CN107995150A - Auth method and device - Google Patents

Auth method and device Download PDF

Info

Publication number
CN107995150A
CN107995150A CN201610955416.8A CN201610955416A CN107995150A CN 107995150 A CN107995150 A CN 107995150A CN 201610955416 A CN201610955416 A CN 201610955416A CN 107995150 A CN107995150 A CN 107995150A
Authority
CN
China
Prior art keywords
account number
user account
place
common
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610955416.8A
Other languages
Chinese (zh)
Other versions
CN107995150B (en
Inventor
李轶峰
林陆
林陆一
杨霞
郝允允
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201610955416.8A priority Critical patent/CN107995150B/en
Publication of CN107995150A publication Critical patent/CN107995150A/en
Application granted granted Critical
Publication of CN107995150B publication Critical patent/CN107995150B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of auth method and device, belong to computer and Internet technical field.The described method includes:The common login of the user account number provided by the operator of user account number is provided checking information, the common login of user account number checking information refer to the common relevant information in login place with user account number, the common place that logs in refers to log in the login place that the frequency is more than predetermined threshold value;Whether checking information is correct with verifying the common login of user account number;According to the verification result person that determines aforesaid operations whether be user account number owner.The authentication requirement that authentication is carried out to operator with user account number relevant information, higher is proposed to operator known based on operator, security higher.

Description

Auth method and device
Technical field
The present embodiments relate to computer and Internet technical field, more particularly to a kind of auth method and dress Put.
Background technology
In network application, user understands registered user's account number, and by the user's account number, unique mark is used in network application Family identity.
When user account number operator ask perform some sensitive operations when, such as sensitive operation can be Modify password, The operation such as password, payment is given for change, using needing the operator to user account number to carry out authentication, whether to verify the operator For the owner of user account number.Wherein, the owner of user account number refers to that registration obtains the user of the user's account number.
In the prior art, the authentication mode of use is as follows:According in advance with user account number bind phone number, To the corresponding sending short message by mobile phone identifying code of the phone number, and the operator of user account number is required to input short message verification code;If The short message verification code of operator's input of user account number is identical with the above-mentioned short message verification code issued, then judges the behaviour of user account number Author is the owner of user account number, and authentication passes through;If the conversely, short message verification code of operator's input of user account number Different from the above-mentioned short message verification code issued, then the operator for judging user account number is not the owner of user account number, and identity is tested Card failure.
The authentication mode that the prior art provides, there are some potential safety problems.For example, work as and user account number binding When mobile phone is stolen by others, or when with injecting the wood for being used for obtaining short message verification code by other people in the mobile phone of user account number binding When horse disease is malicious, the short message verification code sent to mobile phone can be obtained by other people, other people can pass through authentication.Therefore, it is above-mentioned The authentication mode based on short message verification code that the prior art provides, security are relatively low.
The content of the invention
In order to solve the prior art offer the authentication mode based on short message verification code present in security it is relatively low The problem of, an embodiment of the present invention provides a kind of auth method and device.The technical solution is as follows:
First aspect, there is provided a kind of auth method, the described method includes:
The common login of the user account number provided by the operator of user account number is provided checking information, the user The common login of account number checking information refer to the common relevant information in login place with the user account number, it is described common to step on Record place refers to log in the login place that the frequency is more than predetermined threshold value;
Whether checking information is correct with verifying the common login of the user account number;
According to verification result determine the operator whether be the user account number owner.
Second aspect, there is provided a kind of authentication means, described device include:
First acquisition module, the common login for the user account number that the operator for obtaining by user account number provides Checking information, the common login of the user account number checking information refer to it is related to the common login place of the user account number Information, it is described it is common log in place refer to log in the frequency be more than predetermined threshold value login place;
Authentication module, for verify the user account number common login checking information it is whether correct;
Determining module, for according to verification result determine the operator whether be the user account number owner.
The beneficial effect that technical solution provided in an embodiment of the present invention is brought includes:
Due to the common login that is provided according to the operator of user account number checking information carries out the identity of the operator Verification so that operator could must be operated in the case where knowing the common login place of user account number by authentication Person can not be known by way of stealing mobile phone or injecting trojan horse in mobile phone by authentication based on operator With the relevant information of user account number to operator carry out authentication, to operator propose higher authentication requirement, peace Full property higher.
Brief description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for For those of ordinary skill in the art, without creative efforts, other can also be obtained according to these attached drawings Attached drawing.
Fig. 1 is a kind of schematic diagram of implementation environment provided by one embodiment of the present invention;
Fig. 2 is the flow chart of auth method provided by one embodiment of the present invention;
Fig. 3 is the flow chart for the auth method that another embodiment of the present invention provides;
Fig. 4 A are the flow charts for the auth method that another embodiment of the present invention provides;
Fig. 4 B are the schematic diagrames for the implementation environment that Fig. 4 A illustrated embodiments are related to;
Fig. 5 is the block diagram of authentication means provided by one embodiment of the present invention;
Fig. 6 is the structure diagram of terminal provided by one embodiment of the present invention;
Fig. 7 is the structure diagram of server provided by one embodiment of the present invention.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention Formula is described in further detail.
Please refer to Fig.1, it illustrates a kind of schematic diagram of implementation environment provided by one embodiment of the present invention.The implementation ring Border includes:Terminal 110 and server 120.
Terminal 110 can be such as mobile phone, tablet computer, E-book reader, multimedia play equipment, PDA The electronic equipments such as (Personal Digital Assistant, personal digital assistant), PC (Personal Computer).
Communication connection can be established by cable network or wireless network between terminal 110 and server 120.
Server 120 can be a server or the server cluster being made of multiple servers, either One cloud computing service center.
Method provided in an embodiment of the present invention, the executive agent of each step can be terminal or server, or Performed by terminal and server reciprocal.In following methods embodiment, unless otherwise indicated, only with the execution master of each step Exemplified by body is terminal, but restriction is not formed to this.
Please refer to Fig.2, it illustrates the flow chart of auth method provided by one embodiment of the present invention.This method can With including the following steps.
Step 201, with obtaining the common login of the user account number by operator's offer of user account number checking information.
The operator of user account number refers to the user of currently used the user's account number.The operator of user account number is probably this The owner of user account number, it is also possible to it is not owner's (such as stealing a certain user of the user's account number) of the user's account number, Therefore need to carry out authentication to the operator of user account number, with confirm its whether be user account number owner.Wherein, use The owner of family account number refers to that registration obtains the user of the user's account number.In addition, user account number can be user in any network The account number registered in, such as user is in instant messaging application, social class application, the application of payment class, the application of shopping class, network The account number registered in the network applications such as game, website, forum, the embodiment of the present invention are not construed as limiting this.
The common login of user account number checking information refer to the common relevant information in login place with user account number.Its In, the common place that logs in refers to log in the login place that the frequency is more than predetermined threshold value.Log in the frequency and refer to stepping in the unit interval Record number.The unit interval can preset according to the actual requirements, for example, the unit interval in the past one week, past one month, from Period at registration moment to current time of user account number, etc..It can be a geographical position coordinates to log in place;Or Person, it can also be a geographic location area to log in place, such as a building, the building include but not limited to building, Street, square etc..In an example it is assumed that predetermined threshold value is 100, the login frequency of a certain user account number in Tencent mansion is 120 times, be 30 times in the login frequency of GuoMao Building, then Tencent mansion is the common login place of the user's account number, and international trade is big Tall building is not the common login place of the user's account number.
In one example, the common login of user account number checking information be operator provide be used for instruction user account Number common login place checking information.For example, the common login for the user account number that operator provides checking information to rise Mansion is interrogated, shows that the operator thinks that Tencent mansion is the common login place of the user's account number.In another example, user's account Number common login checking information be indicated for the letter of the building in the common login place affiliated area of user account number Breath.For example, operator provide user account number common login checking information be Tencent mansion, show that the operator thinks to rise News mansion is the building in the common login place affiliated area for belong to the user's account number.
In embodiments of the present invention, to obtain operator provide user account number common login checking information it is specific Mode is not construed as limiting.For example, the common login ground checking information of the user account number inputted by the operator of user account number is obtained, should Operator can be with the common login ground checking information of written form or speech form input user account number.In an example In, step 201 includes following several sub-steps:
Step 201a, n the first options of generation and m the second options, the content of the first option and commonly using for user account number It is related to log in place, the content of the second option is unrelated with the common login place of user account number, and n, m are positive integer;
In one example, the content of the first option is the common login place of user account number, and the content of the second option is The non-common login place of user account number.For example, the common login place of user account number is the choosing of Tencent mansion, then above-mentioned generation Item can include:Tencent mansion, HuaQiang Building and GuoMao Building;Wherein, Tencent mansion is the common login place of user account number, HuaQiang Building and the non-common login place that GuoMao Building is user account number.
In another example, the content of the first option is the building in the common login place affiliated area of user account number Thing, the content of the second option is the building outside the common login place affiliated area of user account number.For example, user account number is normal It is Tencent mansion with login place, then the option of above-mentioned generation can include:HuaQiang Building, GuoMao Building and DiWang Building;Its In, HuaQiang Building belongs to the building in Tencent's mansion affiliated area near Tencent mansion, and GuoMao Building and DiWang Building Apart from Tencent mansion farther out, the building outside Tencent's mansion affiliated area is belonged to.Commonly using login place affiliated area can be Centered on common login place, the distance between common login place is less than the region of pre-determined distance.It is common to log in place Affiliated area can also be according to the region determined by predeterminable area division rule including common login place.The region Division rule can be divided according to administrative region or divided according to the region that each base station is serviced, or Person is divided according to other preset rules, and the present embodiment is not construed as limiting this.
Alternatively, 1 the first option and multiple second options are generated.
Step 201b, obtains what is selected by the operator of user account number from above-mentioned n the first options and m the second options Targets option, targets option are the common relevant options in login place with user account number of operator's selection, and targets option is The common login ground checking information for the user account number that operator provides.
For example, the option of above-mentioned generation can include:HuaQiang Building, GuoMao Building and DiWang Building, it is assumed that user from this The targets option selected in a little options is HuaQiang Building, then HuaQiang Building is that the operator of user account number is selected and user The common relevant option in login place of account number.That is, operator thinks that HuaQiang Building is the common login place of user account number, Or operator thinks that HuaQiang Building is the building in the common login place affiliated area of user account number.
In addition, in the option of above-mentioned generation, the content of option can be shown with written form, can also graphic form show, Or shown in the form of word combination picture, the embodiment of the present invention is not construed as limiting this.
By the above-mentioned means, verify letter with enabling the operator to provide the common login of user account number in selection way Breath, it is easy to operate, help to improve the efficiency of authentication.
Step 202, whether checking information is correct with verifying the common login of user account number.
When user account number common login checking information be indicated for user account number common login place information When, the common login place that operator provides is compared with the common login place of user account number reality, is tied according to comparing Whether checking information is correct with determining the common login that operator provides for fruit.
When user account number common login checking information be indicated for the common affiliated area in login place of user account number During the information of the building in domain, building and the common login place affiliated area of user account number reality that operator is provided Interior building is compared, according to comparison result determine operator provide common login checking information it is whether correct.
Alternatively, when operator provide user account number common login checking information be above-mentioned targets option when, walk Rapid 202 include following several sub-steps:
Step 202a, judges whether targets option is at least one option in n the first options;
Step 202b, if targets option is at least one option in n the first options, it is determined that verification result is user The common login of account number checking information it is correct;
Step 202c, if targets option is not at least one option in n the first options, it is determined that verification result is use The common login of family account number checking information it is incorrect.
When the option of generation only includes 1 the first option, judge whether targets option is first option.When generation When option includes multiple first options, in a kind of possible embodiment, judge whether targets option is the plurality of first choosing At least one option in, namely operator only need to correctly select part (namely at least one) the from multiple first options One option can be verified;In alternatively possible embodiment, judge whether targets option is the plurality of first option In whole options, namely operator need correctly selected from multiple first options the first whole options be just able to verify that it is logical Cross, at this time the requirement higher to operator, security also higher.
Step 203, according to verification result determine operator whether be user account number owner.
If verification result for user account number common login information it is correct, it is determined that operator possesses for user account number Person, authentication pass through;If verification result for user account number common login information it is incorrect, it is determined that operator be not use The owner of family account number, authentication failure.
In conclusion method provided in this embodiment, due to the common login that is provided according to the operator of user account number Checking information verifies the identity of the operator so that operator must know the common login place of user account number In the case of could be by authentication, operator can not be led to by way of stealing mobile phone or injecting trojan horse in mobile phone Authentication is crossed, what is known based on operator carries out authentication with the relevant information of user account number to operator, to operation Person proposes the authentication requirement of higher, security higher.
In the following, by embodiment illustrated in fig. 3, the associated trigger condition that explanation carries out operator authentication is introduced.Please With reference to figure 3, the flow chart of the auth method provided it illustrates another embodiment of the present invention.This method can include as follows Several steps.
Step 301, when monitoring that request performs predetermined registration operation to user account number, obtain the current of user account number and log in ground Information.
The current ground information that logs in of user account number logs in place for the current of instruction user account number.
In one example, the current ground information that logs in of user account number logs in place for the current of user account number.For example, can The current of user account number is obtained by relevant locating technology and logs in place, as GPS (Global Positioning System, entirely Ball alignment system) technology.
In another example, the current ground information that logs in of user account number is the currently used IP (Internet of user account number Protocol, procotol) address.It can determine that the current of user account number logs according to the currently used IP address of user account number Place, alternatively, can determine that the current of user account number logs in place affiliated area according to the currently used IP address of user account number. For example, determine to serve the base station that the user's account number currently logs in place according to the currently used IP address of user account number, then The region that the base station is serviced is determined as the current of user account number and logs in place affiliated area.
In addition, above-mentioned predetermined registration operation refers to that triggering set in advance performs the operation of authentication flow.The predetermined registration operation Typically refer to user account number perform sensitive operation, such as Modify password, give for change password, payments etc. operate, the present embodiment pair This is not construed as limiting.
Step 302, ground information is logged according to the current of user account number, detects the current of user account number and log in whether place belongs to In the common login place of user account number.If it is not, then perform following step 303;If so, then perform following step 306.
In one example, step 302 includes following several sub-steps:
Step 302a, whether detect includes the current of user account number in the common login place storehouse of user account number believes with logging in The current of the indicated user account number of breath logs in place, and the common login place storehouse of user account number is used for the normal of user's account number storing With the configured information for logging in place;
Step 302b, if the common login place storehouse of user account number includes the current of user account number and logs in place, really Determine the current common login place for logging in place and belonging to user account number of user account number;
Step 302c, if not including the current of user account number in the common login place storehouse of user account number logs in place, Determine the current common login place for logging in place and being not belonging to user account number of user account number.
Wherein, the common login place storehouse of user account number can be to login place of the user account number in past historical period Counted to obtain, login place of the frequency more than predetermined threshold value will be logged in as the common place that logs in added to common login ground In point storehouse.
Alternatively, the current ground information that logs in of user account number is the currently used IP address of user account number, user account number The common common IP address for logging in place storehouse and being used for user's account number storing.That is, the common login place storehouse of user account number is use The common IP address base of family account number.Above-mentioned steps 302a can be substituted by following steps and realized:With detecting the common IP of user account number Whether user account number currently used IP address is included in the storehouse of location.If the common IP address base of user account number includes user account number Currently used IP address, it is determined that the current common login place for logging in place and belonging to user account number of user account number.If with The currently used IP address of user account number is not included in the common IP address base of family account number, it is determined that the current login of user account number Place is not belonging to the common login place of user account number.
When the current login place of user account number is not belonging to the common login place of user account number, triggering performs identity and tests Flow is demonstrate,proved, following steps 303-305 is performed, is verified with the identity of the operator to user account number.When working as user account number When preceding login place belongs to the common login place of user account number, without performing authentication flow.
Step 303, with obtaining the common login of the user account number by operator's offer of user account number checking information.
This step can be found in the introduction and explanation in above-mentioned embodiment illustrated in fig. 2 for step 201, and details are not described herein again.
Alternatively, when the common login place storehouse of user account number is the common IP address base of user account number, according to upper Stating the option mode provided in embodiment illustrated in fig. 2, checking information, the respective option can with obtaining the common login that operator provides Generate in the following way:The common IP address of at least one user account number is chosen from the common IP address base of user account number, At least one first option is generated according to the common IP address of the user account number of selection;Randomly select at least one user account number Non- common IP address, at least one second option is generated according to the non-common IP address of the user account number of selection.
Step 304, whether checking information is correct with verifying the common login of user account number.
This step can be found in the introduction and explanation in above-mentioned embodiment illustrated in fig. 2 for step 202, and details are not described herein again.
Step 305, according to verification result determine operator whether be user account number owner.If so, then perform following Step 306;If it is not, then perform following step 307.
This step can be found in the introduction and explanation in above-mentioned embodiment illustrated in fig. 2 for step 203, and details are not described herein again.
Step 306, it is allowed to the predetermined registration operation of request is performed to user account number.
Step 307, forbid performing user account number the predetermined registration operation of request.
Alternatively, after above-mentioned steps 305, following steps are further included:When meeting default update condition, by user account number The current place that logs in added in the common login place storehouse of user account number.Wherein, default update condition includes:Operator is The owner of user account number, user account number are more than the Section 1 or complete in predetermined threshold value in the login frequency for currently logging in place Two, portion.The value of predetermined threshold value is smaller than the value of predetermined threshold value described above.The value of predetermined threshold value is bigger, peace Full property is relatively higher.In one example, after determining operator for the owner of user account number, user account number is currently made IP address is added in the common IP address base of user account number.In another example, it is user account number in definite operator Owner after, detection user account number currently log in place the login frequency whether be more than predetermined threshold value, if user's account Number be more than predetermined threshold value in the login frequency for currently logging in place, then the current login place of user account number be added to user In the common login place storehouse of account number.
Alternatively, after the current login ground information of user account number is got, current according to user account number logs in ground Information determines that the current of user account number logs in place, and to the current login frequency logged in corresponding to place of the user's account number into Row renewal.If the login frequency after renewal is more than predetermined threshold value, the current place that logs in of user account number is added to user's account Number common login place storehouse in.
By the above-mentioned means, the common login place storehouse of user account number is updated, it is ensured that the common of user account number is stepped on Record the validity and accuracy of data in the storehouse of place.
In conclusion method provided in this embodiment, logs in whether place belongs to common to the current of user account number first Log in place to be detected, triggered if being not belonging to and perform authentication flow, if authentication flow need not be performed by belonging to, So as to carry out necessary authentication to the user of user account number in the case of there are security risk, reach when necessary Carve and carry out authentication, avoid performing the technique effect of non-essential authentication flow.
In the following, by Fig. 4 A illustrated embodiments, explanation is introduced by the client and server reciprocal in terminal with complete Into the refinement embodiment of authentication flow.A is please referred to Fig.4, it illustrates the authentication that another embodiment of the present invention provides The flow chart of method.This method can be applied in the implementation environment shown in Fig. 4 B, which includes:Client 41 and service Device 42.Wherein, client 41 can be the client or browser of a certain application program.41 installation and operation of client In the terminal of such as mobile phone etc.User account data storehouse 42a, common IP address database 42b are stored with server 42 With environment information database 42c.Wherein, the user account number of each user's registration is stored with the 42a of user account data storehouse;It is common The corresponding common IP address base of each user account number is stored with IP address database 42b;Environment information database 42c In be stored with each common corresponding common login place of IP address, or each common IP address is corresponding The common information for logging in the building in the affiliated area of place.
Exemplarily, this method can include the following steps.
Step 401, when client monitors perform predetermined registration operation to request to user account number, client obtains user account number Currently used IP address.
Step 402, the currently used IP address of user account number is sent to server by client.
Correspondingly, the currently used IP address of the user account number of server reception client transmission.
Step 403, it is whether currently used including user account number in the common IP address base of server detection user account number IP address.
Step 404, if the common IP address base of user account number includes the currently used IP address of user account number, service Device is sent to client to be allowed to execute instruction.
Allow to execute instruction for indicating to allow to perform the predetermined registration operation asked to user account number.
Correspondingly, what client received that server sends allows to execute instruction, and after receiving and allowing to execute instruction Perform the predetermined registration operation of request.
Step 405, if not including the currently used IP address of user account number in the common IP address base of user account number, take Device be engaged according to the common IP address of user account number, generates several options.
Wherein, several described options include n the first options and n the second options, and n, m are positive integer.First option Content it is related to the common login place of user account number, the content of the second option and the common login place of user account number without Close.Alternatively, the content of the first option is the building in the common login place affiliated area of user account number, the second option Content is the building outside the common login place affiliated area of user account number.
Step 406, several above-mentioned options are sent to client by server.
Correspondingly, client receives several above-mentioned options that server is sent.
Step 407, client shows several above-mentioned options.
Step 408, client obtains the targets option selected by the operator of user account number from several above-mentioned options, Targets option is the common relevant option in login place with user account number of operator's selection.
Targets option is the common login ground checking information for the user account number that operator provides.
Step 409, targets option is sent to server by client.
Correspondingly, server receives the targets option that client is sent.
Step 410, server is according to targets option, the common login that verification operation person provides checking information whether just Really.
Step 411, server according to verification result determine operator whether be user account number owner.
Step 412, if operator is the owner of user account number, server is sent to client to be allowed to execute instruction.
Correspondingly, what client received that server sends allows to execute instruction, and after receiving and allowing to execute instruction Perform the predetermined registration operation of request.
Step 413, if operator is not the owner of user account number, server is sent to client forbids execution to refer to Show.
Correspondingly, what client received that server sends forbids executing instruction, and after receiving and forbidding executing instruction Refusal performs the predetermined registration operation of request.
Following is apparatus of the present invention embodiment, can be used for performing the method for the present invention embodiment.It is real for apparatus of the present invention The details not disclosed in example is applied, refer to the method for the present invention embodiment.
Fig. 5 is refer to, it illustrates the block diagram of authentication means provided by one embodiment of the present invention.The device has Realize the exemplary function of the above method, the function can also be performed corresponding software and be realized by hardware realization by hardware. The device can include:First acquisition module 510, authentication module 520 and determining module 530.
First acquisition module 510, for performing above-mentioned steps 201 or step 303.
Authentication module 520, for performing above-mentioned steps 202 or step 304.
Determining module 530, for performing above-mentioned steps 203 or step 305.
In the alternative embodiment provided based on embodiment illustrated in fig. 5, first acquisition module 510, including:It is raw Into unit and acquiring unit.
Generation unit, for performing above-mentioned steps 201a.
Acquiring unit, for performing above-mentioned steps 201b.
Alternatively, the authentication module 520, including:Judging unit, the first determination unit and the second determination unit.
Judging unit, for performing above-mentioned steps 202a.
First determination unit, for performing above-mentioned steps 202b.
Second determination unit, for performing above-mentioned steps 202c.
In another alternative embodiment provided based on embodiment illustrated in fig. 5, described device further includes:Second acquisition module And detection module.
Second acquisition module, for performing above-mentioned steps 301.
Detection module, for performing above-mentioned steps 302.
First acquisition module, be additionally operable to user account number it is current log in place and be not belonging to the common of user account number step on When recording place, triggering performs above-mentioned steps 201 or step 303.
In one example, the detection module, including:Detection unit, the 3rd determination unit and the 4th determination unit.
Detection unit, for performing above-mentioned steps 302a.
3rd determination unit, for performing above-mentioned steps 302b.
4th determination unit, for performing above-mentioned steps 302c.
Alternatively, described device further includes:Add module.Add module, for that when meeting default update condition, will use The current place that logs in of family account number is added in the common login place storehouse of user account number.
Correlative detail refers to above method embodiment.
It should be noted that:The device that above-described embodiment provides is when realizing its function, only with above-mentioned each function module Division for example, in practical application, can be completed as needed and by above-mentioned function distribution by different function modules, The internal structure of equipment is divided into different function modules, to complete all or part of function described above.In addition, The apparatus and method embodiment that above-described embodiment provides belongs to same design, its specific implementation process refers to embodiment of the method, this In repeat no more.
Fig. 6 is refer to, it illustrates the structure diagram of terminal provided by one embodiment of the present invention.The terminal is used for real The auth method provided in above-described embodiment is provided.Specifically:
Terminal 600 can include RF (Radio Frequency, radio frequency) circuit 610, include one or more meters The memory 620 of calculation machine readable storage medium storing program for executing, input unit 630, display unit 640, sensor 650, voicefrequency circuit 660, WiFi (wireless fidelity, Wireless Fidelity) module 670, include one or the processing of more than one processing core The component such as device 680 and power supply 690.It will be understood by those skilled in the art that terminal structure shown in Fig. 6 is not formed pair The restriction of terminal, can include than illustrating more or fewer components, either combine some components or different component cloth Put.Wherein:
RF circuits 610 can be used for receive and send messages or communication process in, the reception and transmission of signal, especially, by base station After downlink information receives, transfer to one or more than one processor 680 is handled;In addition, will be related to the data sending of uplink to Base station.In general, RF circuits 610 include but not limited to antenna, at least one amplifier, tuner, one or more oscillators, use Family identity module (SIM) card, transceiver, coupler, LNA (Low Noise Amplifier, low-noise amplifier), duplex Device etc..In addition, RF circuits 610 can also be communicated by wireless communication with network and other equipment.The wireless communication can make With any communication standard or agreement, include but not limited to GSM (Global System of Mobile communication, entirely Ball mobile communcations system), GPRS (General Packet Radio Service, general packet radio service), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access), LTE (Long Term Evolution, Long Term Evolution), Email, SMS (Short Messaging Service, Short Message Service) etc..
Memory 620 can be used for storage software program and module, and processor 680 is stored in memory 620 by operation Software program and module, so as to perform various functions application and data processing.Memory 620 can mainly include storage journey Sequence area and storage data field, wherein, storing program area can storage program area, the application program (ratio needed at least one function Such as sound-playing function, image player function) etc.;Storage data field can be stored uses created number according to terminal 600 According to (such as voice data, phone directory etc.) etc..In addition, memory 620 can include high-speed random access memory, can also wrap Include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts. Correspondingly, memory 620 can also include Memory Controller, to provide processor 680 and input unit 630 to memory 620 access.
Input unit 630 can be used for the numeral or character information for receiving input, and produce and user setting and function Control related keyboard, mouse, operation lever, optics or the input of trace ball signal.Specifically, input unit 630 may include figure As input equipment 631 and other input equipments 632.Image input device 631 can be camera or optoelectronic scanning Equipment.Except image input device 631, input unit 630 can also include other input equipments 632.Specifically, other are inputted Equipment 632 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse One or more in mark, operation lever etc..
Display unit 640 is available for the information and terminal 600 for showing by information input by user or being supplied to user Various graphical user interface, these graphical user interface can be made of figure, text, icon, video and its any combination. Display unit 640 may include display panel 641, optionally, can use LCD (Liquid Crystal Display, liquid crystal Show device), the form such as OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) configure display panel 641。
Terminal 600 may also include at least one sensor 650, such as optical sensor, motion sensor and other sensings Device.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 641, and proximity sensor can close display when terminal 600 is moved in one's ear Panel 641 and/or backlight.As one kind of motion sensor, gravity accelerometer can detect in all directions (generally Three axis) acceleration size, size and the direction of gravity are can detect that when static, available for identification mobile phone posture application (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Extremely The other sensors such as the gyroscope that can also configure in terminal 600, barometer, hygrometer, thermometer, infrared ray sensor, herein Repeat no more.
Voicefrequency circuit 660, loudspeaker 661, microphone 662 can provide the audio interface between user and terminal 600.Audio The transformed electric signal of the voice data received can be transferred to loudspeaker 661, sound is converted to by loudspeaker 661 by circuit 660 Sound signal exports;On the other hand, the voice signal of collection is converted to electric signal by microphone 662, after being received by voicefrequency circuit 660 Voice data is converted to, then after voice data output processor 680 is handled, through RF circuits 610 to be sent to such as another end End, or voice data is exported to memory 620 further to handle.Voicefrequency circuit 660 is also possible that earphone jack, To provide the communication of peripheral hardware earphone and terminal 600.
WiFi belongs to short range wireless transmission technology, and terminal 600 can help user's transceiver electronics by WiFi module 670 Mail, browse webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 6 is shown WiFi module 670, but it is understood that, it is simultaneously not belonging to must be configured into for terminal 600, can exist as needed completely Do not change in the essential scope of invention and omit.
Processor 680 is the control centre of terminal 600, utilizes various interfaces and each portion of connection whole mobile phone Point, by running or performing the software program and/or module that are stored in memory 620, and call and be stored in memory 620 Interior data, perform the various functions and processing data of terminal 600, so as to carry out integral monitoring to mobile phone.Optionally, processor 680 may include one or more processing cores;Preferably, processor 680 can integrate application processor and modem processor, Wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor mainly handles nothing Line communicates.It is understood that above-mentioned modem processor can not also be integrated into processor 680.
Terminal 600 further includes the power supply 690 (such as battery) to all parts power supply, it is preferred that power supply can pass through electricity Management system and processor 680 are logically contiguous, so as to realize management charging, electric discharge and power consumption by power-supply management system The functions such as management.Power supply 690 can also include one or more direct current or AC power, recharging system, power supply event Hinder the random components such as detection circuit, power supply changeover device or inverter, power supply status indicator.
Although being not shown, terminal 600 can also be including bluetooth module etc., and details are not described herein.
Specifically in the present embodiment, terminal 600 has further included memory, and one or more than one program, its In one either more than one program storage in memory and be configured to by one or more than one processor execution. Said one or more than one program include the instruction for being used for performing the above method.
Fig. 7 is refer to, it illustrates the structure diagram of server provided by one embodiment of the present invention.The server is used In the auth method for implementing to provide in above-described embodiment.Specifically:
The server 700 is including central processing unit (CPU) 701 including random access memory (RAM) 702 and only Read the system storage 704 of memory (ROM) 703, and the system of connection system storage 704 and central processing unit 701 Bus 705.The server 700 further includes the basic input/output of transmission information between each device helped in computer System (I/O systems) 706, and deposited for the large capacity of storage program area 713, application program 714 and other program modules 715 Store up equipment 707.
The basic input/output 706, which includes the display 708 for showing information and inputted for user, to be believed The input equipment 709 of such as mouse, keyboard etc of breath.Wherein described display 708 and input equipment 709 are all by being connected to The input and output controller 710 of system bus 705 is connected to central processing unit 701.The basic input/output 706 Can also include input and output controller 710 for receive and handle from keyboard, mouse or electronic touch pen etc. it is multiple its The input of his equipment.Similarly, input and output controller 710 also provides output to display screen, printer or other kinds of defeated Go out equipment.
The mass-memory unit 707 is by being connected to the bulk memory controller (not shown) of system bus 705 It is connected to central processing unit 701.The mass-memory unit 707 and its associated computer-readable medium are server 700 provide non-volatile memories.That is, the mass-memory unit 707 can include such as hard disk or CD-ROM The computer-readable medium (not shown) of driver etc.
Without loss of generality, the computer-readable medium can include computer storage media and communication media.Computer Storage medium is included for information such as storage computer-readable instruction, data structure, program module or other data The volatile and non-volatile of any method or technique realization, removable and irremovable medium.Computer-readable storage medium includes RAM, ROM, EPROM, EEPROM, flash memory or other solid-state storages its technologies, CD-ROM, DVD or other optical storages, tape Box, tape, disk storage or other magnetic storage apparatus.Certainly, skilled person will appreciate that the computer-readable storage medium It is not limited to above-mentioned several.Above-mentioned system storage 704 and mass-memory unit 707 may be collectively referred to as memory.
According to various embodiments of the present invention, the server 700 can also be arrived by network connections such as internets Remote computer operation on network.Namely server 700 can be by the network interface that is connected on the system bus 705 Unit 711 is connected to network 712, in other words, can also be connected to using Network Interface Unit 711 other kinds of network or Remote computer system (not shown).
The memory further includes one or more than one program, the one or more programs are stored in In memory, and it is configured to by one or the execution of more than one processor.Said one or more than one program include For performing the instruction of the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided Such as include the memory of instruction, above-metioned instruction can be performed by the processor of terminal or server to complete in above method embodiment Each step.For example, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
It should be appreciated that referenced herein " multiple " refer to two or more."and/or", description association The incidence relation of object, expression may have three kinds of relations, for example, A and/or B, can represent:Individualism A, while there are A And B, individualism B these three situations.It is a kind of relation of "or" that character "/", which typicallys represent forward-backward correlation object,.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that hardware can be passed through by realizing all or part of step of above-described embodiment To complete, relevant hardware can also be instructed to complete by program, the program can be stored in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only storage, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all the present invention spirit and Within principle, any modification, equivalent replacement, improvement and so on, should all be included in the protection scope of the present invention.

Claims (16)

  1. A kind of 1. auth method, it is characterised in that the described method includes:
    The common login of the user account number provided by the operator of user account number is provided checking information, the user account number Common login checking information refer to the common relevant information in login place with the user account number, it is described common to log in ground Point refers to log in the login place that the frequency is more than predetermined threshold value;
    Whether checking information is correct with verifying the common login of the user account number;
    According to verification result determine the operator whether be the user account number owner.
  2. 2. according to the method described in claim 1, it is characterized in that, described obtain as described in providing the operator of user account number The common login of user account number ground checking information, including:
    N the first options and m the second options are generated, the content of first option is with the common login of the user account number Point is related, and the content of second option is unrelated with the common login place of the user account number, and n, m are positive integer;
    Obtain the target selected by the operator of the user account number from the n the first options and the m the second options Option, the targets option are the common relevant options in login place with the user account number of operator selection, institute With stating the common login that targets option is the user account number that the operator provides checking information.
  3. 3. according to the method described in claim 2, it is characterized in that, the common login of the verification user account number verify Whether information is correct, including:
    Judge whether the targets option is at least one option in the n the first options;
    If the targets option is at least one option in the n the first options, it is determined that the verification result is described The common login of user account number checking information it is correct;
    If the targets option is not at least one option in the n the first options, it is determined that the verification result is institute Checking information is incorrect with stating the common login of user account number.
  4. 4. according to the method described in claim 2, it is characterized in that,
    The content of first option is the common login place of the user account number, and the content of second option is the use The non-common login place of family account number;
    Alternatively,
    The content of first option for the user account number common login place affiliated area in building, described second The content of option is the building outside the common login place affiliated area of the user account number.
  5. 5. method according to any one of claims 1 to 4, it is characterised in that the operator obtained by user account number The common login of the user account number provided before checking information, further include:
    When monitoring that request performs predetermined registration operation to the user account number, obtain the current of the user account number and believe with logging in Breath, the current ground information that logs in of the user account number are used to indicate that the current of the user account number logs in place;
    Current according to the user account number logs in ground information, detects the current of the user account number and logs in whether place belongs to institute State the common login place of user account number;
    If the current common login place for logging in place and being not belonging to the user account number of the user account number, triggering perform institute With stating the common login for the user account number that acquisition is provided by the operator of user account number the step of checking information.
  6. 6. according to the method described in claim 5, it is characterized in that, described believe with logging according to the current of the user account number Breath, detects the current common login place for logging in place and whether belonging to the user account number of the user account number, including:
    Whether detect includes the current of the user account number in the common login place storehouse of the user account number logs in ground information institute The current of the user account number indicated logs in place, and the common login place storehouse of the user account number is used to store the user The configured information in the common login place of account number;
    If the common login place storehouse of the user account number, which includes the current of the user account number, logs in place, it is determined that described The current common login place for logging in place and belonging to the user account number of user account number;
    If not including the current of the user account number in the common login place storehouse of the user account number logs in place, it is determined that institute State the current common login place for logging in place and being not belonging to the user account number of user account number.
  7. 7. according to the method described in claim 6, it is characterized in that, it is described according to verification result determine the operator whether be After the owner of the user account number, further include:
    When meeting default update condition, by the current place that logs in of the user account number added to the common of the user account number Log in the storehouse of place;
    Wherein, the default update condition includes:The operator is the owner of the user account number, the user account number exists The current login frequency for logging in place is more than Section 1 or all two in predetermined threshold value.
  8. 8. according to the method described in claim 6, it is characterized in that,
    The current ground information that logs in of the user account number logs in place for the current of the user account number, the user account number it is normal The common login place for being used to store the user account number with place storehouse is logged in;
    Alternatively,
    The current ground information that logs in of the user account number is the currently used network protocol IP address of the user account number, the use The common login place storehouse of family account number is used for the common IP address for storing the user account number.
  9. 9. a kind of authentication means, it is characterised in that described device includes:
    First acquisition module, is verified to the common login for the user account number that the operator for obtaining by user account number provides Information, the common login of the user account number checking information refer to the common relevant letter in login place with the user account number Breath, the common place that logs in refer to log in the login place that the frequency is more than predetermined threshold value;
    Authentication module, for verify the user account number common login checking information it is whether correct;
    Determining module, for according to verification result determine the operator whether be the user account number owner.
  10. 10. device according to claim 9, it is characterised in that first acquisition module, including:
    Generation unit, for generating n the first options and m the second options, the content of first option and user's account Number common login place it is related, the content of second option is unrelated with the common login place of the user account number, and n, m are Positive integer;
    Acquiring unit, for obtaining the operator by the user account number from the n the first options and the m the second options The targets option of middle selection, the targets option are the common login place phases with the user account number of operator's selection The option of pass, the targets option are the common login for the user account number that the operator provides ground checking informations.
  11. 11. device according to claim 10, it is characterised in that the authentication module, including:
    Judging unit, for judging whether the targets option is at least one option in the n the first options;
    First determination unit, if being at least one option in the n the first options for the targets option, it is determined that institute Checking information is correct with stating the common login that verification result is the user account number;
    Second determination unit, if not being at least one option in the n the first options for the targets option, it is determined that The verification result for the user account number common login checking information it is incorrect.
  12. 12. device according to claim 10, it is characterised in that
    The content of first option is the common login place of the user account number, and the content of second option is the use The non-common login place of family account number;
    Alternatively,
    The content of first option for the user account number common login place affiliated area in building, described second The content of option is the building outside the common login place affiliated area of the user account number.
  13. 13. according to claim 9 to 12 any one of them device, it is characterised in that described device further includes:
    Second acquisition module, for when monitoring that request performs predetermined registration operation to the user account number, obtaining user's account Number current log in ground information, the current current login for logging in ground information and being used to indicate the user account number of the user account number Place;
    Detection module, for logging in ground information according to the current of the user account number, detects the current login of the user account number Whether place belongs to the common login place of the user account number;
    First acquisition module, is additionally operable to be not belonging to the normal of the user account number in the current place that logs in of the user account number During with logging in place, triggering is with performing the common login of the user account number for obtaining and being provided by the operator of user account number The step of checking information.
  14. 14. device according to claim 13, it is characterised in that the detection module, including:
    Whether detection unit, include the current of the user account number in the common login place storehouse for detecting the user account number Log in the current of the user account number indicated by ground information and log in place, the common login place storehouse of the user account number is used for Store the configured information in the common login place of the user account number;
    3rd determination unit, if the common login place storehouse for the user account number includes the current of the user account number and steps on Record place, it is determined that the current common login place for logging in place and belonging to the user account number of the user account number;
    4th determination unit, if for not including the current of the user account number in the common login place storehouse of the user account number Log in place, it is determined that the current common login place for logging in place and being not belonging to the user account number of the user account number.
  15. 15. device according to claim 14, it is characterised in that described device further includes:
    Add module, for when meeting default update condition, the current login place of the user account number being added to described In the common login place storehouse of user account number;
    Wherein, the default update condition includes:The operator is the owner of the user account number, the user account number exists The current login frequency for logging in place is more than Section 1 or all two in predetermined threshold value.
  16. 16. device according to claim 14, it is characterised in that
    The current ground information that logs in of the user account number logs in place for the current of the user account number, the user account number it is normal The common login place for being used to store the user account number with place storehouse is logged in;
    Alternatively,
    The current ground information that logs in of the user account number is the currently used network protocol IP address of the user account number, the use The common login place storehouse of family account number is used for the common IP address for storing the user account number.
CN201610955416.8A 2016-10-27 2016-10-27 Identity verification method and device Active CN107995150B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610955416.8A CN107995150B (en) 2016-10-27 2016-10-27 Identity verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610955416.8A CN107995150B (en) 2016-10-27 2016-10-27 Identity verification method and device

Publications (2)

Publication Number Publication Date
CN107995150A true CN107995150A (en) 2018-05-04
CN107995150B CN107995150B (en) 2020-08-28

Family

ID=62028326

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610955416.8A Active CN107995150B (en) 2016-10-27 2016-10-27 Identity verification method and device

Country Status (1)

Country Link
CN (1) CN107995150B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108965294A (en) * 2018-07-16 2018-12-07 安徽信尔联信息科技有限公司 A kind of user name and cipher protection system
CN112039839A (en) * 2020-07-16 2020-12-04 北京天融信网络安全技术有限公司 Operation and maintenance method and device based on customer premise examination and approval authorization

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413074A (en) * 2011-11-30 2012-04-11 向进轮 Method for detecting login of instant messenger terminal in another place
CN103138921A (en) * 2011-11-22 2013-06-05 阿里巴巴集团控股有限公司 Method and system for verifying identity information
CN103973711A (en) * 2014-05-28 2014-08-06 中国农业银行股份有限公司 Verification method and device
CN104333530A (en) * 2013-07-22 2015-02-04 深圳市腾讯计算机系统有限公司 Information credibility verifying method and apparatus
CN104468463A (en) * 2013-09-12 2015-03-25 深圳市腾讯计算机系统有限公司 Verification method, verification device and verification system
CN104869124A (en) * 2015-06-05 2015-08-26 飞天诚信科技股份有限公司 Authentication method based on geographic position information
CN105100096A (en) * 2015-07-17 2015-11-25 小米科技有限责任公司 Verification method and apparatus
CN105095205A (en) * 2014-04-17 2015-11-25 阿里巴巴集团控股有限公司 Method and device for address location
CN105471581A (en) * 2014-09-10 2016-04-06 阿里巴巴集团控股有限公司 Identity verification method and device
CN105898015A (en) * 2015-12-04 2016-08-24 乐视致新电子科技(天津)有限公司 Safety certification controlling method and terminal

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103138921A (en) * 2011-11-22 2013-06-05 阿里巴巴集团控股有限公司 Method and system for verifying identity information
CN102413074A (en) * 2011-11-30 2012-04-11 向进轮 Method for detecting login of instant messenger terminal in another place
CN104333530A (en) * 2013-07-22 2015-02-04 深圳市腾讯计算机系统有限公司 Information credibility verifying method and apparatus
CN104468463A (en) * 2013-09-12 2015-03-25 深圳市腾讯计算机系统有限公司 Verification method, verification device and verification system
CN105095205A (en) * 2014-04-17 2015-11-25 阿里巴巴集团控股有限公司 Method and device for address location
CN103973711A (en) * 2014-05-28 2014-08-06 中国农业银行股份有限公司 Verification method and device
CN105471581A (en) * 2014-09-10 2016-04-06 阿里巴巴集团控股有限公司 Identity verification method and device
CN104869124A (en) * 2015-06-05 2015-08-26 飞天诚信科技股份有限公司 Authentication method based on geographic position information
CN105100096A (en) * 2015-07-17 2015-11-25 小米科技有限责任公司 Verification method and apparatus
CN105898015A (en) * 2015-12-04 2016-08-24 乐视致新电子科技(天津)有限公司 Safety certification controlling method and terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108965294A (en) * 2018-07-16 2018-12-07 安徽信尔联信息科技有限公司 A kind of user name and cipher protection system
CN112039839A (en) * 2020-07-16 2020-12-04 北京天融信网络安全技术有限公司 Operation and maintenance method and device based on customer premise examination and approval authorization

Also Published As

Publication number Publication date
CN107995150B (en) 2020-08-28

Similar Documents

Publication Publication Date Title
US9703971B2 (en) Sensitive operation verification method, terminal device, server, and verification system
EP3200487B1 (en) Message processing method and apparatus
CN105024984B (en) Authority setting method, apparatus and system
US10097547B2 (en) Security verification method, apparatus and terminal
US20150319173A1 (en) Co-verification method, two dimensional code generation method, and device and system therefor
CN104468463B (en) Verification method, device and system
WO2019042274A1 (en) Resource transfer method and apparatus, and storage medium
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN103634294A (en) Information verifying method and device
US10993090B2 (en) Network access method, apparatus, and system
CN104735657B (en) Security terminal verification method, wireless access point binding method, apparatus and system
CN106557962A (en) Method of payment, apparatus and system
CN106255102B (en) Terminal equipment identification method and related equipment
CN106570358A (en) Method and device for setting application permissions
CN104954126A (en) Sensitive operation verification method, device and system
JP2020509622A (en) Wireless network type detection method and apparatus and electronic device
CN106534324A (en) Data sharing method and cloud server
CN103533545B (en) A kind of obtain the method for effective communication account number, device and equipment
CN104899488B (en) Numeric value transfer and device
CN104580108A (en) Information prompting method and system as well as server
CN107465646B (en) A kind of application method for down loading, system and relevant device
CN104468466A (en) Operation management method and device for network account
CN108984231A (en) A kind of login method and mobile terminal of application program account
CN107995150A (en) Auth method and device
CN104580251B (en) A kind of method and apparatus for carrying out authorizing quick registration

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant