CN103634294B - Information verifying method and device - Google Patents

Information verifying method and device Download PDF

Info

Publication number
CN103634294B
CN103634294B CN201310533351.4A CN201310533351A CN103634294B CN 103634294 B CN103634294 B CN 103634294B CN 201310533351 A CN201310533351 A CN 201310533351A CN 103634294 B CN103634294 B CN 103634294B
Authority
CN
China
Prior art keywords
terminal
information
verified
assigned operation
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310533351.4A
Other languages
Chinese (zh)
Other versions
CN103634294A (en
Inventor
金凡
高应军
李创奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201310533351.4A priority Critical patent/CN103634294B/en
Publication of CN103634294A publication Critical patent/CN103634294A/en
Application granted granted Critical
Publication of CN103634294B publication Critical patent/CN103634294B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention relates to an information verifying method and an information verifying device, and belongs to the technical field of networks. The method comprises the steps that a first terminal receives specified operation instructions; according to the specified operation instructions, graphic codes are generated so that a second terminal displays an information input interface through scanning the graphic codes, in addition, information, input by users, to be checked is obtained, an verification request is sent to a server, and the server verifies whether a first terminal is allowed to execute the specified operation or not. The information verifying method and the information verifying device have the advantages that the input process of the information to be checked after the first terminal receives the specified operation instructions is transferred onto the second terminal, so the process for inputting the information to be checked is simpler and more convenient, the information verification process is simplified, the time for inputting the information to be checked is reduced, the information verification efficiency is improved, and in addition, a display screen of the second terminal is obviously smaller than that of the first terminal, the information leakage cannot be easily caused, and the safety is improved.

Description

Information Authentication method and apparatus
Technical field
The disclosure is directed to networking technology area, specifically with regard to Information Authentication method and apparatus.
Background technology
With the development of intelligent television, user can install multiple application softwaries on intelligent television, to realize multiple intelligence The function of energyization, but it may be necessary to verify user right, to guarantee safety during using intelligent television.
As user needs when logging in application software to input login account and password, or needs when buying commodity to input The password of account, is needed when paying to input payment cipher etc..
When user carries out Authority Verification on intelligent television, it is possible to use remote control inputs password, but, the key of remote control It is relatively simple that disk is typically arranged, and can only input numeral, and cannot input character, then when password to be entered includes character, Virtual full keyboard can be provided on intelligent television, the direction key that user passes through to click in remote control controls cursor, and leads to Cross and confirm that button selects the character in full keyboard to be inputted.
During realizing the present invention, inventor finds correlation technique at least defect, for example:Authority Verification process operation Loaded down with trivial details, Password Input takes long, leads to the efficiency of Authority Verification very low, and because the display screen ratio of intelligent television is typically whole The display screen at end is big, easily causes information leakage, poor stability.
Content of the invention
In order to solve problem present in correlation technique, present disclose provides a kind of Information Authentication method and apparatus.Described Technical scheme is as follows:
In a first aspect, present disclose provides a kind of Information Authentication method, methods described includes:
First terminal receives assigned operation instruction, and described assigned operation instructs specified for indicating described first terminal execution Operation, described assigned operation needs to carry out Information Authentication;
Described first terminal instructs according to described assigned operation, generates graphic code, and described graphic code at least carries described the User account, described first terminal mark and the instruction of described assigned operation that one terminal uses are so that second terminal passes through scanning Described graphic code, display information inputting interface, and obtain the information to be verified of user input, send checking request to server, Described checking request carries described information to be verified, described user account, described first terminal mark and described assigned operation and refers to Order is so that whether described server authentication allows described first terminal to execute described assigned operation.
First terminal receives assigned operation instruction and includes:
Described first terminal receives logging request, and described logging request is used for indicating that described first terminal is logged in;Or,
Described first terminal receives payment request, and described payment request carries the numbering of order, and is used for indicating described the Order described in one terminal-pair is paid the bill;Or,
Described first terminal receiving encryption key display request, described encryption information display request carries encryption information mark Know, and be used for indicating that described first terminal shows described encryption information.
Second aspect, present disclose provides a kind of Information Authentication method, methods described includes:
Server receives the checking request that second terminal sends, and described checking request carries described second terminal scanning first The assigned operation that user account, described first terminal mark and the described first terminal that the graphic code that terminal generates obtains receives Instruction, and the information to be verified of user input that described second terminal gets, described assigned operation instructs for indicating State first terminal execution assigned operation, described assigned operation needs to carry out Information Authentication;
Described server instructs and described information to be verified according to described user account, described assigned operation, verifies whether Described first terminal is allowed to execute described assigned operation.
Described server instructs and described information to be verified according to described user account, described assigned operation, verifies whether Allow described first terminal to execute described assigned operation to include:
When described server instructs according to described user account and described assigned operation, determine described Information Authentication to be verified By when, execute described assigned operation;Or,
When described server instructs according to described user account and described assigned operation, determine described Information Authentication to be verified When not passing through, described first terminal is not allowed to execute described assigned operation.
When described server instructs according to described user account and described assigned operation, determine described Information Authentication to be verified When not passing through, after not allowing described first terminal to execute described assigned operation, methods described also includes:
Described server sends authentication failed message to described second terminal so that described second terminal reacquires user The information to be verified of input.
The third aspect, present disclose provides a kind of Information Authentication method, methods described includes:
Second terminal scans the graphic code that first terminal generates, and obtains user account that described first terminal uses, described The assigned operation instruction that first terminal mark receives with described first terminal;
Show the information input interface that described user account is instructed based on described assigned operation;
Obtain the information to be verified of user input;
Send checking request to server, described checking request carries described information to be verified, described user account, described First terminal mark and the instruction of described assigned operation are so that whether described server authentication allows described first terminal execution described Assigned operation.
Methods described also includes:
When described second terminal receives the authentication failed message that described server sends, display described information input circle Face;
Reacquire the information to be verified of user input.
Fourth aspect, present disclose provides a kind of Information Authentication method, methods described includes:
First terminal receives assigned operation instruction, and described assigned operation instructs specified for indicating described first terminal execution Operation, described assigned operation needs to carry out Information Authentication;
Described first terminal sends checking request to described server, and described checking request carries the use of described first terminal Family account and described assigned operation instruct so that described server determines second terminal according to described user account, to described the Two terminals send information request to be verified, and when getting the information to be verified that described second terminal sends, verify whether to permit Permitted described first terminal and executed described assigned operation, described second terminal be in logging status based on described user account, And the terminal different from described first terminal.
5th aspect, present disclose provides a kind of Information Authentication method, methods described includes:
Server receives the checking request that first terminal sends, and described checking request carries user's account of described first terminal Number and described first terminal receive assigned operation instruction;
Described server, according to described user account, determines second terminal, and described second terminal is to be in based on described use The logging status of family account and the terminal different from described first terminal;
Described server sends information request to be verified to described second terminal, and described information request to be verified carries described User account and the instruction of described assigned operation are so that described second terminal display information inputting interface, and obtain user input Information to be verified, returns to described server;
When described server receives the information to be verified that described second terminal sends, according to described user account, institute State assigned operation instruction and described information to be verified, verify whether to allow described first terminal to execute described assigned operation.
According to described user account, the instruction of described assigned operation and described information to be verified, verify whether to allow described the One terminal executes described assigned operation and includes:
When described server instructs according to described user account and described assigned operation, determine described Information Authentication to be verified By when, execute described assigned operation;Or,
When described server instructs according to described user account and described assigned operation, determine described Information Authentication to be verified When not passing through, described first terminal is not allowed to execute described assigned operation.
When described server instructs according to described user account and described assigned operation, determine described Information Authentication to be verified When not passing through, after not allowing described first terminal to execute described assigned operation, methods described also includes:
Described server sends authentication failed message to described second terminal so that described second terminal reacquires user The information to be verified of input.
6th aspect, present disclose provides a kind of Information Authentication device, described device includes:
Command reception module, for receiving assigned operation instruction, described assigned operation instructs and refers to for indicating that local terminal executes Fixed operation, described assigned operation needs to carry out Information Authentication;
Graphic code generation module, for instructing according to described assigned operation, generates graphic code, described graphic code at least carries User account, described local terminal mark and the instruction of described assigned operation that described local terminal uses are so that second terminal is passed through to scan institute State graphic code, display information inputting interface, and obtain the information to be verified of user input, send checking request, institute to server State checking request carry described information to be verified, described user account, described local terminal mark and described assigned operation instruction so that Whether described server authentication allows described local terminal to execute described assigned operation.
Described command reception module includes:
First receiving unit, for receiving logging request, described logging request is used for indicating that described local terminal is logged in; Or,
Second receiving unit, receives payment request for described local terminal, and described payment request carries the numbering of order, and uses In the described local terminal of instruction, described order is paid the bill;Or,
3rd receiving unit, shows request for described local terminal receiving encryption key, and described encryption information display request is taken Band encryption information mark, and be used for indicating that described local terminal shows described encryption information.
7th aspect, present disclose provides a kind of Information Authentication device, described device includes:
Checking request receiver module, for receiving the checking request of second terminal transmission, described checking request carries described Second terminal scans user account, described first terminal mark and the described first terminal that the graphic code of first terminal generation obtains The assigned operation instruction receiving, and the information to be verified of user input that described second terminal gets, described specified behaviour It is used for indicating described first terminal execution assigned operation as instruction, described assigned operation needs to carry out Information Authentication;
Authentication module, for being instructed and described information to be verified according to described user account, described assigned operation, checking is No described first terminal is allowed to execute described assigned operation.
Described authentication module includes:
First authentication unit, for when according to described user account and the instruction of described assigned operation, determining described to be verified When Information Authentication is passed through, execute described assigned operation;Or,
Second authentication unit, for when according to described user account and the instruction of described assigned operation, determining described to be verified When Information Authentication is not passed through, described first terminal is not allowed to execute described assigned operation.
Described device also includes:
Failed message sending module, for sending authentication failed message so that described second terminal to described second terminal Reacquire the information to be verified of user input.
Eighth aspect, present disclose provides a kind of Information Authentication device, described device includes:
Graphic code scan module, for scanning the graphic code of first terminal generation, obtains the use that described first terminal uses The assigned operation instruction that family account, described first terminal mark and described first terminal receive;
Interface display module, for showing the information input interface that described user account is instructed based on described assigned operation;
Data obtaining module to be verified, for obtaining the information to be verified of user input;
Checking request sending module, for sending checking request to server, described checking request carries described to be verified Information, described user account, described first terminal mark and described assigned operation instruct so that whether described server authentication is permitted Permitted described first terminal and executed described assigned operation.
Described device also includes:
Authentication failed module, for when described second terminal receives the authentication failed message that described server sends, Display described information inputting interface;
Reacquire module, for reacquiring the information to be verified of user input.
9th aspect, present disclose provides a kind of Information Authentication device, described device includes:
Command reception module, for receiving assigned operation instruction, described assigned operation instructs and refers to for indicating that local terminal executes Fixed operation, described assigned operation needs to carry out Information Authentication;
Checking request sending module, for sending checking request to described server, described checking request carries described The user account at end and described assigned operation instruct so that described server determines second terminal according to described user account, to Described second terminal sends information request to be verified, and when getting the information to be verified that described second terminal sends, checking Described local terminal whether is allowed to execute described assigned operation, described second terminal is the login shape being in based on described user account State and the terminal different from described local terminal.
Tenth aspect, present disclose provides a kind of Information Authentication device, described device includes:
Checking request receiver module, receives the checking request that first terminal sends, and described checking request carries described first The assigned operation instruction that the user account of terminal and described first terminal receive;
Second terminal determining module, for according to described user account, determining second terminal, described second terminal is to be in Logging status based on described user account and the terminal different from described first terminal;
Information request sending module to be verified, for sending information request to be verified to described second terminal, described treats school Test information request and carry described user account and the instruction of described assigned operation so that described second terminal display information inputs boundary Face, and obtain the information to be verified of user input, return to local terminal;
Authentication module, for when receiving the information to be verified that described second terminal sends, according to described user account, Described assigned operation instruction and described information to be verified, verify whether to allow described first terminal to execute described assigned operation.
Described authentication module includes:
First authentication unit, for when according to described user account and the instruction of described assigned operation, determining described to be verified When Information Authentication is passed through, execute described assigned operation;Or,
Second authentication unit, for when according to described user account and the instruction of described assigned operation, determining described to be verified When Information Authentication is not passed through, described first terminal is not allowed to execute described assigned operation.
Described device also includes:
Failed message sending module, for sending authentication failed message so that described second terminal to described second terminal Reacquire the information to be verified of user input.
Some beneficial effects of the disclosure can include:
Method and apparatus provided in an embodiment of the present invention, by first terminal is received assigned operation instruction after treat school Test Information Inputting Process and transfer in second terminal, the letter to be verified needed for this first terminal can be inputted on this second terminal Breath, because, compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies letter Breath proof procedure, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and due to this second end The display screen at end is significantly less than this first terminal, does not easily cause information leakage, improves safety.
It should be appreciated that above general description and detailed description hereinafter are only exemplary, can not be limited this Open.
Brief description
For the technical scheme being illustrated more clearly that in the disclosure, in embodiment being described below, required use is attached Figure be briefly described it should be apparent that, drawings in the following description are only some embodiments of the present disclosure, for this area For those of ordinary skill, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings. Accompanying drawing described herein is used for providing further understanding of the disclosure, constitutes the part of the application, does not constitute to this Disclosed restriction.In the accompanying drawings:
Fig. 1 is the exemplary process diagram of Information Authentication method;
Fig. 2 is the exemplary process diagram of Information Authentication method;
Fig. 3 is the exemplary process diagram of Information Authentication method;
Fig. 4 a is the exemplary process diagram of Information Authentication method;
Fig. 4 b is first terminal schematic diagram;
Fig. 4 c is that graphic code generates schematic diagram;
Fig. 4 d is information input interface display schematic diagram;
Fig. 5 is the exemplary process diagram of Information Authentication method;
Fig. 6 is the exemplary process diagram of Information Authentication method;
Fig. 7 is the exemplary process diagram of Information Authentication method;
Fig. 8 is the example arrangement schematic diagram of Information Authentication device;
Fig. 9 is the example arrangement schematic diagram of Information Authentication device.
Figure 10 is the example arrangement schematic diagram of Information Authentication device;
Figure 11 is the example arrangement schematic diagram of Information Authentication device;
Figure 12 is the example arrangement schematic diagram of Information Authentication device;
Figure 13 is a kind of terminal unit structural representation provided in an embodiment of the present invention;
Figure 14 is a kind of server architecture schematic diagram provided in an embodiment of the present invention.
By above-mentioned accompanying drawing it has been shown that the clear and definite embodiment of the disclosure, hereinafter will be described in more detail.These accompanying drawings It is not intended to limit the scope of disclosure design by any mode with word description, but by reference to specific embodiment be Those skilled in the art illustrate the concept of the disclosure.
Specific embodiment
Purpose, technical scheme and advantage for making the disclosure become more apparent, with reference to embodiment and accompanying drawing, right The disclosure is described in further details.Here, the exemplary embodiment of the disclosure and its illustrate for explaining the disclosure, but simultaneously Not as restriction of this disclosure.
The embodiment of the present disclosure provides a kind of Information Authentication method and apparatus, below in conjunction with accompanying drawing, the disclosure is carried out specifically Bright.
In one embodiment, Fig. 1 is the exemplary process diagram of Information Authentication method, and referring to Fig. 1, methods described includes:
In a step 101, receive assigned operation instruction, this assigned operation instructs specified for indicating the execution of this first terminal Operation, this assigned operation needs to carry out Information Authentication, and the method for the present embodiment is used in first terminal;
In a step 102, instructed according to this assigned operation, generate graphic code, this graphic code at least carries this first terminal The user account, this first terminal mark and the instruction of this assigned operation that use, so that second terminal is passed through to scan this graphic code, show Show information input interface, and obtain the information to be verified of user input, send checking request to server, this checking request carries This information to be verified, this user account, this first terminal mark and this assigned operation instruct so that whether this server authentication is permitted Permitted this first terminal and executed this assigned operation.
The display screen that the present embodiment is applied to this first terminal is significantly greater than the display screen of this second terminal, or should Second terminal is easier to input under the scenes such as character than this first terminal.If this first terminal is intelligent television, this second terminal For mobile phone.
The method that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
First terminal receives assigned operation instruction and includes:
This first terminal receives logging request, and this logging request is used for indicating that this first terminal is logged in;Or,
This first terminal receives payment request, and this payment request carries the numbering of order, and is used for indicating this first terminal This order is paid the bill;Or,
The display request of this first terminal receiving encryption key, the display request of this encryption information carries encryption information mark, and For indicating that this first terminal shows this encryption information.
Above-mentioned all optional technical schemes, can be using the alternative embodiment arbitrarily combining to form the present invention, and here is no longer Repeat one by one.
In one embodiment, Fig. 2 is the exemplary process diagram of Information Authentication method, and referring to Fig. 2, methods described includes:
In step 201, receive the checking request that second terminal sends, this checking request carries this second terminal scanning the The assigned operation that user account, this first terminal mark and this first terminal that the graphic code that one terminal generates obtains receives refers to Order, and the information to be verified of user input that this second terminal gets, this assigned operation instructs for indicating this first eventually End execution assigned operation, this assigned operation needs to carry out Information Authentication, and the present embodiment is applied in server;
In step 202., instructed and this information to be verified according to this user account, this assigned operation, verify whether to allow This first terminal executes this assigned operation.
The method that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
This server instructs and this information to be verified according to this user account, this assigned operation, verify whether to allow this One terminal executes this assigned operation and includes:
When this server instructs according to this user account and this assigned operation, when determining that this Information Authentication to be verified is passed through, Execute this assigned operation;Or,
When this server instructs according to this user account and this assigned operation, determine that this Information Authentication to be verified is not passed through When, do not allow this first terminal to execute this assigned operation.
When this server instructs according to this user account and this assigned operation, determine that this Information Authentication to be verified is not passed through When, after not allowing this first terminal to execute this assigned operation, the method also includes:
This server sends authentication failed message to this second terminal so that this second terminal reacquires user input Information to be verified.
Above-mentioned all optional technical schemes, can be using the alternative embodiment arbitrarily combining to form the present invention, and here is no longer Repeat one by one.
In one embodiment, Fig. 3 is the exemplary process diagram of Information Authentication method, and referring to Fig. 3, methods described includes:
In step 301, the graphic code that scanning first terminal generates, obtains the user account of this first terminal use, is somebody's turn to do The assigned operation instruction that first terminal identifies and this first terminal receives, the present embodiment is applied in second terminal;
In step 302, show the information input interface that this user account is instructed based on this assigned operation;
In step 303, obtain the information to be verified of user input;
In step 304, send checking request to server, this checking request carries this information to be verified, this user's account Number, this first terminal mark and the instruction of this assigned operation be so that whether this server authentication allows this first terminal to execute this refers to Fixed operation.
The method that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
The method also includes:
When this second terminal receives the authentication failed message of this server transmission, show this information input interface;
Reacquire the information to be verified of user input.
Above-mentioned all optional technical schemes, can be using the alternative embodiment arbitrarily combining to form the present invention, and here is no longer Repeat one by one.
In one embodiment, Fig. 4 a is the exemplary process diagram of Information Authentication method, and the interaction agent of the present embodiment is First terminal, second terminal server, referring to Fig. 4 a, methods described includes:
In step 401, first terminal receives assigned operation instruction, and this assigned operation instructs for indicating this first terminal Execution assigned operation, this assigned operation needs to carry out Information Authentication;
This first terminal of the present embodiment can be that the giant-screen terminals or intelligent air condition etc. such as intelligent television are difficult to input word The terminal of symbol, the present embodiment does not limit to this first terminal.
Wherein, this assigned operation instruct for indicate this first terminal execution assigned operation, can be triggered by user or by This first terminal triggers automatically, and such as user can click on login option triggering logging request, or this first terminal is detecting User does not trigger any operation in preset duration, when triggering any operation afterwards, automatically triggers this logging request, this enforcement Example does not limit to this.
It should be noted that the instruction of this assigned operation is not to indicate that this first terminal directly executes this assigned operation Instruction, but need to carry out the instruction of Information Authentication, that is to say, when this first terminal receives the instruction of this assigned operation, and This assigned operation can not directly be executed, but need to input information to be verified, row information is entered to this information to be verified by server Checking, when server authentication is passed through, could execute this assigned operation on this first terminal.As this first terminal receives use During the logging request at family, can not directly log in, but need the password ability Successful login of user input account.
In the present embodiment, the difference according to the instruction of this assigned operation, this step 401 can include following any one:
(1)This first terminal receives logging request, and this logging request is used for indicating that this first terminal is logged in;
In the present embodiment, the webpage of user's current accessed provides and log in option, when this first terminal detects use Family to log in option clicking operation when, enter login interface, at this time, it may be necessary to obtain the user account of user input and close Code, to be logged in.
(2)This first terminal receives payment request, and this payment request carries numbering or the transaction journal number of order, and is used for Indicate that this first terminal is paid the bill to this order;
In the present embodiment, this order can provide Payment Options, when this first terminal detects user to this pair During the clicking operation of money option, enter payment interface, at this time, it may be necessary to obtain the payment cipher of user input to carry out to this order Payment.
As shown in Figure 4 b, so that this first terminal is as intelligent television as a example, use remote control when this first terminal detects user When device clicks " payment " button, determine that this first terminal receives payment request, this payment request is used for indicating this first end Pay the bill to current order in end.
(3)The display request of this first terminal receiving encryption key, the display request of this encryption information carries encryption information mark, And be used for indicating that this first terminal shows this encryption information.
In the present embodiment, the information of encryption can be stored in cloud disk, when this first terminal detect user to plus During the unlatching operation of confidential information, need to obtain the password of user input, to show this encryption information.
It should be noted that the assigned operation instruction in the present embodiment is not limited to above-mentioned three kinds including, acceptable For power on request etc., other instruct, and the present embodiment does not limit to this.
In step 402, this first terminal instructs according to this assigned operation, generates graphic code, and this graphic code at least carries User account, this first terminal mark and the instruction of this assigned operation that this first terminal uses;
Wherein, this graphic code can be bar code, Quick Response Code etc., and this first terminal mark can be the end of this first terminal End number etc..The present embodiment does not all limit to this.
In the present embodiment, this graphic code carries the user account of this first terminal use, this first terminal mark and is somebody's turn to do Assigned operation instructs, so that subsequently this server carries out Information Authentication according to this user account and the instruction of this assigned operation, and root Identify according to this first terminal and determine this first terminal, so that this assigned operation to be executed on this first terminal.
Based on the example of Fig. 4 b, this first terminal, when receiving this payment request, generates graphic code, as illustrated in fig. 4 c.
In step 403, second terminal scans the graphic code of this first terminal generation, obtains the use of this first terminal use The assigned operation instruction that family account, this first terminal mark and this first terminal receive;
Wherein, this second terminal for the small screen terminal such as mobile phone or panel computer and can be easy to input the terminal of character, The present embodiment does not limit to this second terminal.
In the present embodiment, the graphic code of this first terminal generation is scanned by this second terminal, can be by this first end Terminate the assigned operation instruction receiving to transfer in this second terminal, information to be verified to be inputted on this second terminal, just Carry out Information Authentication in this server follow-up, easy and simple to handle, safe.
In step 404, this second terminal shows the information input interface that this user account is instructed based on this assigned operation;
For different assigned operation instructs, this information input interface is also different, then this step 404 can adopt with Any one mode lower:
(1)This assigned operation instructs as logging request, then in step 404, this second terminal shows login interface, and this is stepped on Record interface at least includes user account input field and login password input field;
(2)This assigned operation instructs as payment request, then in step 404, this second terminal display payment interface, this pair Money interface at least includes payment cipher input field;
Based on the example of Fig. 4 b and Fig. 4 c, this second terminal display payment interface, this payment interface is as shown in figure 4d.
(3)This assigned operation instructs and shows request for encryption information, then in step 404, this second terminal shows password Inputting interface, this interface for password input at least includes Password Input hurdle.
Additionally, this information input interface can also include this user account, this first terminal mark or this assigned operation Title of instruction etc., the present embodiment does not limit to the particular content of this information input interface.
In step 405, this second terminal obtains the information to be verified of user input;
In the present embodiment, this information to be verified can be the information of the type such as character, fingerprint, sound, and is referred to according to this Determine the type difference of the information to be verified needed for operational order, this step 405 can include:
(1)This second terminal obtains the character that user inputs in the input field of this information input interface, and this is inputted Character as information to be verified;Or,
(2)This second terminal obtains the finger print information that user inputs in this information input interface, and this finger print information is made For information to be verified;Or,
(3)This second terminal obtains the acoustic information in this information input interface typing for the user, and the sound by this typing Information is as information to be verified etc..
Certainly, the present embodiment does not limit to the type of this information to be verified and the input mode of this information to be verified.
For example, this information to be verified can be password code, and that is, this second terminal shows on this information input interface and is somebody's turn to do The random password card coordinate generating of server is so that user can find this mouth according to this password card coordinate in password card Make the corresponding password code of card coordinate, and input this password code in this information input interface.
In a step 406, this second terminal sends checking request to server, and this checking request carries this letter to be verified Breath, this user account, this first terminal mark and the instruction of this assigned operation;
In the present embodiment, this server be used for this information to be verified is verified, with determine whether this first Terminal executes this assigned operation.Wherein, this server can be associated by the website of this first terminal current accessed or software Service associated by the website of any one of server cluster server or this first terminal current accessed or software Functional module in device, the present embodiment does not limit to this.
In step 407, when this server receives this checking request, referred to according to this user account and this assigned operation Order, judges whether this information to be verified is verified, if it is, execution step 408, if not, execution step 409;
In the present embodiment, this user account corresponds to different assigned operation instructions, may arrange different passwords Information, therefore, this server, when storing the encrypted message of this user account, can store this user account respectively and be based on difference Assigned operation instruction encrypted message, the such as login password of this this user account of server storage and this user account Payment cipher etc..
When this server receives this checking request, inquire about this server storage, this user account be based on this specify The encrypted message of operational order, and this information to be verified and this encrypted message are contrasted, when this information to be verified is close with this During code information matches, it is verified, when this server determines that this information to be verified is mismatched with this encrypted message, determine input Information errors to be verified, then verify and do not pass through.
According to the difference of this information type to be verified, the process that this information to be verified and this encrypted message are contrasted When difference, information as to be verified in this and this encrypted message are character, can be contrasted by Text region, this information to be verified When being acoustic information with this encrypted message, can carry out contrasting by speech recognition etc., will not be described here.
In a step 408, this server executes this assigned operation, terminates;
In the present embodiment, when this server determines that this Information Authentication to be verified is passed through it is allowed to this first terminal executes This assigned operation, now, this server can perform this assigned operation.
Wherein, according to this assigned operation instruction difference, this server execute this assigned operation step can adopt with Any one mode lower:
(1)This assigned operation instructs as logging request, then this first terminal is arranged in based on this use this server The logging status of family account;
(2)This assigned operation instructs as payment request, then this server is paid the bill to this order;
(3)This assigned operation instructs and shows request for encryption information, then this server shows on this first terminal and should add Confidential information.
In step 409, this server does not allow this first terminal to execute this assigned operation;
In step 410, this server sends authentication failed message so that this second terminal obtains again to this second terminal Take the information to be verified of user input.
In the present embodiment, this server can send authentication failed message to this second terminal, notifies this second terminal Checking is not passed through so that this second terminal, when receiving this authentication failed message, shows this information input interface, again to obtain Take the information to be verified of user input, or this server can also when the number of times determining authentication failed reaches predetermined threshold value, Directly close the authority that this first terminal executes this assigned operation.
The method that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
In one embodiment, Fig. 5 is the exemplary process diagram of Information Authentication method, and referring to Fig. 5, the method includes:
In step 501, receive assigned operation instruction, this assigned operation instructs specified for indicating the execution of this first terminal Operation, this assigned operation needs to carry out Information Authentication, and the present embodiment is applied in first terminal;
In step 502, send checking request to this server, this checking request carries the user account of this first terminal Instruct so that this server determines second terminal according to this user account with this assigned operation, send to this second terminal and treat school Test information request, and when getting the information to be verified of this second terminal transmission, verify whether to allow this first terminal to execute This assigned operation, this second terminal is logging status and the terminal different from this first terminal being in based on this user account.
The method that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
In one embodiment, Fig. 6 is the exemplary process diagram of Information Authentication method, and referring to Fig. 6, the method includes:
In step 601, receive the checking request that first terminal sends, this checking request carries the user of this first terminal The assigned operation instruction that account and this first terminal receive, the present embodiment is applied in server;
In step 602, according to this user account, determine second terminal, this second terminal is to be in based on this user's account Number logging status and the terminal different from this first terminal;
In step 603, send information request to be verified to this second terminal, this information request to be verified carries this user Account and the instruction of this assigned operation are so that this second terminal display information inputting interface, and obtain the letter to be verified of user input Breath, returns to this server;
In step 604, when receiving the information to be verified of this second terminal transmission, according to this user account, this refers to Determine operational order and this information to be verified, verify whether to allow this first terminal to execute this assigned operation.
The method that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
According to this user account, the instruction of this assigned operation and this information to be verified, verify whether to allow this first terminal to hold This assigned operation of row includes:
When this server instructs according to this user account and this assigned operation, when determining that this Information Authentication to be verified is passed through, Execute this assigned operation;Or,
When this server instructs according to this user account and this assigned operation, determine that this Information Authentication to be verified is not passed through When, do not allow this first terminal to execute this assigned operation.
When this server instructs according to this user account and this assigned operation, determine that this Information Authentication to be verified is not passed through When, after not allowing this first terminal to execute this assigned operation, the method also includes:
This server sends authentication failed message to this second terminal so that this second terminal reacquires user input Information to be verified.
Above-mentioned all optional technical schemes, can be using the alternative embodiment arbitrarily combining to form the present invention, and here is no longer Repeat one by one.
In one embodiment, Fig. 7 is the exemplary process diagram of Information Authentication method, and the interaction agent of the present embodiment is the One terminal, second terminal server, referring to Fig. 7, the method includes:
In step 701, first terminal receives assigned operation instruction, and this assigned operation instructs for indicating this first terminal Execution assigned operation, this assigned operation needs to carry out Information Authentication;
This step 701 with this step 401 in the same manner, will not be described here.
In a step 702, this first terminal sends checking request to this server, and this checking request carries this first terminal User account and this assigned operation instruct;
In the present embodiment, this server be used for this information to be verified is verified, with determine whether this first Terminal executes this assigned operation.Wherein, this server can be associated by the website of this first terminal current accessed or software Service associated by the website of any one of server cluster server or this first terminal current accessed or software Functional module in device, the present embodiment does not limit to this.
In step 703, when this server receives this checking request, according to this user account, determine second terminal, This second terminal is logging status and the terminal different from this first terminal being in based on this user account;
In the present embodiment, during each terminal is logged in using user account, this server preserves to log in and is somebody's turn to do The corresponding terminal iidentification of user account, that is to say that preservation is in the terminal iidentification of the logging status based on this user account.Accordingly , this step 703 includes:When this server receives this checking request, judge whether this server is preserved to be in and be based on The logging status of this user account and the terminal iidentification different from this first terminal mark, if it is, this is in based on this use Terminal belonging to the logging status of family account and the terminal iidentification different from this first terminal is defined as this second terminal, if No, terminate.
There are multiple logging status being in based on this user account and different from this first terminal when this server determines Terminal when, terminal minimum for display screen in the plurality of terminal can be defined as this second terminal, or, it will thus provide full keyboard Terminal be defined as this second terminal.Wherein, this server can be according to the model of each terminal, terminal number in the plurality of terminal Etc. information, determine the display screen size of each terminal, and then the display screen size according to each terminal, determine the plurality of end The minimum terminal of display screen in end.
Further, the plurality of terminal can also be all defined as this second terminal by this server, i.e. this server follow-up Send information request to be verified to each terminal in the plurality of terminal, therefrom select a second terminal to input this by user and treat Check information.The present embodiment does not limit to how selecting this second terminal.
In step 704, this server sends information request to be verified to this second terminal, and this information request to be verified is taken This user account and this assigned operation is carried to instruct;
In the present embodiment, this server, after determining this second terminal, sends this information to be verified to this second terminal Request, to ask this second terminal to obtain this information to be verified it is achieved that receiving this first terminal after assigned operation instruction Information Inputting Process to be verified transfer to the purpose in this second terminal.
In step 705, when this second terminal receives this information request to be verified, show that this user account is based on and be somebody's turn to do The information input interface of assigned operation instruction;
In the present embodiment, when this second terminal receives this information request to be verified, obtain this user account and be somebody's turn to do Assigned operation instructs, and is instructed according to this user account and this assigned operation, shows this information input interface.Wherein, this information Information input interface in inputting interface and step 404 in the same manner, will not be described here.
In step 706, this second terminal obtains the information to be verified of user input;
This second terminal obtains the process of this information to be verified with this step 405 in the same manner, will not be described here.
In step 707, this information to be verified is sent to this server by this second terminal;
In step 708, when this server receives this information to be verified, according to this user account and this assigned operation Instruction, judges whether this information to be verified is verified, if it is, execution step 709, if not, execution step 710;
This step 708 with this step 407 in the same manner, will not be described here.
In step 709, this server executes this assigned operation, terminates;
This step 709 with this step 408 in the same manner, will not be described here.
In step 720, this server does not allow this first terminal to execute this assigned operation;
In step 711, this server sends authentication failed message so that this second terminal obtains again to this second terminal Take the information to be verified of user input.
The method that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
Fig. 8 is the example arrangement schematic diagram of Information Authentication device, and referring to Fig. 8, this device includes:
Command reception module 801, for receiving assigned operation instruction, this assigned operation instructs and refers to for indicating that local terminal executes Fixed operation, this assigned operation needs to carry out Information Authentication;
Graphic code generation module 802 is connected with command reception module 801, for instructing according to this assigned operation, generates figure Shape code, this graphic code at least carries the user account of this local terminal use, this local terminal mark and the instruction of this assigned operation so that second Terminal is passed through to scan this graphic code, display information inputting interface, and obtains the information to be verified of user input, sends to server Checking request, this checking request carries this information to be verified, this user account, this local terminal mark and the instruction of this assigned operation, makes Obtain whether this server authentication allows this local terminal to execute this assigned operation.
This command reception module 801 includes:
First receiving unit, for receiving logging request, this logging request is used for indicating that this local terminal is logged in;Or,
Second receiving unit, receives payment request for this local terminal, this payment request carries the numbering of order, and is used for referring to Show that this local terminal is paid the bill to this order;Or,
3rd receiving unit, shows request for this local terminal receiving encryption key, and the display request of this encryption information carries and adds Confidential information identifies, and is used for indicating that this local terminal shows this encryption information.
The device that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
Fig. 9 is the example arrangement schematic diagram of Information Authentication device, and referring to Fig. 9, this device includes:
Checking request receiver module 901, for receiving the checking request of second terminal transmission, this checking request carry this User account, this first terminal mark and this first terminal that the graphic code that two terminal scanning first terminals generate obtains receive Assigned operation instruction, and the information to be verified of user input that this second terminal gets, this assigned operation instructs and is used for Indicate this first terminal execution assigned operation, this assigned operation needs to carry out Information Authentication;
Authentication module 902 is connected with checking request receiver module 901, for being referred to according to this user account, this assigned operation Order and this information to be verified, verify whether to allow this first terminal to execute this assigned operation.
This authentication module 902 includes:
First authentication unit, for when instructing according to this user account and this assigned operation, determining that this information to be verified is tested When card passes through, execute this assigned operation;Or,
Second authentication unit, for when instructing according to this user account and this assigned operation, determining that this information to be verified is tested When card does not pass through, this first terminal is not allowed to execute this assigned operation.
This device also includes:
Failed message sending module, for this second terminal send authentication failed message so that this second terminal again Obtain the information to be verified of user input.
The device that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
Figure 10 is the example arrangement schematic diagram of Information Authentication device, and referring to Figure 10, this device includes:
Graphic code scan module 1001, for scanning the graphic code of first terminal generation, obtains the use of this first terminal The assigned operation instruction that user account, this first terminal mark and this first terminal receive;
Interface display module 1002 is connected with graphic code scan module 1001, specifies for showing that this user account is based on this The information input interface of operational order;
Data obtaining module 1003 to be verified is connected with interface display module 1002, for obtaining the to be verified of user input Information;
Checking request sending module 1004 is connected with data obtaining module 1003 to be verified, for sending checking to server Request, this checking request carries this information to be verified, this user account, this first terminal mark and the instruction of this assigned operation, makes Obtain whether this server authentication allows this first terminal to execute this assigned operation.
This device also includes:
Authentication failed module, for when this second terminal receives the authentication failed message that this server sends, showing This information input interface;
Reacquire module, for reacquiring the information to be verified of user input.
The device that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
Figure 11 is the example arrangement schematic diagram of Information Authentication device, and referring to Figure 11, this device includes:
Command reception module 1101, for receiving assigned operation instruction, this assigned operation instructs for indicating local terminal execution Assigned operation, this assigned operation needs to carry out Information Authentication;
Checking request sending module 1102 is connected with command reception module 1101, please for sending checking to this server Ask, this checking request carries the user account of this local terminal and this assigned operation instructs so that this server is according to this user account Determine second terminal, send information request to be verified to this second terminal, and get the to be verified of this second terminal transmission During information, verify whether to allow this local terminal to execute this assigned operation, this second terminal is the login being in based on this user account State and the terminal different from this local terminal.
The device that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
Figure 12 is the example arrangement schematic diagram of Information Authentication device, and referring to Figure 12, this device includes:
Checking request receiver module 1201, receive first terminal send checking request, this checking request carry this first The assigned operation instruction that the user account of terminal and this first terminal receive;
Second terminal determining module 1202 is connected with checking request receiver module 1201, for according to this user account, really Determine second terminal, this second terminal is logging status and the terminal different from this first terminal being in based on this user account;
Information request sending module 1203 to be verified is connected with second terminal determining module 1202, for this second terminal Send information request to be verified, this information request to be verified carry this user account and this assigned operation instruction so that this second Terminal display information inputting interface, and obtain the information to be verified of user input, return to local terminal;
Authentication module 1204 is connected with information request sending module 1203 to be verified, sends out for receiving this second terminal During the information to be verified sent, according to this user account, the instruction of this assigned operation and this information to be verified, verify whether to allow this One terminal executes this assigned operation.
This authentication module 1204 includes:
First authentication unit, for when instructing according to this user account and this assigned operation, determining that this information to be verified is tested When card passes through, execute this assigned operation;Or,
Second authentication unit, for when instructing according to this user account and this assigned operation, determining that this information to be verified is tested When card does not pass through, this first terminal is not allowed to execute this assigned operation.
This device also includes:
Failed message sending module, for this second terminal send authentication failed message so that this second terminal again Obtain the information to be verified of user input.
The device that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
It should be noted that:Above-described embodiment provide Information Authentication device in Information Authentication, only with above-mentioned each function The division of module is illustrated, and in practical application, can distribute above-mentioned functions by different function moulds as desired Block completes, and the internal structure of terminal unit will be divided into different functional modules, with complete described above all or portion Divide function.In addition, the Information Authentication device that above-described embodiment provides belongs to same design with Information Authentication embodiment of the method, its tool Body is realized process and is referred to embodiment of the method, repeats no more here.
Figure 13 is a kind of terminal unit provided in an embodiment of the present invention(Can be requesting party's terminal or associated terminal) Structural representation.Referring to Figure 13, in above-described embodiment, the step of second terminal execution can structure based on this terminal unit.Excellent Choosing:
Terminal unit 1300 can include communication unit 110, include one or more computer-readable storage mediums The memorizer 120 of matter, input block 130, display unit 140, sensor 150, voicefrequency circuit 160, WIFI(Wireless Fidelity, Wireless Fidelity)Module 170, the processor 180 including or more than one processing core and power supply 190 grade parts.It will be understood by those skilled in the art that the terminal unit structure shown in figure does not constitute the limit to terminal unit Fixed, ratio can be included and illustrate more or less of part, or combine some parts, or different part arrangements.Wherein:
Communication unit 110 can be used for receiving and sending messages or communication process in, the reception of signal and transmission, this communication unit 110 Can be RF(Radio Frequency, radio frequency)Circuit, router, modem, etc. network communication equipment.Especially, when When communication unit 110 is RF circuit, after the downlink information of base station is received, transfer at one or more than one processor 180 Reason;In addition, up data is activation will be related to base station.Usually as communication unit RF circuit include but is not limited to antenna, At least one amplifier, tuner, one or more agitator, subscriber identity module(SIM)Card, transceiver, bonder, LNA(Low Noise Amplifier, low-noise amplifier), duplexer etc..Additionally, communication unit 110 can also be by wireless Communication is communicated with network and other equipment.Described radio communication can use arbitrary communication standard or agreement, including but not limited to GSM(Global System of Mobile communication, global system for mobile communications)、GPRS(General Packet Radio Service, general packet radio service)、CDMA(Code Division Multiple Access, code Divide multiple access)、WCDMA(Wideband Code Division Multiple Access, WCDMA)、LTE(Long Term Evolution, Long Term Evolution), Email, SMS(Short Messaging Service, Short Message Service)Deng. Memorizer 120 can be used for storing software program and module, and processor 180 passes through to run the software journey being stored in memorizer 120 Sequence and module, thus execute various function application and data processing.Memorizer 120 can mainly include storing program area and deposit Storage data field, wherein, storing program area can application program needed for storage program area, at least one function(Such as sound is broadcast Playing function, image player function etc.)Deng;Storage data field can store according to terminal unit 1300 using the data being created (Such as voice data, phone directory etc.)Deng.Additionally, memorizer 120 can include high-speed random access memory, can also include Nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-state parts.Phase Ying Di, memorizer 120 can also include Memory Controller, to provide processor 180 and input block 130 to memorizer 120 Access.
Input block 130 can be used for numeral or the character information of receives input, and produces and user setup and function Control relevant keyboard, mouse, action bars, optics or trace ball signal input.Preferably, input block 130 may include tactile Sensitive surfaces 131 and other input equipments 132.Touch sensitive surface 131, also referred to as touch display screen or Trackpad, can collect use Family is thereon or neighbouring touch operation(Such as user uses any suitable object such as finger, stylus or adnexa in touch-sensitive table Operation on face 131 or near Touch sensitive surface 131), and corresponding attachment means are driven according to formula set in advance.Optional , Touch sensitive surface 131 may include touch detecting apparatus and two parts of touch controller.Wherein, touch detecting apparatus detection is used The touch orientation at family, and detect the signal that touch operation brings, transmit a signal to touch controller;Touch controller is from touch Receive touch information in detection means, and be converted into contact coordinate, then give processor 180, and can receiving processor 180 The order sent simultaneously is executed.Furthermore, it is possible to using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves Realize Touch sensitive surface 131.Except Touch sensitive surface 131, input block 130 can also include other input equipments 132.Preferably, Other input equipments 132 can include but is not limited to physical keyboard, function key(Such as volume control button, switch key etc.)、 One or more of trace ball, mouse, action bars etc..
Display unit 140 can be used for showing by the information of user input or the information and the terminal unit that are supplied to user 1300 various graphical user interface, these graphical user interface can be by figure, text, icon, video and its combination in any To constitute.Display unit 140 may include display floater 141, optionally, can adopt LCD(Liquid Crystal Display, liquid crystal display)、OLED(Organic Light-Emitting Diode, Organic Light Emitting Diode)Come etc. form Configuration display floater 141.Further, Touch sensitive surface 131 can cover display floater 141, when Touch sensitive surface 131 detects at it On or near touch operation after, send processor 180 to determine the type of touch event, with preprocessor 180 according to touch The type touching event provides corresponding visual output on display floater 141.Although in fig. 13, Touch sensitive surface 131 and display Panel 141 is to realize input and input function as two independent parts, but in some embodiments it is possible to will be touch-sensitive Surface 131 is integrated with display floater 141 and realize input and output function.
Terminal unit 1300 may also include at least one sensor 150, such as optical sensor, motion sensor and other Sensor.Optical sensor may include ambient light sensor and proximity transducer, and wherein, ambient light sensor can be according to ambient light The brightness to adjust display floater 141 for the light and shade, proximity transducer can cut out display when terminal unit 1300 moves in one's ear Panel 141 and/or backlight.As one kind of motion sensor, Gravity accelerometer can detect in all directions(Generally Three axles)The size of acceleration, can detect that size and the direction of gravity when static, can be used for identifying the application of mobile phone attitude(Than As horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function(Such as pedometer, percussion)Deng;Extremely The other sensors such as the gyroscope that can also configure in terminal unit 1300, barometer, drimeter, thermometer, infrared ray sensor, Will not be described here.
Voicefrequency circuit 160, speaker 161, microphone 162 can provide the audio frequency between user and terminal unit 1300 to connect Mouthful.The signal of telecommunication after the voice data receiving conversion can be transferred to speaker 161, by speaker 161 by voicefrequency circuit 160 Be converted to acoustical signal output;On the other hand, the acoustical signal of collection is converted to the signal of telecommunication by microphone 162, by voicefrequency circuit 160 receive after be converted to voice data, then after voice data output processor 180 is processed, through RF circuit 110 to be sent to ratio As another terminal unit, or voice data is exported to memorizer 120 to process further.Voicefrequency circuit 160 is also possible to Including earphone jack, to provide the communication of peripheral hardware earphone and terminal unit 1300.
In order to realize radio communication, this terminal unit can be configured with wireless communication unit 170, this wireless communication unit 170 can be WIFI module.WIFI belongs to short range wireless transmission technology, and terminal unit 1300 passes through wireless communication unit 170 User can be helped to send and receive e-mail, browse webpage and access streaming video etc., it is mutual that it has provided the user wireless broadband Internet interview.Although in figure shows wireless communication unit 170, but it is understood that, it is simultaneously not belonging to terminal unit 1300 must be configured into, can omit completely as needed in the scope of essence not changing invention.
Processor 180 is the control centre of terminal unit 1300, each using various interfaces and connection whole mobile phone Individual part, is stored in software program and/or module in memorizer 120 by running or executing, and calls and be stored in storage Data in device 120, the various functions of execution terminal unit 1300 and processing data, thus carry out integral monitoring to mobile phone.Can Choosing, processor 180 may include one or more processing cores;Preferably, processor 180 can integrated application processor and modulation Demodulation processor, wherein, application processor mainly processes operating system, user interface and application program etc., and modulation /demodulation is processed Device mainly processes radio communication.It is understood that above-mentioned modem processor can not also be integrated in processor 180.
Terminal unit 1300 also includes the power supply 190 powered to all parts(Such as battery)It is preferred that power supply can lead to Cross power-supply management system logically contiguous with processor 180, thus by power-supply management system realize management charge, electric discharge and The functions such as power managed.Power supply 190 can also include one or more direct current or alternating current power supply, recharging system, electricity The random component such as source failure detector circuit, power supply changeover device or inverter, power supply status indicator.
Although not shown, terminal unit 1300 can also include photographic head, bluetooth module etc., will not be described here.At this In embodiment, terminal unit also includes memorizer, and one or more than one program, one of or one with Upper program storage in memorizer, and be configured to by one or more than one computing device one or one with Upper program bag contains the instruction for carrying out method provided in an embodiment of the present invention.
Figure 14 is a kind of server architecture schematic diagram provided in an embodiment of the present invention.This server 1400 can be because of configuration or property Can the different and larger difference of producing ratio, one or more central processing units can be included(central processing Units, CPU)1422(For example, one or more processors)With memorizer 1432, one or more storage applications The storage medium 1430 of program 1442 or data 1444(Such as one or more mass memory units).Wherein, memorizer 1432 and storage medium 1430 can be of short duration storage or lasting store.The program being stored in storage medium 1430 can include one Individual or more than one module(Diagram does not mark), each module can include in server series of instructions operation.More enter One step ground, central processing unit 1422 could be arranged to communicate with storage medium 1430, executes storage medium on server 1400 Series of instructions operation in 1430.
Server 1400 can also include one or more power supplys 1426, one or more wired or wireless nets Network interface 1450, one or more input/output interfaces 1458, one or more keyboards 1456, and/or, one or More than one operating system 1441, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM Etc..
The step performed by server described in above-described embodiment can be based on the server architecture shown in this Figure 14.
Additionally, typically, the terminal unit described in the disclosure can be various hand-held mobile terminals, such as mobile phone, individual number Word assistant (PDA) etc., the protection domain of the therefore disclosure should not limit as certain certain types of terminal unit.
Additionally, be also implemented as the computer program being executed by CPU according to disclosed method.In this computer journey When sequence is executed by CPU, the above-mentioned functions of restriction in execution disclosed method.
Additionally, said method step and system unit can also utilize controller and make controller real for storage The computer readable storage devices of the computer program of existing above-mentioned steps or Elementary Function are realized.
In addition, it should be appreciated that computer readable storage devices (for example, memorizer) as herein described can be volatile Property memorizer or nonvolatile memory, or volatile memory and nonvolatile memory can be included.As example Son and nonrestrictive, nonvolatile memory can include read only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM) or flash memory.Volatile memory can include random access memory Memorizer (RAM), this RAM can serve as external cache.Nonrestrictive as an example, RAM can be with many The form of kind obtains, such as synchronous random access memory (DRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate SDRAM (DDR SDRAM), strengthen SDRAM (ESDRAM), synchronization link DRAM (SLDRAM) and direct RambusRAM (DRRAM).Institute The storage device of disclosed aspect is intended to the memorizer of including but not limited to these and other suitable type.
Those skilled in the art will also understand is that, in conjunction with the various illustrative logical blocks described by disclosure herein, mould Block, circuit and algorithm steps may be implemented as electronic hardware, computer software or a combination of both.Hard in order to clearly demonstrate Part and this interchangeability of software, the function with regard to various exemplary components, square, module, circuit and step it is entered Go general description.This function is implemented as software and is also implemented as hardware depending on concrete application and applying Design constraint to whole system.Those skilled in the art can realize described in every way for every kind of concrete application Function, but this realize decision and should not be interpreted as causing a departure from the scope of the present disclosure.
Can be using being designed in conjunction with the various illustrative logical blocks described by disclosure herein, module and circuit Execute the following part of function described here to realize or to execute:General processor, digital signal processor (DSP), special collection Become circuit (ASIC), field programmable gate array (FPGA) or other PLD, discrete gate or transistor logic, divide Vertical nextport hardware component NextPort or any combinations of these parts.General processor can be microprocessor, but alternatively, processes Device can be any conventional processors, controller, microcontroller or state machine.Processor can also be implemented as computing device Combination, for example, the combination of DSP and microprocessor, multi-microprocessor, one or more microprocessors combine DSP core or any Other this configurations.
Step in conjunction with the method described by disclosure herein or algorithm can be directly contained in hardware, by processor and holds In the software module of row or in combination of the two.Software module may reside within RAM memory, flash memory, ROM storage Device, eprom memory, eeprom memory, depositor, hard disk, removable disk, CD-ROM or known in the art any its In the storage medium of its form.Exemplary storage medium is coupled to processor so that processor can be from this storage medium Middle reading information or to this storage medium write information.In an alternative, described storage medium can be with processor collection Become together.Processor and storage medium may reside within ASIC.ASIC may reside within user terminal.Replace at one In scheme, processor and storage medium can be resident in the user terminal as discrete assembly.
In one or more exemplary design, described function can be real in hardware, software, firmware or its combination in any Existing.If realized in software, described function can be stored in computer-readable as one or more instructions or code Transmit on medium or by computer-readable medium.Computer-readable medium includes computer-readable storage medium and communication media, This communication media includes contributing to computer program is sent to any medium of another position from a position.Storage medium It can be any usable medium that can be accessed by a general purpose or special purpose computer.Nonrestrictive as an example, this computer Computer-readable recording medium can include RAM, ROM, EEPROM, CD-ROM or other optical disc memory apparatus, disk storage equipment or other magnetic Property storage device, or can be used for carrying or required program code that storage form is instruction or data structure and can Any other medium being accessed by universal or special computer or universal or special processor.Additionally, any connection can It is properly termed as computer-readable medium.For example, if using coaxial cable, optical fiber cable, twisted-pair feeder, digital subscriber line (DSL) or the wireless technology of such as infrared ray, radio and microwave to send software from website, server or other remote source, Then above-mentioned coaxial cable, optical fiber cable, the wireless technology of twisted-pair feeder, the first, radio of DSL or such as infrared and microwave are included in The definition of medium.As used herein, disk and CD include compact disk (CD), laser disk, CD, digital versatile disc (DVD) the usual magnetically reproduce data of, floppy disk, Blu-ray disc, wherein disk, and CD utilizes laser optics ground reproduce data.On The combination stating content should also be as including in the range of computer-readable medium.
Although content disclosed above shows the exemplary embodiment of the disclosure, it should be noted that without departing substantially from power On the premise of profit requires the scope of the present disclosure limiting, may be many modifications and change.According to described herein open real Function, step and/or the action of applying the claim to a method of example are not required to execute with any particular order.Although additionally, the disclosure Element with the description of individual form or can require, it is also contemplated that multiple, unless explicitly limited for odd number.
Above-described specific embodiment, purpose of this disclosure, technical scheme and beneficial effect have been carried out further Describe in detail, be should be understood that the specific embodiment that the foregoing is only the disclosure, be not used to limit the disclosure Protection domain, within all spirit in the disclosure and principle, any modification, equivalent substitution and improvement done etc., all should comprise Within the protection domain of the disclosure.

Claims (22)

1. a kind of Information Authentication method is it is characterised in that methods described includes:
First terminal receives assigned operation instruction, and described assigned operation instructs for indicating described first terminal input letter to be verified Breath, carries out Information Authentication by server, executes assigned operation when being verified;
Described first terminal instructs according to described assigned operation, generates graphic code, and described graphic code at least carries described first eventually User account, described first terminal mark and the instruction of described assigned operation that end uses are so that second terminal is described by scanning Graphic code, display information inputting interface, and obtain the information to be verified of user input, send checking request to described server, Described checking request carries the information to be verified of described user input, described user account, described first terminal mark and described Assigned operation instruction is so that whether described server authentication allows described first terminal to execute described assigned operation.
2. method according to claim 1 is it is characterised in that first terminal receives assigned operation instruction inclusion:
Described first terminal receives logging request, and described logging request is used for indicating that described first terminal is logged in;Or,
Described first terminal receives payment request, and described payment request carries the numbering of order, and is used for indicating described first eventually Pay the bill to described order in end;Or,
Described first terminal receiving encryption key display request, described encryption information display request carries encryption information mark, and For indicating that described first terminal shows described encryption information.
3. a kind of Information Authentication method is it is characterised in that methods described includes:
Server receives the checking request that second terminal sends, and described checking request carries described second terminal scanning first terminal The assigned operation that user account, described first terminal mark and the described first terminal that the graphic code generating obtains receives refers to Order, and the information to be verified of user input that described second terminal gets, described assigned operation instructs described for indicating First terminal inputs information to be verified, carries out Information Authentication by described server, executes assigned operation when being verified;
Described server instructs and described information to be verified according to described user account, described assigned operation, verifies whether to allow Described first terminal executes described assigned operation.
4. method according to claim 3 it is characterised in that described server according to described user account, described specify Operational order and described information to be verified, verify whether that allowing described first terminal to execute described assigned operation includes:
When described server instructs according to described user account and described assigned operation, determine that described Information Authentication to be verified is passed through When, execute described assigned operation;Or,
When described server instructs according to described user account and described assigned operation, determine that described Information Authentication to be verified is not led to Out-of-date, do not allow described first terminal to execute described assigned operation.
5. method according to claim 4 is it is characterised in that work as described server according to described user account and described finger Determine operational order, when determining that described Information Authentication to be verified is not passed through, do not allow described first terminal to execute described assigned operation Afterwards, methods described also includes:
Described server sends authentication failed message to described second terminal so that described second terminal reacquires user input Information to be verified.
6. a kind of Information Authentication method is it is characterised in that methods described includes:
Second terminal scans the graphic code that first terminal generates, and obtains user account, described first that described first terminal uses The assigned operation instruction that terminal iidentification and described first terminal receive, described assigned operation instructs for indicating described first eventually End inputs information to be verified, carries out Information Authentication by server, executes assigned operation when being verified;
Show the information input interface that described user account is instructed based on described assigned operation;
Obtain the information to be verified of user input;
Send checking request to described server, described checking request carries described information to be verified, described user account, described First terminal mark and the instruction of described assigned operation are so that whether described server authentication allows described first terminal execution described Assigned operation.
7. method according to claim 6 is it is characterised in that methods described also includes:
When described second terminal receives the authentication failed message that described server sends, show described information inputting interface;
Reacquire the information to be verified of user input.
8. a kind of Information Authentication method is it is characterised in that methods described includes:
First terminal receives assigned operation instruction, and described assigned operation instructs for indicating described first terminal input letter to be verified Breath, carries out Information Authentication by server to described information to be verified, and when being verified, described first terminal executes assigned operation;
Described first terminal sends checking request to described server, and described checking request carries user's account of described first terminal Number and described assigned operation instruct so that described server determines second terminal according to described user account, to described second eventually End sends information request to be verified, and when getting the information to be verified that described second terminal sends, verifies whether to allow institute State first terminal and execute described assigned operation, described second terminal be in logging status based on described user account and with The different terminal of described first terminal.
9. a kind of Information Authentication method is it is characterised in that methods described includes:
Server receive first terminal send checking request, described checking request carry described first terminal user account and The assigned operation instruction that described first terminal receives, described assigned operation instructs treats school for indicating that described first terminal inputs Test information, Information Authentication is carried out to described information to be verified by described server, when being verified, described first terminal execution refers to Fixed operation;
Described server, according to described user account, determines second terminal, and described second terminal is to be in based on described user's account Number logging status and the terminal different from described first terminal;
Described server sends information request to be verified to described second terminal, and described information request to be verified carries described use Family account and the instruction of described assigned operation are so that described second terminal display information inputting interface, and obtain treating of user input Check information, returns to described server;
When described server receives the information to be verified that described second terminal sends, according to described user account, described finger Determine operational order and described information to be verified, verify whether to allow described first terminal to execute described assigned operation.
10. method according to claim 9 it is characterised in that according to described user account, described assigned operation instruct and Described information to be verified, verifies whether that allowing described first terminal to execute described assigned operation includes:
When described server instructs according to described user account and described assigned operation, determine that described Information Authentication to be verified is passed through When, execute described assigned operation;Or,
When described server instructs according to described user account and described assigned operation, determine that described Information Authentication to be verified is not led to Out-of-date, do not allow described first terminal to execute described assigned operation.
11. methods according to claim 10 are it is characterised in that when described server is according to described user account and described Assigned operation instructs, and when determining that described Information Authentication to be verified is not passed through, does not allow described first terminal to execute described specified behaviour After work, methods described also includes:
Described server sends authentication failed message to described second terminal so that described second terminal reacquires user input Information to be verified.
A kind of 12. Information Authentication devices are it is characterised in that described device includes:
Command reception module, for receiving assigned operation instruction, described assigned operation instructs to be verified for indicating local terminal input Information, carries out Information Authentication by server to described information to be verified, and when being verified, described local terminal executes assigned operation;
Graphic code generation module, for instructing according to described assigned operation, generates graphic code, described graphic code at least carries described User account, described local terminal mark and the instruction of described assigned operation that local terminal uses are so that second terminal is passed through to scan described figure Shape code, display information inputting interface, and obtain the information to be verified of user input, send checking request, institute to described server State information to be verified, described user account, described local terminal mark and the described specified behaviour that checking request carries described user input Instruct so that whether described server authentication allows described local terminal to execute described assigned operation.
13. devices according to claim 12 are it is characterised in that described command reception module includes:
First receiving unit, for receiving logging request, described logging request is used for indicating that described local terminal is logged in;Or,
Second receiving unit, receives payment request for described local terminal, described payment request carries the numbering of order, and is used for referring to Show that described local terminal is paid the bill to described order;Or,
3rd receiving unit, shows request for described local terminal receiving encryption key, and described encryption information display request carries and adds Confidential information identifies, and is used for indicating that described local terminal shows described encryption information.
A kind of 14. Information Authentication devices are it is characterised in that described device includes:
Checking request receiver module, for receiving the checking request of second terminal transmission, described checking request carries described second User account, described first terminal mark and described first terminal that the graphic code that terminal scanning first terminal generates obtains receive The assigned operation instruction arrived, and the information to be verified of user input that described second terminal gets, described assigned operation refers to Make for indicating described first terminal input information to be verified, Information Authentication is carried out by local terminal, executes when being verified and specify Operation;
Authentication module, for according to described user account, the instruction of described assigned operation and described information to be verified, verifying whether to permit Permitted described first terminal and executed described assigned operation.
15. devices according to claim 14 are it is characterised in that described authentication module includes:
First authentication unit, for when according to described user account and the instruction of described assigned operation, determining described information to be verified When being verified, execute described assigned operation;Or,
Second authentication unit, for when according to described user account and the instruction of described assigned operation, determining described information to be verified When checking is not passed through, described first terminal is not allowed to execute described assigned operation.
16. devices according to claim 15 are it is characterised in that described device also includes:
Failed message sending module, for described second terminal send authentication failed message so that described second terminal again Obtain the information to be verified of user input.
A kind of 17. Information Authentication devices are it is characterised in that described device includes:
Graphic code scan module, for scanning the graphic code of first terminal generation, obtains user's account that described first terminal uses Number, the assigned operation instruction that receives of described first terminal mark and described first terminal, described assigned operation instructs for referring to Show that described first terminal inputs information to be verified, Information Authentication is carried out by server, execute assigned operation when being verified;
Interface display module, for showing the information input interface that described user account is instructed based on described assigned operation;
Data obtaining module to be verified, for obtaining the information to be verified of user input;
Checking request sending module, for sending checking request to described server, described checking request carries described to be verified Information, described user account, described first terminal mark and described assigned operation instruct so that whether described server authentication is permitted Permitted described first terminal and executed described assigned operation.
18. devices according to claim 17 are it is characterised in that described device also includes:
Authentication failed module, for when receiving the authentication failed message that described server sends, display described information inputs Interface;
Reacquire module, for reacquiring the information to be verified of user input.
A kind of 19. Information Authentication devices are it is characterised in that described device includes:
Command reception module, for receiving assigned operation instruction, described assigned operation instructs to be verified for indicating local terminal input Information, carries out Information Authentication by server to described information to be verified, and when being verified, described local terminal executes assigned operation;
Checking request sending module, for sending checking request to described server, described checking request carries described local terminal User account and described assigned operation instruct so that described server determines second terminal according to described user account, to described Second terminal sends information request to be verified, and when getting the information to be verified that described second terminal sends, verifies whether Allow described local terminal to execute described assigned operation, described second terminal be in logging status based on described user account and The terminal different from described local terminal.
A kind of 20. Information Authentication devices are it is characterised in that described device includes:
Checking request receiver module, receives the checking request that first terminal sends, and described checking request carries described first terminal User account and the assigned operation instruction that receives of described first terminal, described assigned operation instructs for indicating described first Terminal inputs information to be verified, carries out Information Authentication by local terminal to described information to be verified, when being verified, described first terminal Execution assigned operation;
Second terminal determining module, for according to described user account, determining second terminal, described second terminal is to be in be based on The logging status of described user account and the terminal different from described first terminal;
Information request sending module to be verified, for sending information request to be verified, described letter to be verified to described second terminal Breath request carries described user account and the instruction of described assigned operation so that described second terminal display information inputting interface, and Obtain the information to be verified of user input, return to described local terminal;
Authentication module, for when receiving the information to be verified that described second terminal sends, according to described user account, described Assigned operation instruction and described information to be verified, verify whether to allow described first terminal to execute described assigned operation.
21. devices according to claim 20 are it is characterised in that described authentication module includes:
First authentication unit, for when according to described user account and the instruction of described assigned operation, determining described information to be verified When being verified, execute described assigned operation;Or,
Second authentication unit, for when according to described user account and the instruction of described assigned operation, determining described information to be verified When checking is not passed through, described first terminal is not allowed to execute described assigned operation.
22. devices according to claim 21 are it is characterised in that described device also includes:
Failed message sending module, for described second terminal send authentication failed message so that described second terminal again Obtain the information to be verified of user input.
CN201310533351.4A 2013-10-31 2013-10-31 Information verifying method and device Active CN103634294B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310533351.4A CN103634294B (en) 2013-10-31 2013-10-31 Information verifying method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310533351.4A CN103634294B (en) 2013-10-31 2013-10-31 Information verifying method and device

Publications (2)

Publication Number Publication Date
CN103634294A CN103634294A (en) 2014-03-12
CN103634294B true CN103634294B (en) 2017-02-08

Family

ID=50214922

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310533351.4A Active CN103634294B (en) 2013-10-31 2013-10-31 Information verifying method and device

Country Status (1)

Country Link
CN (1) CN103634294B (en)

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104954126B (en) * 2014-03-26 2020-01-10 腾讯科技(深圳)有限公司 Sensitive operation verification method, device and system
CN104967586B (en) * 2014-05-04 2018-02-27 腾讯科技(深圳)有限公司 A kind of user ID authentication method, apparatus and system
CN104217328A (en) * 2014-08-12 2014-12-17 小米科技有限责任公司 Multi-verification payment method and multi-verification payment device
CN104484114B (en) * 2014-11-24 2017-05-03 腾讯科技(深圳)有限公司 Data transfer method, mobile terminal and data transfer system
CN104394230B (en) * 2014-12-08 2018-03-23 网易有道信息技术(北京)有限公司 The method, apparatus and system that a kind of information is presented
CN104639533B (en) * 2014-12-30 2018-09-04 小米科技有限责任公司 Method of controlling security based on terminal and device
CN105867317B (en) * 2015-01-21 2019-08-20 阿里巴巴集团控股有限公司 A kind of instruction issuing, method of reseptance, device and smart home system
CN105989418B (en) * 2015-02-15 2021-04-02 中兴通讯股份有限公司 Internet surfing service remote booking method and device
CN104915579A (en) * 2015-05-06 2015-09-16 腾讯科技(深圳)有限公司 Information processing method and device
CN107451813B (en) * 2016-06-01 2021-05-18 华为终端有限公司 Payment method, payment device and payment server
CN105938527B (en) * 2016-06-02 2019-04-12 百度在线网络技术(北京)有限公司 A kind of method and apparatus of account verifying
CN106161448A (en) * 2016-07-15 2016-11-23 珠海格力电器股份有限公司 The authority control method of large-sized unit air-conditioning, Apparatus and system
CN106228364A (en) * 2016-07-15 2016-12-14 珠海市魅族科技有限公司 A kind of information demonstrating method and present device
CN106878245B (en) 2016-07-18 2020-04-24 阿里巴巴集团控股有限公司 Graphic code information providing and obtaining method, device and terminal
CN106204027A (en) * 2016-07-22 2016-12-07 珠海市魅族科技有限公司 A kind of method of payment and mobile terminal
CN106230702B (en) * 2016-08-29 2019-05-10 北京小米移动软件有限公司 Identity information verification method, apparatus and system
CN106878018B (en) * 2016-12-30 2020-04-07 腾讯科技(深圳)有限公司 Operation verification method and device
CN107734036B (en) * 2017-10-19 2021-01-19 威盛电子股份有限公司 Communication method and communication system using the same
CN109672941B (en) * 2018-12-29 2022-03-11 深圳Tcl新技术有限公司 Information input method, television and computer readable storage medium
CN110321752B (en) * 2019-06-03 2023-07-14 创新先进技术有限公司 Method and device for checking offline graphic codes
CN110417784B (en) * 2019-07-30 2021-10-12 腾讯科技(深圳)有限公司 Authorization method and device of access control equipment
CN113777909A (en) * 2021-09-06 2021-12-10 珠海格力电器股份有限公司 Master-slave communication control method, device, storage medium and master-slave communication control system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7043230B1 (en) * 2003-02-20 2006-05-09 Sprint Spectrum L.P. Method and system for multi-network authorization and authentication
CN101523859A (en) * 2006-10-19 2009-09-02 高通股份有限公司 System and method for authenticating remote server access
CN102842081A (en) * 2011-06-23 2012-12-26 上海易悠通信息科技有限公司 Method for generating two-dimensional code and implementing mobile payment by mobile phone
CN103020818A (en) * 2013-01-09 2013-04-03 重庆新亚盟电子科技有限公司 Payment system utilizing dynamic two-dimensional verification codes
CN103248680A (en) * 2013-04-26 2013-08-14 北京小米科技有限责任公司 Method and system for sharing network disk data
CN103297231A (en) * 2012-03-01 2013-09-11 盛大计算机(上海)有限公司 Identity authentication method and system
CN103366269A (en) * 2013-07-05 2013-10-23 李卓桓 Fast payment method, equipment and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7043230B1 (en) * 2003-02-20 2006-05-09 Sprint Spectrum L.P. Method and system for multi-network authorization and authentication
CN101523859A (en) * 2006-10-19 2009-09-02 高通股份有限公司 System and method for authenticating remote server access
CN102842081A (en) * 2011-06-23 2012-12-26 上海易悠通信息科技有限公司 Method for generating two-dimensional code and implementing mobile payment by mobile phone
CN103297231A (en) * 2012-03-01 2013-09-11 盛大计算机(上海)有限公司 Identity authentication method and system
CN103020818A (en) * 2013-01-09 2013-04-03 重庆新亚盟电子科技有限公司 Payment system utilizing dynamic two-dimensional verification codes
CN103248680A (en) * 2013-04-26 2013-08-14 北京小米科技有限责任公司 Method and system for sharing network disk data
CN103366269A (en) * 2013-07-05 2013-10-23 李卓桓 Fast payment method, equipment and system

Also Published As

Publication number Publication date
CN103634294A (en) 2014-03-12

Similar Documents

Publication Publication Date Title
CN103634294B (en) Information verifying method and device
CN103634109B (en) Operation right authentication method and device
CN103716793B (en) Access-in point information sharing method and device
CN104468464B (en) verification method, device and system
US9703971B2 (en) Sensitive operation verification method, terminal device, server, and verification system
CN103457951B (en) The method and device of multiple terminals login service device
CN104580167B (en) A kind of methods, devices and systems transmitting data
CN103731810B (en) access point sharing method and device
CN104836664B (en) A kind of methods, devices and systems executing business processing
CN104219050B (en) Voice print verification method, server, client and system
CN103701926A (en) Method, device and system for obtaining fault reason information
CN105704123A (en) Business processing method, device and system
CN104852885A (en) Method, device and system for verifying verification code
CN104735657B (en) Security terminal verification method, wireless access point binding method, apparatus and system
CN103763112B (en) A kind of user identity protection method and apparatus
CN103678502B (en) Information collection method and device
CN104519197A (en) User login method, user login device and terminal devices
CN105491067A (en) Key-based business security verification method and device
CN106156597A (en) The implementation method of a kind of identifying code, and device
CN108234124A (en) Auth method, device and system
CN106302603A (en) The method and apparatus remotely deleting information
CN104899488B (en) Numeric value transfer and device
CN104573437A (en) Information authentication method, device and terminal
CN108090345A (en) Linux system external command performs method and device
CN106709342B (en) Malware detection methods and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant