CN106209742A - Safe verification method and system - Google Patents

Safe verification method and system Download PDF

Info

Publication number
CN106209742A
CN106209742A CN201510229302.0A CN201510229302A CN106209742A CN 106209742 A CN106209742 A CN 106209742A CN 201510229302 A CN201510229302 A CN 201510229302A CN 106209742 A CN106209742 A CN 106209742A
Authority
CN
China
Prior art keywords
application
user
verifying information
approach
user side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510229302.0A
Other languages
Chinese (zh)
Other versions
CN106209742B (en
Inventor
张磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510229302.0A priority Critical patent/CN106209742B/en
Publication of CN106209742A publication Critical patent/CN106209742A/en
Application granted granted Critical
Publication of CN106209742B publication Critical patent/CN106209742B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

This application provides a kind of safe verification method and system, safe verification method therein includes: the user name of user's input that receiving terminal apparatus transmits and static password;The first safety verification is carried out based on described user name and static password;At least two is provided to return the approach of the dynamically verifying information that the application of user side generates to described user;Receive the dynamically verifying information that described user is returned by one of described at least two approach;The dynamically verifying information that described user is from a locally generated by the dynamically verifying information that one of described at least two approach returns is compared, thus carries out the second safety verification.The application avoids static password in the first safety verification and is easily cracked the safety issue brought, and the security reliability of subscriber authentication is effectively ensured.

Description

Safe verification method and system
Technical field
The application relates to computer realm, particularly relates to a kind of safe verification method and system.
Background technology
Developing rapidly and applying along with the Internet, network security problem has become network provider and use One of problem that family is paid close attention to the most.User identity is carried out safety verification and is to ensure that the one of network security Necessary means.At present, most of network services are all to user identity by user name and static password Carry out safety verification.In order to ensure safety, static password needs the more complicated, thus of setting Make password be difficult to remember, and be inconvenient to input.It addition, static password there is also by such as violence Crack, hit storehouse, Tuo Ku, spy on, risk that the means such as wooden horse are cracked.
Therefore, current based on user name and static password, user identity is carried out the means of safety verification There is the risk that static password is easily cracked, therefore, the safety of subscriber authentication is not high enough.
Summary of the invention
The application one of solves the technical problem that a kind of safe verification method and the system of being to provide, further Improve the safety of subscriber authentication.
According to the application embodiment on the one hand, it is provided that a kind of safe verification method, including:
The user name of user's input that receiving terminal apparatus transmits and static password;
The first safety verification is carried out based on described user name and static password;
At least two is provided to return to the way of the dynamically verifying information that the application of user side generates to described user Footpath;
Receive the dynamically verifying information that described user is returned by one of described at least two approach;
The dynamically verifying information described user returned by one of described at least two approach is with local The dynamically verifying information generated compares, thus carries out the second safety verification.
According to the application embodiment on the other hand, it is provided that a kind of security authentication systems, including:
First receives unit, and user name and static state that the user for receiving terminal apparatus transmission inputs are close Code;
First safety verification unit, tests safely for carrying out first based on described user name and static password Card;
There is provided unit, for providing at least two to return the dynamic of user side application generation to described user The approach of checking information;
Second receives unit, for receiving what described user was returned by one of described at least two approach Dynamically verifying information;
Second safety verification unit, for returning described user by one of described at least two approach The dynamically verifying information that is from a locally generated of dynamically verifying information compare, thus carry out the second safety verification.
The embodiment of the present application is carrying out carrying out the base of the first safety verification based on user name and static password On plinth, carry out the second safety verification based on dynamically verifying information.Owing to dynamically verifying information is dynamic Generate, if attempting cracker to be not configured with the user generating dynamically verifying information as user Side application (dynamically verifying information application), is difficult to crack.Therefore, it is to avoid first tests safely In card, static password is easily cracked the safety issue brought, and the safety of subscriber authentication is effectively ensured Reliability.And the present embodiment provides at least two to return for the application life of the user side of the second safety verification The approach of the dynamically verifying information become, overcomes and is providing only a kind of return for the second safety verification Net residing for terminal unit in the case of the approach of the dynamically verifying information that the application of user side generates Network environment and/or terminal capability are limited can not be returned dynamically verifying information by this approach, be caused and cannot enter The problem of row the second safety verification, has been effectively ensured and has obtained dynamically verifying information timely and accurately, thus It is further ensured that the reliability of subscriber authentication.
Although those of ordinary skill in the art it will be appreciated that detailed description below by referenced in schematic embodiment, Accompanying drawing is carried out, but the application is not limited in these embodiments.But, scope of the present application is extensive , and it is intended to be bound only by appended claims restriction scope of the present application.
Accompanying drawing explanation
The detailed description that non-limiting example is made made with reference to the following drawings by reading, this The other features, objects and advantages of application will become more apparent upon:
Fig. 1 a is a kind of flow process implementing order of the safe verification method according to one embodiment of the application Figure.
Fig. 1 b is the stream of the safe verification method another kind enforcement order according to one embodiment of the application Cheng Tu.
Fig. 2 is the boundary with the input frame receiving dynamically verifying information according to one embodiment of the application Face schematic diagram.
Fig. 3 is the interface schematic diagram that the checking page prompts user according to one embodiment of the application confirms.
Fig. 4 is the interface signal that the user side Application Hints user according to one embodiment of the application confirms Figure.
Fig. 5 is the block diagram of the security authentication systems according to one embodiment of the application.
In accompanying drawing, same or analogous reference represents same or analogous parts.
Detailed description of the invention
It should be mentioned that, some exemplary enforcements before being discussed in greater detail exemplary embodiment Example is described as process or the method described as flow chart.Although operations is described as by flow chart The process of order, but many of which operation can be implemented concurrently, concomitantly or simultaneously. Additionally, the order of operations can be rearranged.The most described process can be by Terminate, it is also possible to have the additional step being not included in accompanying drawing.Described process can correspond to Method, function, code, subroutine, subprogram etc..
Described computer equipment includes subscriber equipment and the network equipment.Wherein, described subscriber equipment includes But it is not limited to computer, smart mobile phone, PDA etc.;The described network equipment includes but not limited to single network Server, multiple webserver composition server group or based on cloud computing (Cloud Computing) The cloud being made up of a large amount of computers or the webserver, wherein, cloud computing is the one of Distributed Calculation Kind, the super virtual machine being made up of a group loosely-coupled computer collection.Wherein, described Computer equipment isolated operation can realize the application, it is possible to access network and by with its in network He realizes the application at the interactive operation of computer equipment.Wherein, the net residing for described computer equipment Network includes but not limited to the Internet, wide area network, Metropolitan Area Network (MAN), LAN, VPN etc..
It should be noted that described subscriber equipment, the network equipment and network etc. are only for example, other are existing Computer equipment that is that have or that be likely to occur from now on or network are such as applicable to the application, also should be included in Within the application protection domain, and it is incorporated herein with way of reference.
Method (some of them are illustrated by flow chart) discussed hereafter can pass through hardware, software, Firmware, middleware, microcode, hardware description language or its combination in any are implemented.When with software, When firmware, middleware or microcode are implemented, in order to implement program code or the code segment of necessary task Can be stored in machine or computer-readable medium (such as storage medium).(one or more) Processor can implement the task of necessity.
Concrete structure disclosed herein and function detail are the most representational, and are for describing The purpose of the exemplary embodiment of the application.But the application can come concrete by many alternative forms Realize, and be not interpreted as being limited only by the embodiments set forth herein.
Although retouching it should be appreciated that here may have been used term " first ", " second " etc. State unit, but these unit should not be limited by these terms.Use these terms only In order to a unit is made a distinction with another unit.For example, without departing substantially from exemplary enforcement In the case of the scope of example, first module can be referred to as second unit, and second unit similarly First module can be referred to as.Term "and/or" used herein above include one of them or more listed Any and all combination of the associated item gone out.
It should be appreciated that when a unit is referred to as " connection " or during " coupled " to another unit, its Another unit described can be connected or coupled to, or temporary location can be there is.On the other hand, When a unit is referred to as " when being directly connected " or " directly coupled " to another unit, the most there is not centre Unit.Other words being used for describing the relation between unit should be explained in a comparable manner (such as " it is in ... between " compared to " it is directly in ... between ", " with ... neighbouring " compared to " with ... directly Neighbouring " etc.).
Term used herein above is only used to describe specific embodiment and be not intended to limit exemplary Embodiment.Unless the context clearly dictates otherwise, singulative the most used herein above " ", " one " alsos attempt to include plural number.It is to be further understood that term used herein above " include " and/ Or " comprising " specifies the existence of feature, integer, step, operation, unit and/or the assembly stated, And do not preclude the presence or addition of other features one or more, integer, step, operation, unit, group Part and/or a combination thereof.
It should further be mentioned that replace in implementations at some, the function/action being previously mentioned can be by Occur according to being different from accompanying drawing the order indicated.For example, involved function/action is depended on, The two width figures in succession illustrated can essentially substantially simultaneously perform or sometimes can be according to contrary Order performs.
As previously described, because user identity is carried out the side of safety verification based on user name and static password There is the risk that static password is easily cracked in method, therefore safety is the highest.The embodiment of the present application is for solving This problem, on the basis of carrying out safety verification based on user name and static password, then is carried out based on dynamic The safety verification of state checking information, is effectively increased the security reliability of subscriber authentication.
The application following example are by safety verification based on user name and static password for convenience of description It is referred to as the first safety verification, safety verification based on dynamically verifying information is referred to as the second safety verification.
Below in conjunction with the accompanying drawings the technical scheme of the application is described in further detail.
Fig. 1 a-1b is that two kinds of different execution of the safe verification method according to one embodiment of the application are suitable The flow chart of sequence.This safe verification method can be completed by a server being capable of safety verification, Can also be realized by one group of server.This group of server can be such as two-server, Qi Zhongyi Platform is the server for realizing the first safety verification, and another is for for realizing the second safety verification Server.This group of server can also be the Cloud Server group including multiple servers.Such as Fig. 1 a-b Shown in, this safe verification method mainly comprises the steps:
The user name of user's input that S10, receiving terminal apparatus transmit and static password;
S11, carry out the first safety verification based on described user name and static password;
S12, provide to described user at least two return user side application generate dynamically verifying information Approach;
S13, receive the dynamically verifying information that described user is returned by one of described at least two approach;
S14, the dynamically verifying information that described user is returned by one of described at least two approach with The local dynamically verifying information generated compares, thus carries out the second safety verification.
Below above steps is described in further detail.
Wherein, step S10 and S11 are the process that realizes of the first safety verification, the embodiment of the present application pair First safe verification method is not particularly limited, and prior art can be used to realize.
Step S12~S14 be the second safety verification realize process.It should be noted that the application is real The second safety verification executing example can be at the first safety verification by rear checking, as shown in Figure 1a, also Can perform with the first safety verification simultaneously, namely carry out first based on user name and static password The second checking is carried out based on dynamically verifying information, as shown in Figure 1 b while safety verification.
The application of described user side be in advance with the user name of user (or claiming ID) binding, can generate dynamic The application of checking information, it can be carried in intelligent mobile terminal.By as follows in the application of user side Algorithm generation dynamically verifying information:
Dynamically verifying information=f (random string, time factor, password length) (1)
Server also generates a dynamically verifying information by algorithm in the same manner as above.If user side The dynamic authentication letter that application real-time report generates in real time to the dynamically verifying information of server and server Breath is consistent, has just passed through the second safety verification.
For realizing safety verification based on dynamically verifying information, the embodiment of the present application can be answered by user side With or server (hereinafter referred to as server) for realizing the second safety verification generate described random words Symbol string, and preserve this random string in the application of user side and server simultaneously, wherein, this is random Character string associates preservation with user side application ID, and user side application ID applies with installing this user side Terminal the user name holding user again be binding, so, either in user side application end, Or at server end, this random string can be found by the user name of user, and for same The random string that one user finds is identical.This way it is ensured that user side application end and server Random character string variable in the above-mentioned algorithm (1) of end is identical.
When the initial configuration of dynamically verifying information application, dynamically verifying information application and service device is allowed to lead to Letter, obtains server present system time, when then preserving the system of server in user side is applied Between with the time difference of the system time of application place, user side system.When the application of user side needs to generate During dynamically verifying information, just with the system time of application place, active user side system plus this time difference Value, as time factor (system time of the current server actually calculated), substitutes into Algorithm (1).When server generates dynamically verifying information, just with the system time generation that server is current Enter algorithm (1).This way it is ensured that in the above-mentioned algorithm (1) of user side application end and server end Time factor be identical.
When the initial configuration of dynamically verifying information application, also dynamically verifying information is applied in algorithm (1) The password length that the password length of middle employing uses in algorithm (1) with server is configured to identical.
So, for synchronization, the application of user side generated in real time by above-mentioned algorithm (1), on The dynamically verifying information offering server passes through the dynamic of above-mentioned algorithm (1) generation in real time with server Checking information should be consistent.If verifying user side application real-time report dynamically testing to server The dynamically verifying information that card information generates in real time with server is consistent, has just passed through second and has tested safely Card.
In step S12, the available approach returning the dynamically verifying information that the application of user side generates includes But it is not limited to following three kinds:
Approach one) provide a user with the input frame that the dynamically verifying information of generation is applied in input user side.
Wherein, this input frame can be the input frame being different from and receiving static password, i.e. be provided separately One input frame is used for receiving dynamically verifying information, as shown in Figure 2, provides a use in the checking page In the input frame receiving dynamically verifying information;
This input frame can also be and the same input frame of input frame receiving static password, such as, for The such scene not supporting the change checking page of outlook, then directly will receive the input of static password Frame is as receiving the input frame of dynamically verifying information, and in the input information that will be received by this input frame The password identification specifying figure place below is the dynamically verifying information that user inputs.The present embodiment is i.e. in static state Dynamically verifying information is inputted after Password Input frame inputs static password.
In implementing, can be directly by by being used for receiving what the input frame of dynamically verifying information received Dynamically verifying information sends the server for realizing the second safety verification to.Can also be by for real This dynamically verifying information is sent to user and realizes second and test safely by the server of existing first safety verification (this is same input for corresponding static password input frame and dynamically verifying information input frame to the server of card The scene of frame).
Approach two) to the user side of described user, application sends message to be confirmed, triggers described user side Application sends the checking request carrying the dynamically verifying information that the application of described user side generates.
To the user side of described user, application sends message to be confirmed, i.e. bind to this user name The application of user side sends message to be confirmed.This message to be confirmed comprises user name to be confirmed and event, Such as, this message content to be confirmed is: XX account request logs in.
Such as, send message to be confirmed to the user side application of user's binding, simultaneously can be at the checking page Middle prompting user confirms to the application of user side, and as shown in Figure 3, prompting user " please open hands Machine confirms to log in ".
Showing that this message to be confirmed confirms for user in the application of user side, user is optionally connected to be subject to or refusal Confirm, confirm that result will apply together with user side the dynamically verifying information generated with checking The mode of request is sent to server.
It is understood that application carrying of sending in user side confirms result and dynamically verifying information Checking request can also comprise the ID of this user side application.
Approach three) provide two-dimension code image to described user, so that the application of user side is by scanning institute State two-dimension code image and trigger to send and carry the testing of dynamically verifying information that the application of described user side generates Card request.
Such as, can checking page two-dimensional code display picture, and point out scanning input two-dimension code image with Completing checking, after user is by user side application scanning Quick Response Code, the application of user side is upper to be occurred such as figure Interface shown in 4.
Wherein, the application of user side can obtain in this two-dimension code image by scanning described two-dimension code image Message to be confirmed, comprises user name to be confirmed and event in described message to be confirmed, such as, this is treated Confirm that message content is: XX account request logs in.User can be at the interface of user side application (such as figure 4) select in accept or refuse to confirm, confirm that result is dynamic by generate together with the application of user side State checking information is sent to server together in the way of checking request.
It is understood that application carrying of sending in user side confirms result and dynamically verifying information Checking request can also comprise the ID of this user side application.
Certain drawback is all there is, such as, if singly owing to above-mentioned three kinds of approach are provided separately one of which Approach one is solely provided), then need user to manually enter dynamically verifying information, Consumer's Experience is poor;If Approach two is provided separately), then need network support, in the case of network quality is poor, there is delay; If approach three is provided separately), then need network support, and provide two-dimension code image to need certain showing Show space, for not supporting the terminal of two-dimensional code display picture, such as VPN (Virtual Private Network, VPN (virtual private network)) terminal, or SSH (Secure Shell Protocol, Secure Shell Agreement) terminal then cannot show.
The embodiment of the present application, by being simultaneously provided to the approach of few two kinds of return dynamically verifying informations, can have Effect avoids the problem that single channel exists, in order to obtain dynamically verifying information in time, performs based on dynamic Second safety verification of state checking information, promotes verifying speed.
In addition, it is necessary to explanation, in another embodiment, server can be according to terminal unit institute Which user side application the network environment at place and/or the terminal capability of the terminal unit directional user that determines returns The approach of the dynamically verifying information generated.I.e. step S12 may include that
Obtain the network environment residing for described terminal unit and/or the terminal capability of described terminal unit;
According to the network environment residing for the described terminal unit obtained and/or the terminal of described terminal unit Ability, provides at least two to return to the way of the dynamically verifying information that the application of user side generates to described user Footpath.
Described current network conditions includes: whether to connect network, network speed, network signal intensity etc..Institute State terminal capability to include: whether to support two-dimensional code display, whether support to provide dynamically verifying information input Frame etc..Described acquisition includes: receives and/or detects.The example received is for example, it is possible to set in terminal On standby checking interface, the terminal capability filling in the network environment residing for terminal unit and/or user is set Frame, user input, server is by obtaining the content aware terminal unit institute filled in of user The network environment at place and/or the terminal capability of terminal unit.Such as, server detection is eventually for the example of detection Having network to connect in the environment that end equipment is presently in or connect without network, this is in current technology Can realize.
Such as, server detect the network environment residing for terminal unit for there being network to connect, but this is eventually End does not support that Quick Response Code shows, now server only provides a user with above-mentioned approach one) and approach two), Rather than provide a user with all approach.
Step S13 is to receive the dynamically verifying information that user is returned by one of described at least two approach, Namely user can return dynamically verifying information by any one in described at least two approach.Example As, if provide above-mentioned three kinds of approach simultaneously, user can directly pass through approach two) in user side is applied Checking message is verified, and sends the checking carrying the dynamically verifying information that the application of user side generates Request, this process inputs dynamically verifying information without user.Certainly approach one can also be passed through) or approach Three) dynamically verifying information is returned.
Step S14 is the dynamic authentication that described user is returned by one of described at least two approach to be believed The dynamically verifying information that breath is from a locally generated compares, thus carries out the second safety verification.
The principle of this second safety verification is as previously mentioned.The described local dynamically verifying information generated i.e. is held The dynamically verifying information that the server local of row the second safety verification generates, this server is and user side The server of application binding.
The embodiment of the present application is carrying out carrying out the base of the first safety verification based on user name and static password On plinth, carry out the second safety verification based on dynamically verifying information, it is to avoid quiet in the first safety verification State password is easily cracked the safety issue brought, and the security reliability of subscriber authentication is effectively ensured. And the present embodiment provides at least two return to apply the dynamic of generation for the user side of the second safety verification The approach of state checking information, has been effectively ensured acquisition dynamically verifying information promptly and accurately, to ensure the The execution of two safety verifications, thus it is further ensured that the reliability of subscriber authentication.
The embodiment of the present application also provides for the security authentication systems that a kind of and above-mentioned safe verification method is corresponding. This security authentication systems can include one group of server, and this group of server can be such as two services Device, wherein one is the server for realizing the first safety verification, and another is for being used for realizing second The server of safety verification.Certainly this group of server can also be the cloud service including multiple servers Device group.A kind of security authentication systems shown in Fig. 5, including:
First receive unit 20, for receiving terminal apparatus transmit user input user name and static state Password;
First safety verification unit 21, for carrying out the first safety based on described user name and static password Checking;
There is provided unit 22, for providing at least two to return the dynamic of user side application generation to described user The approach of state checking information;
Second receives unit 23, is used for receiving described user and is returned by one of described at least two approach Dynamically verifying information;
Second safety verification unit 24, for returning described user by one of described at least two approach The dynamically verifying information that the dynamically verifying information returned is from a locally generated compares, thus carries out second and test safely Card.
Alternatively, during described at least two returns the approach of the dynamically verifying information that the application of user side generates A kind of approach be: provide a user with the input frame of dynamically verifying information that the application of input user side generates.
Alternatively, during described at least two returns the approach of the dynamically verifying information that the application of user side generates A kind of approach be: to the user side of described user application send message to be confirmed, trigger described user Side application sends the checking request carrying the dynamically verifying information that the application of described user side generates.
Alternatively, during described at least two returns the approach of the dynamically verifying information that the application of user side generates A kind of approach be: provide two-dimension code image to described user so that user side application by scanning Described two-dimension code image and trigger to send and carry the dynamically verifying information that the application of described user side generates Checking request.
Alternatively, described offer unit is configured to:
Obtain the network environment residing for described terminal unit and/or the terminal capability of described terminal unit;
According to the network environment residing for the described terminal unit obtained and/or the terminal of described terminal unit Ability, provides at least two to return to the way of the dynamically verifying information that the application of user side generates to described user Footpath.
It should be noted that the application can be carried out in the assembly of hardware at software and/or software, Such as, special IC (ASIC), general purpose computer can be used or any other is similar hard Part equipment realizes.In one embodiment, the software program of the application can be performed by processor To realize steps described above or function.Similarly, the software program of the application (includes the number being correlated with According to structure) can be stored in computer readable recording medium storing program for performing, such as, and RAM memory, magnetic Or CD-ROM driver or floppy disc and similar devices.It addition, some steps of the application or function can use Hardware realizes, and such as, performs the circuit of each step or function as coordinating with processor.
It addition, the part of the application can be applied to computer program, such as computer program Instruction, when it is computer-executed, by the operation of this computer, can call or provide basis The present processes and/or technical scheme.And call the programmed instruction of the present processes, may be deposited Store up fixing or movably in record medium, and/or by broadcast or other signal bearing medias Data stream and be transmitted, and/or be stored in the computer equipment that runs according to described programmed instruction In working storage.Here, include a device according to an embodiment of the application, this device bag Include the memorizer for storing computer program instructions and for performing the processor of programmed instruction, wherein, When this computer program instructions is performed by this processor, trigger this plant running based on aforementioned according to this The method of multiple embodiments of application and/or technical scheme.
It is obvious to a person skilled in the art that the application is not limited to the thin of above-mentioned one exemplary embodiment Joint, and in the case of without departing substantially from spirit herein or basic feature, it is possible to concrete with other Form realizes the application.Therefore, no matter from the point of view of which point, embodiment all should be regarded as exemplary , and be nonrestrictive, scope of the present application is limited by claims rather than described above It is fixed, it is intended that all changes fallen in the implication of equivalency and scope of claim are included In the application.Any reference in claim should not be considered as limit involved right want Ask.Furthermore, it is to be understood that " an including " word is not excluded for other unit or step, odd number is not excluded for plural number.System In system claim, multiple unit or the device of statement can also be passed through software by a unit or device Or hardware realizes.The first, the second word such as grade is used for representing title, and is not offered as any specific Order.

Claims (10)

1. a safe verification method, it is characterised in that including:
The user name of user's input that receiving terminal apparatus transmits and static password;
The first safety verification is carried out based on described user name and static password;
At least two is provided to return to the way of the dynamically verifying information that the application of user side generates to described user Footpath;
Receive the dynamically verifying information that described user is returned by one of described at least two approach;
The dynamically verifying information described user returned by one of described at least two approach is with local The dynamically verifying information generated compares, thus carries out the second safety verification.
Safe verification method the most according to claim 1, it is characterised in that described at least two A kind of approach planted in the approach returning the dynamically verifying information that the application of user side generates is:
The input frame of the dynamically verifying information of input user side application generation is provided to described user.
Safe verification method the most according to claim 1, it is characterised in that described at least two A kind of approach planted in the approach returning the dynamically verifying information that the application of user side generates is:
To the user side of described user, application sends message to be confirmed, triggers the application of described user side and sends Carry the checking request of the dynamically verifying information that the application of described user side generates.
Safe verification method the most according to claim 1, it is characterised in that described at least two A kind of approach planted in the approach returning the dynamically verifying information that the application of user side generates is:
Two-dimension code image is provided, so that the application of user side is by scanning described Quick Response Code to described user Picture and trigger send carry described user side application generate dynamically verifying information checking request.
Safe verification method the most according to claim 1, it is characterised in that to described user The approach providing at least two to return the dynamically verifying information that the application of user side generates includes:
Obtain the network environment residing for described terminal unit and/or the terminal capability of described terminal unit;
According to the network environment residing for the described terminal unit obtained and/or the terminal of described terminal unit Ability, provides at least two to return to the way of the dynamically verifying information that the application of user side generates to described user Footpath.
6. a security authentication systems, it is characterised in that including:
First receives unit, and user name and static state that the user for receiving terminal apparatus transmission inputs are close Code;
First safety verification unit, tests safely for carrying out first based on described user name and static password Card;
There is provided unit, for providing at least two to return the dynamic of user side application generation to described user The approach of checking information;
Second receives unit, for receiving what described user was returned by one of described at least two approach Dynamically verifying information;
Second safety verification unit, for returning described user by one of described at least two approach The dynamically verifying information that is from a locally generated of dynamically verifying information compare, thus carry out the second safety verification.
Security authentication systems the most according to claim 6, it is characterised in that described at least two A kind of approach planted in the approach returning the dynamically verifying information that the application of user side generates is:
The input frame of the dynamically verifying information of input user side application generation is provided to described user.
Security authentication systems the most according to claim 6, it is characterised in that described at least two A kind of approach planted in the approach returning the dynamically verifying information that the application of user side generates is:
To the user side of described user, application sends message to be confirmed, triggers the application of described user side and sends Carry the checking request of the dynamically verifying information that the application of described user side generates.
Security authentication systems the most according to claim 6, it is characterised in that described at least two A kind of approach planted in the approach returning the dynamically verifying information that the application of user side generates is:
Two-dimension code image is provided, so that the application of user side is by scanning described Quick Response Code to described user Picture and trigger send carry described user side application generate dynamically verifying information checking request.
Security authentication systems the most according to claim 6, it is characterised in that described offer list Unit is configured to:
Obtain the network environment residing for described terminal unit and/or the terminal capability of described terminal unit;
According to the network environment residing for the described terminal unit obtained and/or the terminal of described terminal unit Ability, provides at least two to return to the way of the dynamically verifying information that the application of user side generates to described user Footpath.
CN201510229302.0A 2015-05-07 2015-05-07 Security verification method and system Active CN106209742B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510229302.0A CN106209742B (en) 2015-05-07 2015-05-07 Security verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510229302.0A CN106209742B (en) 2015-05-07 2015-05-07 Security verification method and system

Publications (2)

Publication Number Publication Date
CN106209742A true CN106209742A (en) 2016-12-07
CN106209742B CN106209742B (en) 2020-08-14

Family

ID=57459947

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510229302.0A Active CN106209742B (en) 2015-05-07 2015-05-07 Security verification method and system

Country Status (1)

Country Link
CN (1) CN106209742B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107341377A (en) * 2017-06-16 2017-11-10 武汉斗鱼网络科技有限公司 Time synchronization control method in one kind authentication
CN108600156A (en) * 2018-03-07 2018-09-28 华为技术有限公司 A kind of server and safety certifying method

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1855810A (en) * 2005-04-26 2006-11-01 上海盛大网络发展有限公司 Dynamic code verificating system, method and use
CN100409685C (en) * 1999-10-19 2008-08-06 汤姆森许可公司 System and method for verifying authorization for communicating protected content
CN101662364A (en) * 2009-09-17 2010-03-03 北京飞天诚信科技有限公司 Method and system for safe login
CN102946334A (en) * 2012-11-28 2013-02-27 中国移动(深圳)有限公司 Method and system for acquiring valid image verification code
US20130217374A1 (en) * 2010-01-25 2013-08-22 Research In Motion Limited Error correction for dtmf corruption on uplink
CN103841130A (en) * 2012-11-21 2014-06-04 深圳市腾讯计算机系统有限公司 Verification information pushing method and device, and identity authentication method and device
CN103927464A (en) * 2013-01-11 2014-07-16 深圳市腾讯计算机系统有限公司 Common validation method, and method, device and system for generating two dimensional code
CN104038502A (en) * 2014-06-24 2014-09-10 五八同城信息技术有限公司 Verification method and system
CN104144058A (en) * 2014-07-29 2014-11-12 诚迈科技(南京)股份有限公司 Information verification method based on sound wave pairing

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100409685C (en) * 1999-10-19 2008-08-06 汤姆森许可公司 System and method for verifying authorization for communicating protected content
CN1855810A (en) * 2005-04-26 2006-11-01 上海盛大网络发展有限公司 Dynamic code verificating system, method and use
CN101662364A (en) * 2009-09-17 2010-03-03 北京飞天诚信科技有限公司 Method and system for safe login
US20130217374A1 (en) * 2010-01-25 2013-08-22 Research In Motion Limited Error correction for dtmf corruption on uplink
CN103841130A (en) * 2012-11-21 2014-06-04 深圳市腾讯计算机系统有限公司 Verification information pushing method and device, and identity authentication method and device
CN102946334A (en) * 2012-11-28 2013-02-27 中国移动(深圳)有限公司 Method and system for acquiring valid image verification code
CN103927464A (en) * 2013-01-11 2014-07-16 深圳市腾讯计算机系统有限公司 Common validation method, and method, device and system for generating two dimensional code
CN104038502A (en) * 2014-06-24 2014-09-10 五八同城信息技术有限公司 Verification method and system
CN104144058A (en) * 2014-07-29 2014-11-12 诚迈科技(南京)股份有限公司 Information verification method based on sound wave pairing

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
温浩宇,等: "《web网站设计与开发教程(HTML5、JSP版)》", 31 January 2014 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107341377A (en) * 2017-06-16 2017-11-10 武汉斗鱼网络科技有限公司 Time synchronization control method in one kind authentication
CN108600156A (en) * 2018-03-07 2018-09-28 华为技术有限公司 A kind of server and safety certifying method
CN108600156B (en) * 2018-03-07 2021-05-07 华为技术有限公司 Server and security authentication method

Also Published As

Publication number Publication date
CN106209742B (en) 2020-08-14

Similar Documents

Publication Publication Date Title
CN104980278B (en) The method and apparatus for verifying the availability of biometric image
CN108965950B (en) Advertisement monitoring method and device
CN104994060B (en) It is a kind of to provide the method and apparatus of verifying for logging in for user
CN104618315B (en) A kind of method, apparatus and system of verification information push and Information Authentication
CN107733883B (en) Method and device for detecting account numbers registered in batches
CN104901970B (en) A kind of Quick Response Code login method, server and system
US20150143481A1 (en) Application security verification method, application server, application client and system
CN105357008B (en) Auth method and device
CN104199654A (en) Open platform calling method and device
CN104967594B (en) Stolen account identification method and apparatus
CN106331042A (en) Single sign-on method and device for heterogeneous user system
CN104253714A (en) Monitoring method, system, browser and server
CN105095729B (en) A kind of Quick Response Code login method, server and system
CN105992174A (en) Message processing method and device
CN106209742A (en) Safe verification method and system
CN107707529A (en) A kind of client validation method for realizing limitation identifying code transmission times
CN105391714B (en) Mobile application software automation signature and verification method and device
CN111385272A (en) Weak password detection method and device
CN107231358B (en) Questionnaire data acquisition method, server and mobile terminal
US20170026409A1 (en) Phishing campaign ranker
CN109509001A (en) For visual marker anti-counterfeit authentication method
CN104994082A (en) Picture information processing method, server and system
CN117220904A (en) Service protection method, device, electronic equipment and storage medium
CN103761473B (en) application management system and method on mobile terminal
CN105871801A (en) Stolen chain detection method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant