CN102208978A - Input verification system and method - Google Patents
Input verification system and method Download PDFInfo
- Publication number
- CN102208978A CN102208978A CN2010101424807A CN201010142480A CN102208978A CN 102208978 A CN102208978 A CN 102208978A CN 2010101424807 A CN2010101424807 A CN 2010101424807A CN 201010142480 A CN201010142480 A CN 201010142480A CN 102208978 A CN102208978 A CN 102208978A
- Authority
- CN
- China
- Prior art keywords
- information
- input
- authorization information
- checking
- verification mode
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention provides an input verification system and an input verification method. The system comprises a server and a client, wherein the server receives a verification session from the client, randomly selects a preset verification way, randomly selects resources corresponding to the verification way according to the selected verification way, generates verification information, returns the verification information to the client, acquires input information from a user, compares the input information with the verification information, judges whether the input information is matched with the verification information or not, determines the input information passes the verification if the input information is judged to be matched with the verification information, otherwise determines the input information does not pass the verification; and the client is used for transmitting the verification session to the server, receiving the verification information from the server and transmitting the input information of the user to the server. By the input verification method and the input verification system provided by the invention, difficulties in seeing through the verification can be increased.
Description
[technical field]
The present invention relates to the Information Authentication technical field, relate in particular to a kind of system and method for verifying input.
[background technology]
In the network interaction system; in order to prevent user's malicious registration; usually can provide identifying code that user's input is verified; the picture that this identifying code is normally handled through scrambler; the user goes out corresponding literal and numeral and inserts the checking frame according to picture recognition; whether correct by the identifying code of background server checking user input then, thus the legitimacy of checking user input.In the anti-external store system in the online game, can eject usually and fill in frame prompting player and import corresponding literal, numeral etc., thereby it is plug-in to verify whether current operator has adopted.
Because the identifying code character space that the mode of traditional checking input adopts is identified with exhaustive easily at 26 upper and lower case letters and 10 Arabic numerals; And this identifying code is handled through scrambler, if scrambler easy crack simply then, and the scrambler complexity is difficult to be gone out by User Recognition; And identifying code needs the user to import from keyboard, and easily the people is for makeing mistakes, and because the employing Chinese character also may run into the problem that the user can't import some Chinese character, thereby increased user's use threshold; In addition, the verification mode in the recreation is difficult to use in the Web login frame, and context is had severe dependency.
[summary of the invention]
Based on this, be necessary to provide a kind of system that verifies input, can promote the difficulty that checking is penetrated.
A kind of system that verifies input comprises: server receives the checking session that client sends, picked at random is preset verification mode, according to the verification mode picked at random resource of choosing corresponding with verification mode, generate authorization information, described authorization information is back to client, and the input information that obtains the user, described input information and authorization information are compared, judge whether input information and authorization information mate, if, then checking is passed through, otherwise authentication failed; Client is used for sending the checking session to server, receives the authorization information that described server returns, and user's input information is sent to described server.
This server can comprise: the identification generation module, and picked at random is preset verification mode, chooses the resource corresponding with this verification mode according to the verification mode of choosing, and generates authorization information, and generates information according to the characteristic information of the described verification mode of choosing; First session management module adds described authorization information in the session; Authentication module obtains user's input information, and the authorization information in described input information and described first session management module is compared, and judges whether described input information and authorization information mate, if then checking is passed through, otherwise authentication failed; First communication module receive the checking session of client transmission and user's input information, and authorization information and information that server is generated is back to described client.
This server also can comprise the resources bank of default verification mode of storage and corresponding resource, and described resource comprises more than one of literal, picture, icon, voice, beat and gesture information.
This server also can comprise: the scrambler module, and described authorization information to be carried out scrambler handle, the authorization information after scrambler is handled is back to described client.
This client can comprise: second communication module, Client-initiated is verified session and user's input information is sent to server, and the authorization information returned of reception server, information and checking result; Second session management module is used for initiating the checking session; Input/output module provides the interface of user's input information, and exports described authorization information, information and demonstration.
In addition, also be necessary to provide a kind of method of verifying input, can promote the difficulty that checking is penetrated.
A kind of method of verifying input comprises: receive Client-initiated checking session; Picked at random is preset verification mode, according to the resource of this verification mode correspondence of verification mode picked at random of choosing, generates authorization information; Described authorization information is back to the user; Obtain user's input information, described input information and authorization information are compared; Judge whether described input information and authorization information mate, if then checking is passed through, otherwise authentication failed.
The step that this picked at random resource generates authorization information also can comprise: described authorization information is added in the session, according to the characteristic information generation information of the described verification mode of choosing.
This method also can comprise: default multiple verification mode and the resource corresponding with described verification mode, described default verification mode and corresponding resource are stored in the resources bank, and described resource comprises more than one of literal, picture, icon, voice, beat and gesture information.
Describedly before being back to user's step, authorization information also can comprise: described authorization information is carried out the step that scrambler is handled.
The described step that authorization information is back to the user also can comprise: with described authorization information, information output and show; Described method also comprises: described checking result is back to the user.
The system and method for above-mentioned checking input, by the default verification mode of picked at random, according to the verification mode picked at random resource of choosing corresponding with verification mode, generate authorization information, make that optional verification mode can be versatile and flexible, be that verification mode can change at random, thereby promoted the difficulty that checking is penetrated.
In addition, according to the characteristic information generation information of the verification mode of choosing, convenient prompting user imports corresponding authorization information; Selectable resource comprises more than one of literal, picture, icon, voice, beat and gesture information, further promotes the difficulty that checking is penetrated; Picture, icon, voice, beat and gesture information etc. need not the user and import from keyboard, have reduced possible artificial error rate and user's use threshold.
[description of drawings]
Fig. 1 is the structural representation of the system of checking input among the embodiment;
Fig. 2 is the structural representation of server among the embodiment;
Fig. 3 is one of interface schematic diagram of checking input;
Fig. 4 be checking input the interface schematic diagram two;
Fig. 5 is the structural representation of server among another embodiment;
Fig. 6 is the structural representation of client among the embodiment;
Fig. 7 is the flow chart of the method for checking input among the embodiment.
[embodiment]
Fig. 1 shows the system of checking input among the embodiment, and this system comprises server 10 and client 20.Should be noted that this embodiment is an embodiment the simplest who proposes for the structure that said system is described, the system of checking input provided by the invention should comprise a plurality of and server 10 carries out mutual client 20.Wherein:
Fig. 2 shows a server 10 among the embodiment, and this server 10 comprises resources bank 101, identification generation module 102, first session management module 103, first communication module 104 and authentication module 105, wherein:
Multiple default verification mode and corresponding resource have been stored in the resources bank 10.Among this embodiment, default verification mode can comprise multiple, for example verifies by multiple modes such as literal, numeral, icon, picture, voice, beat, gestures.Accordingly, also stored the resource corresponding with these verification modes in the resources bank 10, for example the corresponding icon verification mode has been stored a large amount of icons; Corresponding speech verification mode has been stored the voice messaging of more predefined sentences or phrase in the resources bank 10; Corresponding beat verification mode has been stored the beat data of record in advance; Corresponding gesture verification mode has been stored the track data of predefined certain gestures etc.
First session management module 103 is used for the authorization information that identification generation module 102 generates is added session.Among this embodiment, first session management module 103 also is used to realize the session timeout and the uniqueness control of server 10.
As shown in Figure 5, in another embodiment, server 10 also comprises scrambler module 106 except comprising above-mentioned resources bank 101, identification generation module 102, first session management module 103, first communication module 104 and authentication module 105.Wherein: scrambler module 106 is used for that authorization information is carried out scrambler to be handled, and the authorization information after scrambler is handled is back to client 20 by first communication module 104.Among this embodiment, 106 pairs of authorization informations of scrambler module add some noises, and therefore the authorization information after scrambler is handled can further promote the difficulty that checking is penetrated easily by User Recognition but be difficult to by machine recognition.After can compressing, authorization information behind the scrambler is back to client 20, for example for the authorization information that forms with literal, numeral, icon etc., authorization information after scrambler can being handled is compressed into picture format, for speech verification information, then it can be compressed into the audio format of suitable Network Transmission etc.
Fig. 6 shows a client 20 among the embodiment, and this client 20 comprises second session management module 201, second communication module 202 and input/output module 203, wherein:
Second session management module 201 is used for initiating the checking session.In one embodiment, as Fig. 3~shown in Figure 4, the user need login or register a network interaction system, and then second conversation module 201 is initiated the checking sessions, and this checking session sends to server 10.
Input/output module 203 is used to provide the interface of user's input information, and output authorization information, information also is shown to the user.In one embodiment, the authorization information that server 10 generates returns to client 20 through behind the scrambler in the lump with information, the second communication module 202 of client 20 receives these information, be shown to the user by input/output module 203, as identifying code among Fig. 3~Fig. 4 and information, the user imports according to these information.Input/output module 203 is obtained the coordinate sequence of being clicked when the user imports, and can obtain which icon of user's input etc. by this coordinate sequence.Input information uploads onto the server 10 by second communication module 202, and after server 10 was verified according to user's input information, the checking result returned to client 20 again.
Fig. 7 shows the method flow of a checking input among the embodiment, and detailed process is as follows:
Step S10 receives Client-initiated checking session.
Step S20, picked at random is preset verification mode, according to the resource of this verification mode correspondence of verification mode picked at random of choosing, generates authorization information.
In one embodiment, preset multiple verification mode and the resource corresponding with verification mode in advance, default verification mode and corresponding resource all can be stored in the resources bank 101.Default verification mode comprises by multiple modes such as literal, numeral, icon, picture, voice, beat, gestures to be verified.Accordingly, also stored the resource corresponding with these verification modes in the resources bank 10, for example the corresponding icon verification mode has been stored a large amount of icons; Corresponding speech verification mode has been stored the voice messaging of more predefined sentences or phrase in the resources bank 10; Corresponding beat verification mode has been stored the beat data of record in advance; Corresponding gesture verification mode has been stored the track data of predefined certain gestures etc.
Among this embodiment, picked at random verification mode from resources bank 101, for example, picked at random the icon verification mode, then corresponding in the resource corresponding with the icon verification mode picked at random icon, generate authorization information; Again for example, the speech verification mode of picked at random, then corresponding in the resource corresponding with the speech verification mode voice messaging of picked at random sentence or phrase, generate authorization information.The authorization information that is generated adds in the session.Different verification modes after the generation authorization information, can generate information to different informations should be arranged according to the feature of the verification mode of choosing, and it is that the corresponding information of user is imported accordingly for convenience that information returns to the user.As Fig. 3~shown in Figure 4, wherein, " please select the head portrait identical with sample ", " please select the fruit similar with sample " all are information.The user imports accordingly according to this information can be by checking.
Step S30 is back to the user with described authorization information.In one embodiment, also can carry out scrambler to the authorization information that generates and handle, concrete is to add some noises in authorization information, makes the authorization information that returns to the user easily by User Recognition but be difficult to by machine recognition.After compressing, authorization information behind the scrambler returns to the user, for example for the authorization information that forms with literal, numeral, icon etc., authorization information after scrambler can being handled is compressed into picture format, for speech verification information, then it can be compressed into the audio format of suitable Network Transmission etc.Among this embodiment, also the information that generates can be returned to the user and show that the user can import according to information.
Step S40 obtains user's input information, and user's input information and authorization information compared.In one embodiment, as Fig. 3~shown in Figure 4, picked at random be the icon verification mode, the user clicks corresponding icon (comprising various icons such as head portrait, fruit, vegetables, animal, plant) according to information, obtain the icon of user's input, the authorization information in adding session this time of icon and generation is before compared.In another embodiment, picked at random be the speech verification mode, the user imports corresponding voice according to information, input voice and the authorization information of then obtaining the user compare.In another embodiment, picked at random be the gesture verification mode, the user is according to the information corresponding track that draws on screen, the track data and the authorization information that get access to user's input compare.
Step S50 judges whether user's input information and authorization information mate, if then enter step S60, otherwise enter step S70.Among this embodiment, user's input information and authorization information can be carried out fuzzy matching usually.
Step S60, checking is passed through.
Step S70, authentication failed.In one embodiment, also can return the information (as ejecting message box prompting user rs authentication failure) of authentication failed after the authentication failed to the user.
The system and method for above-mentioned checking input, by the default verification mode of picked at random, according to the verification mode picked at random resource of choosing corresponding with verification mode, generate authorization information, make that optional verification mode can be versatile and flexible, be that verification mode can change at random, thereby promoted the difficulty that checking is penetrated.
In addition, according to the characteristic information generation information of the verification mode of choosing, convenient prompting user imports corresponding authorization information; Selectable resource comprises more than one of literal, picture, icon, voice, beat and gesture information, further promotes the difficulty that checking is penetrated; Picture, icon, voice, beat and gesture information etc. need not the user and import from keyboard, have reduced possible artificial error rate and user's use threshold.
The above embodiment has only expressed several execution mode of the present invention, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to claim of the present invention.Should be pointed out that for the person of ordinary skill of the art without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection range of patent of the present invention should be as the criterion with claims.
Claims (10)
1. a system that verifies input is characterized in that, comprising:
Server, receive the checking session that client sends, picked at random is preset verification mode, according to the verification mode picked at random resource of choosing corresponding with verification mode, generate authorization information, described authorization information is back to client, and the input information that obtains the user, described input information and authorization information are compared, judge whether input information and authorization information mate, if then checking is passed through, otherwise authentication failed;
Client is used for sending the checking session to server, receives the authorization information that described server returns, and user's input information is sent to described server.
2. the system of checking input according to claim 1 is characterized in that described server comprises:
The identification generation module, picked at random is preset verification mode, chooses the resource corresponding with this verification mode according to the verification mode of choosing, and generates authorization information, and generates information according to the characteristic information of the described verification mode of choosing;
First session management module adds described authorization information in the session;
Authentication module obtains user's input information, and the authorization information in described input information and described first session management module is compared, and judges whether described input information and authorization information mate, if then checking is passed through, otherwise authentication failed;
First communication module receive the checking session of client transmission and user's input information, and authorization information and information that server is generated is back to described client.
3. the system of checking input according to claim 2, it is characterized in that, described server also comprises the resources bank of default verification mode of storage and corresponding resource, and described resource comprises more than one of literal, picture, icon, voice, beat and gesture information.
4. the system of checking input according to claim 1 is characterized in that described server also comprises:
The scrambler module is carried out scrambler to described authorization information and is handled, and the authorization information after scrambler is handled is back to described client.
5. the system of checking input according to claim 2 is characterized in that described client comprises:
Second communication module is verified Client-initiated session and user's input information is sent to server, and the authorization information returned of reception server, information and checking result;
Second session management module is used for initiating the checking session;
Input/output module provides the interface of user's input information, and exports described authorization information, information and demonstration.
6. method of verifying input comprises:
Receive Client-initiated checking session;
Picked at random is preset verification mode, according to the resource of this verification mode correspondence of verification mode picked at random of choosing, generates authorization information;
Described authorization information is back to the user;
Obtain user's input information, described input information and authorization information are compared;
Judge whether described input information and authorization information mate, if then checking is passed through, otherwise authentication failed.
7. the method for checking input according to claim 6, it is characterized in that, the step that described picked at random resource generates authorization information also comprises: described authorization information is added in the session, according to the characteristic information generation information of the described verification mode of choosing.
8. the method for checking input according to claim 7 is characterized in that described method also comprises:
Default multiple verification mode and the resource corresponding with described verification mode are stored in described default verification mode and corresponding resource in the resources bank, and described resource comprises more than one of literal, picture, icon, voice, beat and gesture information.
9. the method for checking according to claim 6 input is characterized in that, also comprises before the described step that authorization information is back to the user: described authorization information is carried out the step that scrambler is handled.
10. the method for checking according to claim 6 input is characterized in that, the described step that authorization information is back to the user also comprises: with described authorization information, information output and show; Described method also comprises: described checking result is back to the user.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010101424807A CN102208978A (en) | 2010-03-30 | 2010-03-30 | Input verification system and method |
PCT/CN2011/070924 WO2011120357A1 (en) | 2010-03-30 | 2011-02-11 | System, method and server for input verification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010101424807A CN102208978A (en) | 2010-03-30 | 2010-03-30 | Input verification system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102208978A true CN102208978A (en) | 2011-10-05 |
Family
ID=44697652
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010101424807A Pending CN102208978A (en) | 2010-03-30 | 2010-03-30 | Input verification system and method |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102208978A (en) |
WO (1) | WO2011120357A1 (en) |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102867025A (en) * | 2012-08-23 | 2013-01-09 | 百度在线网络技术(北京)有限公司 | Method and device for acquiring picture marking data |
CN103310139A (en) * | 2013-05-10 | 2013-09-18 | 百度在线网络技术(北京)有限公司 | Input validation method and input validation device |
CN104104664A (en) * | 2013-04-11 | 2014-10-15 | 腾讯科技(深圳)有限公司 | Method, server, client and system for verifying verification code |
CN104378329A (en) * | 2013-08-13 | 2015-02-25 | 深圳市腾讯计算机系统有限公司 | Safety verification method, device and system |
CN104468486A (en) * | 2013-09-23 | 2015-03-25 | 联想(北京)有限公司 | Information processing method and system and electronic device |
CN104954131A (en) * | 2014-03-31 | 2015-09-30 | 腾讯科技(深圳)有限公司 | Method for verifying verification code and system thereof |
CN104965589A (en) * | 2015-06-13 | 2015-10-07 | 东莞市微模式软件有限公司 | Human living body detection method and device based on human brain intelligence and man-machine interaction |
CN104967627A (en) * | 2015-07-14 | 2015-10-07 | 张媛媛 | Information query method based on management background and system |
CN105306207A (en) * | 2014-07-21 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Method, device and system for performing verification of verification code |
CN105450402A (en) * | 2014-06-26 | 2016-03-30 | 优视科技有限公司 | Method, device and system for inputting combined-type image verification code |
CN105763319A (en) * | 2016-02-02 | 2016-07-13 | 南京云创大数据科技股份有限公司 | Random multi-state verification code generation method |
WO2017028141A1 (en) * | 2015-08-16 | 2017-02-23 | 张焰焰 | Method and mobile terminal for logging in to account |
CN107483456A (en) * | 2017-08-25 | 2017-12-15 | 北京元心科技有限公司 | Identity identifying method and device |
CN107748952A (en) * | 2017-10-09 | 2018-03-02 | 深圳广联赛讯有限公司 | Prestige checking method, device and storage medium based on consumer's risk control |
CN108563375A (en) * | 2018-03-09 | 2018-09-21 | 福州米鱼信息科技有限公司 | A kind of electronic evidence acquisition method and system based on text prompt |
CN108810021A (en) * | 2012-12-28 | 2018-11-13 | 诺克诺克实验公司 | Determine the inquiry system and method for authentication function |
CN109364489A (en) * | 2018-12-12 | 2019-02-22 | 北京像素软件科技股份有限公司 | The dance movement processing method and processing device of based role game for play |
CN110084029A (en) * | 2012-06-25 | 2019-08-02 | 英特尔公司 | The user of system is verified via authentication image mechanism |
WO2020134608A1 (en) * | 2018-12-27 | 2020-07-02 | 阿里巴巴集团控股有限公司 | Method, apparatus and device for pushing login mode, and method, apparatus and device for displaying login mode |
CN113489719A (en) * | 2021-07-03 | 2021-10-08 | 深圳市泰壹格物信息技术有限公司 | Man-machine verification application system based on 5G message service |
CN113761489A (en) * | 2020-06-02 | 2021-12-07 | 共道网络科技有限公司 | Verification method, device and equipment and storage medium |
CN115022002A (en) * | 2022-05-27 | 2022-09-06 | 中国电信股份有限公司 | Verification mode determination method and device, storage medium and electronic equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1574741A (en) * | 2003-06-14 | 2005-02-02 | Lg电子株式会社 | Authentication method in wire/wireless communication system using markup language |
US20060005025A1 (en) * | 2004-06-25 | 2006-01-05 | Koji Okada | System, apparatus, program, and method for authentication |
CN1845489A (en) * | 2005-04-06 | 2006-10-11 | 腾讯科技(深圳)有限公司 | Authentication information generating device and its method, inverse automata checking device and its method |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1283827A (en) * | 2000-08-18 | 2001-02-14 | 郝孟一 | Universal electronic information network authentication system and method |
CN1697379B (en) * | 2005-06-22 | 2011-04-20 | 王李琰 | Method for authenticating user's ID in safety communication service of public network based on cryptotechnique of identification |
CN101277181A (en) * | 2008-05-04 | 2008-10-01 | 福州大学 | Dynamic multilayer encryption method for managing flow medium digital authority |
-
2010
- 2010-03-30 CN CN2010101424807A patent/CN102208978A/en active Pending
-
2011
- 2011-02-11 WO PCT/CN2011/070924 patent/WO2011120357A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1574741A (en) * | 2003-06-14 | 2005-02-02 | Lg电子株式会社 | Authentication method in wire/wireless communication system using markup language |
US20060005025A1 (en) * | 2004-06-25 | 2006-01-05 | Koji Okada | System, apparatus, program, and method for authentication |
CN1845489A (en) * | 2005-04-06 | 2006-10-11 | 腾讯科技(深圳)有限公司 | Authentication information generating device and its method, inverse automata checking device and its method |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110084029A (en) * | 2012-06-25 | 2019-08-02 | 英特尔公司 | The user of system is verified via authentication image mechanism |
CN102867025A (en) * | 2012-08-23 | 2013-01-09 | 百度在线网络技术(北京)有限公司 | Method and device for acquiring picture marking data |
CN108810021A (en) * | 2012-12-28 | 2018-11-13 | 诺克诺克实验公司 | Determine the inquiry system and method for authentication function |
CN104104664A (en) * | 2013-04-11 | 2014-10-15 | 腾讯科技(深圳)有限公司 | Method, server, client and system for verifying verification code |
US9979721B2 (en) | 2013-04-11 | 2018-05-22 | Tencent Technology (Shenzhen) Company Limited | Method, server, client and system for verifying verification codes |
CN103310139A (en) * | 2013-05-10 | 2013-09-18 | 百度在线网络技术(北京)有限公司 | Input validation method and input validation device |
CN104378329A (en) * | 2013-08-13 | 2015-02-25 | 深圳市腾讯计算机系统有限公司 | Safety verification method, device and system |
CN104378329B (en) * | 2013-08-13 | 2018-08-07 | 深圳市腾讯计算机系统有限公司 | The method, apparatus and system of safety verification |
CN104468486A (en) * | 2013-09-23 | 2015-03-25 | 联想(北京)有限公司 | Information processing method and system and electronic device |
CN104954131A (en) * | 2014-03-31 | 2015-09-30 | 腾讯科技(深圳)有限公司 | Method for verifying verification code and system thereof |
CN105450402A (en) * | 2014-06-26 | 2016-03-30 | 优视科技有限公司 | Method, device and system for inputting combined-type image verification code |
CN105306207B (en) * | 2014-07-21 | 2019-09-27 | 腾讯科技(深圳)有限公司 | A kind of methods, devices and systems carrying out identifying code verifying |
CN105306207A (en) * | 2014-07-21 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Method, device and system for performing verification of verification code |
CN104965589A (en) * | 2015-06-13 | 2015-10-07 | 东莞市微模式软件有限公司 | Human living body detection method and device based on human brain intelligence and man-machine interaction |
CN104967627A (en) * | 2015-07-14 | 2015-10-07 | 张媛媛 | Information query method based on management background and system |
WO2017028141A1 (en) * | 2015-08-16 | 2017-02-23 | 张焰焰 | Method and mobile terminal for logging in to account |
CN105763319A (en) * | 2016-02-02 | 2016-07-13 | 南京云创大数据科技股份有限公司 | Random multi-state verification code generation method |
CN107483456A (en) * | 2017-08-25 | 2017-12-15 | 北京元心科技有限公司 | Identity identifying method and device |
CN107748952A (en) * | 2017-10-09 | 2018-03-02 | 深圳广联赛讯有限公司 | Prestige checking method, device and storage medium based on consumer's risk control |
CN108563375A (en) * | 2018-03-09 | 2018-09-21 | 福州米鱼信息科技有限公司 | A kind of electronic evidence acquisition method and system based on text prompt |
CN109364489B (en) * | 2018-12-12 | 2022-05-27 | 北京像素软件科技股份有限公司 | Dance action processing method and device based on role playing game |
CN109364489A (en) * | 2018-12-12 | 2019-02-22 | 北京像素软件科技股份有限公司 | The dance movement processing method and processing device of based role game for play |
WO2020134608A1 (en) * | 2018-12-27 | 2020-07-02 | 阿里巴巴集团控股有限公司 | Method, apparatus and device for pushing login mode, and method, apparatus and device for displaying login mode |
CN113761489A (en) * | 2020-06-02 | 2021-12-07 | 共道网络科技有限公司 | Verification method, device and equipment and storage medium |
CN113761489B (en) * | 2020-06-02 | 2024-01-26 | 共道网络科技有限公司 | Verification method, device and equipment and storage medium |
CN113489719A (en) * | 2021-07-03 | 2021-10-08 | 深圳市泰壹格物信息技术有限公司 | Man-machine verification application system based on 5G message service |
CN115022002A (en) * | 2022-05-27 | 2022-09-06 | 中国电信股份有限公司 | Verification mode determination method and device, storage medium and electronic equipment |
CN115022002B (en) * | 2022-05-27 | 2024-02-06 | 中国电信股份有限公司 | Verification mode determining method and device, storage medium and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
WO2011120357A1 (en) | 2011-10-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102208978A (en) | Input verification system and method | |
RU2513761C2 (en) | Method and server for instant messaging | |
CN102904936B (en) | Method, server, device, system and apparatus for establishing session | |
US8036902B1 (en) | Audio human verification | |
CN106453209B (en) | Identity verification method and device | |
CN109684799A (en) | Account logon method, entering device, Account Logon equipment and storage medium | |
CN105577664A (en) | Cipher reset method and system, client and server | |
CN103326989A (en) | Identifying code based on voice recognition | |
CN105468948A (en) | Method for identifying identity through social relation | |
CN106385403B (en) | A kind of the user account register method and relevant device of self-help print equipment | |
CN105656763A (en) | Message pushing method and message pushing device | |
CN107734076A (en) | Information push method, device and storage medium | |
CN109121124A (en) | A kind of client-based bluetooth mesh equipment networking process implementation method | |
CN102508475B (en) | Remote control method and remote control system | |
WO2020228367A1 (en) | Mobile payment self-service signing method, device and system | |
CN109271757A (en) | A kind of offline Activiation method and system of software | |
CN104917722A (en) | Identity verifying method, apparatus and system | |
CN102739667A (en) | Verification method, device and system based on verification prompt message and server | |
CN105245489A (en) | Verification method and verification device | |
CN102882868A (en) | Audio-based user login method and device | |
CN1937500B (en) | Network user identification authentication method and system | |
CN105227557A (en) | A kind of account number processing method and device | |
CN104333538B (en) | A kind of network equipment access method | |
CN103634197A (en) | Method and device for establishing polylogue in instant communication tool | |
CN112929353B (en) | Method and device for realizing teleconference, server and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20111005 |