CN102904893A - Verifying device and verifying method - Google Patents

Verifying device and verifying method Download PDF

Info

Publication number
CN102904893A
CN102904893A CN201210402932XA CN201210402932A CN102904893A CN 102904893 A CN102904893 A CN 102904893A CN 201210402932X A CN201210402932X A CN 201210402932XA CN 201210402932 A CN201210402932 A CN 201210402932A CN 102904893 A CN102904893 A CN 102904893A
Authority
CN
China
Prior art keywords
random value
server
proof procedure
identifying code
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210402932XA
Other languages
Chinese (zh)
Other versions
CN102904893B (en
Inventor
仇大帅
李晓峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE ICT Technologies Co Ltd
Original Assignee
ZTE ICT Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE ICT Technologies Co Ltd filed Critical ZTE ICT Technologies Co Ltd
Priority to CN201210402932.XA priority Critical patent/CN102904893B/en
Publication of CN102904893A publication Critical patent/CN102904893A/en
Application granted granted Critical
Publication of CN102904893B publication Critical patent/CN102904893B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Testing And Monitoring For Control Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a verifying device, which comprises an acquisition unit and a control unit, wherein the acquisition unit is used for acquiring a random value sent from a server to a client in a previous verifying process and a verification code obtained on the basis of the random value and a preset operation function; and the control unit is used for identifying a preset command input by a user in the current verifying process and making the server verify the verification code input in the current verifying process by using the random value according to the identified preset command. The invention further provides a verifying method. Through the technical scheme of the invention, the verification code inputting frequency of a user can be lowered greatly according to user requirements during the performance of operation which cannot be performed until a verification code is input, the Internet surfing smoothness is improved, and user experience is improved.

Description

Demo plant and verification method
Technical field
The present invention relates to the data verification technical field, in particular to a kind of demo plant and a kind of verification method.
Background technology
There is authentication mechanism in the most website, namely in process of user login or when replying some model, needs the input validation code just can finish, and the situations such as too fast are replied in the too much or same IP of quantity address to avoid posting.
But when the user need to be with very fast frequency money order receipt to be signed and returned to the sender, or when needing at short notice repeatedly to login, the repetition input validation code of having to, very the smoothness sense of impact online can cause a lot of inconvenience to the user.
Therefore, need a kind of new verification technique, can be according to user's needs, when execution needs operation that the input validation code just can carry out, significantly reduce the frequency of user's input validation code, improve the fluency of online, promote the user and experience.
Summary of the invention
The present invention just is being based on the problems referred to above, has proposed a kind of verification technique, can be according to user's needs, when execution needs operation that the input validation code just can carry out, significantly reduce the frequency of user's input validation code, and improve the fluency of online, promote the user and experience.
In view of this, the present invention proposes a kind of demo plant, comprising: acquiring unit, be used for obtaining last time proof procedure server and be sent to the random value of client, and the identifying code that obtains based on described random value and default operation function; Control unit is used for the preset instructions in this proof procedure identification user input, and makes described server use described random value to verify the described identifying code of inputting in described this proof procedure according to the preset instructions that identifies.
In this technical scheme, in some needs operation that the input validation code just can carry out, server can generate data (being random value) at random, bringing default operation function (irreversible and crack difficulty high) into calculates again, be verified code (such as numeral, Chinese character, symbol and/or letter), and then identifying code is converted into picture is sent to client, the content that the user shows in client input picture, server carries out verification to user's input message, judge whether user's input message equates with the result who random value is brought into default operation function gained, and then judge whether correctly input validation code of user.And when each operation, server can change by changing random value the output valve of default operation function, and the identifying code that need input when namely at every turn operating is different.
User (identifying code that input page shows is finished checking) in normal proof procedure, can obtain the random value of this proof procedure use and the identifying code of user's input in client, (also can be for the third time for the second time the user, the 4th is inferior) in the proof procedure, can be by the input preset instructions, make server not re-use the random value that this proof procedure should use, and use the random value that obtained in the proof procedure last time, and then the input identifying code that obtained in proof procedure last time, server can calculate the random value that has obtained by default operation function, draws the correct conclusion of user's input validation code.
Thereby in the operation that needs the input validation code just can carry out, if the user need to frequently carry out this operation, just can use this demo plant, make server when the user carries out this operation at every turn, can judge the user to input correct identifying code and allow this operation, and then avoid repeatedly the input validation code and can directly carry out this operation, improve the fluency of online, save user time.
In technique scheme, preferably, also comprise: memory cell is used for preserving described random value and described identifying code.
In technique scheme, preferably, described default operation function comprises hash function.
In technique scheme, preferably, described acquiring unit also is used for when described server is judged the described identifying code mistake of inputting at described this proof procedure, obtain the new random value that described server is sent to described client next time, and obtain new identifying code based on described new random value and described default operation function.
In this technical scheme, owing to can be regularly or change aperiodically and preset operation function in some website, so adopting fixing operation function and identifying code verifies, may good authentication after after a while, need in this case again to obtain new operation function and the corresponding new identifying code that server is sent to client, and again call new operation function according to user instruction and verify with the new identifying code of input.
In above-mentioned arbitrary technical scheme, preferably, also comprise: transmission unit, be used for according to described preset instructions, the described random value that adopted in the proof procedure described last time is transferred to described server or described client send request to described server, make described server that the described random value that described last time, proof procedure adopted is applied to described this proof procedure.
In this technical scheme, can be sent to by the random value that will obtain server or by sending request to server, server is applied in the random value that obtained in the proof procedure last time in this proof procedure.
According to another aspect of the invention, also proposed a kind of verification method, having comprised: step 202, obtain server in proof procedure last time and be sent to the random value of client and the identifying code that obtains based on described random value and default operation function; Step 204, in this proof procedure, the preset instructions of identification user input, the described identifying code that makes described server use described random value checking in described this proof procedure, to input.
In this technical scheme, in some needs operation that the input validation code just can carry out, server can generate data (being random value) at random, bringing default operation function (irreversible and crack difficulty high) into calculates again, be verified code (such as numeral, Chinese character, symbol and/or letter), and then identifying code is converted into picture is sent to client, the content that the user shows in client input picture, server carries out verification to user's input message, judge whether user's input message equates with the result who random value is brought into default operation function gained, and then judge whether correctly input validation code of user.And when each operation, server can change by changing random value the output valve of default operation function, and the identifying code that need input when namely at every turn operating is different.
User (identifying code that input page shows is finished checking) in normal proof procedure, can obtain the random value of this proof procedure use and the identifying code of user's input in client, (also can be for the third time for the second time the user, the 4th is inferior) in the proof procedure, can be by the input preset instructions, make server not re-use the random value that this proof procedure should use, and use the random value that obtained in the proof procedure last time, and then the input identifying code that obtained in proof procedure last time, server can calculate the random value that has obtained by default operation function, draws the correct conclusion of user's input validation code.
Thereby in the operation that needs the input validation code just can carry out, if the user need to frequently carry out this operation, just can use this demo plant, make server when the user carries out this operation at every turn, can judge the user to input correct identifying code and allow this operation, and then avoid repeatedly the input validation code and can directly carry out this operation, improve the fluency of online, save user time.
In technique scheme, preferably, described step 202 also comprises: preserve described random value and described identifying code.
In technique scheme, preferably, described default operation function comprises hash function.
In technique scheme, preferably, described step 204 also comprises, if in described this proof procedure, the described identifying code authentication failed of input, then obtain the new random value that described server is sent to described client next time, and obtain new identifying code based on described new random value and described default operation function.
In this technical scheme, owing to can be regularly or change aperiodically and preset operation function in some website, so adopting fixing operation function and identifying code verifies, may good authentication after after a while, need in this case again to obtain new operation function and the corresponding new identifying code that server is sent to client, and again call new operation function according to user instruction and verify with the new identifying code of input.
In above-mentioned arbitrary technical scheme, preferably, according to described preset instructions, the described random value that adopted in the proof procedure described last time is transferred to described server or described client send request to described server, make described server that the described random value that described last time, proof procedure adopted is applied to described this proof procedure.
In this technical scheme, can be sent to by the random value that will obtain server or by sending request to server, server is applied in the random value that obtained in the proof procedure last time in this proof procedure.
By above technical scheme, can be according to user's needs, when execution needs operation that the input validation code just can carry out, significantly reduce the frequency of user's input validation code, improve the fluency of online, promote the user and experience.
Description of drawings
Fig. 1 shows the according to an embodiment of the invention block diagram of demo plant;
Fig. 2 shows the according to an embodiment of the invention flow chart of verification method;
Fig. 3 A to Fig. 3 D shows the according to an embodiment of the invention schematic diagram of register.
Embodiment
In order more clearly to understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments the present invention is further described in detail.Need to prove that in the situation of not conflicting, the application's embodiment and the feature among the embodiment can make up mutually.
A lot of details have been set forth in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not subjected to the restriction of following public specific embodiment.
Fig. 1 shows the according to an embodiment of the invention block diagram of demo plant.
As shown in Figure 1, demo plant 100 comprises according to an embodiment of the invention: acquiring unit 102, and be used for obtaining last time proof procedure server and be sent to the random value of client, and the identifying code that obtains based on random value and default operation function; Control unit 104 is used for the preset instructions in this proof procedure identification user input, and makes server use random value to verify the identifying code of inputting in this proof procedure according to the preset instructions that identifies.
In some needs operation that the input validation code just can carry out, server can generate data (being random value) at random, bringing default operation function (irreversible and crack difficulty high) into calculates again, be verified code (such as numeral, Chinese character, symbol and/or letter), be f (x) such as default operation function, random value is a, identifying code=f (a) so, and then the identifying code mother is converted into picture is sent to client, the content that the user shows in client input picture, server carries out verification to user's input message, judge whether user's input message equates with the result who random value is brought into default operation function gained, and then judge whether correctly input validation code of user.And when each operation, server can change by changing random value the output valve of default operation function, and the identifying code that need input when namely at every turn operating is different.
User (identifying code that input page shows is finished checking) in normal proof procedure, can obtain the random value of this proof procedure use and the identifying code of user's input in client, (also can be for the third time for the second time the user, the 4th is inferior) in the proof procedure, can be by the input preset instructions, make server not re-use the random value that this proof procedure should use, and use the random value that obtained in the proof procedure last time, and then the input identifying code that obtained in proof procedure last time, server can calculate the random value that has obtained by default operation function, draws the correct conclusion of user's input validation code.
Thereby in the operation that needs the input validation code just can carry out, if the user need to frequently carry out this operation, just can use demo plant 100, make server when the user carries out this operation at every turn, can judge the user to input correct identifying code and allow this operation, and then avoid repeatedly the input validation code and can directly carry out this operation, improve the fluency of online, save user time.
Preferably, demo plant 100 can also comprise according to an embodiment of the invention: memory cell 106 is used for preserving random value and identifying code.
Preferably, default operation function can be hash function.
Preferably, acquiring unit 102 also is used for when server is judged the identifying code mistake of inputting at this proof procedure, obtain the new random value that server is sent to client next time, and obtain new identifying code based on new random value and default operation function.
Owing to can be regularly or change aperiodically and preset operation function in some website, so adopting fixing operation function and identifying code verifies, may good authentication after after a while, need in this case again to obtain new operation function and the corresponding new identifying code that server is sent to client, and again call new operation function according to user instruction and verify with the new identifying code of input.
Preferably, demo plant 100 also comprises according to an embodiment of the invention: transmission unit 108, be used for according to preset instructions, the random value that adopted in the proof procedure last time is transferred to server or user end to server transmission request, make server that the random value that last time, proof procedure adopted is applied to this proof procedure.
Can be sent to by the random value that will obtain server or by sending request to server, server is applied in the random value that obtained in the proof procedure last time in this proof procedure.
Fig. 2 shows the according to an embodiment of the invention flow chart of verification method.
As shown in Figure 2, verification method comprises according to an embodiment of the invention: comprising: step 202, and obtain server in proof procedure last time and be sent to the random value of client and the identifying code that obtains based on random value and default operation function; Step 204, in this proof procedure, the preset instructions of identification user input, the identifying code that makes server use the random value checking in this proof procedure, to input.
In some needs operation that the input validation code just can carry out, server can generate data (being random value) at random, bringing default operation function (irreversible and crack difficulty high) into calculates again, be verified code (such as numeral, Chinese character, symbol and/or letter), be f (x) such as default operation function, random value is a, identifying code=f (a) so, and then identifying code is converted into picture is sent to client, the content that the user shows in client input picture, server carries out verification to user's input, judge whether user's input equates with the result who random value is brought into default operation function gained, and then judge whether correctly input validation code of user.And when each operation, server can change by changing random value the output valve of default operation function, and the identifying code that need input when namely at every turn operating is different.
User (identifying code that input page shows is finished checking) in normal proof procedure, can obtain the random value of this proof procedure use and the identifying code of user's input in client, (also can be for the third time for the second time the user, the 4th is inferior) in the proof procedure, can be by the input preset instructions, make server not re-use the random value that this proof procedure should use, and use the random value that obtained in the proof procedure last time, and then the input identifying code that obtained in proof procedure last time, server can calculate the random value that has obtained by default operation function, draws the correct conclusion of user's input validation code.
Thereby in the operation that needs the input validation code just can carry out, if the user need to frequently carry out this operation, just can use this verification method, make server when the user carries out this operation at every turn, can judge the user to input correct identifying code and allow this operation, and then avoid repeatedly the input validation code and can directly carry out this operation, improve the fluency of online, save user time.
Preferably, step 202 also comprises: preserve random value and identifying code.
Preferably, default operation function can be hash function.
Preferably, step 204 comprises that also if in this proof procedure, the identifying code authentication failed of input is then obtained the new random value that server is sent to client next time, and obtains new identifying code based on new random value and default operation function.
Owing to can be regularly or change aperiodically and preset operation function in some website, so adopting fixing operation function and identifying code verifies, may good authentication after after a while, need in this case again to obtain new operation function and the corresponding new identifying code that server is sent to client, and again call new operation function according to user instruction and verify with the new identifying code of input.
Preferably, according to preset instructions, the random value that adopted in the proof procedure last time is transferred to server or user end to server transmission request, make server that the random value that last time, proof procedure adopted is applied to this proof procedure.
Can be sent to by the random value that will obtain server or by sending request to server, server is applied in the random value that obtained in the proof procedure last time in this proof procedure.
Fig. 3 A to Fig. 3 D shows the according to an embodiment of the invention schematic diagram of register.
As shown in Figure 3A, during certain forum, need input account, password in the normal login process in login, and according to the prompting input validation code of identifying code picture, then click the login button and can login this forum.
Shown in Fig. 3 B, in login process as shown in Figure 3A, can access instruction input frame 302, and the identifying code that obtains this operation function that generates at random of server and be sent to client by inputting specific instruction, such as in instruction input frame 302, inputting:
curl?http://www.victim.org/get_code.php-c?cookie-o?auth.png
Can obtain the hash function among the $ savecookie(cookie) and $ authnum(identifying code), then the hash function and the identifying code that obtain in client storage, be a such as the random value that generates for this operations server, the default operation function that adopts is f (x), so corresponding identifying code is A=f (a), suppose that f (x) is hash function, a is the message of arbitrary length of input at random so, and A is through the Output rusults after the Hash operation.
Shown in Fig. 3 C, behind register as shown in Figure 3A, when again carrying out register, can access instruction input frame 302, then in instruction input frame 302, input preset instructions, make server in this proof procedure, use the random value that has obtained in as shown in Figure 3A the login process to verify, and then the identifying code that has obtained in the input login process as shown in Figure 3A can be by checking, such as input in instruction input frame 302:
$savecookie=294b506f05f896dcbb3a0dde86a5e36c
$num=9632
$username=bluestar
$password=007007
curl?http://www.victim.org/index.php-c?$username.cookie。
Can obtain ID and the initialization cookies of this session, hash function and corresponding identifying code comprising the required user name of login, password, cookie, then continue input in instruction input frame 302:
grep-v?authhash?$username.cookie>tmp.$username
Can ignore the random value corresponding to this session (even the random value that server does not adopt this proof procedure to generate is verified) that server is sent to client, be b such as the random value that generates for this operation, so corresponding identifying code is B=b), can not consider this random value b and the identifying code B that calculates based on this random value by above-mentioned instruction, then in the instruction input frame, input:
echo″www.victim.org?FALSE/FALSE?0?hash?$savecookie″>>tmp.$username。
Input (above-mentioned two instructions are the preset instructions that the user inputs) after the above-mentioned instruction, server is used carry out this checking such as the random value that has obtained among Fig. 3 B, be about to a and bring f (x) into, in instruction input frame 302, input at last:
mv?tmp.$username?$username.cookie
curl?http://www.victim.org/login.php?-b?$username.cookie?-c$username.cookie-d?username=$username-d?password=$password-d
authnum=$num。
Namely input the identifying code shown in Fig. 3 B, because server adopts the random value shown in Fig. 3 B to carry out this checking, so the identifying code shown in Fig. 3 B is verified and must be proved to be successful, i.e. the identifying code of client input is A, and server authentication f (a)=A sets up.
Shown in Fig. 3 D, after operating by said method, in login process subsequently, can directly click the login button logins, and need not again to input account, password and identifying code, in like manner, also can adopt said method for other operations that need the input validation code just can carry out, repeat the user that the input validation code just can operate for needs, can greatly improve the fluency of online.
More than be described with reference to the accompanying drawings technical scheme of the present invention, consider in the correlation technique, there is authentication mechanism in most of websites, some action need user input validation code just can be finished, cause the user when repeating this generic operation, need repeatedly input validation code, greatly the fluency of impact online.By technical scheme of the present invention, can be according to user's needs, when execution needs operation that the input validation code just can carry out, significantly reduce the frequency of user's input validation code, improve the fluency of online, promote the user and experience.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a demo plant is characterized in that, comprising:
Acquiring unit is used for obtaining last time proof procedure server and is sent to the random value of client, and the identifying code that obtains based on described random value and default operation function;
Control unit is used for the preset instructions in this proof procedure identification user input, and makes described server use described random value to verify the described identifying code of inputting in described this proof procedure according to the preset instructions that identifies.
2. demo plant according to claim 1 is characterized in that, also comprises:
Memory cell is used for preserving described random value and described identifying code.
3. demo plant according to claim 1 is characterized in that, described default operation function comprises hash function.
4. demo plant according to claim 1, it is characterized in that, described acquiring unit also is used for when described server is judged the described identifying code mistake of inputting at described this proof procedure, obtain the new random value that described server is sent to described client next time, and obtain new identifying code based on described new random value and described default operation function.
5. each described demo plant in 4 according to claim 1 is characterized in that, also comprises:
Transmission unit, be used for according to described preset instructions, the described random value that adopted in the proof procedure described last time is transferred to described server or described client send request to described server, make described server that the described random value that described last time, proof procedure adopted is applied to described this proof procedure.
6. a verification method is characterized in that, comprising:
Step 202 is obtained server in proof procedure last time and is sent to the random value of client and the identifying code that obtains based on described random value and default operation function;
Step 204, in this proof procedure, the preset instructions of identification user input, the described identifying code that makes described server use described random value checking in described this proof procedure, to input.
7. verification method according to claim 6 is characterized in that, described step 202 also comprises: preserve described random value and described identifying code.
8. verification method according to claim 6 is characterized in that, described default operation function comprises hash function.
9. verification method according to claim 6, it is characterized in that, described step 204 also comprises, if in described this proof procedure, the described identifying code authentication failed of input, then obtain the new random value that described server is sent to described client next time, and obtain new identifying code based on described new random value and described default operation function.
10. each described verification method in 9 according to claim 6, it is characterized in that, according to described preset instructions, the described random value that adopted in the proof procedure described last time is transferred to described server or described client send request to described server, make described server that the described random value that described last time, proof procedure adopted is applied to described this proof procedure.
CN201210402932.XA 2012-10-22 2012-10-22 Checking device and verification method Expired - Fee Related CN102904893B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210402932.XA CN102904893B (en) 2012-10-22 2012-10-22 Checking device and verification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210402932.XA CN102904893B (en) 2012-10-22 2012-10-22 Checking device and verification method

Publications (2)

Publication Number Publication Date
CN102904893A true CN102904893A (en) 2013-01-30
CN102904893B CN102904893B (en) 2016-08-10

Family

ID=47576929

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210402932.XA Expired - Fee Related CN102904893B (en) 2012-10-22 2012-10-22 Checking device and verification method

Country Status (1)

Country Link
CN (1) CN102904893B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104113514A (en) * 2013-04-19 2014-10-22 腾讯科技(深圳)有限公司 Information safety processing method and device
CN104320767A (en) * 2014-11-10 2015-01-28 吴东辉 Short message verification system and method
CN104468486A (en) * 2013-09-23 2015-03-25 联想(北京)有限公司 Information processing method and system and electronic device
CN104852906A (en) * 2015-01-22 2015-08-19 物联智慧科技(深圳)有限公司 Data transmission method and system and data transmission method of client
CN105119722A (en) * 2015-08-07 2015-12-02 杭州朗和科技有限公司 Identity verification method, equipment and system
CN106548541A (en) * 2015-09-18 2017-03-29 台湾福兴工业股份有限公司 Input verification method, input verification system and lock with input verification system
CN107196761A (en) * 2017-03-31 2017-09-22 武汉斗鱼网络科技有限公司 A kind of method of core function in protection application program

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101651546A (en) * 2009-09-11 2010-02-17 福建天晴在线互动科技有限公司 Method for off-line generation of dynamic password and debarkation authentication and synchronization of server
CN102682009A (en) * 2011-03-11 2012-09-19 腾讯科技(北京)有限公司 Method and system for logging in webpage

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101651546A (en) * 2009-09-11 2010-02-17 福建天晴在线互动科技有限公司 Method for off-line generation of dynamic password and debarkation authentication and synchronization of server
CN102682009A (en) * 2011-03-11 2012-09-19 腾讯科技(北京)有限公司 Method and system for logging in webpage

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104113514A (en) * 2013-04-19 2014-10-22 腾讯科技(深圳)有限公司 Information safety processing method and device
CN104113514B (en) * 2013-04-19 2019-01-22 腾讯科技(深圳)有限公司 The treating method and apparatus of information security
CN104468486A (en) * 2013-09-23 2015-03-25 联想(北京)有限公司 Information processing method and system and electronic device
CN104468486B (en) * 2013-09-23 2019-01-15 联想(北京)有限公司 Information processing method, system and electronic equipment
CN104320767A (en) * 2014-11-10 2015-01-28 吴东辉 Short message verification system and method
CN104852906A (en) * 2015-01-22 2015-08-19 物联智慧科技(深圳)有限公司 Data transmission method and system and data transmission method of client
CN104852906B (en) * 2015-01-22 2018-03-30 物联智慧科技(深圳)有限公司 Data transmission method and system and data transmission method of client
CN105119722A (en) * 2015-08-07 2015-12-02 杭州朗和科技有限公司 Identity verification method, equipment and system
CN105119722B (en) * 2015-08-07 2018-05-01 杭州朗和科技有限公司 A kind of auth method, equipment and system
CN106548541A (en) * 2015-09-18 2017-03-29 台湾福兴工业股份有限公司 Input verification method, input verification system and lock with input verification system
CN107196761A (en) * 2017-03-31 2017-09-22 武汉斗鱼网络科技有限公司 A kind of method of core function in protection application program
CN107196761B (en) * 2017-03-31 2019-10-25 武汉斗鱼网络科技有限公司 A kind of method of core function in protection application program

Also Published As

Publication number Publication date
CN102904893B (en) 2016-08-10

Similar Documents

Publication Publication Date Title
CN102904893A (en) Verifying device and verifying method
CN104092811B (en) Mobile terminal information download method, system, terminal device and server
WO2018064881A1 (en) Method and system for saving user login state for use in ios client terminal
CN104883351B (en) Multiple-factor authentication method and device
CN107612889B (en) Method for preventing user information leakage
CN106453205B (en) identity verification method and device
JP2015509632A (en) Login method, login device, terminal, and network server
EP4120109A1 (en) Cluster access method and apparatus, electronic device, and medium
CN103152402A (en) Method and system for logging in through mobile terminal and cloud server
MY189293A (en) Identity authentication method, server, and storage medium
CN103139200A (en) Single sign-on method of web service
CN102882903A (en) Method and system for acquiring multi-site application information
CN104967597A (en) Third-party application message authentication method and system based on secure channel
US20140068780A1 (en) Apparatus and method for remotely deleting critical information
CN104618117A (en) Two-dimension code based smart card device identity authentication device and method
CN104519050A (en) Login method and login system
US20150244695A1 (en) Network authentication method for secure user identity verification
CN104301875A (en) Short message processing method and device
WO2015043787A1 (en) Method and system for authenticating a user of a device
CN104917740A (en) Password resetting method and password verifying method and device
CN109586920A (en) A kind of trust authentication method and device
CN106796630A (en) User authentication
KR101586439B1 (en) User data integrity verification method and apparatus capable of guaranteeing privacy
CN104052757B (en) Identification system and method based on the client application in mobile phone
CN105743854A (en) Security authentication system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160810

Termination date: 20211022

CF01 Termination of patent right due to non-payment of annual fee