CN108449186A - Safe verification method and device - Google Patents

Safe verification method and device Download PDF

Info

Publication number
CN108449186A
CN108449186A CN201810593528.2A CN201810593528A CN108449186A CN 108449186 A CN108449186 A CN 108449186A CN 201810593528 A CN201810593528 A CN 201810593528A CN 108449186 A CN108449186 A CN 108449186A
Authority
CN
China
Prior art keywords
dynamic password
user
sent
air control
control end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810593528.2A
Other languages
Chinese (zh)
Other versions
CN108449186B (en
Inventor
彭展
季周
张晨
张燕锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JD Digital Technology Holdings Co Ltd
Jingdong Technology Holding Co Ltd
Original Assignee
Beijing Jingdong Financial Technology Holding Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Financial Technology Holding Co Ltd filed Critical Beijing Jingdong Financial Technology Holding Co Ltd
Priority to CN201810593528.2A priority Critical patent/CN108449186B/en
Publication of CN108449186A publication Critical patent/CN108449186A/en
Priority to PCT/CN2019/089487 priority patent/WO2019237950A1/en
Application granted granted Critical
Publication of CN108449186B publication Critical patent/CN108449186B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Payment protocols; Details thereof using an alias or single-use codes

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the present application discloses safe verification method and device.One specific implementation mode of this method includes:Receive security authentication request, wherein security authentication request includes the classification logotype of the sender of user identifier and security authentication request;Security authentication request is forwarded to connected air control end, so that air control end group determines whether to carry out information checking to the user indicated by user identifier in classification logotype;In response to receiving the prompt message for being used to indicate progress information checking of air control end return, information checking is carried out to user based on prompt message, generates information checking as a result, and being based on information checking as a result, obtaining safety verification result.The embodiment realizes the safety verification to user, and avoids the interaction between the sender of security authentication request and air control end, so as to so that the responsibility of the sender becomes single.

Description

Safe verification method and device
Technical field
The invention relates to field of computer technology, and in particular to safe verification method and device.
Background technology
Currently, safety verification can be applied to different systems, such as shopping class system, credit class system, financing class system System etc..These systems usually call air control engine to determine whether to trigger the information checking to user.Moreover, information checking is patrolled Volume, verification validity etc. be typically to go to complete according to self-demand by these systems.Thus existing safe verification method is usual It can cause a large amount of overlapping development and be not easy to safeguard.
Invention content
The embodiment of the present application proposes safe verification method and device.
In a first aspect, the embodiment of the present application provides a kind of safe verification method, this method includes:Safety verification is received to ask It asks, wherein security authentication request includes the classification logotype of the sender of user identifier and security authentication request;Safety verification is asked Ask and be forwarded to connected air control end so that air control end group in classification logotype determine whether to the user indicated by user identifier into Row information verifies;In response to receiving the prompt message for being used to indicate progress information checking of air control end return, based on prompt letter Breath carries out information checking to user, generates information checking as a result, and being based on information checking as a result, obtaining safety verification result.
In some embodiments, information checking includes verifying dynamic password, and prompt message is indicated for into Mobile state mouth Enable the information of verification;And information checking is carried out to user based on prompt message, including:Execute following verification operation:It generates dynamic The dynamic password generated is sent to the user terminal of user by state password;Receive the dynamic password that user terminal is sent;Determine user Whether the dynamic password that end is sent meets preset condition, if satisfied, then determining that user passes through verifying dynamic password;If user terminal The dynamic password of transmission is unsatisfactory for preset condition, then carries out increment operation to the verifying dynamic password frequency of failure, determines currently Whether the verifying dynamic password frequency of failure less than preset value continues to execute verification operation if being less than.
In some embodiments, it is based on prompt message and information checking is carried out to user, further include:In response to determining user terminal The dynamic password of transmission is unsatisfactory for preset condition or the current verifying dynamic password frequency of failure is not less than preset value, determines user Do not pass through verifying dynamic password.
In some embodiments, believe in the prompt for being used to indicate progress information checking in response to receiving the return of air control end After breath, the above method further includes:For security authentication request, corresponding identification information is set;And in the dynamic mouth that will be generated Order is sent to after the user terminal of user, and method further includes:Corresponding dynamic password mark is arranged in dynamic password to be generated, Storage is corresponded to by the dynamic password and dynamic password mark composition information pair, and by information pair and identification information.
In some embodiments, preset condition includes:It is consistent it to be sent to the dynamic password of user terminal with the last time;And Determine whether the dynamic password that user terminal is sent meets preset condition, including:Determine user terminal send dynamic password whether with The dynamic password of the information centering corresponding with identification information of newest storage is consistent, if unanimously, it is determined that user terminal is sent dynamic State password meets preset condition.
In some embodiments, the dynamic password generated is sent to the user terminal of user, including:Pass through short message channel The dynamic password generated is sent to user terminal.
In some embodiments, before executing verification operation for the first time, the above method further includes:Dynamic is sent to user terminal The address of the password authentication page passes through dynamic mouth so that user terminal jumps to the verifying dynamic password page based on address for user The verification page is enabled to send dynamic password.
In some embodiments, based on information checking as a result, obtaining safety verification as a result, including:If information checking result User is used to indicate not by information checking, then generates and is used to indicate user not by the safety verification result of safety verification.
In some embodiments, based on information checking as a result, obtaining safety verification as a result, further including:If information checking knot Fruit is used to indicate user by information checking, then information checking result is sent to air control end, so that air control end is based further on Classification logotype determines whether user passes through safety verification;Receive the safety verification result that air control end returns.
In some embodiments, after security authentication request to be forwarded to connected air control end, the above method also wraps It includes:Air control end is received to determine not to user's progress information checking and determining whether user passes through safety based on classification logotype The safety verification result returned after verification.
In some embodiments, the above method further includes:Safety verification result is returned into sender.
Second aspect, the embodiment of the present application provide a kind of safety verification device, which includes:Receiving unit, by with It is set to reception security authentication request, wherein security authentication request includes the class of the sender of user identifier and security authentication request It does not identify;Retransmission unit is configured to for security authentication request to be forwarded to connected air control end, so that air control end group is in classification Mark determines whether to carry out information checking to the user indicated by user identifier;Processing unit is configured in response to receive What air control end returned is used to indicate the prompt message for carrying out information checking, and information checking is carried out to user based on prompt message, raw At information checking as a result, and being based on information checking as a result, obtaining safety verification result.
In some embodiments, information checking includes verifying dynamic password, and prompt message is indicated for into Mobile state mouth Enable the information of verification;And processing unit includes:First executes subelement, is configured to execute following verification operation:It generates dynamic The dynamic password generated is sent to the user terminal of user by state password;Receive the dynamic password that user terminal is sent;Determine user Whether the dynamic password that end is sent meets preset condition, if satisfied, then determining that user passes through verifying dynamic password;Second executes son Unit, if the dynamic password for being configured to user terminal transmission is unsatisfactory for preset condition, to the verifying dynamic password frequency of failure Increment operation is carried out, determines whether the current verifying dynamic password frequency of failure continues to execute and test if being less than less than preset value Card operation.
In some embodiments, processing unit further includes:Determination subelement is configured in response to determine that user terminal is sent Dynamic password be unsatisfactory for preset condition or the current verifying dynamic password frequency of failure and be not less than preset value, determine that user is not led to Cross verifying dynamic password.
In some embodiments, above-mentioned apparatus further includes:First setting unit is configured to security authentication request setting Corresponding identification information;And storage unit, it is configured to generated dynamic password and corresponding dynamic password mark is set, Storage is corresponded to by the dynamic password and dynamic password mark composition information pair, and by information pair and identification information.
In some embodiments, preset condition includes:It is consistent it to be sent to the dynamic password of user terminal with the last time;And First execution subelement is further configured to:Determine whether the dynamic password that user terminal is sent is believed with newest storage and mark The dynamic password for ceasing corresponding information centering is consistent, if unanimously, it is determined that the dynamic password that user terminal is sent meets preset condition.
In some embodiments, the first execution subelement is still further configured to:It will be generated by short message channel Dynamic password is sent to user terminal.
In some embodiments, above-mentioned apparatus further includes:First transmission unit is configured to send dynamic mouth to user terminal The address of the verification page is enabled to pass through dynamic password for user so that user terminal jumps to the verifying dynamic password page based on address It verifies the page and sends dynamic password.
In some embodiments, processing unit further includes:Subelement is generated, if being configured to information checking result for referring to Show that user not by information checking, then generates and is used to indicate user not by the safety verification result of safety verification.
In some embodiments, processing unit further includes:Transmission sub-unit, if being configured to information checking result for referring to Show that information checking result by information checking, is then sent to air control end by user, so that air control end is based further on classification logotype Determine whether user passes through safety verification;Receive the safety verification result that air control end returns.
In some embodiments, above-mentioned apparatus further includes:First receiving unit is configured to reception air control end and is determining not Information checking is carried out to user and determines user whether by the safety verification knot that is returned after safety verification based on classification logotype Fruit.
In some embodiments, above-mentioned apparatus further includes:Second transmission unit is configured to return to safety verification result To sender.
The third aspect, the embodiment of the present application provide a kind of electronic equipment, which includes:One or more processing Device;Storage device is stored thereon with one or more programs;When the one or more program is held by the one or more processors Row so that the one or more processors realize the method as described in any realization method in first aspect.
Fourth aspect, the embodiment of the present application provide a kind of computer-readable medium, are stored thereon with computer program, should The method as described in any realization method in first aspect is realized when program is executed by processor.
Safe verification method and device provided by the embodiments of the present application include classification logotype and user identifier by receiving Security authentication request is forwarded to connected air control end by security authentication request later, so that air control end group is identified in the category Determine whether to carry out information checking to the user indicated by the user identifier.Then in response to receiving being used for for air control end return Indicate that the prompt message for carrying out information checking generates information checking as a result, to be based on information school to user's progress information checking It tests result and obtains safety verification result.The safety verification to user is realized, and avoids the sender of security authentication request With the interaction between air control end, so as to so that the responsibility of the sender becomes single.
Description of the drawings
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is that one embodiment of the application can be applied to exemplary system architecture figure therein;
Fig. 2 is the flow chart according to one embodiment of the safe verification method of the application;
Fig. 3 is the schematic diagram according to an application scenarios of the safe verification method of the application;
Fig. 4 is the flow chart according to another embodiment of the safe verification method of the application;
Fig. 5 is the structural schematic diagram according to one embodiment of the safety verification device of the application;
Fig. 6 is adapted for the structural schematic diagram of the computer system of the electronic equipment for realizing the embodiment of the present application.
Specific implementation mode
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to Convenient for description, is illustrated only in attached drawing and invent relevant part with related.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 shows the exemplary system of the embodiment of the safe verification method or safety verification device that can apply the application System framework 100.
As shown in Figure 1, system architecture 100 may include request end 101, management end 103, air control end 105 and network 102, 104.Network 102 between request end 101 and management end 103 provide communication link medium.Network 104 is managing The medium of communication link is provided between end 103 and air control end 105.Network 102,104 may include various connection types, such as have Line, wireless communication link or fiber optic cables etc..
Request end 101 can be interacted by network 102 with management end 103, to receive or send information etc..Wherein, it asks End 101 can be terminal device, can also be server.When request end 101 is terminal device, can pacify on request end 101 Equipped with various telecommunication customer end applications, such as network browser application, the application of shopping class, the application of financing class, the application of credit class, branch Pay class application etc..It should be noted that terminal device can be hardware, can also be software.When terminal device is hardware, Can be the various electronic equipments with display screen, including but not limited to smart mobile phone, tablet computer, E-book reader, knee Mo(u)ld top half pocket computer and desktop computer etc..When terminal device is software, above-mentioned cited electronics may be mounted at In equipment.Multiple softwares or software module (such as providing Distributed Services) may be implemented into it, can also be implemented as list A software or software module.It is not specifically limited herein.
Management end 103 can be to provide the management server of various services, which for example can be to request end 101 security authentication requests sent are handled etc., obtain handling result (such as safety verification result).
Air control end 105 can be to provide the air control server of various services, which can for example receive management Security authentication requests of 103 forwarding of end, and analyze etc. processing to the security authentication request, and by handling result (such as It is used to indicate the prompt message for carrying out information checking) return to management end 103.
It should be noted that management end 103 and air control end 105 can be the same servers, clothes can also be different Business device.
Can also be soft in addition, can be hardware as the request end 101 of server, management end 103, air control end 105 Part.When request end 101, management end 103, air control end 105 are hardware, the distributed clothes of multiple server compositions may be implemented into Business device cluster, can also be implemented as individual server.It, can be with when request end 101, management end 103, air control end 105 are software It is implemented as multiple softwares or software module (such as providing Distributed Services), single software or software mould can also be implemented as Block.It is not specifically limited herein.
It should be pointed out that the safe verification method that the embodiment of the present application is provided generally is executed by management end 103.Accordingly Ground, safety verification device are generally positioned in management end 103.
It should be understood that the number of the request end, network, management end and air control end in Fig. 1 is only schematical.According to reality It now needs, can have any number of request end, network, management end and air control end.
With continued reference to Fig. 2, the flow 200 of one embodiment of the safe verification method according to the application is shown.The peace The flow 200 of full verification method, includes the following steps:
Step 201, security authentication request is received.
In the present embodiment, the executive agent (such as management end 103 shown in FIG. 1) of safe verification method can be by having Line connection type or radio connection receive security authentication request.Wherein, security authentication request may include user identifier With the classification logotype of the sender (such as request end 101 shown in FIG. 1) of security authentication request.
It should be noted that above-mentioned security authentication request can be above-mentioned sender in response to receiving the request of user (such as payment request, credit request etc.) and the security authentication request sent to above-mentioned executive agent.On as an example it is supposed that It is the terminal device or server for providing ability to pay to state sender, then the classification of above-mentioned sender for example can be branch Classification is paid, the classification logotype of above-mentioned sender is such as can be the title or number of payment category.
Step 202, security authentication request is forwarded to connected air control end.
In the present embodiment, above-mentioned executive agent can test above-mentioned safety after receiving above-mentioned security authentication request Card request is forwarded to connected air control end (such as air control end 105 shown in FIG. 1), so that air control end group is in above-mentioned classification logotype Determine whether to carry out information checking to the user indicated by above-mentioned user identifier.Wherein, information checking for example may include following At least one of:Verifying dynamic password, payment cipher verification, fingerprint authentication etc..Dynamic password can be according to special algorithm The uncertain random digit combination generated, each dynamic password are typically only capable to, using once, be widely used in net at present The application fields such as silver, network game, telecom operators, e-commerce, enterprise.
It should be noted that air control end can for example be previously stored with plus standard inspection corresponding with above-mentioned classification logotype Label.This adds standard inspection label can serve to indicate that the information checking whether increased to target user.Wherein, target user can be source The user indicated by user identifier in the security authentication request of the sender under classification indicated by above-mentioned classification logotype.Separately Outside, above-mentioned plus standard inspection label label values may include the first value for being used to indicate increase to the information checking of target user, and It is used to indicate the second value not increased to the information checking of target user.Air control end is in the peace for receiving above-mentioned executive agent forwarding After full checking request, corresponding to the classification logotype in the security authentication request plus standard inspection label current label values can be first checked Whether it is the first value, if the first value, then air control end can be determined to indicated by the user identifier in the security authentication request User carries out information checking, at this point, air control end can be sent to above-mentioned executive agent is used to indicate the prompt for carrying out information checking Information.If it is not the first value that should add the current label value of standard inspection label, air control end can determine not to indicated by the user identifier User carry out information checking.
Step 203, the prompt message for being used to indicate progress information checking returned in response to receiving air control end, to user Information checking is carried out, generates information checking as a result, and being based on information checking as a result, obtaining safety verification result.
In the present embodiment, above-mentioned executive agent can in response to receive air control end return be used to indicate into row information The prompt message of verification carries out information checking to user, generates information checking result.Moreover, above-mentioned executive agent can be with base In information checking as a result, obtaining safety verification result.
As an example, for the user indicated by the user identifier in the security authentication request that receives in step 201, Assuming that information checking includes payment cipher verification, above-mentioned executive agent can be shown to the user terminal of the user is used to indicate input The prompt message of payment cipher.The payment cipher that then above-mentioned executive agent can be returned in response to receiving above-mentioned user terminal, By the user identifier, associated payment cipher is compared with the payment cipher that above-mentioned user terminal returns in advance.If the two are propped up Pay password it is consistent, then above-mentioned executive agent can determine that user is verified by payment cipher, and above-mentioned executive agent can give birth at this time The information checking verified by payment cipher at user is used to indicate is as a result, and can be based on the information checking result and generate to use In instruction safety verification result of the user by safety verification.If the two payment ciphers are inconsistent, above-mentioned executive agent It can determine that user is not verified by payment cipher, above-mentioned executive agent, which can generate, at this time is used to indicate user and does not pass through payment The information checking of password authentification is used to indicate user not by testing safely as a result, can be based on information checking result generation in turn The safety verification result of card.
It should be noted that executing safe verification method by above-mentioned executive agent, safety can be efficiently reduced and tested Demonstrate,prove dependence of the sender of request to external system.Such as can make the sender that need to only rely on above-mentioned executive agent, without Air control end is relied on, the responsibility of the sender can be made to become single.In addition, executing safety verification side by above-mentioned executive agent Method can also reduce dependence of the air control end to external system.Such as it can be to avoid air control end to verifying dynamic password server, branch The dependence for paying password authentication server, fingerprint authentication server etc., can make air control end that need to only rely on above-mentioned executive agent, can be with Reduce network interaction.In addition, executing safe verification method by above-mentioned executive agent, redundant request can also be effectively prevented from The problems such as appearance.
In some optional realization methods of the present embodiment, if information checking includes verifying dynamic password, it is used for Indicate that the prompt message for carrying out information checking can be indicated for carrying out the prompt message of verifying dynamic password.If above-mentioned execution Main body receives the prompt message from air control termination, then above-mentioned executive agent can execute following verification operation:Dynamic password is generated, The dynamic password generated is sent to above-mentioned user terminal;Receive the dynamic password that above-mentioned user terminal is sent;Determine above-mentioned user Whether the dynamic password that end is sent meets preset condition, if satisfied, then determining that the user that above-mentioned user terminal is belonged to passes through dynamic Password authentication.If the dynamic password that above-mentioned user terminal is sent is unsatisfactory for above-mentioned preset condition, above-mentioned executive agent can be right The verifying dynamic password frequency of failure carries out increment operation, and it is default to determine whether the current verifying dynamic password frequency of failure is less than Value, if being less than, above-mentioned executive agent can continue to execute above-mentioned verification operation.If the dynamic password that above-mentioned user terminal is sent It is unsatisfactory for above-mentioned preset condition or the current verifying dynamic password frequency of failure is not less than above-mentioned preset value, then above-mentioned executive agent It can determine that the user that above-mentioned user terminal is belonged to does not pass through verifying dynamic password.
Wherein, above-mentioned preset condition for example may include:The dynamic password one of above-mentioned user terminal is sent to the last time It causes.Optionally, above-mentioned preset condition include with the last time be sent to the dynamic password of above-mentioned user terminal it is consistent while, also May include:Sending time is in preset time period.Wherein, preset time period can be sent to above-mentioned use with the last time The sending time of the dynamic password at family end be initial time, when a length of preset duration (such as 60 seconds) period.In addition, above-mentioned The verifying dynamic password frequency of failure is corresponding with the security authentication request received in step 201.Above-mentioned verifying dynamic password The initial value of the frequency of failure can be 0.
In some optional realization methods of the present embodiment, above-mentioned executive agent can will be generated by short message channel Dynamic password be sent to above-mentioned user terminal.In addition, above-mentioned executive agent carries out information checking and carries receiving to be used to indicate Can be that corresponding identification information is arranged in the security authentication request received after showing information.In practice, different classification logotypes can With the first different serial number generating algorithm of correspondence.Above-mentioned executive agent can utilize the classification logotype in the security authentication request The first corresponding serial number generating algorithm generates serial number, and sets the serial number in the mark letter of the security authentication request Breath.
In addition, above-mentioned executive agent is by the dynamic password generated after being sent to above-mentioned user terminal, above-mentioned execution master Body can also be that corresponding dynamic password mark is arranged in the dynamic password.Above-mentioned executive agent can move the dynamic password with this State password mark composition information pair, and by the information pair it is corresponding with above-mentioned identification information store.Such as by the information pair and upper It states identification information and corresponds to the data storage server stored to above-mentioned executive agent is local or above-mentioned executive agent is connected.It is real In trampling, different classification logotypes can also correspond to the second different serial number generating algorithms.Above-mentioned executive agent can be utilized and be connect The second serial number generating algorithm corresponding to classification logotype in the security authentication request received generates serial number, by the serial number It is set as the dynamic password mark of the dynamic password.
In some optional realization methods of the present embodiment, above-mentioned executive agent from above-mentioned user terminal every time to receiving Dynamic password verified after, corresponding verification record can be generated, and store to verification record.Wherein, this is tested Card record can include but is not limited to:The dynamic password, above-mentioned identification information, the target information corresponding with above-mentioned identification information To, verification result etc..Wherein, target information is to that can be the information for including the dynamic password being compared with the dynamic password It is right.Verification result for example may include being proved to be successful or authentication failed.
In some optional realization methods of the present embodiment, if above-mentioned preset condition includes being sent to institute with the last time The dynamic password for stating user terminal is consistent, then above-mentioned executive agent can determine dynamic password that above-mentioned user terminal is sent whether with most The dynamic password of the information centering corresponding with above-mentioned identification information newly stored is consistent.If consistent, above-mentioned executive agent can be with Determine that the dynamic password that above-mentioned user terminal is sent meets above-mentioned preset condition.
In some optional realization methods of the present embodiment, above-mentioned executive agent execute for the first time above-mentioned verification operation it Before, the address of the verifying dynamic password page can be first sent to above-mentioned user terminal, so that above-mentioned user terminal is redirected based on the address To the verifying dynamic password page, dynamic password is sent by the verifying dynamic password page for user.It should be noted that dynamic mouth It can be the page based on HTML (HyperText Markup Language, HyperText Markup Language) 5 standards to enable the verification page Face.In practice, for the security authentication request from different classes of sender, above-mentioned executive agent can be to the safety verification The user terminal of the user indicated by user identifier in request sends the address of the same verifying dynamic password page.Moreover, above-mentioned Executive agent can send dynamic password by unified short message channel to the user terminal.In this way, by using unified dynamic The password authentication page and unified short message channel, can be effectively prevented from overlapping development, can be in order to safeguarding.
In some optional realization methods of the present embodiment, above-mentioned executive agent can return to safety verification result The sender of security authentication request.
It is a schematic diagram according to the application scenarios of the safe verification method of the present embodiment with continued reference to Fig. 3, Fig. 3. In the application scenarios of Fig. 3, can be equipped on the terminal device 301 of user shopping class application, terminal device 301 can with to this Class of doing shopping application provides the payment class server 302 supported and communicates to connect.User can be with the shopping class in using terminal equipment 301 Using doing shopping, in payment, user can preset payment operation to send payment to payment class server 302 by execution Request, wherein the payment request may include the user identifier of above-mentioned user.Then, payment class server 302 can be in response to The payment request is received, sends security authentication request to the management server 303 connected, wherein the security authentication request It may include the classification logotype of above-mentioned user identifier and payment class server 302.Then, management server 303 can be in response to Above-mentioned security authentication request is received, above-mentioned security authentication request is forwarded to connected air control server 304.Followed by, Air control server 304 can be determined whether based on above-mentioned classification logotype to above-mentioned in response to receiving above-mentioned security authentication request User carries out information checking, and is returned to management server 303 for referring to after determining to above-mentioned user progress information checking Show the prompt message for carrying out information checking.Then, management server 303 can be in response to receiving above-mentioned prompt message, to upper It states user and carries out information checking, generate information checking as a result, being for example used to indicate information school of the above-mentioned user by information checking Test result.Finally, management server 303 can be indicated for above-mentioned user in response to information checking result and pass through information checking Information checking as a result, generate be used to indicate safety verification result of the above-mentioned user by safety verification.In addition, management server 303 can also return to safety verification result payment class server 302.In this way, payment class server 302 can be based on receiving The safety verification arrived to terminal device 301 as a result, return to payment result.
The method that above-described embodiment of the application provides includes classification logotype and the safety verification of user identifier by receiving Security authentication request, is forwarded to connected air control end by request later, so that air control end group determines whether in category mark Information checking is carried out to the user indicated by the user identifier.Then in response to receive air control end return be used to indicate progress The prompt message of information checking carries out information checking to user, generates information checking as a result, being obtained to be based on information checking result To safety verification result.The safety verification to user is realized, and avoids sender and the air control end of security authentication request Between interaction, so as to so that the responsibility of the sender becomes single.
With further reference to Fig. 4, it illustrates the flows 400 of another embodiment of safe verification method.The safety verification The flow 400 of method, includes the following steps:
Step 401, security authentication request is received.
In the present embodiment, the executive agent (such as management end 103 shown in FIG. 1) of safe verification method can be by having Line connection type or radio connection receive security authentication request.Wherein, security authentication request may include user identifier With the classification logotype of the sender (such as request end 101 shown in FIG. 1) of security authentication request.
Step 402, security authentication request is forwarded to connected air control end.
In the present embodiment, above-mentioned executive agent can test above-mentioned safety after receiving above-mentioned security authentication request Card request is forwarded to connected air control end (such as air control end 105 shown in FIG. 1).Wherein, air control end can be based on above-mentioned class It Biao Shi not determine whether to carry out information checking to the user indicated by above-mentioned user identifier, it is corresponding to determine that method be referring to Fig. 2 Related description in illustrated embodiment, details are not described herein.It is tested it should be noted that information checking may include dynamic password Card.Dynamic password can be the uncertain random digit combination generated according to special algorithm, and each dynamic password is usual It is used only once, is widely used in the application fields such as Internetbank, network game, telecom operators, e-commerce, enterprise at present.
In addition, air control end can also be based further on above-mentioned classification when determining not to above-mentioned user progress information checking Mark determines whether above-mentioned user passes through safety verification.It should be noted that air control end can be previously stored with it is above-mentioned The corresponding safety verification of classification logotype indicates that information, safety verification instruction information can serve to indicate that how air control end determines State whether user passes through safety verification.
As an example, above-mentioned security authentication request can also include IP (Internet Protocol, the net of above-mentioned user The agreement interconnected between network) address.Above-mentioned safety verification indicates that information may include:If the IP in above-mentioned security authentication request Address is consistent with the IP address of the above-mentioned user to prestore, it is determined that above-mentioned user passes through safety verification;Otherwise above-mentioned user is determined Do not pass through safety verification.
For another example above-mentioned security authentication request can also include the facial image of above-mentioned user.Above-mentioned safety verification instruction Information may include:If the facial image in above-mentioned security authentication request is matched with the facial image of the above-mentioned user to prestore, Then determine that above-mentioned user passes through safety verification;Otherwise determine that above-mentioned user does not pass through safety verification.
It should be pointed out that the content of safety verification instruction information can adjust according to actual needs, the present embodiment Any restriction is not done to content in this respect.
In practice, if air control end is determined carries out information checking to above-mentioned user, such as determine to above-mentioned user into Mobile state Password authentication, air control end can return to above-mentioned executive agent and be used to indicate the prompt message for carrying out verifying dynamic password, at this time Above-mentioned executive agent can execute step 403.In addition, air control end is determining not to above-mentioned user into row information and based on upper It states after whether classification logotype determine above-mentioned user by safety verification, corresponding safety verification can be returned to above-mentioned executive agent As a result, above-mentioned executive agent can execute step 405 at this time.
Step 403, the prompt message for being used to indicate progress verifying dynamic password returned in response to receiving air control end is right User carries out verifying dynamic password, generates and whether is used to indicate user by the information checking result of verifying dynamic password.
In the present embodiment, above-mentioned executive agent can in response to receive air control end return be used to indicate into Mobile state The prompt message of password authentication, and verifying dynamic password is carried out to above-mentioned user, and generate whether be used to indicate above-mentioned user Pass through the information checking result of verifying dynamic password.It should be noted that for verifying dynamic password method, it can be referring to Fig. 2 institutes Show the related description in embodiment, details are not described herein.
It should be pointed out that if above-mentioned executive agent determines that above-mentioned user passes through verifying dynamic password, above-mentioned execution master The information checking result that body is generated can serve to indicate that user by verifying dynamic password, and above-mentioned executive agent can be held at this time Row step 404.If above-mentioned executive agent determines above-mentioned user not by verifying dynamic password, what above-mentioned executive agent was generated Information checking result can serve to indicate that user not by verifying dynamic password, and above-mentioned executive agent can execute step at this time 406。
Step 404, user is used to indicate by verifying dynamic password, by information checking result in response to information checking result It is sent to air control end.
In the present embodiment, it is used to indicate above-mentioned user by verifying dynamic password in response to above- mentioned information check results, Above- mentioned information check results can be sent to air control end by above-mentioned executive agent, so that air control end is based further on above-mentioned classification mark Know and determines whether above-mentioned user passes through safety verification.
It should be noted that air control end not only can be after determining not to above-mentioned user progress information checking, automatic ground Determine whether above-mentioned user passes through safety verification in above-mentioned classification logotype.Moreover, air control end can also receive above-mentioned execution After the information checking result that main body is sent, determine whether above-mentioned user passes through safety verification based on above-mentioned classification logotype.
Step 405, the safety verification result that air control end returns is received.
In the present embodiment, in the case where air control end determines not to above-mentioned user progress information checking, above-mentioned execution master Body can receive the safety verification result of air control end return after executing the step 402.In addition, above-mentioned executive agent is executing After complete step 404, the safety verification result of air control end return can also be received.
Step 406, user is used to indicate not by verifying dynamic password in response to information checking result, generation is used to indicate User does not pass through the safety verification result of safety verification.
In the present embodiment, do not pass through if the information checking result that above-mentioned executive agent is generated is used to indicate above-mentioned user Verifying dynamic password, then above-mentioned executive agent can determine above-mentioned user not by safety verification, above-mentioned executive agent is just at this time It can generate and be used to indicate above-mentioned user not by the safety verification result of safety verification.
Step 407, safety verification result is returned to the sender of security authentication request.
In the present embodiment, above-mentioned executive agent, can be by safety verification knot after executing the step 405 or step 406 Fruit returns to the sender of above-mentioned security authentication request.
Figure 4, it is seen that compared with the corresponding embodiments of Fig. 2, the flow of the safe verification method in the present embodiment 400 highlight after security authentication request is forwarded to air control end, receive air control end determine not to user carry out information checking, And the step of whether user is by the safety verification result that is returned after safety verification is determined based on classification logotype;And it is generating After being used to indicate the information checking result that user passes through verifying dynamic password, which is sent to air control end, and Be followed by calling prisoners in after letting them out for exercise the step of controlling the safety verification result that end returns.Safety verification may be implemented in the scheme of the present embodiment description as a result, As a result the diversity of acquisition modes, and the validity of safety verification result can be improved.
With further reference to Fig. 5, as the realization to method shown in above-mentioned each figure, this application provides a kind of safety verification dresses The one embodiment set, the device embodiment is corresponding with embodiment of the method shown in Fig. 2, which specifically can be applied to respectively In kind electronic equipment.
As shown in figure 5, the safety verification device 500 of the present embodiment includes:Receiving unit 501 may be configured to receive peace Full checking request, wherein security authentication request may include the classification logotype of the sender of user identifier and security authentication request; Retransmission unit 502 may be configured to for security authentication request to be forwarded to connected air control end, so that air control end group is in classification Mark determines whether to carry out information checking to the user indicated by user identifier;Processing unit 503 is configured in response to receive The prompt message for being used to indicate progress information checking returned to air control end carries out information checking based on prompt message to user, Information checking is generated as a result, and being based on information checking as a result, obtaining safety verification result.
In the present embodiment, in safety verification device 500:Receiving unit 501, retransmission unit 502 and processing unit 503 Specific processing and its caused technique effect can be respectively with reference to step 201, step 202 and the steps in 2 corresponding embodiment of figure 203 related description, details are not described herein.
In some optional realization methods of the present embodiment, information checking may include verifying dynamic password, prompt letter Breath can be indicated for carrying out the information of verifying dynamic password;And processing unit 503 may include:First executes subelement (not shown) is configured to execute following verification operation:Dynamic password is generated, the dynamic password generated is sent to use The user terminal at family;Receive the dynamic password that user terminal is sent;Determine whether the dynamic password that user terminal is sent meets preset condition, If satisfied, then determining that user passes through verifying dynamic password;Second executes subelement (not shown), if being configured to user The dynamic password that end is sent is unsatisfactory for preset condition, then carries out increment operation to the verifying dynamic password frequency of failure, determines current The verifying dynamic password frequency of failure whether less than preset value continue to execute verification operation if being less than.
In some optional realization methods of the present embodiment, processing unit 503 can also include:Determination subelement (figure In be not shown), be configured in response to determine user terminal send dynamic password be unsatisfactory for preset condition or current dynamic mouth It enables authentication failed number be not less than preset value, determines that user does not pass through verifying dynamic password.
In some optional realization methods of the present embodiment, above-mentioned apparatus 500 can also include:First setting unit (not shown) is configured to security authentication request and corresponding identification information is arranged;And storage unit (is not shown in figure Go out), it is configured to generated dynamic password and corresponding dynamic password mark is set, by the dynamic password and the dynamic password Mark composition information pair, and information pair and identification information are corresponded into storage.
In some optional realization methods of the present embodiment, preset condition may include:It is sent to use with the last time The dynamic password at family end is consistent;And first execution subelement can be further configured to:Determine the dynamic that user terminal is sent Whether the dynamic password of information centering corresponding with identification information with newest storage is consistent for password, if unanimously, it is determined that user The dynamic password that end is sent meets preset condition.
In some optional realization methods of the present embodiment, the first execution subelement can also be further configured to: The dynamic password generated is sent to user terminal by short message channel.
In some optional realization methods of the present embodiment, above-mentioned apparatus 500 can also include:First transmission unit (not shown) is configured to send the address of the verifying dynamic password page to user terminal, so that user terminal is jumped based on address The verifying dynamic password page is gone to, dynamic password is sent by the verifying dynamic password page for user.
In some optional realization methods of the present embodiment, processing unit 503 can also include:Generate subelement (figure In be not shown), if being configured to information checking result is used to indicate user not by information checking, generation is used to indicate user Do not pass through the safety verification result of safety verification.
In some optional realization methods of the present embodiment, processing unit 503 can also include:Transmission sub-unit (figure In be not shown), if being configured to information checking result is used to indicate user by information checking, information checking result is sent To air control end, so that air control end is based further on classification logotype and determines whether user passes through safety verification;Air control end is received to return Safety verification result.
In some optional realization methods of the present embodiment, above-mentioned apparatus 500 can also include:First receiving unit (not shown), be configured to receive air control end determine not to user carry out information checking and based on classification logotype it is true Whether user is determined by the safety verification result that is returned after safety verification.
In some optional realization methods of the present embodiment, above-mentioned apparatus 500 can also include:Second transmission unit (not shown) is configured to safety verification result returning to above-mentioned sender.
The device that above-described embodiment of the application provides includes classification logotype and the safety verification of user identifier by receiving Security authentication request, is forwarded to connected air control end by request later, so that air control end group determines whether in category mark Information checking is carried out to the user indicated by the user identifier.Then in response to receive air control end return be used to indicate progress The prompt message of information checking carries out information checking to user, generates information checking as a result, being obtained to be based on information checking result To safety verification result.The safety verification to user is realized, and avoids sender and the air control end of security authentication request Between interaction, so as to so that the responsibility of the sender becomes single.
Below with reference to Fig. 6, it illustrates suitable for for realizing that the electronic equipment of the embodiment of the present application is (such as shown in FIG. 1 Management end 103) computer system 600 structural schematic diagram.Electronic equipment shown in Fig. 6 is only an example, should not be right The function and use scope of the embodiment of the present application bring any restrictions.
As shown in fig. 6, computer system 600 includes central processing unit (CPU) 601, it can be read-only according to being stored in Program in memory (ROM) 602 or be loaded into the program in random access storage device (RAM) 603 from storage section 608 and Execute various actions appropriate and processing.In RAM 603, also it is stored with system 600 and operates required various programs and data. CPU 601, ROM 602 and RAM 603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected to always Line 604.
It is connected to I/O interfaces 605 with lower component:Importation 606 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loud speaker etc.;Storage section 608 including hard disk etc.; And the communications portion 609 of the network interface card including LAN card, modem etc..Communications portion 609 via such as because The network of spy's net executes communication process.Driver 610 is also according to needing to be connected to I/O interfaces 605.Detachable media 611, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on driver 610, as needed in order to be read from thereon Computer program be mounted into storage section 608 as needed.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium On computer program, which includes the program code for method shown in execution flow chart.In such reality It applies in example, which can be downloaded and installed by communications portion 609 from network, and/or from detachable media 611 are mounted.When the computer program is executed by central processing unit (CPU) 601, executes and limited in the system of the application Above-mentioned function.
It should be noted that computer-readable medium shown in the application can be computer-readable signal media or meter Calculation machine readable storage medium storing program for executing either the two arbitrarily combines.Computer readable storage medium for example can be --- but not Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or arbitrary above combination.Meter The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to:Electrical connection with one or more conducting wires, just It takes formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type and may be programmed read-only storage Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device, Or above-mentioned any appropriate combination.In this application, can be any include computer readable storage medium or storage journey The tangible medium of sequence, the program can be commanded the either device use or in connection of execution system, device.And at this In application, computer-readable signal media may include in a base band or as the data-signal that a carrier wave part is propagated, Wherein carry computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By instruction execution system, device either device use or program in connection.Include on computer-readable medium Program code can transmit with any suitable medium, including but not limited to:Wirelessly, electric wire, optical cable, RF etc. or above-mentioned Any appropriate combination.
The calculating of the operation for executing the application can be write with one or more programming languages or combinations thereof Machine program code, described program design language include object oriented program language-such as Java, Smalltalk, C+ +, further include conventional procedural programming language-such as " C " language or similar programming language.Program code can Fully to execute on the user computer, partly execute, executed as an independent software package on the user computer, Part executes or executes on a remote computer or server completely on the remote computer on the user computer for part. In situations involving remote computers, remote computer can pass through the network of any kind --- including LAN (LAN) Or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as utilize Internet service Provider is connected by internet).
Flow chart in attached drawing and block diagram, it is illustrated that according to the system of the various embodiments of the application, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part for a part for one module, program segment, or code of table, above-mentioned module, program segment, or code includes one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depended on the functions involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
Being described in unit involved in the embodiment of the present application can be realized by way of software, can also be by hard The mode of part is realized.Described unit can also be arranged in the processor, for example, can be described as:A kind of processor packet Include receiving unit, retransmission unit and processing unit.Wherein, the title of these units is not constituted under certain conditions to the unit The restriction of itself, for example, receiving unit is also described as " receiving the unit of security authentication request ".
As on the other hand, present invention also provides a kind of computer-readable medium, which can be Included in electronic equipment described in above-described embodiment;Can also be individualism, and without be incorporated the electronic equipment in. Above computer readable medium carries one or more program, when the electronics is set by one for said one or multiple programs When standby execution so that the electronic equipment:Receive security authentication request, wherein security authentication request may include user identifier and The classification logotype of the sender of security authentication request;Security authentication request is forwarded to connected air control end, so that air control end Determine whether to carry out information checking to the user indicated by user identifier based on classification logotype;It is returned in response to receiving air control end Be used to indicate carry out information checking prompt message, based on prompt message to user carry out information checking, generate information checking As a result, and being based on information checking as a result, obtaining safety verification result.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.People in the art Member should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic Scheme, while should also cover in the case where not departing from foregoing invention design, it is carried out by above-mentioned technical characteristic or its equivalent feature Other technical solutions of arbitrary combination and formation.Such as features described above has similar work(with (but not limited to) disclosed herein Can technical characteristic replaced mutually and the technical solution that is formed.

Claims (24)

1. a kind of safe verification method, including:
Receive security authentication request, wherein the security authentication request includes the hair of user identifier and the security authentication request The classification logotype for the side of sending;
The security authentication request is forwarded to connected air control end, so that the air control end group is determined in the classification logotype Whether information checking is carried out to the user indicated by the user identifier;
The prompt message for being used to indicate progress information checking returned in response to receiving the air control end, is believed based on the prompt Breath carries out information checking to the user, generates information checking as a result, and based on described information check results, being tested safely Demonstrate,prove result.
2. according to the method described in claim 1, wherein, information checking includes verifying dynamic password, the prompt message is to use The information of verifying dynamic password is carried out in instruction;And
It is described that information checking is carried out to the user based on the prompt message, including:
Execute following verification operation:Dynamic password is generated, the dynamic password generated is sent to the user terminal of the user;It connects Receive the dynamic password that the user terminal is sent;Determine whether the dynamic password that the user terminal is sent meets preset condition, if full Foot, it is determined that the user passes through verifying dynamic password;
If the dynamic password that the user terminal is sent is unsatisfactory for the preset condition, to the verifying dynamic password frequency of failure into Row increment operation, determines whether the current verifying dynamic password frequency of failure is less than preset value, if being less than, continues to execute described Verification operation.
3. according to the method described in claim 2, wherein, it is described based on the prompt message to the user into row information school It tests, further includes:
The dynamic password sent in response to the determination user terminal is unsatisfactory for the preset condition or current verifying dynamic password The frequency of failure is not less than the preset value, determines that the user does not pass through verifying dynamic password.
4. according to the method described in claim 2, wherein, it is used to indicate in response to receive that the air control end returns described After the prompt message for carrying out information checking, the method further includes:
For the security authentication request, corresponding identification information is set;And
It is described the dynamic password generated is sent to the user terminal of the user after, the method further includes:
Corresponding dynamic password mark is arranged in dynamic password to be generated, by the dynamic password and dynamic password mark composition Information pair, and by described information pair it is corresponding with the identification information storage.
5. according to the method described in claim 4, wherein, the preset condition includes:It is sent to the user with the last time The dynamic password at end is consistent;And
Whether the dynamic password that the determination user terminal is sent meets preset condition, including:
Determine dynamic password that the user terminal is sent whether with the information centering corresponding with the identification information of newest storage Dynamic password it is consistent, if unanimously, it is determined that the dynamic password that the user terminal is sent meets the preset condition.
6. according to the method described in claim 2, wherein, the user that the dynamic password generated is sent to the user End, including:
The dynamic password generated is sent to the user terminal by short message channel.
7. according to the method described in claim 2, wherein, before executing the verification operation for the first time, the method further includes:
The address that the verifying dynamic password page is sent to the user terminal, so that the user terminal jumps to institute based on described address The verifying dynamic password page is stated, dynamic password is sent by the verifying dynamic password page for the user.
8. described to be based on described information check results according to the method described in claim 1, wherein, obtain safety verification as a result, Including:
If described information check results are used to indicate the user not by information checking, generation is used to indicate the user not Pass through the safety verification result of safety verification.
9. described to be based on described information check results according to the method described in claim 1, wherein, obtain safety verification as a result, Further include:
If described information check results are used to indicate the user by information checking, described information check results are sent to The air control end, so that the air control end, which is based further on the classification logotype, determines whether the user passes through safety verification; Receive the safety verification result that the air control end returns.
10. according to the method described in claim 1, wherein, the security authentication request to be forwarded to connected wind described After controlling end, the method further includes:
The air control end is received to determine not to user progress information checking and based on described in classification logotype determination Whether user passes through the safety verification result that is returned after safety verification.
11. according to the method described in one of claim 1-10, wherein the method further includes:
Safety verification result is returned into described sender.
12. a kind of safety verification device, including:
Receiving unit is configured to receive security authentication request, wherein the security authentication request includes user identifier and described The classification logotype of the sender of security authentication request;
Retransmission unit is configured to for the security authentication request to be forwarded to connected air control end, so that the air control end group Determine whether to carry out information checking to the user indicated by the user identifier in the classification logotype;
Processing unit is configured in response to receive the prompt letter for being used to indicate progress information checking that the air control end returns Breath carries out information checking based on the prompt message to the user, generates information checking as a result, and based on described information school It tests as a result, obtaining safety verification result.
13. device according to claim 12, wherein information checking includes verifying dynamic password, and the prompt message is It is used to indicate the information for carrying out verifying dynamic password;And
The processing unit includes:
First executes subelement, is configured to execute following verification operation:Dynamic password is generated, the dynamic password generated is sent out It send to the user terminal of the user;Receive the dynamic password that the user terminal is sent;Determine the dynamic mouth that the user terminal is sent Whether order meets preset condition, if satisfied, then determining that the user passes through verifying dynamic password;
Second executes subelement, if being configured to the dynamic password that the user terminal is sent is unsatisfactory for the preset condition, Increment operation is carried out to the verifying dynamic password frequency of failure, it is default to determine whether the current verifying dynamic password frequency of failure is less than Value, if being less than, continues to execute the verification operation.
14. device according to claim 13, wherein the processing unit further includes:
Determination subelement, be configured in response to determine dynamic password that the user terminal is sent be unsatisfactory for the preset condition or The current verifying dynamic password frequency of failure is not less than the preset value, determines that the user does not pass through verifying dynamic password.
15. device according to claim 13, wherein described device further includes:
First setting unit is configured to the security authentication request and corresponding identification information is arranged;And
Storage unit is configured to generated dynamic password and corresponding dynamic password mark is arranged, by the dynamic password and The dynamic password mark composition information pair, and by described information pair it is corresponding with the identification information store.
16. device according to claim 15, wherein the preset condition includes:It is sent to the use with the last time The dynamic password at family end is consistent;And
The first execution subelement is further configured to:
Determine dynamic password that the user terminal is sent whether with the information centering corresponding with the identification information of newest storage Dynamic password it is consistent, if unanimously, it is determined that the dynamic password that the user terminal is sent meets the preset condition.
17. device according to claim 13, wherein the first execution subelement is still further configured to:
The dynamic password generated is sent to the user terminal by short message channel.
18. device according to claim 13, wherein described device further includes:
First transmission unit is configured to send the address of the verifying dynamic password page to the user terminal, so that the user End group jumps to the verifying dynamic password page in described address, is sent out by the verifying dynamic password page for the user Send dynamic password.
19. device according to claim 12, wherein the processing unit further includes:
Subelement is generated to give birth to if being configured to described information check results is used to indicate the user not by information checking At being used to indicate the user not by the safety verification result of safety verification.
20. device according to claim 12, wherein the processing unit further includes:
Transmission sub-unit, if being configured to described information check results is used to indicate the user by information checking, by institute It states information checking result and is sent to the air control end, so that the air control end, which is based further on the classification logotype, determines the use Whether family passes through safety verification;Receive the safety verification result that the air control end returns.
21. device according to claim 12, wherein described device further includes:
First receiving unit is configured to receive the air control end determining not to user progress information checking, Yi Jiji The safety verification result returned after whether the classification logotype determines the user by safety verification.
22. according to the device described in one of claim 12-21, wherein described device further includes:
Second transmission unit is configured to safety verification result returning to described sender.
23. a kind of electronic equipment, including:
One or more processors;
Storage device is stored thereon with one or more programs,
When one or more of programs are executed by one or more of processors so that one or more of processors are real The now method as described in any in claim 1-11.
24. a kind of computer-readable medium, is stored thereon with computer program, wherein real when described program is executed by processor The now method as described in any in claim 1-11.
CN201810593528.2A 2018-06-11 2018-06-11 Security verification method and device Active CN108449186B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810593528.2A CN108449186B (en) 2018-06-11 2018-06-11 Security verification method and device
PCT/CN2019/089487 WO2019237950A1 (en) 2018-06-11 2019-05-31 Security verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810593528.2A CN108449186B (en) 2018-06-11 2018-06-11 Security verification method and device

Publications (2)

Publication Number Publication Date
CN108449186A true CN108449186A (en) 2018-08-24
CN108449186B CN108449186B (en) 2020-06-05

Family

ID=63206945

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810593528.2A Active CN108449186B (en) 2018-06-11 2018-06-11 Security verification method and device

Country Status (2)

Country Link
CN (1) CN108449186B (en)
WO (1) WO2019237950A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110189452A (en) * 2019-06-06 2019-08-30 广州小鹏汽车科技有限公司 Access processing method, device, system and the vehicle of car key
WO2019237950A1 (en) * 2018-06-11 2019-12-19 京东数字科技控股有限公司 Security verification method and device
WO2021190070A1 (en) * 2020-03-25 2021-09-30 支付宝(杭州)信息技术有限公司 Biological verification method and apparatus

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016070135A1 (en) * 2014-10-31 2016-05-06 Proofpoint, Inc. Systems and methods for privately performing application security analysis
CN105933266A (en) * 2015-08-20 2016-09-07 中国银联股份有限公司 Verification method and server
CN106845995A (en) * 2017-01-19 2017-06-13 飞天诚信科技股份有限公司 A kind of method of Bluetooth intelligent card and its control transaction risk
CN106998315A (en) * 2016-01-22 2017-08-01 阿里巴巴集团控股有限公司 A kind of method of authentication registration, apparatus and system
CN107018119A (en) * 2016-08-30 2017-08-04 阿里巴巴集团控股有限公司 Authentication system, method and platform
CN107341384A (en) * 2016-04-28 2017-11-10 苏宁云商集团股份有限公司 A kind of service verification method and system
CN107395647A (en) * 2017-09-05 2017-11-24 北京京东尚科信息技术有限公司 Checking system, method and apparatus

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8485442B2 (en) * 2009-07-02 2013-07-16 Biometric Payment Solutions Electronic transaction verification system with biometric authentication
CN102147900A (en) * 2011-03-14 2011-08-10 珠海飞讯科技有限公司 System and method for realizing payment
CN108449186B (en) * 2018-06-11 2020-06-05 京东数字科技控股有限公司 Security verification method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016070135A1 (en) * 2014-10-31 2016-05-06 Proofpoint, Inc. Systems and methods for privately performing application security analysis
CN105933266A (en) * 2015-08-20 2016-09-07 中国银联股份有限公司 Verification method and server
CN106998315A (en) * 2016-01-22 2017-08-01 阿里巴巴集团控股有限公司 A kind of method of authentication registration, apparatus and system
CN107341384A (en) * 2016-04-28 2017-11-10 苏宁云商集团股份有限公司 A kind of service verification method and system
CN107018119A (en) * 2016-08-30 2017-08-04 阿里巴巴集团控股有限公司 Authentication system, method and platform
CN106845995A (en) * 2017-01-19 2017-06-13 飞天诚信科技股份有限公司 A kind of method of Bluetooth intelligent card and its control transaction risk
CN107395647A (en) * 2017-09-05 2017-11-24 北京京东尚科信息技术有限公司 Checking system, method and apparatus

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019237950A1 (en) * 2018-06-11 2019-12-19 京东数字科技控股有限公司 Security verification method and device
CN110189452A (en) * 2019-06-06 2019-08-30 广州小鹏汽车科技有限公司 Access processing method, device, system and the vehicle of car key
WO2021190070A1 (en) * 2020-03-25 2021-09-30 支付宝(杭州)信息技术有限公司 Biological verification method and apparatus

Also Published As

Publication number Publication date
WO2019237950A1 (en) 2019-12-19
CN108449186B (en) 2020-06-05

Similar Documents

Publication Publication Date Title
CN108174381B (en) Method and apparatus for connecting wireless access point
CN107070735B (en) Method, test terminal and the system of asynchronous interface test
US20200036692A1 (en) System and method for providing controlled application programming interface security
CN107357914B (en) Information processing method and device
CN106412024B (en) A kind of page acquisition methods and device
CN108173938A (en) Server load shunt method and device
CN108574604A (en) test method and device
CN104580112B (en) A kind of service authentication method, system and server
CN108449186A (en) Safe verification method and device
CN107342966B (en) Authority credentials distribution method and device
CN109408250A (en) Call application programming interface API approach, device, electronic equipment
CN107465693A (en) Request message treating method and apparatus
CN109460652A (en) For marking the method, equipment and computer-readable medium of image pattern
CN109743161A (en) Information ciphering method, electronic equipment and computer-readable medium
CN109284198A (en) A kind of method and apparatus verifying data
CN108259457A (en) A kind of WEB authentication methods and device
CN110188159A (en) Collage-credit data cut-in method, device, equipment and computer readable storage medium
CN108305071A (en) A kind of method and apparatus of enquiring digital currency managing detailed catalogue
CN107609953A (en) The quick treating method and apparatus of order
CN108763881A (en) Method and apparatus for controlling user right
CN108390878A (en) Method, apparatus for verifying network request safety
CN109150898A (en) Method and apparatus for handling information
CN106888448A (en) Using method for down loading, safety element and terminal
CN106845209A (en) Safe verification method and device
CN109726593A (en) A kind of implementation method and device of data sandbox

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Room 221, 2nd floor, Block C, 18 Kechuang 11th Street, Daxing Economic and Technological Development Zone, Beijing, 100176

Applicant after: JINGDONG DIGITAL TECHNOLOGY HOLDINGS Co.,Ltd.

Address before: Room 221, 2nd floor, Block C, 18 Kechuang 11th Street, Daxing Economic and Technological Development Zone, Beijing, 100176

Applicant before: BEIJING JINGDONG FINANCIAL TECHNOLOGY HOLDING Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: Room 221, 2nd floor, Block C, 18 Kechuang 11th Street, Daxing Economic and Technological Development Zone, Beijing, 100176

Patentee after: Jingdong Technology Holding Co.,Ltd.

Address before: Room 221, 2nd floor, Block C, 18 Kechuang 11th Street, Daxing Economic and Technological Development Zone, Beijing, 100176

Patentee before: Jingdong Digital Technology Holding Co.,Ltd.

Address after: Room 221, 2nd floor, Block C, 18 Kechuang 11th Street, Daxing Economic and Technological Development Zone, Beijing, 100176

Patentee after: Jingdong Digital Technology Holding Co.,Ltd.

Address before: Room 221, 2nd floor, Block C, 18 Kechuang 11th Street, Daxing Economic and Technological Development Zone, Beijing, 100176

Patentee before: JINGDONG DIGITAL TECHNOLOGY HOLDINGS Co.,Ltd.