CN107995150A - Auth method and device - Google Patents
Auth method and device Download PDFInfo
- Publication number
- CN107995150A CN107995150A CN201610955416.8A CN201610955416A CN107995150A CN 107995150 A CN107995150 A CN 107995150A CN 201610955416 A CN201610955416 A CN 201610955416A CN 107995150 A CN107995150 A CN 107995150A
- Authority
- CN
- China
- Prior art keywords
- account number
- user account
- place
- common
- current
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of auth method and device, belong to computer and Internet technical field.The described method includes:The common login of the user account number provided by the operator of user account number is provided checking information, the common login of user account number checking information refer to the common relevant information in login place with user account number, the common place that logs in refers to log in the login place that the frequency is more than predetermined threshold value;Whether checking information is correct with verifying the common login of user account number;According to the verification result person that determines aforesaid operations whether be user account number owner.The authentication requirement that authentication is carried out to operator with user account number relevant information, higher is proposed to operator known based on operator, security higher.
Description
Technical field
The present embodiments relate to computer and Internet technical field, more particularly to a kind of auth method and dress
Put.
Background technology
In network application, user understands registered user's account number, and by the user's account number, unique mark is used in network application
Family identity.
When user account number operator ask perform some sensitive operations when, such as sensitive operation can be Modify password,
The operation such as password, payment is given for change, using needing the operator to user account number to carry out authentication, whether to verify the operator
For the owner of user account number.Wherein, the owner of user account number refers to that registration obtains the user of the user's account number.
In the prior art, the authentication mode of use is as follows:According in advance with user account number bind phone number,
To the corresponding sending short message by mobile phone identifying code of the phone number, and the operator of user account number is required to input short message verification code;If
The short message verification code of operator's input of user account number is identical with the above-mentioned short message verification code issued, then judges the behaviour of user account number
Author is the owner of user account number, and authentication passes through;If the conversely, short message verification code of operator's input of user account number
Different from the above-mentioned short message verification code issued, then the operator for judging user account number is not the owner of user account number, and identity is tested
Card failure.
The authentication mode that the prior art provides, there are some potential safety problems.For example, work as and user account number binding
When mobile phone is stolen by others, or when with injecting the wood for being used for obtaining short message verification code by other people in the mobile phone of user account number binding
When horse disease is malicious, the short message verification code sent to mobile phone can be obtained by other people, other people can pass through authentication.Therefore, it is above-mentioned
The authentication mode based on short message verification code that the prior art provides, security are relatively low.
The content of the invention
In order to solve the prior art offer the authentication mode based on short message verification code present in security it is relatively low
The problem of, an embodiment of the present invention provides a kind of auth method and device.The technical solution is as follows:
First aspect, there is provided a kind of auth method, the described method includes:
The common login of the user account number provided by the operator of user account number is provided checking information, the user
The common login of account number checking information refer to the common relevant information in login place with the user account number, it is described common to step on
Record place refers to log in the login place that the frequency is more than predetermined threshold value;
Whether checking information is correct with verifying the common login of the user account number;
According to verification result determine the operator whether be the user account number owner.
Second aspect, there is provided a kind of authentication means, described device include:
First acquisition module, the common login for the user account number that the operator for obtaining by user account number provides
Checking information, the common login of the user account number checking information refer to it is related to the common login place of the user account number
Information, it is described it is common log in place refer to log in the frequency be more than predetermined threshold value login place;
Authentication module, for verify the user account number common login checking information it is whether correct;
Determining module, for according to verification result determine the operator whether be the user account number owner.
The beneficial effect that technical solution provided in an embodiment of the present invention is brought includes:
Due to the common login that is provided according to the operator of user account number checking information carries out the identity of the operator
Verification so that operator could must be operated in the case where knowing the common login place of user account number by authentication
Person can not be known by way of stealing mobile phone or injecting trojan horse in mobile phone by authentication based on operator
With the relevant information of user account number to operator carry out authentication, to operator propose higher authentication requirement, peace
Full property higher.
Brief description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for
For those of ordinary skill in the art, without creative efforts, other can also be obtained according to these attached drawings
Attached drawing.
Fig. 1 is a kind of schematic diagram of implementation environment provided by one embodiment of the present invention;
Fig. 2 is the flow chart of auth method provided by one embodiment of the present invention;
Fig. 3 is the flow chart for the auth method that another embodiment of the present invention provides;
Fig. 4 A are the flow charts for the auth method that another embodiment of the present invention provides;
Fig. 4 B are the schematic diagrames for the implementation environment that Fig. 4 A illustrated embodiments are related to;
Fig. 5 is the block diagram of authentication means provided by one embodiment of the present invention;
Fig. 6 is the structure diagram of terminal provided by one embodiment of the present invention;
Fig. 7 is the structure diagram of server provided by one embodiment of the present invention.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention
Formula is described in further detail.
Please refer to Fig.1, it illustrates a kind of schematic diagram of implementation environment provided by one embodiment of the present invention.The implementation ring
Border includes:Terminal 110 and server 120.
Terminal 110 can be such as mobile phone, tablet computer, E-book reader, multimedia play equipment, PDA
The electronic equipments such as (Personal Digital Assistant, personal digital assistant), PC (Personal Computer).
Communication connection can be established by cable network or wireless network between terminal 110 and server 120.
Server 120 can be a server or the server cluster being made of multiple servers, either
One cloud computing service center.
Method provided in an embodiment of the present invention, the executive agent of each step can be terminal or server, or
Performed by terminal and server reciprocal.In following methods embodiment, unless otherwise indicated, only with the execution master of each step
Exemplified by body is terminal, but restriction is not formed to this.
Please refer to Fig.2, it illustrates the flow chart of auth method provided by one embodiment of the present invention.This method can
With including the following steps.
Step 201, with obtaining the common login of the user account number by operator's offer of user account number checking information.
The operator of user account number refers to the user of currently used the user's account number.The operator of user account number is probably this
The owner of user account number, it is also possible to it is not owner's (such as stealing a certain user of the user's account number) of the user's account number,
Therefore need to carry out authentication to the operator of user account number, with confirm its whether be user account number owner.Wherein, use
The owner of family account number refers to that registration obtains the user of the user's account number.In addition, user account number can be user in any network
The account number registered in, such as user is in instant messaging application, social class application, the application of payment class, the application of shopping class, network
The account number registered in the network applications such as game, website, forum, the embodiment of the present invention are not construed as limiting this.
The common login of user account number checking information refer to the common relevant information in login place with user account number.Its
In, the common place that logs in refers to log in the login place that the frequency is more than predetermined threshold value.Log in the frequency and refer to stepping in the unit interval
Record number.The unit interval can preset according to the actual requirements, for example, the unit interval in the past one week, past one month, from
Period at registration moment to current time of user account number, etc..It can be a geographical position coordinates to log in place;Or
Person, it can also be a geographic location area to log in place, such as a building, the building include but not limited to building,
Street, square etc..In an example it is assumed that predetermined threshold value is 100, the login frequency of a certain user account number in Tencent mansion is
120 times, be 30 times in the login frequency of GuoMao Building, then Tencent mansion is the common login place of the user's account number, and international trade is big
Tall building is not the common login place of the user's account number.
In one example, the common login of user account number checking information be operator provide be used for instruction user account
Number common login place checking information.For example, the common login for the user account number that operator provides checking information to rise
Mansion is interrogated, shows that the operator thinks that Tencent mansion is the common login place of the user's account number.In another example, user's account
Number common login checking information be indicated for the letter of the building in the common login place affiliated area of user account number
Breath.For example, operator provide user account number common login checking information be Tencent mansion, show that the operator thinks to rise
News mansion is the building in the common login place affiliated area for belong to the user's account number.
In embodiments of the present invention, to obtain operator provide user account number common login checking information it is specific
Mode is not construed as limiting.For example, the common login ground checking information of the user account number inputted by the operator of user account number is obtained, should
Operator can be with the common login ground checking information of written form or speech form input user account number.In an example
In, step 201 includes following several sub-steps:
Step 201a, n the first options of generation and m the second options, the content of the first option and commonly using for user account number
It is related to log in place, the content of the second option is unrelated with the common login place of user account number, and n, m are positive integer;
In one example, the content of the first option is the common login place of user account number, and the content of the second option is
The non-common login place of user account number.For example, the common login place of user account number is the choosing of Tencent mansion, then above-mentioned generation
Item can include:Tencent mansion, HuaQiang Building and GuoMao Building;Wherein, Tencent mansion is the common login place of user account number,
HuaQiang Building and the non-common login place that GuoMao Building is user account number.
In another example, the content of the first option is the building in the common login place affiliated area of user account number
Thing, the content of the second option is the building outside the common login place affiliated area of user account number.For example, user account number is normal
It is Tencent mansion with login place, then the option of above-mentioned generation can include:HuaQiang Building, GuoMao Building and DiWang Building;Its
In, HuaQiang Building belongs to the building in Tencent's mansion affiliated area near Tencent mansion, and GuoMao Building and DiWang Building
Apart from Tencent mansion farther out, the building outside Tencent's mansion affiliated area is belonged to.Commonly using login place affiliated area can be
Centered on common login place, the distance between common login place is less than the region of pre-determined distance.It is common to log in place
Affiliated area can also be according to the region determined by predeterminable area division rule including common login place.The region
Division rule can be divided according to administrative region or divided according to the region that each base station is serviced, or
Person is divided according to other preset rules, and the present embodiment is not construed as limiting this.
Alternatively, 1 the first option and multiple second options are generated.
Step 201b, obtains what is selected by the operator of user account number from above-mentioned n the first options and m the second options
Targets option, targets option are the common relevant options in login place with user account number of operator's selection, and targets option is
The common login ground checking information for the user account number that operator provides.
For example, the option of above-mentioned generation can include:HuaQiang Building, GuoMao Building and DiWang Building, it is assumed that user from this
The targets option selected in a little options is HuaQiang Building, then HuaQiang Building is that the operator of user account number is selected and user
The common relevant option in login place of account number.That is, operator thinks that HuaQiang Building is the common login place of user account number,
Or operator thinks that HuaQiang Building is the building in the common login place affiliated area of user account number.
In addition, in the option of above-mentioned generation, the content of option can be shown with written form, can also graphic form show,
Or shown in the form of word combination picture, the embodiment of the present invention is not construed as limiting this.
By the above-mentioned means, verify letter with enabling the operator to provide the common login of user account number in selection way
Breath, it is easy to operate, help to improve the efficiency of authentication.
Step 202, whether checking information is correct with verifying the common login of user account number.
When user account number common login checking information be indicated for user account number common login place information
When, the common login place that operator provides is compared with the common login place of user account number reality, is tied according to comparing
Whether checking information is correct with determining the common login that operator provides for fruit.
When user account number common login checking information be indicated for the common affiliated area in login place of user account number
During the information of the building in domain, building and the common login place affiliated area of user account number reality that operator is provided
Interior building is compared, according to comparison result determine operator provide common login checking information it is whether correct.
Alternatively, when operator provide user account number common login checking information be above-mentioned targets option when, walk
Rapid 202 include following several sub-steps:
Step 202a, judges whether targets option is at least one option in n the first options;
Step 202b, if targets option is at least one option in n the first options, it is determined that verification result is user
The common login of account number checking information it is correct;
Step 202c, if targets option is not at least one option in n the first options, it is determined that verification result is use
The common login of family account number checking information it is incorrect.
When the option of generation only includes 1 the first option, judge whether targets option is first option.When generation
When option includes multiple first options, in a kind of possible embodiment, judge whether targets option is the plurality of first choosing
At least one option in, namely operator only need to correctly select part (namely at least one) the from multiple first options
One option can be verified;In alternatively possible embodiment, judge whether targets option is the plurality of first option
In whole options, namely operator need correctly selected from multiple first options the first whole options be just able to verify that it is logical
Cross, at this time the requirement higher to operator, security also higher.
Step 203, according to verification result determine operator whether be user account number owner.
If verification result for user account number common login information it is correct, it is determined that operator possesses for user account number
Person, authentication pass through;If verification result for user account number common login information it is incorrect, it is determined that operator be not use
The owner of family account number, authentication failure.
In conclusion method provided in this embodiment, due to the common login that is provided according to the operator of user account number
Checking information verifies the identity of the operator so that operator must know the common login place of user account number
In the case of could be by authentication, operator can not be led to by way of stealing mobile phone or injecting trojan horse in mobile phone
Authentication is crossed, what is known based on operator carries out authentication with the relevant information of user account number to operator, to operation
Person proposes the authentication requirement of higher, security higher.
In the following, by embodiment illustrated in fig. 3, the associated trigger condition that explanation carries out operator authentication is introduced.Please
With reference to figure 3, the flow chart of the auth method provided it illustrates another embodiment of the present invention.This method can include as follows
Several steps.
Step 301, when monitoring that request performs predetermined registration operation to user account number, obtain the current of user account number and log in ground
Information.
The current ground information that logs in of user account number logs in place for the current of instruction user account number.
In one example, the current ground information that logs in of user account number logs in place for the current of user account number.For example, can
The current of user account number is obtained by relevant locating technology and logs in place, as GPS (Global Positioning System, entirely
Ball alignment system) technology.
In another example, the current ground information that logs in of user account number is the currently used IP (Internet of user account number
Protocol, procotol) address.It can determine that the current of user account number logs according to the currently used IP address of user account number
Place, alternatively, can determine that the current of user account number logs in place affiliated area according to the currently used IP address of user account number.
For example, determine to serve the base station that the user's account number currently logs in place according to the currently used IP address of user account number, then
The region that the base station is serviced is determined as the current of user account number and logs in place affiliated area.
In addition, above-mentioned predetermined registration operation refers to that triggering set in advance performs the operation of authentication flow.The predetermined registration operation
Typically refer to user account number perform sensitive operation, such as Modify password, give for change password, payments etc. operate, the present embodiment pair
This is not construed as limiting.
Step 302, ground information is logged according to the current of user account number, detects the current of user account number and log in whether place belongs to
In the common login place of user account number.If it is not, then perform following step 303;If so, then perform following step 306.
In one example, step 302 includes following several sub-steps:
Step 302a, whether detect includes the current of user account number in the common login place storehouse of user account number believes with logging in
The current of the indicated user account number of breath logs in place, and the common login place storehouse of user account number is used for the normal of user's account number storing
With the configured information for logging in place;
Step 302b, if the common login place storehouse of user account number includes the current of user account number and logs in place, really
Determine the current common login place for logging in place and belonging to user account number of user account number;
Step 302c, if not including the current of user account number in the common login place storehouse of user account number logs in place,
Determine the current common login place for logging in place and being not belonging to user account number of user account number.
Wherein, the common login place storehouse of user account number can be to login place of the user account number in past historical period
Counted to obtain, login place of the frequency more than predetermined threshold value will be logged in as the common place that logs in added to common login ground
In point storehouse.
Alternatively, the current ground information that logs in of user account number is the currently used IP address of user account number, user account number
The common common IP address for logging in place storehouse and being used for user's account number storing.That is, the common login place storehouse of user account number is use
The common IP address base of family account number.Above-mentioned steps 302a can be substituted by following steps and realized:With detecting the common IP of user account number
Whether user account number currently used IP address is included in the storehouse of location.If the common IP address base of user account number includes user account number
Currently used IP address, it is determined that the current common login place for logging in place and belonging to user account number of user account number.If with
The currently used IP address of user account number is not included in the common IP address base of family account number, it is determined that the current login of user account number
Place is not belonging to the common login place of user account number.
When the current login place of user account number is not belonging to the common login place of user account number, triggering performs identity and tests
Flow is demonstrate,proved, following steps 303-305 is performed, is verified with the identity of the operator to user account number.When working as user account number
When preceding login place belongs to the common login place of user account number, without performing authentication flow.
Step 303, with obtaining the common login of the user account number by operator's offer of user account number checking information.
This step can be found in the introduction and explanation in above-mentioned embodiment illustrated in fig. 2 for step 201, and details are not described herein again.
Alternatively, when the common login place storehouse of user account number is the common IP address base of user account number, according to upper
Stating the option mode provided in embodiment illustrated in fig. 2, checking information, the respective option can with obtaining the common login that operator provides
Generate in the following way:The common IP address of at least one user account number is chosen from the common IP address base of user account number,
At least one first option is generated according to the common IP address of the user account number of selection;Randomly select at least one user account number
Non- common IP address, at least one second option is generated according to the non-common IP address of the user account number of selection.
Step 304, whether checking information is correct with verifying the common login of user account number.
This step can be found in the introduction and explanation in above-mentioned embodiment illustrated in fig. 2 for step 202, and details are not described herein again.
Step 305, according to verification result determine operator whether be user account number owner.If so, then perform following
Step 306;If it is not, then perform following step 307.
This step can be found in the introduction and explanation in above-mentioned embodiment illustrated in fig. 2 for step 203, and details are not described herein again.
Step 306, it is allowed to the predetermined registration operation of request is performed to user account number.
Step 307, forbid performing user account number the predetermined registration operation of request.
Alternatively, after above-mentioned steps 305, following steps are further included:When meeting default update condition, by user account number
The current place that logs in added in the common login place storehouse of user account number.Wherein, default update condition includes:Operator is
The owner of user account number, user account number are more than the Section 1 or complete in predetermined threshold value in the login frequency for currently logging in place
Two, portion.The value of predetermined threshold value is smaller than the value of predetermined threshold value described above.The value of predetermined threshold value is bigger, peace
Full property is relatively higher.In one example, after determining operator for the owner of user account number, user account number is currently made
IP address is added in the common IP address base of user account number.In another example, it is user account number in definite operator
Owner after, detection user account number currently log in place the login frequency whether be more than predetermined threshold value, if user's account
Number be more than predetermined threshold value in the login frequency for currently logging in place, then the current login place of user account number be added to user
In the common login place storehouse of account number.
Alternatively, after the current login ground information of user account number is got, current according to user account number logs in ground
Information determines that the current of user account number logs in place, and to the current login frequency logged in corresponding to place of the user's account number into
Row renewal.If the login frequency after renewal is more than predetermined threshold value, the current place that logs in of user account number is added to user's account
Number common login place storehouse in.
By the above-mentioned means, the common login place storehouse of user account number is updated, it is ensured that the common of user account number is stepped on
Record the validity and accuracy of data in the storehouse of place.
In conclusion method provided in this embodiment, logs in whether place belongs to common to the current of user account number first
Log in place to be detected, triggered if being not belonging to and perform authentication flow, if authentication flow need not be performed by belonging to,
So as to carry out necessary authentication to the user of user account number in the case of there are security risk, reach when necessary
Carve and carry out authentication, avoid performing the technique effect of non-essential authentication flow.
In the following, by Fig. 4 A illustrated embodiments, explanation is introduced by the client and server reciprocal in terminal with complete
Into the refinement embodiment of authentication flow.A is please referred to Fig.4, it illustrates the authentication that another embodiment of the present invention provides
The flow chart of method.This method can be applied in the implementation environment shown in Fig. 4 B, which includes:Client 41 and service
Device 42.Wherein, client 41 can be the client or browser of a certain application program.41 installation and operation of client
In the terminal of such as mobile phone etc.User account data storehouse 42a, common IP address database 42b are stored with server 42
With environment information database 42c.Wherein, the user account number of each user's registration is stored with the 42a of user account data storehouse;It is common
The corresponding common IP address base of each user account number is stored with IP address database 42b;Environment information database 42c
In be stored with each common corresponding common login place of IP address, or each common IP address is corresponding
The common information for logging in the building in the affiliated area of place.
Exemplarily, this method can include the following steps.
Step 401, when client monitors perform predetermined registration operation to request to user account number, client obtains user account number
Currently used IP address.
Step 402, the currently used IP address of user account number is sent to server by client.
Correspondingly, the currently used IP address of the user account number of server reception client transmission.
Step 403, it is whether currently used including user account number in the common IP address base of server detection user account number
IP address.
Step 404, if the common IP address base of user account number includes the currently used IP address of user account number, service
Device is sent to client to be allowed to execute instruction.
Allow to execute instruction for indicating to allow to perform the predetermined registration operation asked to user account number.
Correspondingly, what client received that server sends allows to execute instruction, and after receiving and allowing to execute instruction
Perform the predetermined registration operation of request.
Step 405, if not including the currently used IP address of user account number in the common IP address base of user account number, take
Device be engaged according to the common IP address of user account number, generates several options.
Wherein, several described options include n the first options and n the second options, and n, m are positive integer.First option
Content it is related to the common login place of user account number, the content of the second option and the common login place of user account number without
Close.Alternatively, the content of the first option is the building in the common login place affiliated area of user account number, the second option
Content is the building outside the common login place affiliated area of user account number.
Step 406, several above-mentioned options are sent to client by server.
Correspondingly, client receives several above-mentioned options that server is sent.
Step 407, client shows several above-mentioned options.
Step 408, client obtains the targets option selected by the operator of user account number from several above-mentioned options,
Targets option is the common relevant option in login place with user account number of operator's selection.
Targets option is the common login ground checking information for the user account number that operator provides.
Step 409, targets option is sent to server by client.
Correspondingly, server receives the targets option that client is sent.
Step 410, server is according to targets option, the common login that verification operation person provides checking information whether just
Really.
Step 411, server according to verification result determine operator whether be user account number owner.
Step 412, if operator is the owner of user account number, server is sent to client to be allowed to execute instruction.
Correspondingly, what client received that server sends allows to execute instruction, and after receiving and allowing to execute instruction
Perform the predetermined registration operation of request.
Step 413, if operator is not the owner of user account number, server is sent to client forbids execution to refer to
Show.
Correspondingly, what client received that server sends forbids executing instruction, and after receiving and forbidding executing instruction
Refusal performs the predetermined registration operation of request.
Following is apparatus of the present invention embodiment, can be used for performing the method for the present invention embodiment.It is real for apparatus of the present invention
The details not disclosed in example is applied, refer to the method for the present invention embodiment.
Fig. 5 is refer to, it illustrates the block diagram of authentication means provided by one embodiment of the present invention.The device has
Realize the exemplary function of the above method, the function can also be performed corresponding software and be realized by hardware realization by hardware.
The device can include:First acquisition module 510, authentication module 520 and determining module 530.
First acquisition module 510, for performing above-mentioned steps 201 or step 303.
Authentication module 520, for performing above-mentioned steps 202 or step 304.
Determining module 530, for performing above-mentioned steps 203 or step 305.
In the alternative embodiment provided based on embodiment illustrated in fig. 5, first acquisition module 510, including:It is raw
Into unit and acquiring unit.
Generation unit, for performing above-mentioned steps 201a.
Acquiring unit, for performing above-mentioned steps 201b.
Alternatively, the authentication module 520, including:Judging unit, the first determination unit and the second determination unit.
Judging unit, for performing above-mentioned steps 202a.
First determination unit, for performing above-mentioned steps 202b.
Second determination unit, for performing above-mentioned steps 202c.
In another alternative embodiment provided based on embodiment illustrated in fig. 5, described device further includes:Second acquisition module
And detection module.
Second acquisition module, for performing above-mentioned steps 301.
Detection module, for performing above-mentioned steps 302.
First acquisition module, be additionally operable to user account number it is current log in place and be not belonging to the common of user account number step on
When recording place, triggering performs above-mentioned steps 201 or step 303.
In one example, the detection module, including:Detection unit, the 3rd determination unit and the 4th determination unit.
Detection unit, for performing above-mentioned steps 302a.
3rd determination unit, for performing above-mentioned steps 302b.
4th determination unit, for performing above-mentioned steps 302c.
Alternatively, described device further includes:Add module.Add module, for that when meeting default update condition, will use
The current place that logs in of family account number is added in the common login place storehouse of user account number.
Correlative detail refers to above method embodiment.
It should be noted that:The device that above-described embodiment provides is when realizing its function, only with above-mentioned each function module
Division for example, in practical application, can be completed as needed and by above-mentioned function distribution by different function modules,
The internal structure of equipment is divided into different function modules, to complete all or part of function described above.In addition,
The apparatus and method embodiment that above-described embodiment provides belongs to same design, its specific implementation process refers to embodiment of the method, this
In repeat no more.
Fig. 6 is refer to, it illustrates the structure diagram of terminal provided by one embodiment of the present invention.The terminal is used for real
The auth method provided in above-described embodiment is provided.Specifically:
Terminal 600 can include RF (Radio Frequency, radio frequency) circuit 610, include one or more meters
The memory 620 of calculation machine readable storage medium storing program for executing, input unit 630, display unit 640, sensor 650, voicefrequency circuit 660,
WiFi (wireless fidelity, Wireless Fidelity) module 670, include one or the processing of more than one processing core
The component such as device 680 and power supply 690.It will be understood by those skilled in the art that terminal structure shown in Fig. 6 is not formed pair
The restriction of terminal, can include than illustrating more or fewer components, either combine some components or different component cloth
Put.Wherein:
RF circuits 610 can be used for receive and send messages or communication process in, the reception and transmission of signal, especially, by base station
After downlink information receives, transfer to one or more than one processor 680 is handled;In addition, will be related to the data sending of uplink to
Base station.In general, RF circuits 610 include but not limited to antenna, at least one amplifier, tuner, one or more oscillators, use
Family identity module (SIM) card, transceiver, coupler, LNA (Low Noise Amplifier, low-noise amplifier), duplex
Device etc..In addition, RF circuits 610 can also be communicated by wireless communication with network and other equipment.The wireless communication can make
With any communication standard or agreement, include but not limited to GSM (Global System of Mobile communication, entirely
Ball mobile communcations system), GPRS (General Packet Radio Service, general packet radio service), CDMA (Code
Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple
Access, wideband code division multiple access), LTE (Long Term Evolution, Long Term Evolution), Email, SMS (Short
Messaging Service, Short Message Service) etc..
Memory 620 can be used for storage software program and module, and processor 680 is stored in memory 620 by operation
Software program and module, so as to perform various functions application and data processing.Memory 620 can mainly include storage journey
Sequence area and storage data field, wherein, storing program area can storage program area, the application program (ratio needed at least one function
Such as sound-playing function, image player function) etc.;Storage data field can be stored uses created number according to terminal 600
According to (such as voice data, phone directory etc.) etc..In addition, memory 620 can include high-speed random access memory, can also wrap
Include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Correspondingly, memory 620 can also include Memory Controller, to provide processor 680 and input unit 630 to memory
620 access.
Input unit 630 can be used for the numeral or character information for receiving input, and produce and user setting and function
Control related keyboard, mouse, operation lever, optics or the input of trace ball signal.Specifically, input unit 630 may include figure
As input equipment 631 and other input equipments 632.Image input device 631 can be camera or optoelectronic scanning
Equipment.Except image input device 631, input unit 630 can also include other input equipments 632.Specifically, other are inputted
Equipment 632 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse
One or more in mark, operation lever etc..
Display unit 640 is available for the information and terminal 600 for showing by information input by user or being supplied to user
Various graphical user interface, these graphical user interface can be made of figure, text, icon, video and its any combination.
Display unit 640 may include display panel 641, optionally, can use LCD (Liquid Crystal Display, liquid crystal
Show device), the form such as OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) configure display panel
641。
Terminal 600 may also include at least one sensor 650, such as optical sensor, motion sensor and other sensings
Device.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 641, and proximity sensor can close display when terminal 600 is moved in one's ear
Panel 641 and/or backlight.As one kind of motion sensor, gravity accelerometer can detect in all directions (generally
Three axis) acceleration size, size and the direction of gravity are can detect that when static, available for identification mobile phone posture application (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Extremely
The other sensors such as the gyroscope that can also configure in terminal 600, barometer, hygrometer, thermometer, infrared ray sensor, herein
Repeat no more.
Voicefrequency circuit 660, loudspeaker 661, microphone 662 can provide the audio interface between user and terminal 600.Audio
The transformed electric signal of the voice data received can be transferred to loudspeaker 661, sound is converted to by loudspeaker 661 by circuit 660
Sound signal exports;On the other hand, the voice signal of collection is converted to electric signal by microphone 662, after being received by voicefrequency circuit 660
Voice data is converted to, then after voice data output processor 680 is handled, through RF circuits 610 to be sent to such as another end
End, or voice data is exported to memory 620 further to handle.Voicefrequency circuit 660 is also possible that earphone jack,
To provide the communication of peripheral hardware earphone and terminal 600.
WiFi belongs to short range wireless transmission technology, and terminal 600 can help user's transceiver electronics by WiFi module 670
Mail, browse webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 6 is shown
WiFi module 670, but it is understood that, it is simultaneously not belonging to must be configured into for terminal 600, can exist as needed completely
Do not change in the essential scope of invention and omit.
Processor 680 is the control centre of terminal 600, utilizes various interfaces and each portion of connection whole mobile phone
Point, by running or performing the software program and/or module that are stored in memory 620, and call and be stored in memory 620
Interior data, perform the various functions and processing data of terminal 600, so as to carry out integral monitoring to mobile phone.Optionally, processor
680 may include one or more processing cores;Preferably, processor 680 can integrate application processor and modem processor,
Wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor mainly handles nothing
Line communicates.It is understood that above-mentioned modem processor can not also be integrated into processor 680.
Terminal 600 further includes the power supply 690 (such as battery) to all parts power supply, it is preferred that power supply can pass through electricity
Management system and processor 680 are logically contiguous, so as to realize management charging, electric discharge and power consumption by power-supply management system
The functions such as management.Power supply 690 can also include one or more direct current or AC power, recharging system, power supply event
Hinder the random components such as detection circuit, power supply changeover device or inverter, power supply status indicator.
Although being not shown, terminal 600 can also be including bluetooth module etc., and details are not described herein.
Specifically in the present embodiment, terminal 600 has further included memory, and one or more than one program, its
In one either more than one program storage in memory and be configured to by one or more than one processor execution.
Said one or more than one program include the instruction for being used for performing the above method.
Fig. 7 is refer to, it illustrates the structure diagram of server provided by one embodiment of the present invention.The server is used
In the auth method for implementing to provide in above-described embodiment.Specifically:
The server 700 is including central processing unit (CPU) 701 including random access memory (RAM) 702 and only
Read the system storage 704 of memory (ROM) 703, and the system of connection system storage 704 and central processing unit 701
Bus 705.The server 700 further includes the basic input/output of transmission information between each device helped in computer
System (I/O systems) 706, and deposited for the large capacity of storage program area 713, application program 714 and other program modules 715
Store up equipment 707.
The basic input/output 706, which includes the display 708 for showing information and inputted for user, to be believed
The input equipment 709 of such as mouse, keyboard etc of breath.Wherein described display 708 and input equipment 709 are all by being connected to
The input and output controller 710 of system bus 705 is connected to central processing unit 701.The basic input/output 706
Can also include input and output controller 710 for receive and handle from keyboard, mouse or electronic touch pen etc. it is multiple its
The input of his equipment.Similarly, input and output controller 710 also provides output to display screen, printer or other kinds of defeated
Go out equipment.
The mass-memory unit 707 is by being connected to the bulk memory controller (not shown) of system bus 705
It is connected to central processing unit 701.The mass-memory unit 707 and its associated computer-readable medium are server
700 provide non-volatile memories.That is, the mass-memory unit 707 can include such as hard disk or CD-ROM
The computer-readable medium (not shown) of driver etc.
Without loss of generality, the computer-readable medium can include computer storage media and communication media.Computer
Storage medium is included for information such as storage computer-readable instruction, data structure, program module or other data
The volatile and non-volatile of any method or technique realization, removable and irremovable medium.Computer-readable storage medium includes
RAM, ROM, EPROM, EEPROM, flash memory or other solid-state storages its technologies, CD-ROM, DVD or other optical storages, tape
Box, tape, disk storage or other magnetic storage apparatus.Certainly, skilled person will appreciate that the computer-readable storage medium
It is not limited to above-mentioned several.Above-mentioned system storage 704 and mass-memory unit 707 may be collectively referred to as memory.
According to various embodiments of the present invention, the server 700 can also be arrived by network connections such as internets
Remote computer operation on network.Namely server 700 can be by the network interface that is connected on the system bus 705
Unit 711 is connected to network 712, in other words, can also be connected to using Network Interface Unit 711 other kinds of network or
Remote computer system (not shown).
The memory further includes one or more than one program, the one or more programs are stored in
In memory, and it is configured to by one or the execution of more than one processor.Said one or more than one program include
For performing the instruction of the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided
Such as include the memory of instruction, above-metioned instruction can be performed by the processor of terminal or server to complete in above method embodiment
Each step.For example, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM),
CD-ROM, tape, floppy disk and optical data storage devices etc..
It should be appreciated that referenced herein " multiple " refer to two or more."and/or", description association
The incidence relation of object, expression may have three kinds of relations, for example, A and/or B, can represent:Individualism A, while there are A
And B, individualism B these three situations.It is a kind of relation of "or" that character "/", which typicallys represent forward-backward correlation object,.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that hardware can be passed through by realizing all or part of step of above-described embodiment
To complete, relevant hardware can also be instructed to complete by program, the program can be stored in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only storage, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all the present invention spirit and
Within principle, any modification, equivalent replacement, improvement and so on, should all be included in the protection scope of the present invention.
Claims (16)
- A kind of 1. auth method, it is characterised in that the described method includes:The common login of the user account number provided by the operator of user account number is provided checking information, the user account number Common login checking information refer to the common relevant information in login place with the user account number, it is described common to log in ground Point refers to log in the login place that the frequency is more than predetermined threshold value;Whether checking information is correct with verifying the common login of the user account number;According to verification result determine the operator whether be the user account number owner.
- 2. according to the method described in claim 1, it is characterized in that, described obtain as described in providing the operator of user account number The common login of user account number ground checking information, including:N the first options and m the second options are generated, the content of first option is with the common login of the user account number Point is related, and the content of second option is unrelated with the common login place of the user account number, and n, m are positive integer;Obtain the target selected by the operator of the user account number from the n the first options and the m the second options Option, the targets option are the common relevant options in login place with the user account number of operator selection, institute With stating the common login that targets option is the user account number that the operator provides checking information.
- 3. according to the method described in claim 2, it is characterized in that, the common login of the verification user account number verify Whether information is correct, including:Judge whether the targets option is at least one option in the n the first options;If the targets option is at least one option in the n the first options, it is determined that the verification result is described The common login of user account number checking information it is correct;If the targets option is not at least one option in the n the first options, it is determined that the verification result is institute Checking information is incorrect with stating the common login of user account number.
- 4. according to the method described in claim 2, it is characterized in that,The content of first option is the common login place of the user account number, and the content of second option is the use The non-common login place of family account number;Alternatively,The content of first option for the user account number common login place affiliated area in building, described second The content of option is the building outside the common login place affiliated area of the user account number.
- 5. method according to any one of claims 1 to 4, it is characterised in that the operator obtained by user account number The common login of the user account number provided before checking information, further include:When monitoring that request performs predetermined registration operation to the user account number, obtain the current of the user account number and believe with logging in Breath, the current ground information that logs in of the user account number are used to indicate that the current of the user account number logs in place;Current according to the user account number logs in ground information, detects the current of the user account number and logs in whether place belongs to institute State the common login place of user account number;If the current common login place for logging in place and being not belonging to the user account number of the user account number, triggering perform institute With stating the common login for the user account number that acquisition is provided by the operator of user account number the step of checking information.
- 6. according to the method described in claim 5, it is characterized in that, described believe with logging according to the current of the user account number Breath, detects the current common login place for logging in place and whether belonging to the user account number of the user account number, including:Whether detect includes the current of the user account number in the common login place storehouse of the user account number logs in ground information institute The current of the user account number indicated logs in place, and the common login place storehouse of the user account number is used to store the user The configured information in the common login place of account number;If the common login place storehouse of the user account number, which includes the current of the user account number, logs in place, it is determined that described The current common login place for logging in place and belonging to the user account number of user account number;If not including the current of the user account number in the common login place storehouse of the user account number logs in place, it is determined that institute State the current common login place for logging in place and being not belonging to the user account number of user account number.
- 7. according to the method described in claim 6, it is characterized in that, it is described according to verification result determine the operator whether be After the owner of the user account number, further include:When meeting default update condition, by the current place that logs in of the user account number added to the common of the user account number Log in the storehouse of place;Wherein, the default update condition includes:The operator is the owner of the user account number, the user account number exists The current login frequency for logging in place is more than Section 1 or all two in predetermined threshold value.
- 8. according to the method described in claim 6, it is characterized in that,The current ground information that logs in of the user account number logs in place for the current of the user account number, the user account number it is normal The common login place for being used to store the user account number with place storehouse is logged in;Alternatively,The current ground information that logs in of the user account number is the currently used network protocol IP address of the user account number, the use The common login place storehouse of family account number is used for the common IP address for storing the user account number.
- 9. a kind of authentication means, it is characterised in that described device includes:First acquisition module, is verified to the common login for the user account number that the operator for obtaining by user account number provides Information, the common login of the user account number checking information refer to the common relevant letter in login place with the user account number Breath, the common place that logs in refer to log in the login place that the frequency is more than predetermined threshold value;Authentication module, for verify the user account number common login checking information it is whether correct;Determining module, for according to verification result determine the operator whether be the user account number owner.
- 10. device according to claim 9, it is characterised in that first acquisition module, including:Generation unit, for generating n the first options and m the second options, the content of first option and user's account Number common login place it is related, the content of second option is unrelated with the common login place of the user account number, and n, m are Positive integer;Acquiring unit, for obtaining the operator by the user account number from the n the first options and the m the second options The targets option of middle selection, the targets option are the common login place phases with the user account number of operator's selection The option of pass, the targets option are the common login for the user account number that the operator provides ground checking informations.
- 11. device according to claim 10, it is characterised in that the authentication module, including:Judging unit, for judging whether the targets option is at least one option in the n the first options;First determination unit, if being at least one option in the n the first options for the targets option, it is determined that institute Checking information is correct with stating the common login that verification result is the user account number;Second determination unit, if not being at least one option in the n the first options for the targets option, it is determined that The verification result for the user account number common login checking information it is incorrect.
- 12. device according to claim 10, it is characterised in thatThe content of first option is the common login place of the user account number, and the content of second option is the use The non-common login place of family account number;Alternatively,The content of first option for the user account number common login place affiliated area in building, described second The content of option is the building outside the common login place affiliated area of the user account number.
- 13. according to claim 9 to 12 any one of them device, it is characterised in that described device further includes:Second acquisition module, for when monitoring that request performs predetermined registration operation to the user account number, obtaining user's account Number current log in ground information, the current current login for logging in ground information and being used to indicate the user account number of the user account number Place;Detection module, for logging in ground information according to the current of the user account number, detects the current login of the user account number Whether place belongs to the common login place of the user account number;First acquisition module, is additionally operable to be not belonging to the normal of the user account number in the current place that logs in of the user account number During with logging in place, triggering is with performing the common login of the user account number for obtaining and being provided by the operator of user account number The step of checking information.
- 14. device according to claim 13, it is characterised in that the detection module, including:Whether detection unit, include the current of the user account number in the common login place storehouse for detecting the user account number Log in the current of the user account number indicated by ground information and log in place, the common login place storehouse of the user account number is used for Store the configured information in the common login place of the user account number;3rd determination unit, if the common login place storehouse for the user account number includes the current of the user account number and steps on Record place, it is determined that the current common login place for logging in place and belonging to the user account number of the user account number;4th determination unit, if for not including the current of the user account number in the common login place storehouse of the user account number Log in place, it is determined that the current common login place for logging in place and being not belonging to the user account number of the user account number.
- 15. device according to claim 14, it is characterised in that described device further includes:Add module, for when meeting default update condition, the current login place of the user account number being added to described In the common login place storehouse of user account number;Wherein, the default update condition includes:The operator is the owner of the user account number, the user account number exists The current login frequency for logging in place is more than Section 1 or all two in predetermined threshold value.
- 16. device according to claim 14, it is characterised in thatThe current ground information that logs in of the user account number logs in place for the current of the user account number, the user account number it is normal The common login place for being used to store the user account number with place storehouse is logged in;Alternatively,The current ground information that logs in of the user account number is the currently used network protocol IP address of the user account number, the use The common login place storehouse of family account number is used for the common IP address for storing the user account number.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610955416.8A CN107995150B (en) | 2016-10-27 | 2016-10-27 | Identity verification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610955416.8A CN107995150B (en) | 2016-10-27 | 2016-10-27 | Identity verification method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107995150A true CN107995150A (en) | 2018-05-04 |
CN107995150B CN107995150B (en) | 2020-08-28 |
Family
ID=62028326
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610955416.8A Active CN107995150B (en) | 2016-10-27 | 2016-10-27 | Identity verification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107995150B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108965294A (en) * | 2018-07-16 | 2018-12-07 | 安徽信尔联信息科技有限公司 | A kind of user name and cipher protection system |
CN112039839A (en) * | 2020-07-16 | 2020-12-04 | 北京天融信网络安全技术有限公司 | Operation and maintenance method and device based on customer premise examination and approval authorization |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102413074A (en) * | 2011-11-30 | 2012-04-11 | 向进轮 | Method for detecting login of instant messenger terminal in another place |
CN103138921A (en) * | 2011-11-22 | 2013-06-05 | 阿里巴巴集团控股有限公司 | Method and system for verifying identity information |
CN103973711A (en) * | 2014-05-28 | 2014-08-06 | 中国农业银行股份有限公司 | Verification method and device |
CN104333530A (en) * | 2013-07-22 | 2015-02-04 | 深圳市腾讯计算机系统有限公司 | Information credibility verifying method and apparatus |
CN104468463A (en) * | 2013-09-12 | 2015-03-25 | 深圳市腾讯计算机系统有限公司 | Verification method, verification device and verification system |
CN104869124A (en) * | 2015-06-05 | 2015-08-26 | 飞天诚信科技股份有限公司 | Authentication method based on geographic position information |
CN105100096A (en) * | 2015-07-17 | 2015-11-25 | 小米科技有限责任公司 | Verification method and apparatus |
CN105095205A (en) * | 2014-04-17 | 2015-11-25 | 阿里巴巴集团控股有限公司 | Method and device for address location |
CN105471581A (en) * | 2014-09-10 | 2016-04-06 | 阿里巴巴集团控股有限公司 | Identity verification method and device |
CN105898015A (en) * | 2015-12-04 | 2016-08-24 | 乐视致新电子科技(天津)有限公司 | Safety certification controlling method and terminal |
-
2016
- 2016-10-27 CN CN201610955416.8A patent/CN107995150B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103138921A (en) * | 2011-11-22 | 2013-06-05 | 阿里巴巴集团控股有限公司 | Method and system for verifying identity information |
CN102413074A (en) * | 2011-11-30 | 2012-04-11 | 向进轮 | Method for detecting login of instant messenger terminal in another place |
CN104333530A (en) * | 2013-07-22 | 2015-02-04 | 深圳市腾讯计算机系统有限公司 | Information credibility verifying method and apparatus |
CN104468463A (en) * | 2013-09-12 | 2015-03-25 | 深圳市腾讯计算机系统有限公司 | Verification method, verification device and verification system |
CN105095205A (en) * | 2014-04-17 | 2015-11-25 | 阿里巴巴集团控股有限公司 | Method and device for address location |
CN103973711A (en) * | 2014-05-28 | 2014-08-06 | 中国农业银行股份有限公司 | Verification method and device |
CN105471581A (en) * | 2014-09-10 | 2016-04-06 | 阿里巴巴集团控股有限公司 | Identity verification method and device |
CN104869124A (en) * | 2015-06-05 | 2015-08-26 | 飞天诚信科技股份有限公司 | Authentication method based on geographic position information |
CN105100096A (en) * | 2015-07-17 | 2015-11-25 | 小米科技有限责任公司 | Verification method and apparatus |
CN105898015A (en) * | 2015-12-04 | 2016-08-24 | 乐视致新电子科技(天津)有限公司 | Safety certification controlling method and terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108965294A (en) * | 2018-07-16 | 2018-12-07 | 安徽信尔联信息科技有限公司 | A kind of user name and cipher protection system |
CN112039839A (en) * | 2020-07-16 | 2020-12-04 | 北京天融信网络安全技术有限公司 | Operation and maintenance method and device based on customer premise examination and approval authorization |
Also Published As
Publication number | Publication date |
---|---|
CN107995150B (en) | 2020-08-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9703971B2 (en) | Sensitive operation verification method, terminal device, server, and verification system | |
EP3200487B1 (en) | Message processing method and apparatus | |
CN105024984B (en) | Authority setting method, apparatus and system | |
US10097547B2 (en) | Security verification method, apparatus and terminal | |
US20150319173A1 (en) | Co-verification method, two dimensional code generation method, and device and system therefor | |
CN104468463B (en) | Verification method, device and system | |
WO2019042274A1 (en) | Resource transfer method and apparatus, and storage medium | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN103634294A (en) | Information verifying method and device | |
US10993090B2 (en) | Network access method, apparatus, and system | |
CN104735657B (en) | Security terminal verification method, wireless access point binding method, apparatus and system | |
CN106557962A (en) | Method of payment, apparatus and system | |
CN106255102B (en) | Terminal equipment identification method and related equipment | |
CN106570358A (en) | Method and device for setting application permissions | |
CN104954126A (en) | Sensitive operation verification method, device and system | |
JP2020509622A (en) | Wireless network type detection method and apparatus and electronic device | |
CN106534324A (en) | Data sharing method and cloud server | |
CN103533545B (en) | A kind of obtain the method for effective communication account number, device and equipment | |
CN104899488B (en) | Numeric value transfer and device | |
CN104580108A (en) | Information prompting method and system as well as server | |
CN107465646B (en) | A kind of application method for down loading, system and relevant device | |
CN104468466A (en) | Operation management method and device for network account | |
CN108984231A (en) | A kind of login method and mobile terminal of application program account | |
CN107995150A (en) | Auth method and device | |
CN104580251B (en) | A kind of method and apparatus for carrying out authorizing quick registration |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |