including: judge the N position of code value and this target verification code of the N position of this identifying code to be verified
Code value is the most identical, it is thus achieved that the first judged result of the code value of this N position;This N is more than 0 and less than or equal to this target verification
The integer of the figure place of code;Judge hardware operation to be verified instruction that the code value of the N position of this identifying code to be verified is corresponding with should
The target verification hardware operation instruction that the code value of the N position of target verification code is corresponding is the most identical, it is thus achieved that the code value of this N position
Second judged result;If this first judged result and this second judged result are identical, and this N is equal to this target verification code
Figure place, it is determined that this result is for being proved to be successful;If this first judged result and this second judged result are identical, and should
N less than the figure place of this target verification code, then exports the first information to this user, and this first information is used for pointing out this use
Family inputs the hardware operation to be verified instruction that the N+1 position of this identifying code to be verified is corresponding with the code value of this N+1 position;If should
First judged result or this second judged result are for differing, it is determined that this result is authentication failed.
The third aspect according to disclosure embodiment, it is provided that a kind of device carrying out based on identifying code verifying, including: first
Acquisition module, is configured to obtain target verification code and the target hardware operational order corresponding with this target verification code;Second
Acquisition module, is configured to prompt the user with this target verification code and this target hardware operational order, and obtains user's input
Identifying code to be verified and hardware operation to be verified instruction;First sending module, being configured to send checking to server please
Seeking message, this checking request message includes that this identifying code to be verified and this hardware operation to be verified instruct, and this checking request disappears
Breath is verified according to this identifying code to be verified and the instruction of this hardware operation to be verified for this server;Receiver module, quilt
It is configured to receive the result that this server returns.
Further, this first acquisition module includes: first obtains submodule;This first acquisition submodule, is configured to
Receiving the identifying code response message that this server sends, this identifying code response message includes that this target verification code and this target are hard
Part operational order.
Further, this device also includes: the second sending module;This second sending module, is configured to this server
Sending identifying code request message, this identifying code request message includes that this target hardware operational order is corresponding for indicating terminal to support
The instruction information of input type.
Further, this first acquisition module includes: second obtains submodule;This second acquisition submodule, is configured to:
Receiving the identifying code response message that server sends, this identifying code response message includes this target verification code;According to
This target verification code, generates this target hardware operational order.
Further, the target hardware operational order that this target verification code is corresponding, including: the M bit code of this target verification code
The corresponding target hardware operational order of the code value of each in value;Wherein, M is more than 0 and less than or equal to this target verification
The integer of the figure place of code.
Further, this target hardware operational order is pressure rating.
What each possible embodiment of the above-mentioned third aspect and the above-mentioned third aspect was provided is carried out based on identifying code
The device of checking, its beneficial effect may refer to what each possible embodiment of above-mentioned first aspect and first aspect was brought
Beneficial effect, does not repeats them here.
Fourth aspect according to disclosure embodiment, it is provided that a kind of device carrying out based on identifying code verifying, including: first
Receiver module, is configured to receive the checking request message that terminal sends, and it is to be tested that this checking request message includes that user inputs
The identifying code of card and hardware operation to be verified instruction;Determine module, be configured to ask message, target verification code according to this checking
And the target hardware operational order corresponding with this target verification code, determine the result;First sending module, be configured to by
This result returns to this terminal.
Further, this device also includes: the second receiver module and the second sending module;This second receiver module, is joined
Being set to receive the identifying code request message that this terminal sends, this identifying code request message includes for indicating terminal to support this target
The instruction information of the input type that hardware operation instruction is corresponding;This second sending module, is configured to ask according to this identifying code
Message, sends identifying code response message to this terminal, and this identifying code response message includes that this target verification code and this target are hard
Part operational order.
Further, the target hardware operational order that this target verification code is corresponding, including: the M bit code of this target verification code
The corresponding target hardware operational order of the code value of each in value;Wherein, M is more than 0 and less than or equal to this target verification
The integer of the figure place of code.
Further, this determines that module includes: first determines module;This first determines module, is configured to: judge that this is treated
Whether the identifying code of checking mates with this target verification code;If this identifying code to be verified mates with this target verification code, then sentence
Whether disconnected this hardware operation to be verified instruction mates with this target hardware operational order;If this hardware operation to be verified instructs and is somebody's turn to do
Target hardware operational order mates, it is determined that this result is for being proved to be successful.
Further, this first determines that module includes that first determines submodule;This first determines submodule, is configured to:
The code value of each in the identifying code to be verified to this performs the first judgement operation, determines this each code value
Judged result;If the judged result of this each code value is coupling, it is determined that this identifying code to be verified and this target
Identifying code mates;
Wherein, this first judges that operation includes: judge code value and this target verification of the N position of this identifying code to be verified
The code value of the N position of code is the most identical;If the code value of the N position of this identifying code to be verified and the N position of this target verification code
Code value identical, it is determined that the judged result of the code value of the N position of this identifying code to be verified for coupling.
Further, this first determines that module includes that second determines submodule;This second determines submodule, is configured to:
The hardware operation to be verified instruction that each the code value in identifying code to be verified to this is corresponding performs second and sentences
Disconnected operation, determines the judged result of the hardware operation to be verified instruction that this each code value is corresponding;If this each code value
The judged result of corresponding hardware operation to be verified instruction is coupling, it is determined that the instruction of this hardware operation to be verified and this target
Hardware operation instructions match;
Wherein, this second judges that operation includes: judge corresponding to be verified of the code value of the N position of this identifying code to be verified
It is the most identical that hardware operation instructs the target hardware operational order corresponding with the code value of the N position of this target verification code;If this is treated
The code value of hardware operation to be verified instruction corresponding to the code value of N position of the identifying code of checking and the N position of this target verification code
Corresponding target hardware operational order is identical, it is determined that the code value of the N position of this identifying code to be verified corresponding to be verified firmly
The judged result of part operational order is coupling.
Further, this checking request message include this identifying code to be verified that user inputs N position code value and
The to be verified hardware operation instruction corresponding with the code value of the N position of this identifying code to be verified;This determines that module includes: second is true
Cover half block;
This second determines module, is configured to: judge code value and this target verification of the N position of this identifying code to be verified
The code value of the N position of code is the most identical, it is thus achieved that the first judged result of the code value of this N position;This N be more than 0 and less than or etc.
Integer in the figure place of this target verification code;Judge the hardware to be verified that the code value of the N position of this identifying code to be verified is corresponding
The target verification hardware operation instruction that operational order is corresponding with the code value of the N position of this target verification code is the most identical, it is thus achieved that should
Second judged result of the code value of N position;If this first judged result and this second judged result are identical, and this N is equal to
The figure place of this target verification code, it is determined that this result is for being proved to be successful;If this first judged result and this second judgement knot
Fruit is identical, and this N is less than the figure place of this target verification code, then export the first information to this user, this first prompting
To be verified corresponding with the code value of this N+1 position for the N+1 position of pointing out this user to input this identifying code to be verified of information
Hardware operation instructs;If this first judged result or this second judged result are for differing, it is determined that this result is checking
Failure.
What each possible embodiment of above-mentioned fourth aspect and above-mentioned fourth aspect was provided is carried out based on identifying code
The device of checking, its beneficial effect may refer to what each possible embodiment of above-mentioned second aspect and second aspect was brought
Beneficial effect, does not repeats them here.
The 5th aspect according to disclosure embodiment, it is provided that a kind of system carrying out based on identifying code verifying, including: the 3rd
Aspect or each possible device involved by implementation of the third aspect, and fourth aspect or each of fourth aspect may realizations
Device involved by mode.
The 6th aspect according to disclosure embodiment, it is provided that a kind of terminal, including: processor, transmitter, receptor and quilt
It is configured to store the memorizer of processor executable;
Wherein, this processor is configured to: obtain target verification code and the target hardware corresponding with this target verification code
Operational order;Prompt the user with this target verification code and this target hardware operational order, and obtain the to be verified of user's input
Identifying code and hardware operation to be verified instruction;This transmitter is configured to: send checking request message, this checking to server
Request message includes that this identifying code to be verified and this hardware operation to be verified instruct, and this checking request message is for this server
Verify according to this identifying code to be verified and the instruction of this hardware operation to be verified;This receptor is configured to: receive this clothes
The result that business device returns.
The 7th aspect according to disclosure embodiment, it is provided that a kind of server, including: processor, transmitter, receptor and
It is configured to store the memorizer of processor executable;Wherein, this receptor is configured to: receive the checking that terminal sends
Request message, this checking request message includes identifying code to be verified and the hardware operation to be verified instruction that user inputs;At this
Reason device is configured to: according to this checking request message, target verification code and the target hardware corresponding with this target verification code behaviour
Instruct, determine the result;This transmitter, is configured to return to this result this terminal.
It should be appreciated that it is only exemplary and explanatory, not that above general description and details hereinafter describe
The disclosure can be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the enforcement of the present invention
Example, and for explaining the principle of the present invention together with description.
Fig. 1 is according to a kind of method flow diagram carrying out based on identifying code verifying shown in an exemplary embodiment;
Fig. 2 is according to a kind of method flow diagram carrying out based on identifying code verifying shown in another exemplary embodiment;
Fig. 3 is according to a kind of method flow diagram carrying out based on identifying code verifying shown in another exemplary embodiment;
Fig. 4 is according to a kind of method flow diagram carrying out based on identifying code verifying shown in another exemplary embodiment;
Fig. 5 is according to a kind of block diagram carrying out the device verified based on identifying code shown in an exemplary embodiment;
Fig. 6 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment;
Fig. 7 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment;
Fig. 8 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment;
Fig. 9 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment;
Figure 10 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment;
Figure 11 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment;
Figure 12 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment;
Figure 13 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment;
Figure 14 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment;
Figure 15 is the block diagram of the entity according to the terminal shown in an exemplary embodiment;
Figure 16 is the block diagram according to the terminal 800 shown in another exemplary embodiment;
Figure 17 is the block diagram according to the server 1900 shown in another exemplary embodiment.
By above-mentioned accompanying drawing, it has been shown that the embodiment that the disclosure is clear and definite, hereinafter will be described in more detail.These accompanying drawings
With word, the scope being not intended to be limited disclosure design by any mode is described, but by with reference to specific embodiment being
Those skilled in the art illustrate the concept of the disclosure.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Explained below relates to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the present invention.On the contrary, they are only with the most appended
The example of the apparatus and method that some aspects that described in detail in claims, the present invention are consistent.
Fig. 1 is according to a kind of method flow diagram carrying out based on identifying code verifying shown in an exemplary embodiment, the party
Method can apply to need in any terminal that input validation code carries out verifying, such as mobile phone, panel computer etc., as it is shown in figure 1,
Comprise the following steps:
In a step 101, target verification code and the target hardware operational order corresponding with this target verification code are obtained.
In this step, this target verification code is for indicating the identifying code needing user to input, and this target verification code can be
Some unordered words, such as " FXCB ", " 0536 " etc..This target hardware operational order for instruction need that user inputs hard
Part operational order, this target hardware operational order includes: pressure rating, rock number of times, trace information etc..Wherein, terminal obtains
The mode of target verification code can be that terminal obtains from server.The mode that terminal obtains target hardware operational order is the most permissible
For: terminal obtains from server or is generated by terminal oneself.
In a step 102, prompt the user with this target verification code and this target hardware operational order, and it is defeated to obtain user
The identifying code to be verified entered and hardware operation to be verified instruction.
In this step, concrete, can by eject by the way of prompt window to this user point out this target verification code and
This target hardware operational order;Or, it is also possible to by send by the way of short message to this user point out this target verification code and
This target hardware operational order.Here, to this user point out the purpose of this target verification code and target hardware operational order be for
User is allowed to input identifying code to be verified and hardware operation to be verified instruction according to prompting.In this step, user is inputted
The order of identifying code to be verified and hardware operation to be verified instruction does not limit.Optionally, user can first input and treat
The identifying code of checking inputs hardware operation to be verified instruction again, or user can also first input hardware operation to be verified and instruct
Input identifying code to be verified, or user can also input hardware operation to be verified while inputting identifying code to be verified and refer to
Order.
In step 103, sending checking request message to server, this checking request message includes this checking to be verified
Code and this hardware operation to be verified instruct.
In this step, this checking request message is used for this server according to this identifying code to be verified and this hardware to be verified
Operational order is verified so that this server obtain the result time, not only need according to user input to be verified
Identifying code, in addition it is also necessary to according to the hardware operation to be verified instruction of user's input.It should be noted that according to identifying code to be verified
The step carrying out verifying with hardware operation to be verified instruction can also be carried out by terminal.
At step 104, the result that this server returns is received.
In this step, it is specifically as follows and receives the authentication response information that this server returns, this identifying code response message bag
Include this result.Wherein, this result is specifically as follows and is proved to be successful or authentication failed.Optionally, when the result it is
During authentication failed, this authentication response information can also include the failure cause of authentication failed, and this failure cause can be such as to test
Card code input error and/or hardware operation instruction input error.
The present embodiment carry out, based on identifying code, the method verified, prompt the user with target verification code and target by terminal
Hardware operation instructs, and obtains identifying code to be verified and the hardware operation to be verified instruction of user's input, and sends to server
Including the checking request message of this identifying code to be verified and the instruction of this hardware operation to be verified, this checking request message is used for should
Server is verified according to this identifying code to be verified and the instruction of this hardware operation to be verified so that user is at input validation code
Time also need to input hardware operational order, and rogue program cannot be simulated people and be completed the input of hardware operation instruction, to relevant skill
According only to identifying code, art determines that the result is compared, it is to avoid Malware is by stealing after the information such as target verification code directly
Carry out the operation not authorized by user, improve safety.
Fig. 2 is according to a kind of method flow diagram carrying out based on identifying code verifying shown in another exemplary embodiment, should
Method can apply to use identifying code to carry out in any server verified, as in figure 2 it is shown, comprise the following steps:
In step 201, receiving the checking request message that terminal sends, this checking request message includes that what user inputted treats
The identifying code of checking and hardware operation to be verified instruction.
In this step, interacting message can be carried out by cordless communication network between server and terminal, this radio communication
Network can be such as global system for mobile communications (GSM, Global System for Mobile Communication) net
Network, Long Term Evolution (LTE, Long Term Evolution) network, bluetooth (Bluetooth) network, Wireless Fidelity (WiFi,
Wireless Fidelity) network etc..
In step 202., according to this checking request message, target verification code and the target corresponding with this target verification code
Hardware operation instructs, and determines the result.
In this step, server, when determining the result, not only needs the identifying code to be verified according to user's input
With target verification code, in addition it is also necessary to according to hardware operation to be verified instruction and the target hardware operational order of user's input.
In step 203, this result is returned to this terminal.
In this step, being specifically as follows server and send authentication response information to terminal, this authentication response information includes this
The result.Wherein, this authentication response information may be considered the response message that above-mentioned checking request message is corresponding.
The present embodiment carry out, based on identifying code, the method verified, by server according to target verification code and this target
What target hardware operational order that identifying code is corresponding and terminal sent include identifying code to be verified that user inputs and to be tested
The checking request message of card hardware operation instruction, determines the result so that it is hard that user also needs to input when input validation code
Part operational order, and rogue program cannot simulate people complete hardware operation instruction input, with correlation technique in according only to checking
Code determines that the result is compared, it is to avoid Malware is by directly carrying out not awarded by user after stealing the information such as target verification code
The operation of power, improves safety.
Fig. 3 is according to a kind of method flow diagram carrying out based on identifying code verifying shown in another exemplary embodiment, should
Method, on the basis of Fig. 1 and embodiment illustrated in fig. 2, essentially describes the interaction of server and terminal, as it is shown on figure 3,
Comprise the following steps:
In step 301, terminal to server sends identifying code request message.
In this step, this identifying code request message is for this server requests authentication code.Optionally, this identifying code request
Message can include the instruction information for the input type indicating terminal to support that target hardware operational order is corresponding.Such as, when
When object run instruction is for pressure rating, this checking request message such as can include for indicating terminal support pressure to input
Instruction information.
In step 302, this server asks message according to this identifying code, sends identifying code response message to this terminal.
In this step, this identifying code response message includes target verification code.Optionally, this identifying code response message is all right
Including the target hardware operational order that this target verification code is corresponding.Optionally, step 302 is specifically as follows server and tests according to this
Card code request message, generates target verification code, generates the target hardware corresponding with this target verification code according to this target verification code
Operational order, and the identifying code response message including this target verification code and this target hardware operational order is sent to terminal.
Wherein, the target hardware operational order that this target verification code is corresponding, including: in the M bit code value of this target verification code each
The corresponding target hardware operational order of code value, wherein, M is whole more than 0 and less than or equal to the figure place of this target verification code
Number;Or, whole target verification code can a corresponding target hardware operational order.Such as, for target verification code " FXCB ",
When M is equal to figure place (that is, 4) of target verification code, primary code value F can a corresponding target hardware operational order, the
The code value X of two can a corresponding target hardware operate, and the code value C of the 3rd can refer in corresponding target hardware operation
Order, the code value B of the 4th can a corresponding target hardware operational order.With target hardware operational order with pressure rating it is
Example, server, when generating target hardware operational order according to target verification code, can determine according to the length of target verification code
Pressure rating number, and randomly choose M pressure rating in this pressure rating number.It should be noted that when identifying code response disappears
When not including target hardware operational order in breath, this target hardware operational order can also be generated by terminal, the specifically side of generation
It is similar that formula generates target hardware operational order with server according to target verification code, repeats no more.In Fig. 3 with target verification code and
As a example by target hardware operational order is all generated by server.
In step 303, this terminal prompts the user with this target verification code and this target hardware operational order, and obtains
The identifying code to be verified of user's input and hardware operation to be verified instruction.
In this step, user can carry out input validation code by the identifying code input frame in terminal.Wherein, terminal can root
According to the length of target verification code, identifying code input frame is divided into the input grid of respective amount.Such as, if target verification code
A length of 6, then identifying code input frame is divided into 6 lattice, the corresponding target verification code of every lattice.Optionally, defeated acquisition user
Before the identifying code to be verified entered and hardware operation to be verified instruction, it is also possible to including: recall entering method keyboard.
With target hardware operational order as pressure rating, and as a example by all corresponding pressure rating of the code value of each, use
Family can input validation code and hardware operation instruct in the following way: user, after often inputting a bit code value, can test
The grid position that in card code input frame, this bit code value is corresponding, the pressure rating using this bit code value corresponding presses this grid.Above-mentioned
In mode, user is after entering method keyboard clicks on a bit code value, in addition it is also necessary to press screen in the grid that this bit code value is corresponding, this
Identifying code that the understanding that sample can allow user clear and definite is currently entered or target hardware operational order, however it is necessary that user's finger
Position is changed to identifying code input frame by entering method keyboard.In order to simplify the operation of user, user clicks on entering method keyboard
Can press screen with the pressure rating that this bit code value is corresponding while one bit code value, after pressing terminates, terminal both can obtain
Obtain this bit code value and can also obtain the pressure rating that this bit code value is corresponding.
In step 304, this terminal sends checking request message to this server, and this checking request message includes that this is to be tested
The identifying code of card and this checking hardware operation instruct.
It should be noted that step 304 is similar with step 103, do not repeat them here.
In step 305, this server judges whether this identifying code to be verified mates with this target verification code.
In this step, if this identifying code to be verified mates with this target verification code, then perform step 306.If this is to be tested
The identifying code of card does not mates with this target verification code, then perform step 308.Optionally, step 305 is specifically as follows: treat this
The code value of each in the identifying code of checking performs the first judgement operation, determines the judged result of this each code value;If
The judged result of this each code value is coupling, it is determined that this identifying code to be verified mates with this target verification code;Its
In, this first judges that operation includes: judge the N position of code value and this target verification code of the N position of this identifying code to be verified
Code value the most identical;If the code value phase of the code value of the N position of this identifying code to be verified and the N position of this target verification code
With, it is determined that the judged result of the code value of the N position of this identifying code to be verified is coupling.
Within step 306, with this target hardware operational order whether this server judges the instruction of this hardware operation to be verified
Coupling.
In this step, if the instruction of this hardware operation to be verified is mated with this target hardware operational order, then perform step
307;If the instruction of this hardware operation to be verified is not mated with this target hardware operational order, then perform step 308.Optionally, step
Rapid 306 are specifically as follows: the hardware operation to be verified instruction that each the code value in identifying code to be verified to this is corresponding is held
Row second judges operation, determines the judged result of the hardware operation to be verified instruction that this each code value is corresponding;If this is each
Position code value corresponding hardware operation to be verified instruction judged result be coupling, it is determined that this hardware operation to be verified instruct
Mate with this target hardware operational order;Wherein, this second judges that operation includes: judge the N position of this identifying code to be verified
The hardware operation to be verified instruction target hardware corresponding with the code value of the N position of this target verification code corresponding to code value operate and refer to
Make the most identical;If the hardware operation to be verified instruction that the code value of the N position of this identifying code to be verified is corresponding is tested with this target
The target hardware operational order that the code value of the N position of card code is corresponding is identical, it is determined that the code of the N position of this identifying code to be verified
The judged result of the hardware operation to be verified instruction that value is corresponding is coupling.
It should be noted that server can also first judge the hardware operation to be verified instruction that user inputs in the present embodiment
Whether mate with this target hardware operational order, then judge whether are identifying code to be verified that user inputs and this target verification code
Coupling, show that the Specific Principles of the result can be: if this identifying code to be verified mates with this target verification code, and this is treated
Checking hardware operation instruction is mated with this target hardware operational order, then the result is for being proved to be successful;If this to be verified testing
Card code does not mates with this target verification code, or the instruction of this hardware operation to be verified is not mated with this target hardware operational order,
Then determine that the result is authentication failed.
In step 307, this server determines that the result is for being proved to be successful.
It should be noted that after step 307 has performed, perform step 309.
In step 308, this server determines that the result is authentication failed.
In a step 309, this result is returned to this terminal by this server.
In this step, when the result is authentication failed, terminal is after receiving this result that server returns
Can also carry out: terminal is back to target pages and shows, this target pages can be such as homepage, identifying code input page etc.
Step.
The present embodiment carry out, based on identifying code, the method verified, by inputting identifying code to be verified and to be tested user
After card hardware operation instruction, if it is determined that the identifying code to be verified of user's input mates with this target verification code, and judge to be somebody's turn to do
The hardware operation to be verified instruction of user's input is mated with this target hardware operational order, it is determined that is proved to be successful, otherwise determines
Authentication failed so that user also needs to input hardware operational order when input validation code, and rogue program cannot to simulate people complete
Become the input of hardware operation instruction, it is to avoid Malware is by directly carrying out not by user after stealing the information such as target verification code
The operation authorized, improves safety.
Fig. 4 is according to a kind of method flow diagram carrying out based on identifying code verifying shown in another exemplary embodiment, should
Method on the basis of embodiment illustrated in fig. 3, in step 304 checking request message can include that user inputs this is to be verified
The code value of the N position of identifying code and the to be verified hardware operation corresponding with the code value of the N position of this identifying code to be verified instruction.
As shown in Figure 4, step 305-step 308 could alternatively be following steps:
In step 401, this server judges code value and this target verification code of N position of this identifying code to be verified
The code value of N position is the most identical, it is thus achieved that the first judged result of the code value of this N position.
In this step, N is the integer of the figure place more than 0 and less than or equal to this target verification code.
In step 402, this server judges the hardware to be verified that the code value of N position of this identifying code to be verified is corresponding
The target verification hardware operation instruction that operational order is corresponding with the code value of the N position of this target verification code is the most identical, it is thus achieved that should
Second judged result of the code value of N position.
It should be noted that do not have the restriction of sequencing between step 401 and step 402.
In step 403, this server judges whether this first judged result is identical with this second judged result.
In this step, if this first judged result is identical with this second judged result, then perform step 404.If should
First judged result or this second judged result for differing, then perform step 407.Optionally, in the first judged result or
When two judged results are for differing, it is also possible to including: this server exports the second information to this user, this second prompting letter
Breath is for pointing out the reason of this user's authentication failed.Concrete, if this first judged result is for differing, then this authentication failed
Reason is identifying code input error;If this second judged result is for differing, then the reason that this identifying code is failed is hardware operation
Instruction input error.It should be noted that this server can be by being sent to this terminal by this second information, so that being somebody's turn to do
Terminal exports the mode of this second information to this user, it is achieved this server exports the second information to this user.
In step 404, this server judges whether N is equal to the figure place of this target verification code.
In this step, if N is equal to the figure place of this target verification code, then perform step 405.If N is less than this target verification code
Position, then perform step 406.
In step 405, this server determines that the result is for being proved to be successful.
It should be noted that step 405 terminates after having performed.
In a step 406, this server exports the first information to this user.
In this step, this first information for point out N+1 position that this user inputs this identifying code to be verified and
The hardware operation to be verified that the code value of this N+1 position is corresponding instructs.It should be noted that this server can by by this first
Information is sent to this terminal, to make this terminal in the way of this user exports this first information, it is achieved this server
The first information is exported to this user.
It should be noted that after step 406 has performed, this server can be further to this identifying code to be verified
The hardware operation to be verified instruction that the code value of N+1 position is corresponding with the code value of the N+1 position of this identifying code to be verified is tested
Card, code value and this checking to be verified to the N position of this identifying code to be verified in detailed process and step 401-step 407
The process that the hardware operation to be verified instruction that the code value of N position of code is corresponding carries out verifying is similar to, and repeats no more.
In step 407, this server determines that the result is authentication failed.
It should be noted that differring primarily in that of the present embodiment and embodiment illustrated in fig. 3, defeated user in the present embodiment
Enter identifying code and hardware operation instruction during verify, and embodiment illustrated in fig. 3 be inputted user all of
Verify again after identifying code and hardware operation instruction.In the present embodiment, implementing of other parts is implemented with shown in Fig. 3
In example similar, therefore about the present embodiment not have the part of detailed description, specifically may refer to embodiment illustrated in fig. 3.
The present embodiment carry out, based on identifying code, the method verified, by instructing at user's input validation code and hardware operation
During verify, determine the result so that user also needs to input hardware operational order when input validation code, and
Rogue program cannot be simulated people and be completed the input of hardware operation instruction, it is to avoid Malware is by stealing the letters such as target verification code
Directly carry out the operation not authorized by user after breath, improve safety.
Following for disclosure device embodiment, may be used for performing method of disclosure embodiment.Real for disclosure device
Execute the details not disclosed in example, refer to method of disclosure embodiment.
Fig. 5 is according to a kind of block diagram carrying out the device verified based on identifying code shown in an exemplary embodiment.This dress
Put can pass through software, hardware or both be implemented in combination with become the some or all of of terminal.With reference to Fig. 5, this device bag
Include the first acquisition module the 501, second acquisition module the 502, first sending module 503 and receiver module 504.
Wherein, the first acquisition module 501, it is configured to obtain target verification code and the mesh corresponding with this target verification code
Mark hardware operation instruction;
Second acquisition module 502, is configured to prompt the user with this target verification code that the first acquisition module 501 gets
And this target hardware operational order, and obtain identifying code to be verified and the hardware operation to be verified instruction of user's input;
First sending module 503, is configured to send checking request message to server, and this checking request message includes the
This identifying code to be verified that two acquisition modules 502 get and this hardware operation to be verified instruct, and this checking request message is used
Verify according to this identifying code to be verified and the instruction of this hardware operation to be verified in this server;
Receiver module 504, is configured to receive the result that this server returns.
Optionally, the target hardware operational order that this target verification code is corresponding, including: the M bit code value of this target verification code
In each the corresponding target hardware operational order of code value;Wherein, M is more than 0 and less than or equal to this target verification code
The integer of figure place.
Optionally, this target hardware operational order is pressure rating.
In sum, what disclosure embodiment provided carries out, based on identifying code, the device verified, by the second acquisition module
Prompt the user with target verification code and target hardware operational order, and obtain the identifying code to be verified of user's input and to be verified
Hardware operation instructs, and the first sending module sends to server and includes that this identifying code to be verified and this hardware operation to be verified refer to
The checking request message of order, this checking request message is used for this server according to this identifying code to be verified and this hardware to be verified
Operational order is verified so that user also needs to input hardware operational order when input validation code, and rogue program cannot
Simulation people completes the input of hardware operation instruction, determine the result with correlation technique according only to identifying code compared with, it is to avoid
Malware, by the operation directly carrying out not authorized by user after stealing the information such as target verification code, improves safety.
Fig. 6 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment.Ginseng
According to Fig. 6, this device on the basis of block diagram shown in Fig. 5, the first acquisition module 501, including: first obtain submodule 5011.Should
First obtains submodule 5011, is configured to receive the identifying code response message that this server sends, this identifying code response message
Including this target verification code and this target hardware operational order.
In sum, what disclosure embodiment provided carries out, based on identifying code, the device verified, obtains submodule by first
Block receives the identifying code response message including target verification code and target hardware operational order that server sends so that terminal can
To obtain target verification code and target hardware operational order.
Fig. 7 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment.Ginseng
According to Fig. 7, this device is on the basis of block diagram shown in Fig. 6, and this device can also include: the second sending module 505.
This second sending module 505, is configured to send identifying code request message to this server, and the request of this identifying code disappears
Breath includes the instruction information for the input type indicating terminal to support that this target hardware operational order is corresponding.
Fig. 8 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment.Ginseng
According to Fig. 8, this device on the basis of block diagram shown in Fig. 5, the first acquisition module 501, including: second obtain submodule 5012.
This second acquisition submodule 5012, is configured to:
Receiving the identifying code response message that server sends, this identifying code response message includes this target verification code;According to
This target verification code, generates this target hardware operational order.
In sum, what disclosure embodiment provided carries out, based on identifying code, the device verified, obtains submodule by second
Block receives the identifying code response message including target verification code that server sends, and generates target hardware according to target verification code
Operational order so that terminal can obtain target verification code and target hardware operational order.
Fig. 9 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment.Should
Device can pass through software, hardware or both be implemented in combination with become the some or all of of server.With reference to Fig. 9, this dress
Put and include: the first receiver module 901, determine module 902 and the first sending module 903.
Wherein, the first receiver module 901, it is configured to receive the checking request message that terminal sends, this checking request disappears
Cease identifying code to be verified and the hardware operation to be verified instruction including that user inputs;
Determine module 902, be configured to ask message, target to be tested according to this checking that the first receiver module 901 receives
Card code and the target hardware operational order corresponding with this target verification code, determine the result;
First sending module 903, is configured to determine that this result that module 902 determines returns to this terminal.
Optionally, the target hardware operational order that this target verification code is corresponding, including:
The corresponding target hardware operational order of the code value of each in the M bit code value of this target verification code;Wherein, M is
The integer of the figure place more than 0 and less than or equal to this target verification code.
In sum, what disclosure embodiment provided carries out, based on identifying code, the device verified, be determined by module according to
What target hardware operational order that target verification code is corresponding with this target verification code and terminal sent include, and user inputs treats
The checking request message of the identifying code of checking and hardware operation to be verified instruction, determines the result so that user tests in input
Also need to input hardware operational order during card code, and rogue program cannot be simulated people and be completed the input of hardware operation instruction, with phase
According only to identifying code, pass technology determines that the result is compared, it is to avoid after Malware is by stealing the information such as target verification code
Directly carry out the operation not authorized by user, improve safety.
Figure 10 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment.Ginseng
According to Figure 10, this device is on the basis of block diagram shown in Fig. 9, and optionally, this device also includes the second receiver module 904 and second
Send module 905.
Wherein, this second receiver module 904, it is configured to receive the identifying code request message that this terminal sends, this checking
Code request message includes the instruction information for the input type indicating terminal to support that this target hardware operational order is corresponding;
This second sending module 905, is configured to ask message according to this identifying code, sends identifying code response to this terminal
Message, this identifying code response message includes this target verification code and this target hardware operational order.
In sum, what disclosure embodiment provided carries out, based on identifying code, the device verified, by the second sending module
The identifying code response message including target verification code and target hardware operational order is sent so that terminal can obtain to terminal
This target verification code and target hardware operational order.
Figure 11 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment.Ginseng
According to Figure 11, this device is on the basis of block diagram shown in Fig. 9, optionally, determines that module 902 includes that first determines module 9021;
Wherein, first determines module 9021, is configured to:
Judge whether this identifying code to be verified mates with this target verification code;
If this identifying code to be verified mates with this target verification code, then judge the instruction of this hardware operation to be verified and this mesh
Whether mark hardware operation instruction mates;
If the instruction of this hardware operation to be verified is mated with this target hardware operational order, it is determined that this result is checking
Success.
In sum, what disclosure embodiment provided carries out, based on identifying code, the device verified, determines module by first
After user inputs identifying code to be verified and hardware operation to be verified instruction, if it is determined that the checking to be verified of user's input
Code mates with this target verification code, and judges that the hardware operation to be verified that this user inputs instructs and this target hardware operational order
Coupling, it is determined that be proved to be successful, otherwise determine authentication failed so that user also needs to input hardware operation when input validation code
Instruction, and rogue program cannot be simulated people and be completed the input of hardware operation instruction, it is to avoid Malware is tested by stealing target
Directly carry out the operation not authorized by user after the information such as card code, improve safety.
Figure 12 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment.Ginseng
According to Figure 12, this device is on the basis of block diagram shown in Figure 11, and optionally, first determines that module 9021 includes that first determines submodule
90211。
Wherein, this first determines submodule 90211, is configured to: each the code in identifying code to be verified to this
Value performs the first judgement operation, determines the judged result of this each code value;If the judged result of this each code value is equal
For coupling, it is determined that this identifying code to be verified mates with this target verification code;
Wherein, this first judges that operation includes:
Judge that the code value of the N position of this identifying code to be verified is the most identical with the code value of the N position of this target verification code;
If the code value of the N position of this identifying code to be verified is identical with the code value of the N position of this target verification code, it is determined that
The judged result of the code value of the N position of this identifying code to be verified is coupling.
Figure 13 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment.Ginseng
According to Figure 13, this device is on the basis of block diagram shown in Figure 11, and optionally, first determines that module 9021 includes that second determines submodule
90212。
This second determines submodule 90212, is configured to: the code value of each in the identifying code to be verified to this is corresponding
Hardware operation to be verified instruction perform the second judgement operation, determine that the hardware operation to be verified that this each code value is corresponding refers to
The judged result of order;If the judged result of the hardware operation to be verified instruction that this each code value is corresponding is coupling, the most really
Fixed this hardware operation to be verified instruction is mated with this target hardware operational order;
Wherein, this second judges that operation includes:
Judge hardware operation to be verified instruction and this target verification that the code value of the N position of this identifying code to be verified is corresponding
The target hardware operational order that the code value of the N position of code is corresponding is the most identical;
If the hardware operation to be verified instruction that the code value of the N position of this identifying code to be verified is corresponding and this target verification code
Target hardware operational order corresponding to the code value of N position identical, it is determined that the code value pair of the N position of this identifying code to be verified
The judged result of the hardware operation to be verified instruction answered is coupling.
Figure 14 is according to a kind of block diagram carrying out the device verified based on identifying code shown in another exemplary embodiment.Ginseng
According to Figure 14, this device is on the basis of block diagram shown in Fig. 9, optionally, this checking request message include that user inputs this is to be tested
The code value of the N position of the identifying code of card and the to be verified hardware operation corresponding with the code value of the N position of this identifying code to be verified
Instruction;Determine that module 902 includes that second determines module 9022;
This second determines module 9022, is configured to:
Judge that the code value of the N position of this identifying code to be verified is the most identical with the code value of the N position of this target verification code,
Obtain the first judged result of the code value of this N position;This N is more than 0 and less than or equal to figure place whole of this target verification code
Number;
Judge hardware operation to be verified instruction and this target verification that the code value of the N position of this identifying code to be verified is corresponding
The target verification hardware operation instruction that the code value of the N position of code is corresponding is the most identical, it is thus achieved that the second judgement of the code value of this N position
Result;
If this first judged result and this second judged result are identical, and this N is equal to the figure place of this target verification code,
Then determine that this result is for being proved to be successful;
If this first judged result and this second judged result are identical, and this N is less than the figure place of this target verification code,
Then exporting the first information to this user, this first information is for pointing out this user to input this identifying code to be verified
The hardware operation to be verified instruction that N+1 position is corresponding with the code value of this N+1 position;
If this first judged result or this second judged result are for differing, it is determined that this result is authentication failed.
In sum, what disclosure embodiment provided carries out, based on identifying code, the device verified, determines module by second
Verify during user's input validation code and hardware operation instruct, determine the result so that user tests in input
Also need to input hardware operation during card code, and rogue program cannot be simulated people and be completed the input of hardware operation, it is to avoid malice is the softest
Part, by the operation directly carrying out not authorized by user after stealing the information such as target verification code, improves safety.
The disclosure also provides for a kind of system carrying out based on identifying code and verifying, including: above-mentioned Fig. 5-Fig. 8 is arbitrary based on checking
Code carries out the device described in device embodiment verified, and the arbitrary device carrying out verifying of above-mentioned Fig. 9-Figure 14 based on identifying code
Device described in embodiment.It is similar with said apparatus embodiment with effect that it realizes principle, does not repeats them here.
About the device in above-described embodiment, wherein modules performs the concrete mode of operation in relevant the method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
The foregoing describing and carry out, based on identifying code, the inner function module of device and the structural representation verified, Figure 15 is root
According to the block diagram of the entity of the terminal shown in an exemplary embodiment, this terminal can be such as mobile phone or panel computer etc..Such as figure
Shown in 15, this equipment may include that processor 1501, transmitter 1502, receptor 1503 and is configured to store processor
The memorizer 1504 of the executable instruction of 1501.
Processor 1501 is configured to: obtain target verification code and the target hardware corresponding with this target verification code operation
Instruction;Prompt the user with this target verification code and this target hardware operational order, and obtain to be verified the testing of user's input
Card code and hardware operation to be verified instruction;
Transmitter 1502 is configured to: send checking request message to server, and this checking request message includes that this is to be tested
The identifying code of card and this hardware operation to be verified instruct, and this checking request message is used for this server according to this checking to be verified
Code and the instruction of this hardware operation to be verified are verified;
Receptor 1503 is configured to: receive the result that this server returns.
The block diagram of the entity of server is similar with the block diagram of the entity of terminal, equally includes: processor, transmitter,
Receptor and the memorizer being configured to storage processor executable;
Wherein, described receptor is configured to: receive the checking request message that terminal sends, described checking request message bag
Include identifying code to be verified and the hardware operation to be verified instruction of user's input;
Described processor is configured to: according to described checking request message, target verification code and with described target verification
The target hardware operational order that code is corresponding, determines the result;
Described transmitter, is configured to described the result is returned to described terminal.
In the embodiment of above-mentioned terminal and server, it should be appreciated that this processor can be CPU (English:
Central Processing Unit, is called for short: CPU), it is also possible to be other general processors, digital signal processor (English:
Digital Signal Processor, is called for short: DSP), special IC (English: Application Specific
Integrated Circuit, is called for short: ASIC) etc..General processor can be microprocessor, and this processor of person can also be to appoint
The processor etc. what is conventional.And aforesaid memorizer can be read only memory (English: read-only memory, abbreviation:
ROM), random access memory (English: random access memory, RAM), flash memory, hard disk or solid be called for short:
State hard disk.SIM is also referred to as subscriber identification card, smart card, and digital mobile telephone must be loaded onto this card and can use.I.e.
Computer chip stores the information of digital mobile phone client, the content such as the key of encryption and telephone directory of user.Before
The receptor stated can be the element with receive capabilities, such as, have the antenna of receive capabilities.Aforesaid transmitter can be
There is the element of sending function, such as, there is the antenna of sending function.Step in conjunction with the method disclosed in the embodiment of the present invention
Hardware processor can be embodied directly in performed, or complete with the hardware in processor and software module combination execution.
Figure 16 is the block diagram according to the terminal 800 shown in another exemplary embodiment.Such as, terminal 800 can be mobile
Phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, armarium, body-building equipment,
Personal digital assistant etc..
With reference to Figure 16, terminal 800 can include following one or more assembly: processes assembly 802, memorizer 804, power supply
Assembly 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor cluster 814, and
Communications component 816.
Process assembly 802 and generally control the integrated operation of terminal 800, such as with display, call, data communication, phase
The operation that machine operation and record operation are associated.Process assembly 802 and can include that one or more processor 820 performs to refer to
Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 802 can include one or more module, just
Mutual in process between assembly 802 and other assemblies.Such as, process assembly 802 and can include multi-media module, many to facilitate
Media component 808 and process between assembly 802 mutual.
Memorizer 804 is configured to store various types of data to support the operation in terminal 800.Showing of these data
Example includes any application program for operation in terminal 800 or the instruction of method, contact data, telephone book data, disappears
Breath, picture, video etc..Memorizer 804 can be by any kind of volatibility or non-volatile memory device or their group
Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable compile
Journey read only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash
Device, disk or CD.
The various assemblies that power supply module 806 is terminal 800 provide electric power.Power supply module 806 can include power management system
System, one or more power supplys, and other generate, manage and distribute, with for terminal 800, the assembly that electric power is associated.
The screen of one output interface of offer that multimedia groupware 808 is included between this terminal 800 and user.At some
In embodiment, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen
May be implemented as touch screen, to receive the input signal from user.Touch panel includes one or more touch sensor
With the gesture on sensing touch, slip and touch panel.This touch sensor can not only sense touch or the limit of sliding action
Boundary, but also detect the persistent period relevant to this touch or slide and pressure.In certain embodiments, multimedia groupware
808 include a front-facing camera and/or post-positioned pick-up head.When equipment 800 is in operator scheme, such as screening-mode or video screen module
During formula, front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Each front-facing camera and rearmounted take the photograph
As head can be a fixing optical lens system or has focal length and optical zoom ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.Such as, audio-frequency assembly 810 includes a Mike
Wind (MIC), when terminal 800 is in operator scheme, during such as call model, logging mode and speech recognition mode, mike is joined
It is set to receive external audio signal.The audio signal received can be further stored at memorizer 804 or via communication set
Part 816 sends.In certain embodiments, audio-frequency assembly 810 also includes a speaker, is used for exporting audio signal.
I/O interface 812 provides interface for processing between assembly 802 and peripheral interface module, above-mentioned peripheral interface module can
To be keyboard, put striking wheel, button etc..These buttons may include but be not limited to: home button, volume button, start button and lock
Set button.
Sensor cluster 814 includes one or more sensor, for providing the state of various aspects to comment for terminal 800
Estimate.Such as, what sensor cluster 814 can detect equipment 800 opens/closed mode, the relative localization of assembly, such as this group
Part is display and the keypad of terminal 800, and sensor cluster 814 can also detect terminal 800 or 800 1 assemblies of terminal
Position change, the presence or absence that user contacts with terminal 800, terminal 800 orientation or acceleration/deceleration and the temperature of terminal 800
Degree change.Sensor cluster 814 can include proximity transducer, is configured to detect when not having any physical contact attached
The existence of nearly object.Sensor cluster 814 can also include optical sensor, such as CMOS or ccd image sensor, is used in imaging
Application uses.In certain embodiments, this sensor cluster 814 can also include acceleration transducer, gyro sensor,
Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 816 is configured to facilitate the communication of wired or wireless mode between terminal 800 and other equipment.Terminal
800 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.An exemplary enforcement
In example, communications component 816 receives the broadcast singal from external broadcasting management system or broadcast related information via broadcast channel.
In one exemplary embodiment, this communications component 816 also includes near-field communication (NFC) module, to promote junction service.Example
As, can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology,
Bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, terminal 800 can be by one or more application specific integrated circuits (ASIC), numeral letter
Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components realize, be used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable recording medium including instruction, example are additionally provided
As included the memorizer 804 of instruction, above-mentioned instruction can have been performed said method by the processor 820 of terminal 800.Such as,
This non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and
Optical data storage devices etc..
A kind of non-transitory computer-readable recording medium, when the instruction in storage medium is held by the processor of terminal 800
During row so that terminal 800 is able to carry out a kind of method carrying out based on identifying code and verifying, the method includes:
Obtain target verification code and the target hardware operational order corresponding with this target verification code;Prompt the user with this mesh
Mark identifying code and this target hardware operational order, and obtain the identifying code to be verified of user's input and hardware operation to be verified
Instruction;Sending checking request message to server, this checking request message includes that this identifying code to be verified and this are to be verified firmly
Part operational order, this checking request message refers to according to this identifying code to be verified and this hardware operation to be verified for this server
Order is verified;Receive the result that this server returns.
Further, this acquisition target verification code and the target hardware operational order corresponding with this target verification code, bag
Include: receiving the identifying code response message that this server sends, this identifying code response message includes this target verification code and this mesh
Mark hardware operation instruction.
Further, the method also includes: send identifying code request message, this identifying code request message bag to this server
Include the instruction information for the input type indicating terminal to support that this target hardware operational order is corresponding.
Further, this acquisition target verification code and the target hardware operational order corresponding with this target verification code, bag
Include: receiving the identifying code response message that server sends, this identifying code response message includes this target verification code;According to this target
Identifying code, generates this target hardware operational order.
Further, the target hardware operational order that this target verification code is corresponding, including: the M bit code of this target verification code
The corresponding target hardware operational order of the code value of each in value;Wherein, M is more than 0 and less than or equal to this target verification
The integer of the figure place of code.
Further, this target hardware operational order is pressure rating.
Figure 17 is the block diagram according to the server 1900 shown in another exemplary embodiment.With reference to Figure 17, server 1900
Including processing assembly 1922, it farther includes one or more processor, and by the memorizer representated by memorizer 1932
Resource, can be by the instruction of the execution processing assembly 1922, such as application program for storage.The application of storage in memorizer 1932
Program can include one or more each corresponding to one group instruction module.Joined additionally, process assembly 1922
It is set to perform instruction, to perform said method.
Server 1900 can also include that a power supply module 1926 is configured to perform the power management of server 1900,
One wired or wireless network interface 1950 is configured to be connected to server 1900 network, and an input and output (I/O)
Interface 1958.Server 1900 can operate based on the operating system being stored in memorizer 1932, such as Windows
ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
In the exemplary embodiment, a kind of non-transitory computer-readable recording medium including instruction, example are additionally provided
As included the memorizer 1932 of instruction, above-mentioned instruction can have been performed above-mentioned side by the process assembly 1922 of server 1900
Method.Such as, this non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, magnetic
Band, floppy disk and optical data storage devices etc..
A kind of non-transitory computer-readable recording medium, when the instruction in storage medium is performed by the processor of server
Time so that server is able to carry out a kind of method carrying out based on identifying code and verifying, the method includes:
Receiving the checking request message that terminal sends, this checking request message includes the identifying code to be verified that user inputs
Instruct with hardware operation to be verified;According to this checking request message, target verification code and the mesh corresponding with this target verification code
Mark hardware operation instruction, determines the result;This result is returned to this terminal.
Further, the method also includes: receive the identifying code request message that this terminal sends, this identifying code request message
Including the instruction information for indicating input type that terminal supports that this target hardware operational order is corresponding;Please according to this identifying code
Seeking message, send identifying code response message to this terminal, this identifying code response message includes this target verification code and this target
Hardware operation instructs.
Further, the target hardware operational order that this target verification code is corresponding, including: the M bit code of this target verification code
The corresponding target hardware operational order of the code value of each in value;Wherein, M is more than 0 and less than or equal to this target verification
The integer of the figure place of code.
Further, this is according to this checking request message, target verification code and the target corresponding with this target verification code
Hardware operation instructs, and determines the result, including: judge whether this identifying code to be verified mates with this target verification code;If
This identifying code to be verified mates with this target verification code, then judge that the instruction of this hardware operation to be verified operates with this target hardware
Whether instruction mates;If the instruction of this hardware operation to be verified is mated with this target hardware operational order, it is determined that this result
For being proved to be successful.
Further, this judges whether this identifying code to be verified mates with this target verification code, including: to be verified to this
Identifying code in the code value of each perform the first judgement operation, determine the judged result of this each code value;If this is every
The judged result of the code value of is coupling, it is determined that this identifying code to be verified mates with this target verification code;
Wherein, this first judges that operation includes:
Judge that the code value of the N position of this identifying code to be verified is the most identical with the code value of the N position of this target verification code;
If the code value of the N position of this identifying code to be verified is identical with the code value of the N position of this target verification code, it is determined that this is to be verified
Identifying code N position code value judged result for coupling.
Further, this judges whether the instruction of this hardware operation to be verified mates with this target hardware operational order, including:
The hardware operation to be verified instruction that each the code value in identifying code to be verified to this is corresponding performs the second judgement operation, really
The judged result of the hardware operation to be verified instruction that fixed this each code value is corresponding;If corresponding to be tested of this each code value
The judged result of card hardware operation instruction is coupling, it is determined that the instruction of this hardware operation to be verified refers to the operation of this target hardware
Order coupling;
Wherein, this second judges that operation includes: judge corresponding to be verified of the code value of the N position of this identifying code to be verified
It is the most identical that hardware operation instructs the target hardware operational order corresponding with the code value of the N position of this target verification code;If this is treated
The code value of hardware operation to be verified instruction corresponding to the code value of N position of the identifying code of checking and the N position of this target verification code
Corresponding target hardware operational order is identical, it is determined that the code value of the N position of this identifying code to be verified corresponding to be verified firmly
The judged result of part operational order is coupling.
Further, this checking request message include this identifying code to be verified that user inputs N position code value and
The to be verified hardware operation instruction corresponding with the code value of the N position of this identifying code to be verified;
This refers to according to this checking request message, target verification code and the target hardware corresponding with this target verification code operation
Order, determines the result, including:
Judge that the code value of the N position of this identifying code to be verified is the most identical with the code value of the N position of this target verification code,
Obtain the first judged result of the code value of this N position;This N is more than 0 and less than or equal to figure place whole of this target verification code
Number;Judge hardware operation to be verified instruction and this target verification code that the code value of the N position of this identifying code to be verified is corresponding
The target verification hardware operation instruction that the code value of N position is corresponding is the most identical, it is thus achieved that the second judgement knot of the code value of this N position
Really;If this first judged result and this second judged result are identical, and this N is equal to the figure place of this target verification code, the most really
This result fixed is for being proved to be successful;If this first judged result and this second judged result are identical, and this N is less than this mesh
The figure place of mark identifying code, then export the first information to this user, and this first information is used for pointing out this user to input this
The hardware operation to be verified that the N+1 position of identifying code to be verified is corresponding with the code value of this N+1 position instructs;If this first judgement
Result or this second judged result are for differing, it is determined that this result is authentication failed.
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to its of the present invention
Its embodiment.The application is intended to any modification, purposes or the adaptations of the present invention, these modification, purposes or
Person's adaptations is followed the general principle of the present invention and includes the undocumented common knowledge in the art of the disclosure
Or conventional techniques means.Description and embodiments is considered only as exemplary, and true scope and spirit of the invention are by following
Claim is pointed out.
It should be appreciated that the invention is not limited in precision architecture described above and illustrated in the accompanying drawings, and
And various modifications and changes can carried out without departing from the scope.The scope of the present invention is only limited by appended claim.
Claims (29)
1. the method carrying out verifying based on identifying code, it is characterised in that including:
Obtain target verification code and the target hardware operational order corresponding with described target verification code;
Prompt the user with described target verification code and described target hardware operational order, and obtain the to be verified of user's input
Identifying code and hardware operation to be verified instruction;
Sending checking request message to server, described checking request message includes described identifying code to be verified and described to be tested
Card hardware operation instruction, described checking request message for described server according to described identifying code to be verified and described to be tested
Card hardware operation instruction is verified;
Receive the result that described server returns.
Method the most according to claim 1, it is characterised in that described acquisition target verification code and with described target verification
The target hardware operational order that code is corresponding, including:
Receive described server send identifying code response message, described identifying code response message include described target verification code with
And described target hardware operational order.
Method the most according to claim 2, it is characterised in that described method also includes:
Sending identifying code request message to described server, described identifying code request message includes for indicating terminal to support described
The instruction information of the input type that target hardware operational order is corresponding.
Method the most according to claim 1, it is characterised in that described acquisition target verification code and with described target verification
The target hardware operational order that code is corresponding, including:
Receiving the identifying code response message that server sends, described identifying code response message includes described target verification code;
According to described target verification code, generate described target hardware operational order.
Method the most according to claim 1, it is characterised in that the target hardware operation that described target verification code is corresponding refers to
Order, including:
The corresponding target hardware operational order of the code value of each in the M bit code value of described target verification code;Wherein, M is big
In 0 and less than or equal to the integer of figure place of described target verification code.
6. according to the method described in any one of claim 1-5, it is characterised in that described target hardware operational order is pressure etc.
Level.
7. the method carrying out verifying based on identifying code, it is characterised in that including:
Receive the checking request message that terminal sends, described checking request message include identifying code to be verified that user inputs and
Hardware operation to be verified instructs;
Refer to according to described checking request message, target verification code and the target hardware corresponding with described target verification code operation
Order, determines the result;
Described the result is returned to described terminal.
Method the most according to claim 7, it is characterised in that described method also includes:
Receiving the identifying code request message that described terminal sends, described identifying code request message includes for indicating terminal to support institute
State the instruction information of input type corresponding to target hardware operational order;
Ask message according to described identifying code, send identifying code response message, described identifying code response message bag to described terminal
Include described target verification code and described target hardware operational order.
9. according to the method described in claim 7 or 8, it is characterised in that the target hardware operation that described target verification code is corresponding
Instruction, including:
The corresponding target hardware operational order of the code value of each in the M bit code value of described target verification code;Wherein, M is big
In 0 and less than or equal to the integer of figure place of described target verification code.
Method the most according to claim 9, it is characterised in that described according to described checking request message, target verification code
And the target hardware operational order corresponding with described target verification code, determine the result, including:
Judge whether described identifying code to be verified mates with described target verification code;
If described identifying code to be verified mates with described target verification code, then judge the instruction of described hardware operation to be verified and institute
State whether target hardware operational order mates;
If the instruction of described hardware operation to be verified is mated with described target hardware operational order, it is determined that described the result is for testing
Demonstrate,prove successfully.
11. methods according to claim 10, it is characterised in that the described identifying code to be verified of described judgement and described mesh
Whether mark identifying code mates, including:
The code value of each in described identifying code to be verified is performed the first judgement operation, determines each code value described
Judged result;
If each the judged result of code value described is coupling, it is determined that described identifying code to be verified is tested with described target
Card code coupling;
Wherein, described first judges that operation includes:
Judge that the code value of the N position of described identifying code to be verified is the most identical with the code value of the N position of described target verification code;
If the code value of the N position of described identifying code to be verified is identical with the code value of the N position of described target verification code, it is determined that
The judged result of the code value of the N position of described identifying code to be verified is coupling.
12. methods according to claim 10, it is characterised in that the instruction of described judgement described hardware operation to be verified and institute
State whether target hardware operational order mates, including:
Hardware operation to be verified instruction to the code value of each in described identifying code to be verified is corresponding performs the second judgement
Operation, determines the judged result of the hardware operation to be verified instruction that each code value described is corresponding;
If the judged result of the hardware operation to be verified instruction that each code value described is corresponding is coupling, it is determined that described in treat
Checking hardware operation instruction is mated with described target hardware operational order;
Wherein, described second judges that operation includes:
Judge hardware operation to be verified instruction that the code value of the N position of described identifying code to be verified is corresponding and described target verification
The target hardware operational order that the code value of the N position of code is corresponding is the most identical;
If the hardware operation to be verified instruction that the code value of the N position of described identifying code to be verified is corresponding and described target verification code
Target hardware operational order corresponding to the code value of N position identical, it is determined that the code value of the N position of described identifying code to be verified
The judged result of corresponding hardware operation to be verified instruction is coupling.
13. methods according to claim 9, it is characterised in that it is described that described checking request message includes that user inputs
The code value of the N position of identifying code to be verified and corresponding with the code value of the N position of described identifying code to be verified to be verified firmly
Part operational order;
Described according to described checking request message, target verification code and the target hardware corresponding with described target verification code operation
Instruction, determines the result, including:
Judge that the code value of the N position of described identifying code to be verified is the most identical with the code value of the N position of described target verification code,
Obtain the first judged result of the code value of described N position;Described N is more than 0 and is less than or equal to the position of described target verification code
The integer of number;
Judge hardware operation to be verified instruction that the code value of the N position of described identifying code to be verified is corresponding and described target verification
The target verification hardware operation instruction that the code value of the N position of code is corresponding is the most identical, it is thus achieved that the second of the code value of described N position is sentenced
Disconnected result;
If described first judged result and described second judged result are identical, and described N is equal to described target verification code
Figure place, it is determined that described the result is for being proved to be successful;
If described first judged result and described second judged result are identical, and described N is less than described target verification code
Figure place, then export the first information to described user, described first information be used for pointing out described user input described in treat
The hardware operation to be verified that the N+1 position of the identifying code of checking is corresponding with the code value of described N+1 position instructs;
If described first judged result or described second judged result are for differing, it is determined that described the result loses for checking
Lose.
14. 1 kinds of devices carrying out verifying based on identifying code, it is characterised in that including:
First acquisition module, is configured to obtain target verification code and the target hardware corresponding with described target verification code operation
Instruction;
Second acquisition module, is configured to prompt the user with described target verification code and described target hardware operational order, and
Obtain identifying code to be verified and the hardware operation to be verified instruction of user's input;
First sending module, is configured to verify that request message, described checking request message are treated described in including to server transmission
Checking identifying code and described hardware operation to be verified instruction, described checking request message for described server according to described in treat
The identifying code of checking and the instruction of described hardware operation to be verified are verified;
Receiver module, is configured to receive the result that described server returns.
15. devices according to claim 14, it is characterised in that described first acquisition module includes: first obtains submodule
Block;
Described first obtains submodule, is configured to receive the identifying code response message that described server sends, described identifying code
Response message includes described target verification code and described target hardware operational order.
16. devices according to claim 15, it is characterised in that described device also includes: the second sending module;
Described second sending module, is configured to send identifying code request message to described server, and the request of described identifying code disappears
Breath includes the instruction information for the input type indicating terminal to support that described target hardware operational order is corresponding.
17. devices according to claim 14, it is characterised in that described first acquisition module includes: second obtains submodule
Block;
Described second obtains submodule, is configured to:
Receiving the identifying code response message that server sends, described identifying code response message includes described target verification code;According to
Described target verification code, generates described target hardware operational order.
18. devices according to claim 14, it is characterised in that the target hardware operation that described target verification code is corresponding refers to
Order, including:
The corresponding target hardware operational order of the code value of each in the M bit code value of described target verification code;Wherein, M is big
In 0 and less than or equal to the integer of figure place of described target verification code.
19. according to the device described in any one of claim 14-18, it is characterised in that described target hardware operational order is pressure
Power grade.
20. 1 kinds of devices carrying out verifying based on identifying code, it is characterised in that including:
First receiver module, is configured to receive the checking request message that terminal sends, and described checking request message includes user
The identifying code to be verified of input and hardware operation to be verified instruction;
Determine module, be configured to according to described checking request message, target verification code and corresponding with described target verification code
Target hardware operational order, determine the result;
First sending module, is configured to described the result is returned to described terminal.
21. devices according to claim 20, it is characterised in that described device also includes: the second receiver module and second
Sending module;
Described second receiver module, is configured to receive the identifying code request message that described terminal sends, and described identifying code is asked
Message includes the instruction information for the input type indicating terminal to support that described target hardware operational order is corresponding;
Described second sending module, is configured to ask message according to described identifying code, sends identifying code response to described terminal
Message, described identifying code response message includes described target verification code and described target hardware operational order.
22. according to the device described in claim 20 or 21, it is characterised in that the target hardware behaviour that described target verification code is corresponding
Instruct, including:
The corresponding target hardware operational order of the code value of each in the M bit code value of described target verification code;Wherein, M is big
In 0 and less than or equal to the integer of figure place of described target verification code.
23. devices according to claim 22, it is characterised in that described determine that module includes: first determines module;
Described first determines module, is configured to:
Judge whether described identifying code to be verified mates with described target verification code;
If described identifying code to be verified mates with described target verification code, then judge the instruction of described hardware operation to be verified and institute
State whether target hardware operational order mates;
If the instruction of described hardware operation to be verified is mated with described target hardware operational order, it is determined that described the result is for testing
Demonstrate,prove successfully.
24. devices according to claim 23, it is characterised in that described first determines that module includes that first determines submodule
Block;
Described first determines submodule, is configured to:
The code value of each in described identifying code to be verified is performed the first judgement operation, determines each code value described
Judged result;
If each the judged result of code value described is coupling, it is determined that described identifying code to be verified is tested with described target
Card code coupling;
Wherein, described first judges that operation includes:
Judge that the code value of the N position of described identifying code to be verified is the most identical with the code value of the N position of described target verification code;
If the code value of the N position of described identifying code to be verified is identical with the code value of the N position of described target verification code, it is determined that
The judged result of the code value of the N position of described identifying code to be verified is coupling.
25. devices according to claim 23, it is characterised in that described first determines that module includes that second determines submodule
Block;
Described second determines submodule, is configured to:
Hardware operation to be verified instruction to the code value of each in described identifying code to be verified is corresponding performs the second judgement
Operation, determines the judged result of the hardware operation to be verified instruction that each code value described is corresponding;
If the judged result of the hardware operation to be verified instruction that each code value described is corresponding is coupling, it is determined that described in treat
Checking hardware operation instruction is mated with described target hardware operational order;
Wherein, described second judges that operation includes:
Judge hardware operation to be verified instruction that the code value of the N position of described identifying code to be verified is corresponding and described target verification
The target hardware operational order that the code value of the N position of code is corresponding is the most identical;
If the hardware operation to be verified instruction that the code value of the N position of described identifying code to be verified is corresponding and described target verification code
Target hardware operational order corresponding to the code value of N position identical, it is determined that the code value of the N position of described identifying code to be verified
The judged result of corresponding hardware operation to be verified instruction is coupling.
26. devices according to claim 22, it is characterised in that it is described that described checking request message includes that user inputs
The code value of the N position of identifying code to be verified and corresponding with the code value of the N position of described identifying code to be verified to be verified firmly
Part operational order;
Described determine that module includes: second determines module;
Described second determines module, is configured to:
Judge that the code value of the N position of described identifying code to be verified is the most identical with the code value of the N position of described target verification code,
Obtain the first judged result of the code value of described N position;Described N is more than 0 and is less than or equal to the position of described target verification code
The integer of number;
Judge hardware operation to be verified instruction that the code value of the N position of described identifying code to be verified is corresponding and described target verification
The target verification hardware operation instruction that the code value of the N position of code is corresponding is the most identical, it is thus achieved that the second of the code value of described N position is sentenced
Disconnected result;
If described first judged result and described second judged result are identical, and described N is equal to described target verification code
Figure place, it is determined that described the result is for being proved to be successful;
If described first judged result and described second judged result are identical, and described N is less than described target verification code
Figure place, then export the first information to described user, described first information be used for pointing out described user input described in treat
The hardware operation to be verified that the N+1 position of the identifying code of checking is corresponding with the code value of described N+1 position instructs;
If described first judged result or described second judged result are for differing, it is determined that described the result loses for checking
Lose.
27. 1 kinds of systems carrying out verifying based on identifying code, it is characterised in that including: described in any one of claim 14-19
Device, and the device described in any one of claim 20-26.
28. 1 kinds of terminals, it is characterised in that including: processor, transmitter, receptor and be configured to store processor can hold
The memorizer of row instruction;
Wherein, described processor is configured to: obtain target verification code and the target hardware corresponding with described target verification code
Operational order;Prompt the user with described target verification code and described target hardware operational order, and obtain treating of user's input
The identifying code of checking and hardware operation to be verified instruction;
Described transmitter is configured to: sending checking request message to server, described checking request message includes described to be tested
The identifying code of card and the instruction of described hardware operation to be verified, described checking request message is used for described server according to described to be tested
The identifying code of card and the instruction of described hardware operation to be verified are verified;
Described receptor is configured to: receive the result that described server returns.
29. 1 kinds of servers, it is characterised in that including: processor, transmitter, receptor and be configured to store processor can
Perform the memorizer of instruction;
Wherein, described receptor is configured to: receive the checking request message that terminal sends, and described checking request message includes using
The identifying code to be verified of family input and hardware operation to be verified instruction;
Described processor is configured to: according to described checking request message, target verification code and right with described target verification code
The target hardware operational order answered, determines the result;
Described transmitter, is configured to described the result is returned to described terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610354003.4A CN106060027B (en) | 2016-05-25 | 2016-05-25 | Method, apparatus, equipment and the system verified based on identifying code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610354003.4A CN106060027B (en) | 2016-05-25 | 2016-05-25 | Method, apparatus, equipment and the system verified based on identifying code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106060027A true CN106060027A (en) | 2016-10-26 |
CN106060027B CN106060027B (en) | 2019-04-12 |
Family
ID=57174420
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610354003.4A Active CN106060027B (en) | 2016-05-25 | 2016-05-25 | Method, apparatus, equipment and the system verified based on identifying code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106060027B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108460268A (en) * | 2017-02-20 | 2018-08-28 | 阿里巴巴集团控股有限公司 | Verification method and device |
CN108737346A (en) * | 2017-04-21 | 2018-11-02 | 珠海格力电器股份有限公司 | A kind of method of password authentication and its device, server, communication system |
CN109446056A (en) * | 2018-09-11 | 2019-03-08 | 平安科技(深圳)有限公司 | Code verification method, apparatus, electronic equipment and medium |
CN109697343A (en) * | 2018-12-28 | 2019-04-30 | 联想(北京)有限公司 | Verification method and system, computer system |
CN109740323A (en) * | 2018-10-26 | 2019-05-10 | 深圳壹账通智能科技有限公司 | Verify code verification method, device, storage medium and computer equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120183270A1 (en) * | 2011-01-14 | 2012-07-19 | International Business Machines Corporation | Webcam captcha |
CN103065077A (en) * | 2013-01-06 | 2013-04-24 | 于朔 | Real user authentication method and real user authentication device |
CN104023029A (en) * | 2014-06-19 | 2014-09-03 | 百度在线网络技术(北京)有限公司 | Method and device for verifying verification codes |
CN104348617A (en) * | 2013-07-26 | 2015-02-11 | 中兴通讯股份有限公司 | Verification code processing method and device, and terminal and server |
CN104836778A (en) * | 2014-02-11 | 2015-08-12 | 腾讯科技(深圳)有限公司 | Method, device and system for realizing identifying code |
-
2016
- 2016-05-25 CN CN201610354003.4A patent/CN106060027B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120183270A1 (en) * | 2011-01-14 | 2012-07-19 | International Business Machines Corporation | Webcam captcha |
CN103065077A (en) * | 2013-01-06 | 2013-04-24 | 于朔 | Real user authentication method and real user authentication device |
CN104348617A (en) * | 2013-07-26 | 2015-02-11 | 中兴通讯股份有限公司 | Verification code processing method and device, and terminal and server |
CN104836778A (en) * | 2014-02-11 | 2015-08-12 | 腾讯科技(深圳)有限公司 | Method, device and system for realizing identifying code |
CN104023029A (en) * | 2014-06-19 | 2014-09-03 | 百度在线网络技术(北京)有限公司 | Method and device for verifying verification codes |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108460268A (en) * | 2017-02-20 | 2018-08-28 | 阿里巴巴集团控股有限公司 | Verification method and device |
CN108737346A (en) * | 2017-04-21 | 2018-11-02 | 珠海格力电器股份有限公司 | A kind of method of password authentication and its device, server, communication system |
CN108737346B (en) * | 2017-04-21 | 2020-06-19 | 珠海格力电器股份有限公司 | Password verification method and device, server and communication system |
CN109446056A (en) * | 2018-09-11 | 2019-03-08 | 平安科技(深圳)有限公司 | Code verification method, apparatus, electronic equipment and medium |
CN109446056B (en) * | 2018-09-11 | 2023-03-21 | 平安科技(深圳)有限公司 | Code verification method and device, electronic equipment and medium |
CN109740323A (en) * | 2018-10-26 | 2019-05-10 | 深圳壹账通智能科技有限公司 | Verify code verification method, device, storage medium and computer equipment |
CN109697343A (en) * | 2018-12-28 | 2019-04-30 | 联想(北京)有限公司 | Verification method and system, computer system |
CN109697343B (en) * | 2018-12-28 | 2021-08-17 | 联想(北京)有限公司 | Verification method and system and computer system |
Also Published As
Publication number | Publication date |
---|---|
CN106060027B (en) | 2019-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104202306B (en) | Access authentication method, Apparatus and system | |
CN106453245B (en) | Verify the method and device of identity | |
CN104125067B (en) | Account and token secret key binding method and device | |
CN107241688A (en) | Signature, verification method, device and the storage medium of application installation package | |
CN106060027A (en) | Methods, devices, equipment and systems for verification based on verification codes | |
CN104283876A (en) | Operation authorization method and device | |
CN104933351A (en) | Information security processing method and information security processing device | |
CN104484593B (en) | terminal verification method and device | |
CN106204046A (en) | The method and device that order pays | |
CN105847243A (en) | Method and device for accessing smart camera | |
CN106375096A (en) | Short message verification method and device | |
CN104468581B (en) | The method and device of login application program | |
CN104158665A (en) | Method and device of verification | |
CN106204029A (en) | The method and apparatus of Quick Response Code payment | |
CN105871913A (en) | Identity authentication method and system | |
CN107729000A (en) | Application program installation kit generation method and device | |
CN104639533A (en) | Safety control method and device based on terminal | |
CN110049062A (en) | Verify code check method, device, electronic equipment and storage medium | |
CN106446653A (en) | Application authority management method and device and electronic equipment | |
CN104158659A (en) | Anti-fake verifying method, device and system | |
CN107230060A (en) | The method and apparatus that a kind of account is reported the loss | |
CN106022045A (en) | Information processing device and method | |
CN107819740A (en) | Verification method, terminal device, audio amplifier and the server of terminal device | |
CN107145771A (en) | application program unlocking method, device and terminal | |
CN106775834A (en) | Brush machine verification method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |