CN102208978A - Input verification system and method - Google Patents

Input verification system and method Download PDF

Info

Publication number
CN102208978A
CN102208978A CN2010101424807A CN201010142480A CN102208978A CN 102208978 A CN102208978 A CN 102208978A CN 2010101424807 A CN2010101424807 A CN 2010101424807A CN 201010142480 A CN201010142480 A CN 201010142480A CN 102208978 A CN102208978 A CN 102208978A
Authority
CN
China
Prior art keywords
information
input
authorization information
checking
verification mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010101424807A
Other languages
Chinese (zh)
Inventor
曾小俊
赵建伟
何晓明
吴云林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN2010101424807A priority Critical patent/CN102208978A/en
Priority to PCT/CN2011/070924 priority patent/WO2011120357A1/en
Publication of CN102208978A publication Critical patent/CN102208978A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention provides an input verification system and an input verification method. The system comprises a server and a client, wherein the server receives a verification session from the client, randomly selects a preset verification way, randomly selects resources corresponding to the verification way according to the selected verification way, generates verification information, returns the verification information to the client, acquires input information from a user, compares the input information with the verification information, judges whether the input information is matched with the verification information or not, determines the input information passes the verification if the input information is judged to be matched with the verification information, otherwise determines the input information does not pass the verification; and the client is used for transmitting the verification session to the server, receiving the verification information from the server and transmitting the input information of the user to the server. By the input verification method and the input verification system provided by the invention, difficulties in seeing through the verification can be increased.

Description

The system and method for checking input
[technical field]
The present invention relates to the Information Authentication technical field, relate in particular to a kind of system and method for verifying input.
[background technology]
In the network interaction system; in order to prevent user's malicious registration; usually can provide identifying code that user's input is verified; the picture that this identifying code is normally handled through scrambler; the user goes out corresponding literal and numeral and inserts the checking frame according to picture recognition; whether correct by the identifying code of background server checking user input then, thus the legitimacy of checking user input.In the anti-external store system in the online game, can eject usually and fill in frame prompting player and import corresponding literal, numeral etc., thereby it is plug-in to verify whether current operator has adopted.
Because the identifying code character space that the mode of traditional checking input adopts is identified with exhaustive easily at 26 upper and lower case letters and 10 Arabic numerals; And this identifying code is handled through scrambler, if scrambler easy crack simply then, and the scrambler complexity is difficult to be gone out by User Recognition; And identifying code needs the user to import from keyboard, and easily the people is for makeing mistakes, and because the employing Chinese character also may run into the problem that the user can't import some Chinese character, thereby increased user's use threshold; In addition, the verification mode in the recreation is difficult to use in the Web login frame, and context is had severe dependency.
[summary of the invention]
Based on this, be necessary to provide a kind of system that verifies input, can promote the difficulty that checking is penetrated.
A kind of system that verifies input comprises: server receives the checking session that client sends, picked at random is preset verification mode, according to the verification mode picked at random resource of choosing corresponding with verification mode, generate authorization information, described authorization information is back to client, and the input information that obtains the user, described input information and authorization information are compared, judge whether input information and authorization information mate, if, then checking is passed through, otherwise authentication failed; Client is used for sending the checking session to server, receives the authorization information that described server returns, and user's input information is sent to described server.
This server can comprise: the identification generation module, and picked at random is preset verification mode, chooses the resource corresponding with this verification mode according to the verification mode of choosing, and generates authorization information, and generates information according to the characteristic information of the described verification mode of choosing; First session management module adds described authorization information in the session; Authentication module obtains user's input information, and the authorization information in described input information and described first session management module is compared, and judges whether described input information and authorization information mate, if then checking is passed through, otherwise authentication failed; First communication module receive the checking session of client transmission and user's input information, and authorization information and information that server is generated is back to described client.
This server also can comprise the resources bank of default verification mode of storage and corresponding resource, and described resource comprises more than one of literal, picture, icon, voice, beat and gesture information.
This server also can comprise: the scrambler module, and described authorization information to be carried out scrambler handle, the authorization information after scrambler is handled is back to described client.
This client can comprise: second communication module, Client-initiated is verified session and user's input information is sent to server, and the authorization information returned of reception server, information and checking result; Second session management module is used for initiating the checking session; Input/output module provides the interface of user's input information, and exports described authorization information, information and demonstration.
In addition, also be necessary to provide a kind of method of verifying input, can promote the difficulty that checking is penetrated.
A kind of method of verifying input comprises: receive Client-initiated checking session; Picked at random is preset verification mode, according to the resource of this verification mode correspondence of verification mode picked at random of choosing, generates authorization information; Described authorization information is back to the user; Obtain user's input information, described input information and authorization information are compared; Judge whether described input information and authorization information mate, if then checking is passed through, otherwise authentication failed.
The step that this picked at random resource generates authorization information also can comprise: described authorization information is added in the session, according to the characteristic information generation information of the described verification mode of choosing.
This method also can comprise: default multiple verification mode and the resource corresponding with described verification mode, described default verification mode and corresponding resource are stored in the resources bank, and described resource comprises more than one of literal, picture, icon, voice, beat and gesture information.
Describedly before being back to user's step, authorization information also can comprise: described authorization information is carried out the step that scrambler is handled.
The described step that authorization information is back to the user also can comprise: with described authorization information, information output and show; Described method also comprises: described checking result is back to the user.
The system and method for above-mentioned checking input, by the default verification mode of picked at random, according to the verification mode picked at random resource of choosing corresponding with verification mode, generate authorization information, make that optional verification mode can be versatile and flexible, be that verification mode can change at random, thereby promoted the difficulty that checking is penetrated.
In addition, according to the characteristic information generation information of the verification mode of choosing, convenient prompting user imports corresponding authorization information; Selectable resource comprises more than one of literal, picture, icon, voice, beat and gesture information, further promotes the difficulty that checking is penetrated; Picture, icon, voice, beat and gesture information etc. need not the user and import from keyboard, have reduced possible artificial error rate and user's use threshold.
[description of drawings]
Fig. 1 is the structural representation of the system of checking input among the embodiment;
Fig. 2 is the structural representation of server among the embodiment;
Fig. 3 is one of interface schematic diagram of checking input;
Fig. 4 be checking input the interface schematic diagram two;
Fig. 5 is the structural representation of server among another embodiment;
Fig. 6 is the structural representation of client among the embodiment;
Fig. 7 is the flow chart of the method for checking input among the embodiment.
[embodiment]
Fig. 1 shows the system of checking input among the embodiment, and this system comprises server 10 and client 20.Should be noted that this embodiment is an embodiment the simplest who proposes for the structure that said system is described, the system of checking input provided by the invention should comprise a plurality of and server 10 carries out mutual client 20.Wherein:
Server 10 is used to receive the checking session that client 20 sends, and picked at random is preset verification mode, according to the verification mode picked at random resource of choosing corresponding with verification mode, generates authorization information, and described authorization information is back to client 20; Obtain user's input information, input information and authorization information are compared, judge whether input information and authorization information mate, if then checking is passed through, otherwise authentication failed.
Client 20 is used for sending the checking sessions to server 10, the authorization information that reception server 10 returns, and user's input information is sent to server 10.
Fig. 2 shows a server 10 among the embodiment, and this server 10 comprises resources bank 101, identification generation module 102, first session management module 103, first communication module 104 and authentication module 105, wherein:
Multiple default verification mode and corresponding resource have been stored in the resources bank 10.Among this embodiment, default verification mode can comprise multiple, for example verifies by multiple modes such as literal, numeral, icon, picture, voice, beat, gestures.Accordingly, also stored the resource corresponding with these verification modes in the resources bank 10, for example the corresponding icon verification mode has been stored a large amount of icons; Corresponding speech verification mode has been stored the voice messaging of more predefined sentences or phrase in the resources bank 10; Corresponding beat verification mode has been stored the beat data of record in advance; Corresponding gesture verification mode has been stored the track data of predefined certain gestures etc.
Identification generation module 102 is used for the default verification mode of picked at random resources bank 101, chooses the resource corresponding with this verification mode according to the verification mode of choosing, and generates authorization information, and generates information according to the characteristic information of selected verification mode.Among this embodiment, identification generation module 102 picked at random verification mode from resources bank 101, for example, picked at random the icon verification mode, then corresponding in the resource corresponding with the icon verification mode picked at random icon, generate authorization information; Again for example, the speech verification mode of identification generation module 102 picked at random, then corresponding in the resource corresponding with the speech verification mode voice messaging of picked at random sentence or phrase, generate authorization information.Different verification modes is to there being different informations, and it is that the corresponding information of user is imported accordingly for convenience that information returns to the user.As Fig. 3~shown in Figure 4, wherein, " please select the head portrait identical with sample ", " please select the fruit similar with sample " all are information.The user imports accordingly according to this information can be by checking.
First session management module 103 is used for the authorization information that identification generation module 102 generates is added session.Among this embodiment, first session management module 103 also is used to realize the session timeout and the uniqueness control of server 10.
First communication module 104 is used to receive the checking session of client 20 transmissions and user's input information, and authorization information and information that server 10 is generated are back to client 20.Among this embodiment, first communication module 104 also is used for the checking result is back to client 20.
Authentication module 105 is used to obtain user's input information, and user's input information and the authorization information in first session management module 103 are compared, and judges whether input information and authorization information mate, if then checking is passed through, otherwise authentication failed.As Fig. 3~shown in Figure 4, when identification generation module 102 picked at random are icon verification modes, the user clicks corresponding icon (comprising various icons such as head portrait, fruit, vegetables, animal, plant) according to information, authentication module 105 obtains the icon of user's input, authorization information in adding session this time of icon and generation is before compared, if the icon of input and authorization information coupling, then by checking, otherwise authentication failed.During authentication failed, can return the information (as ejecting message box prompting user rs authentication failure) of authentication failed to the user.
As shown in Figure 5, in another embodiment, server 10 also comprises scrambler module 106 except comprising above-mentioned resources bank 101, identification generation module 102, first session management module 103, first communication module 104 and authentication module 105.Wherein: scrambler module 106 is used for that authorization information is carried out scrambler to be handled, and the authorization information after scrambler is handled is back to client 20 by first communication module 104.Among this embodiment, 106 pairs of authorization informations of scrambler module add some noises, and therefore the authorization information after scrambler is handled can further promote the difficulty that checking is penetrated easily by User Recognition but be difficult to by machine recognition.After can compressing, authorization information behind the scrambler is back to client 20, for example for the authorization information that forms with literal, numeral, icon etc., authorization information after scrambler can being handled is compressed into picture format, for speech verification information, then it can be compressed into the audio format of suitable Network Transmission etc.
Fig. 6 shows a client 20 among the embodiment, and this client 20 comprises second session management module 201, second communication module 202 and input/output module 203, wherein:
Second session management module 201 is used for initiating the checking session.In one embodiment, as Fig. 3~shown in Figure 4, the user need login or register a network interaction system, and then second conversation module 201 is initiated the checking sessions, and this checking session sends to server 10.
Second communication module 202 is used for described checking session and user's input information is sent to server 10, and the authorization information returned of reception server 10, information and checking result.
Input/output module 203 is used to provide the interface of user's input information, and output authorization information, information also is shown to the user.In one embodiment, the authorization information that server 10 generates returns to client 20 through behind the scrambler in the lump with information, the second communication module 202 of client 20 receives these information, be shown to the user by input/output module 203, as identifying code among Fig. 3~Fig. 4 and information, the user imports according to these information.Input/output module 203 is obtained the coordinate sequence of being clicked when the user imports, and can obtain which icon of user's input etc. by this coordinate sequence.Input information uploads onto the server 10 by second communication module 202, and after server 10 was verified according to user's input information, the checking result returned to client 20 again.
Fig. 7 shows the method flow of a checking input among the embodiment, and detailed process is as follows:
Step S10 receives Client-initiated checking session.
Step S20, picked at random is preset verification mode, according to the resource of this verification mode correspondence of verification mode picked at random of choosing, generates authorization information.
In one embodiment, preset multiple verification mode and the resource corresponding with verification mode in advance, default verification mode and corresponding resource all can be stored in the resources bank 101.Default verification mode comprises by multiple modes such as literal, numeral, icon, picture, voice, beat, gestures to be verified.Accordingly, also stored the resource corresponding with these verification modes in the resources bank 10, for example the corresponding icon verification mode has been stored a large amount of icons; Corresponding speech verification mode has been stored the voice messaging of more predefined sentences or phrase in the resources bank 10; Corresponding beat verification mode has been stored the beat data of record in advance; Corresponding gesture verification mode has been stored the track data of predefined certain gestures etc.
Among this embodiment, picked at random verification mode from resources bank 101, for example, picked at random the icon verification mode, then corresponding in the resource corresponding with the icon verification mode picked at random icon, generate authorization information; Again for example, the speech verification mode of picked at random, then corresponding in the resource corresponding with the speech verification mode voice messaging of picked at random sentence or phrase, generate authorization information.The authorization information that is generated adds in the session.Different verification modes after the generation authorization information, can generate information to different informations should be arranged according to the feature of the verification mode of choosing, and it is that the corresponding information of user is imported accordingly for convenience that information returns to the user.As Fig. 3~shown in Figure 4, wherein, " please select the head portrait identical with sample ", " please select the fruit similar with sample " all are information.The user imports accordingly according to this information can be by checking.
Step S30 is back to the user with described authorization information.In one embodiment, also can carry out scrambler to the authorization information that generates and handle, concrete is to add some noises in authorization information, makes the authorization information that returns to the user easily by User Recognition but be difficult to by machine recognition.After compressing, authorization information behind the scrambler returns to the user, for example for the authorization information that forms with literal, numeral, icon etc., authorization information after scrambler can being handled is compressed into picture format, for speech verification information, then it can be compressed into the audio format of suitable Network Transmission etc.Among this embodiment, also the information that generates can be returned to the user and show that the user can import according to information.
Step S40 obtains user's input information, and user's input information and authorization information compared.In one embodiment, as Fig. 3~shown in Figure 4, picked at random be the icon verification mode, the user clicks corresponding icon (comprising various icons such as head portrait, fruit, vegetables, animal, plant) according to information, obtain the icon of user's input, the authorization information in adding session this time of icon and generation is before compared.In another embodiment, picked at random be the speech verification mode, the user imports corresponding voice according to information, input voice and the authorization information of then obtaining the user compare.In another embodiment, picked at random be the gesture verification mode, the user is according to the information corresponding track that draws on screen, the track data and the authorization information that get access to user's input compare.
Step S50 judges whether user's input information and authorization information mate, if then enter step S60, otherwise enter step S70.Among this embodiment, user's input information and authorization information can be carried out fuzzy matching usually.
Step S60, checking is passed through.
Step S70, authentication failed.In one embodiment, also can return the information (as ejecting message box prompting user rs authentication failure) of authentication failed after the authentication failed to the user.
The system and method for above-mentioned checking input, by the default verification mode of picked at random, according to the verification mode picked at random resource of choosing corresponding with verification mode, generate authorization information, make that optional verification mode can be versatile and flexible, be that verification mode can change at random, thereby promoted the difficulty that checking is penetrated.
In addition, according to the characteristic information generation information of the verification mode of choosing, convenient prompting user imports corresponding authorization information; Selectable resource comprises more than one of literal, picture, icon, voice, beat and gesture information, further promotes the difficulty that checking is penetrated; Picture, icon, voice, beat and gesture information etc. need not the user and import from keyboard, have reduced possible artificial error rate and user's use threshold.
The above embodiment has only expressed several execution mode of the present invention, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to claim of the present invention.Should be pointed out that for the person of ordinary skill of the art without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection range of patent of the present invention should be as the criterion with claims.

Claims (10)

1. a system that verifies input is characterized in that, comprising:
Server, receive the checking session that client sends, picked at random is preset verification mode, according to the verification mode picked at random resource of choosing corresponding with verification mode, generate authorization information, described authorization information is back to client, and the input information that obtains the user, described input information and authorization information are compared, judge whether input information and authorization information mate, if then checking is passed through, otherwise authentication failed;
Client is used for sending the checking session to server, receives the authorization information that described server returns, and user's input information is sent to described server.
2. the system of checking input according to claim 1 is characterized in that described server comprises:
The identification generation module, picked at random is preset verification mode, chooses the resource corresponding with this verification mode according to the verification mode of choosing, and generates authorization information, and generates information according to the characteristic information of the described verification mode of choosing;
First session management module adds described authorization information in the session;
Authentication module obtains user's input information, and the authorization information in described input information and described first session management module is compared, and judges whether described input information and authorization information mate, if then checking is passed through, otherwise authentication failed;
First communication module receive the checking session of client transmission and user's input information, and authorization information and information that server is generated is back to described client.
3. the system of checking input according to claim 2, it is characterized in that, described server also comprises the resources bank of default verification mode of storage and corresponding resource, and described resource comprises more than one of literal, picture, icon, voice, beat and gesture information.
4. the system of checking input according to claim 1 is characterized in that described server also comprises:
The scrambler module is carried out scrambler to described authorization information and is handled, and the authorization information after scrambler is handled is back to described client.
5. the system of checking input according to claim 2 is characterized in that described client comprises:
Second communication module is verified Client-initiated session and user's input information is sent to server, and the authorization information returned of reception server, information and checking result;
Second session management module is used for initiating the checking session;
Input/output module provides the interface of user's input information, and exports described authorization information, information and demonstration.
6. method of verifying input comprises:
Receive Client-initiated checking session;
Picked at random is preset verification mode, according to the resource of this verification mode correspondence of verification mode picked at random of choosing, generates authorization information;
Described authorization information is back to the user;
Obtain user's input information, described input information and authorization information are compared;
Judge whether described input information and authorization information mate, if then checking is passed through, otherwise authentication failed.
7. the method for checking input according to claim 6, it is characterized in that, the step that described picked at random resource generates authorization information also comprises: described authorization information is added in the session, according to the characteristic information generation information of the described verification mode of choosing.
8. the method for checking input according to claim 7 is characterized in that described method also comprises:
Default multiple verification mode and the resource corresponding with described verification mode are stored in described default verification mode and corresponding resource in the resources bank, and described resource comprises more than one of literal, picture, icon, voice, beat and gesture information.
9. the method for checking according to claim 6 input is characterized in that, also comprises before the described step that authorization information is back to the user: described authorization information is carried out the step that scrambler is handled.
10. the method for checking according to claim 6 input is characterized in that, the described step that authorization information is back to the user also comprises: with described authorization information, information output and show; Described method also comprises: described checking result is back to the user.
CN2010101424807A 2010-03-30 2010-03-30 Input verification system and method Pending CN102208978A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2010101424807A CN102208978A (en) 2010-03-30 2010-03-30 Input verification system and method
PCT/CN2011/070924 WO2011120357A1 (en) 2010-03-30 2011-02-11 System, method and server for input verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101424807A CN102208978A (en) 2010-03-30 2010-03-30 Input verification system and method

Publications (1)

Publication Number Publication Date
CN102208978A true CN102208978A (en) 2011-10-05

Family

ID=44697652

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101424807A Pending CN102208978A (en) 2010-03-30 2010-03-30 Input verification system and method

Country Status (2)

Country Link
CN (1) CN102208978A (en)
WO (1) WO2011120357A1 (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102867025A (en) * 2012-08-23 2013-01-09 百度在线网络技术(北京)有限公司 Method and device for acquiring picture marking data
CN103310139A (en) * 2013-05-10 2013-09-18 百度在线网络技术(北京)有限公司 Input validation method and input validation device
CN104104664A (en) * 2013-04-11 2014-10-15 腾讯科技(深圳)有限公司 Method, server, client and system for verifying verification code
CN104378329A (en) * 2013-08-13 2015-02-25 深圳市腾讯计算机系统有限公司 Safety verification method, device and system
CN104468486A (en) * 2013-09-23 2015-03-25 联想(北京)有限公司 Information processing method and system and electronic device
CN104954131A (en) * 2014-03-31 2015-09-30 腾讯科技(深圳)有限公司 Method for verifying verification code and system thereof
CN104965589A (en) * 2015-06-13 2015-10-07 东莞市微模式软件有限公司 Human living body detection method and device based on human brain intelligence and man-machine interaction
CN104967627A (en) * 2015-07-14 2015-10-07 张媛媛 Information query method based on management background and system
CN105306207A (en) * 2014-07-21 2016-02-03 腾讯科技(深圳)有限公司 Method, device and system for performing verification of verification code
CN105450402A (en) * 2014-06-26 2016-03-30 优视科技有限公司 Method, device and system for inputting combined-type image verification code
CN105763319A (en) * 2016-02-02 2016-07-13 南京云创大数据科技股份有限公司 Random multi-state verification code generation method
WO2017028141A1 (en) * 2015-08-16 2017-02-23 张焰焰 Method and mobile terminal for logging in to account
CN107483456A (en) * 2017-08-25 2017-12-15 北京元心科技有限公司 Identity identifying method and device
CN107748952A (en) * 2017-10-09 2018-03-02 深圳广联赛讯有限公司 Prestige checking method, device and storage medium based on consumer's risk control
CN108563375A (en) * 2018-03-09 2018-09-21 福州米鱼信息科技有限公司 A kind of electronic evidence acquisition method and system based on text prompt
CN108810021A (en) * 2012-12-28 2018-11-13 诺克诺克实验公司 Determine the inquiry system and method for authentication function
CN109364489A (en) * 2018-12-12 2019-02-22 北京像素软件科技股份有限公司 The dance movement processing method and processing device of based role game for play
CN110084029A (en) * 2012-06-25 2019-08-02 英特尔公司 The user of system is verified via authentication image mechanism
WO2020134608A1 (en) * 2018-12-27 2020-07-02 阿里巴巴集团控股有限公司 Method, apparatus and device for pushing login mode, and method, apparatus and device for displaying login mode
CN113489719A (en) * 2021-07-03 2021-10-08 深圳市泰壹格物信息技术有限公司 Man-machine verification application system based on 5G message service
CN113761489A (en) * 2020-06-02 2021-12-07 共道网络科技有限公司 Verification method, device and equipment and storage medium
CN115022002A (en) * 2022-05-27 2022-09-06 中国电信股份有限公司 Verification mode determination method and device, storage medium and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1574741A (en) * 2003-06-14 2005-02-02 Lg电子株式会社 Authentication method in wire/wireless communication system using markup language
US20060005025A1 (en) * 2004-06-25 2006-01-05 Koji Okada System, apparatus, program, and method for authentication
CN1845489A (en) * 2005-04-06 2006-10-11 腾讯科技(深圳)有限公司 Authentication information generating device and its method, inverse automata checking device and its method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1283827A (en) * 2000-08-18 2001-02-14 郝孟一 Universal electronic information network authentication system and method
CN1697379B (en) * 2005-06-22 2011-04-20 王李琰 Method for authenticating user's ID in safety communication service of public network based on cryptotechnique of identification
CN101277181A (en) * 2008-05-04 2008-10-01 福州大学 Dynamic multilayer encryption method for managing flow medium digital authority

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1574741A (en) * 2003-06-14 2005-02-02 Lg电子株式会社 Authentication method in wire/wireless communication system using markup language
US20060005025A1 (en) * 2004-06-25 2006-01-05 Koji Okada System, apparatus, program, and method for authentication
CN1845489A (en) * 2005-04-06 2006-10-11 腾讯科技(深圳)有限公司 Authentication information generating device and its method, inverse automata checking device and its method

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110084029A (en) * 2012-06-25 2019-08-02 英特尔公司 The user of system is verified via authentication image mechanism
CN102867025A (en) * 2012-08-23 2013-01-09 百度在线网络技术(北京)有限公司 Method and device for acquiring picture marking data
CN108810021A (en) * 2012-12-28 2018-11-13 诺克诺克实验公司 Determine the inquiry system and method for authentication function
CN104104664A (en) * 2013-04-11 2014-10-15 腾讯科技(深圳)有限公司 Method, server, client and system for verifying verification code
US9979721B2 (en) 2013-04-11 2018-05-22 Tencent Technology (Shenzhen) Company Limited Method, server, client and system for verifying verification codes
CN103310139A (en) * 2013-05-10 2013-09-18 百度在线网络技术(北京)有限公司 Input validation method and input validation device
CN104378329A (en) * 2013-08-13 2015-02-25 深圳市腾讯计算机系统有限公司 Safety verification method, device and system
CN104378329B (en) * 2013-08-13 2018-08-07 深圳市腾讯计算机系统有限公司 The method, apparatus and system of safety verification
CN104468486A (en) * 2013-09-23 2015-03-25 联想(北京)有限公司 Information processing method and system and electronic device
CN104954131A (en) * 2014-03-31 2015-09-30 腾讯科技(深圳)有限公司 Method for verifying verification code and system thereof
CN105450402A (en) * 2014-06-26 2016-03-30 优视科技有限公司 Method, device and system for inputting combined-type image verification code
CN105306207B (en) * 2014-07-21 2019-09-27 腾讯科技(深圳)有限公司 A kind of methods, devices and systems carrying out identifying code verifying
CN105306207A (en) * 2014-07-21 2016-02-03 腾讯科技(深圳)有限公司 Method, device and system for performing verification of verification code
CN104965589A (en) * 2015-06-13 2015-10-07 东莞市微模式软件有限公司 Human living body detection method and device based on human brain intelligence and man-machine interaction
CN104967627A (en) * 2015-07-14 2015-10-07 张媛媛 Information query method based on management background and system
WO2017028141A1 (en) * 2015-08-16 2017-02-23 张焰焰 Method and mobile terminal for logging in to account
CN105763319A (en) * 2016-02-02 2016-07-13 南京云创大数据科技股份有限公司 Random multi-state verification code generation method
CN107483456A (en) * 2017-08-25 2017-12-15 北京元心科技有限公司 Identity identifying method and device
CN107748952A (en) * 2017-10-09 2018-03-02 深圳广联赛讯有限公司 Prestige checking method, device and storage medium based on consumer's risk control
CN108563375A (en) * 2018-03-09 2018-09-21 福州米鱼信息科技有限公司 A kind of electronic evidence acquisition method and system based on text prompt
CN109364489B (en) * 2018-12-12 2022-05-27 北京像素软件科技股份有限公司 Dance action processing method and device based on role playing game
CN109364489A (en) * 2018-12-12 2019-02-22 北京像素软件科技股份有限公司 The dance movement processing method and processing device of based role game for play
WO2020134608A1 (en) * 2018-12-27 2020-07-02 阿里巴巴集团控股有限公司 Method, apparatus and device for pushing login mode, and method, apparatus and device for displaying login mode
CN113761489A (en) * 2020-06-02 2021-12-07 共道网络科技有限公司 Verification method, device and equipment and storage medium
CN113761489B (en) * 2020-06-02 2024-01-26 共道网络科技有限公司 Verification method, device and equipment and storage medium
CN113489719A (en) * 2021-07-03 2021-10-08 深圳市泰壹格物信息技术有限公司 Man-machine verification application system based on 5G message service
CN115022002A (en) * 2022-05-27 2022-09-06 中国电信股份有限公司 Verification mode determination method and device, storage medium and electronic equipment
CN115022002B (en) * 2022-05-27 2024-02-06 中国电信股份有限公司 Verification mode determining method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
WO2011120357A1 (en) 2011-10-06

Similar Documents

Publication Publication Date Title
CN102208978A (en) Input verification system and method
RU2513761C2 (en) Method and server for instant messaging
CN102904936B (en) Method, server, device, system and apparatus for establishing session
US8036902B1 (en) Audio human verification
CN106453209B (en) Identity verification method and device
CN109684799A (en) Account logon method, entering device, Account Logon equipment and storage medium
CN105577664A (en) Cipher reset method and system, client and server
CN103326989A (en) Identifying code based on voice recognition
CN105468948A (en) Method for identifying identity through social relation
CN106385403B (en) A kind of the user account register method and relevant device of self-help print equipment
CN105656763A (en) Message pushing method and message pushing device
CN107734076A (en) Information push method, device and storage medium
CN109121124A (en) A kind of client-based bluetooth mesh equipment networking process implementation method
CN102508475B (en) Remote control method and remote control system
WO2020228367A1 (en) Mobile payment self-service signing method, device and system
CN109271757A (en) A kind of offline Activiation method and system of software
CN104917722A (en) Identity verifying method, apparatus and system
CN102739667A (en) Verification method, device and system based on verification prompt message and server
CN105245489A (en) Verification method and verification device
CN102882868A (en) Audio-based user login method and device
CN1937500B (en) Network user identification authentication method and system
CN105227557A (en) A kind of account number processing method and device
CN104333538B (en) A kind of network equipment access method
CN103634197A (en) Method and device for establishing polylogue in instant communication tool
CN112929353B (en) Method and device for realizing teleconference, server and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20111005