CN103634294B - Information verifying method and device - Google Patents
Information verifying method and device Download PDFInfo
- Publication number
- CN103634294B CN103634294B CN201310533351.4A CN201310533351A CN103634294B CN 103634294 B CN103634294 B CN 103634294B CN 201310533351 A CN201310533351 A CN 201310533351A CN 103634294 B CN103634294 B CN 103634294B
- Authority
- CN
- China
- Prior art keywords
- terminal
- information
- verified
- assigned operation
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention relates to an information verifying method and an information verifying device, and belongs to the technical field of networks. The method comprises the steps that a first terminal receives specified operation instructions; according to the specified operation instructions, graphic codes are generated so that a second terminal displays an information input interface through scanning the graphic codes, in addition, information, input by users, to be checked is obtained, an verification request is sent to a server, and the server verifies whether a first terminal is allowed to execute the specified operation or not. The information verifying method and the information verifying device have the advantages that the input process of the information to be checked after the first terminal receives the specified operation instructions is transferred onto the second terminal, so the process for inputting the information to be checked is simpler and more convenient, the information verification process is simplified, the time for inputting the information to be checked is reduced, the information verification efficiency is improved, and in addition, a display screen of the second terminal is obviously smaller than that of the first terminal, the information leakage cannot be easily caused, and the safety is improved.
Description
Technical field
The disclosure is directed to networking technology area, specifically with regard to Information Authentication method and apparatus.
Background technology
With the development of intelligent television, user can install multiple application softwaries on intelligent television, to realize multiple intelligence
The function of energyization, but it may be necessary to verify user right, to guarantee safety during using intelligent television.
As user needs when logging in application software to input login account and password, or needs when buying commodity to input
The password of account, is needed when paying to input payment cipher etc..
When user carries out Authority Verification on intelligent television, it is possible to use remote control inputs password, but, the key of remote control
It is relatively simple that disk is typically arranged, and can only input numeral, and cannot input character, then when password to be entered includes character,
Virtual full keyboard can be provided on intelligent television, the direction key that user passes through to click in remote control controls cursor, and leads to
Cross and confirm that button selects the character in full keyboard to be inputted.
During realizing the present invention, inventor finds correlation technique at least defect, for example:Authority Verification process operation
Loaded down with trivial details, Password Input takes long, leads to the efficiency of Authority Verification very low, and because the display screen ratio of intelligent television is typically whole
The display screen at end is big, easily causes information leakage, poor stability.
Content of the invention
In order to solve problem present in correlation technique, present disclose provides a kind of Information Authentication method and apparatus.Described
Technical scheme is as follows:
In a first aspect, present disclose provides a kind of Information Authentication method, methods described includes:
First terminal receives assigned operation instruction, and described assigned operation instructs specified for indicating described first terminal execution
Operation, described assigned operation needs to carry out Information Authentication;
Described first terminal instructs according to described assigned operation, generates graphic code, and described graphic code at least carries described the
User account, described first terminal mark and the instruction of described assigned operation that one terminal uses are so that second terminal passes through scanning
Described graphic code, display information inputting interface, and obtain the information to be verified of user input, send checking request to server,
Described checking request carries described information to be verified, described user account, described first terminal mark and described assigned operation and refers to
Order is so that whether described server authentication allows described first terminal to execute described assigned operation.
First terminal receives assigned operation instruction and includes:
Described first terminal receives logging request, and described logging request is used for indicating that described first terminal is logged in;Or,
Described first terminal receives payment request, and described payment request carries the numbering of order, and is used for indicating described the
Order described in one terminal-pair is paid the bill;Or,
Described first terminal receiving encryption key display request, described encryption information display request carries encryption information mark
Know, and be used for indicating that described first terminal shows described encryption information.
Second aspect, present disclose provides a kind of Information Authentication method, methods described includes:
Server receives the checking request that second terminal sends, and described checking request carries described second terminal scanning first
The assigned operation that user account, described first terminal mark and the described first terminal that the graphic code that terminal generates obtains receives
Instruction, and the information to be verified of user input that described second terminal gets, described assigned operation instructs for indicating
State first terminal execution assigned operation, described assigned operation needs to carry out Information Authentication;
Described server instructs and described information to be verified according to described user account, described assigned operation, verifies whether
Described first terminal is allowed to execute described assigned operation.
Described server instructs and described information to be verified according to described user account, described assigned operation, verifies whether
Allow described first terminal to execute described assigned operation to include:
When described server instructs according to described user account and described assigned operation, determine described Information Authentication to be verified
By when, execute described assigned operation;Or,
When described server instructs according to described user account and described assigned operation, determine described Information Authentication to be verified
When not passing through, described first terminal is not allowed to execute described assigned operation.
When described server instructs according to described user account and described assigned operation, determine described Information Authentication to be verified
When not passing through, after not allowing described first terminal to execute described assigned operation, methods described also includes:
Described server sends authentication failed message to described second terminal so that described second terminal reacquires user
The information to be verified of input.
The third aspect, present disclose provides a kind of Information Authentication method, methods described includes:
Second terminal scans the graphic code that first terminal generates, and obtains user account that described first terminal uses, described
The assigned operation instruction that first terminal mark receives with described first terminal;
Show the information input interface that described user account is instructed based on described assigned operation;
Obtain the information to be verified of user input;
Send checking request to server, described checking request carries described information to be verified, described user account, described
First terminal mark and the instruction of described assigned operation are so that whether described server authentication allows described first terminal execution described
Assigned operation.
Methods described also includes:
When described second terminal receives the authentication failed message that described server sends, display described information input circle
Face;
Reacquire the information to be verified of user input.
Fourth aspect, present disclose provides a kind of Information Authentication method, methods described includes:
First terminal receives assigned operation instruction, and described assigned operation instructs specified for indicating described first terminal execution
Operation, described assigned operation needs to carry out Information Authentication;
Described first terminal sends checking request to described server, and described checking request carries the use of described first terminal
Family account and described assigned operation instruct so that described server determines second terminal according to described user account, to described the
Two terminals send information request to be verified, and when getting the information to be verified that described second terminal sends, verify whether to permit
Permitted described first terminal and executed described assigned operation, described second terminal be in logging status based on described user account,
And the terminal different from described first terminal.
5th aspect, present disclose provides a kind of Information Authentication method, methods described includes:
Server receives the checking request that first terminal sends, and described checking request carries user's account of described first terminal
Number and described first terminal receive assigned operation instruction;
Described server, according to described user account, determines second terminal, and described second terminal is to be in based on described use
The logging status of family account and the terminal different from described first terminal;
Described server sends information request to be verified to described second terminal, and described information request to be verified carries described
User account and the instruction of described assigned operation are so that described second terminal display information inputting interface, and obtain user input
Information to be verified, returns to described server;
When described server receives the information to be verified that described second terminal sends, according to described user account, institute
State assigned operation instruction and described information to be verified, verify whether to allow described first terminal to execute described assigned operation.
According to described user account, the instruction of described assigned operation and described information to be verified, verify whether to allow described the
One terminal executes described assigned operation and includes:
When described server instructs according to described user account and described assigned operation, determine described Information Authentication to be verified
By when, execute described assigned operation;Or,
When described server instructs according to described user account and described assigned operation, determine described Information Authentication to be verified
When not passing through, described first terminal is not allowed to execute described assigned operation.
When described server instructs according to described user account and described assigned operation, determine described Information Authentication to be verified
When not passing through, after not allowing described first terminal to execute described assigned operation, methods described also includes:
Described server sends authentication failed message to described second terminal so that described second terminal reacquires user
The information to be verified of input.
6th aspect, present disclose provides a kind of Information Authentication device, described device includes:
Command reception module, for receiving assigned operation instruction, described assigned operation instructs and refers to for indicating that local terminal executes
Fixed operation, described assigned operation needs to carry out Information Authentication;
Graphic code generation module, for instructing according to described assigned operation, generates graphic code, described graphic code at least carries
User account, described local terminal mark and the instruction of described assigned operation that described local terminal uses are so that second terminal is passed through to scan institute
State graphic code, display information inputting interface, and obtain the information to be verified of user input, send checking request, institute to server
State checking request carry described information to be verified, described user account, described local terminal mark and described assigned operation instruction so that
Whether described server authentication allows described local terminal to execute described assigned operation.
Described command reception module includes:
First receiving unit, for receiving logging request, described logging request is used for indicating that described local terminal is logged in;
Or,
Second receiving unit, receives payment request for described local terminal, and described payment request carries the numbering of order, and uses
In the described local terminal of instruction, described order is paid the bill;Or,
3rd receiving unit, shows request for described local terminal receiving encryption key, and described encryption information display request is taken
Band encryption information mark, and be used for indicating that described local terminal shows described encryption information.
7th aspect, present disclose provides a kind of Information Authentication device, described device includes:
Checking request receiver module, for receiving the checking request of second terminal transmission, described checking request carries described
Second terminal scans user account, described first terminal mark and the described first terminal that the graphic code of first terminal generation obtains
The assigned operation instruction receiving, and the information to be verified of user input that described second terminal gets, described specified behaviour
It is used for indicating described first terminal execution assigned operation as instruction, described assigned operation needs to carry out Information Authentication;
Authentication module, for being instructed and described information to be verified according to described user account, described assigned operation, checking is
No described first terminal is allowed to execute described assigned operation.
Described authentication module includes:
First authentication unit, for when according to described user account and the instruction of described assigned operation, determining described to be verified
When Information Authentication is passed through, execute described assigned operation;Or,
Second authentication unit, for when according to described user account and the instruction of described assigned operation, determining described to be verified
When Information Authentication is not passed through, described first terminal is not allowed to execute described assigned operation.
Described device also includes:
Failed message sending module, for sending authentication failed message so that described second terminal to described second terminal
Reacquire the information to be verified of user input.
Eighth aspect, present disclose provides a kind of Information Authentication device, described device includes:
Graphic code scan module, for scanning the graphic code of first terminal generation, obtains the use that described first terminal uses
The assigned operation instruction that family account, described first terminal mark and described first terminal receive;
Interface display module, for showing the information input interface that described user account is instructed based on described assigned operation;
Data obtaining module to be verified, for obtaining the information to be verified of user input;
Checking request sending module, for sending checking request to server, described checking request carries described to be verified
Information, described user account, described first terminal mark and described assigned operation instruct so that whether described server authentication is permitted
Permitted described first terminal and executed described assigned operation.
Described device also includes:
Authentication failed module, for when described second terminal receives the authentication failed message that described server sends,
Display described information inputting interface;
Reacquire module, for reacquiring the information to be verified of user input.
9th aspect, present disclose provides a kind of Information Authentication device, described device includes:
Command reception module, for receiving assigned operation instruction, described assigned operation instructs and refers to for indicating that local terminal executes
Fixed operation, described assigned operation needs to carry out Information Authentication;
Checking request sending module, for sending checking request to described server, described checking request carries described
The user account at end and described assigned operation instruct so that described server determines second terminal according to described user account, to
Described second terminal sends information request to be verified, and when getting the information to be verified that described second terminal sends, checking
Described local terminal whether is allowed to execute described assigned operation, described second terminal is the login shape being in based on described user account
State and the terminal different from described local terminal.
Tenth aspect, present disclose provides a kind of Information Authentication device, described device includes:
Checking request receiver module, receives the checking request that first terminal sends, and described checking request carries described first
The assigned operation instruction that the user account of terminal and described first terminal receive;
Second terminal determining module, for according to described user account, determining second terminal, described second terminal is to be in
Logging status based on described user account and the terminal different from described first terminal;
Information request sending module to be verified, for sending information request to be verified to described second terminal, described treats school
Test information request and carry described user account and the instruction of described assigned operation so that described second terminal display information inputs boundary
Face, and obtain the information to be verified of user input, return to local terminal;
Authentication module, for when receiving the information to be verified that described second terminal sends, according to described user account,
Described assigned operation instruction and described information to be verified, verify whether to allow described first terminal to execute described assigned operation.
Described authentication module includes:
First authentication unit, for when according to described user account and the instruction of described assigned operation, determining described to be verified
When Information Authentication is passed through, execute described assigned operation;Or,
Second authentication unit, for when according to described user account and the instruction of described assigned operation, determining described to be verified
When Information Authentication is not passed through, described first terminal is not allowed to execute described assigned operation.
Described device also includes:
Failed message sending module, for sending authentication failed message so that described second terminal to described second terminal
Reacquire the information to be verified of user input.
Some beneficial effects of the disclosure can include:
Method and apparatus provided in an embodiment of the present invention, by first terminal is received assigned operation instruction after treat school
Test Information Inputting Process and transfer in second terminal, the letter to be verified needed for this first terminal can be inputted on this second terminal
Breath, because, compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies letter
Breath proof procedure, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and due to this second end
The display screen at end is significantly less than this first terminal, does not easily cause information leakage, improves safety.
It should be appreciated that above general description and detailed description hereinafter are only exemplary, can not be limited this
Open.
Brief description
For the technical scheme being illustrated more clearly that in the disclosure, in embodiment being described below, required use is attached
Figure be briefly described it should be apparent that, drawings in the following description are only some embodiments of the present disclosure, for this area
For those of ordinary skill, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Accompanying drawing described herein is used for providing further understanding of the disclosure, constitutes the part of the application, does not constitute to this
Disclosed restriction.In the accompanying drawings:
Fig. 1 is the exemplary process diagram of Information Authentication method;
Fig. 2 is the exemplary process diagram of Information Authentication method;
Fig. 3 is the exemplary process diagram of Information Authentication method;
Fig. 4 a is the exemplary process diagram of Information Authentication method;
Fig. 4 b is first terminal schematic diagram;
Fig. 4 c is that graphic code generates schematic diagram;
Fig. 4 d is information input interface display schematic diagram;
Fig. 5 is the exemplary process diagram of Information Authentication method;
Fig. 6 is the exemplary process diagram of Information Authentication method;
Fig. 7 is the exemplary process diagram of Information Authentication method;
Fig. 8 is the example arrangement schematic diagram of Information Authentication device;
Fig. 9 is the example arrangement schematic diagram of Information Authentication device.
Figure 10 is the example arrangement schematic diagram of Information Authentication device;
Figure 11 is the example arrangement schematic diagram of Information Authentication device;
Figure 12 is the example arrangement schematic diagram of Information Authentication device;
Figure 13 is a kind of terminal unit structural representation provided in an embodiment of the present invention;
Figure 14 is a kind of server architecture schematic diagram provided in an embodiment of the present invention.
By above-mentioned accompanying drawing it has been shown that the clear and definite embodiment of the disclosure, hereinafter will be described in more detail.These accompanying drawings
It is not intended to limit the scope of disclosure design by any mode with word description, but by reference to specific embodiment be
Those skilled in the art illustrate the concept of the disclosure.
Specific embodiment
Purpose, technical scheme and advantage for making the disclosure become more apparent, with reference to embodiment and accompanying drawing, right
The disclosure is described in further details.Here, the exemplary embodiment of the disclosure and its illustrate for explaining the disclosure, but simultaneously
Not as restriction of this disclosure.
The embodiment of the present disclosure provides a kind of Information Authentication method and apparatus, below in conjunction with accompanying drawing, the disclosure is carried out specifically
Bright.
In one embodiment, Fig. 1 is the exemplary process diagram of Information Authentication method, and referring to Fig. 1, methods described includes:
In a step 101, receive assigned operation instruction, this assigned operation instructs specified for indicating the execution of this first terminal
Operation, this assigned operation needs to carry out Information Authentication, and the method for the present embodiment is used in first terminal;
In a step 102, instructed according to this assigned operation, generate graphic code, this graphic code at least carries this first terminal
The user account, this first terminal mark and the instruction of this assigned operation that use, so that second terminal is passed through to scan this graphic code, show
Show information input interface, and obtain the information to be verified of user input, send checking request to server, this checking request carries
This information to be verified, this user account, this first terminal mark and this assigned operation instruct so that whether this server authentication is permitted
Permitted this first terminal and executed this assigned operation.
The display screen that the present embodiment is applied to this first terminal is significantly greater than the display screen of this second terminal, or should
Second terminal is easier to input under the scenes such as character than this first terminal.If this first terminal is intelligent television, this second terminal
For mobile phone.
The method that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction
Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by
In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication
Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal
Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
First terminal receives assigned operation instruction and includes:
This first terminal receives logging request, and this logging request is used for indicating that this first terminal is logged in;Or,
This first terminal receives payment request, and this payment request carries the numbering of order, and is used for indicating this first terminal
This order is paid the bill;Or,
The display request of this first terminal receiving encryption key, the display request of this encryption information carries encryption information mark, and
For indicating that this first terminal shows this encryption information.
Above-mentioned all optional technical schemes, can be using the alternative embodiment arbitrarily combining to form the present invention, and here is no longer
Repeat one by one.
In one embodiment, Fig. 2 is the exemplary process diagram of Information Authentication method, and referring to Fig. 2, methods described includes:
In step 201, receive the checking request that second terminal sends, this checking request carries this second terminal scanning the
The assigned operation that user account, this first terminal mark and this first terminal that the graphic code that one terminal generates obtains receives refers to
Order, and the information to be verified of user input that this second terminal gets, this assigned operation instructs for indicating this first eventually
End execution assigned operation, this assigned operation needs to carry out Information Authentication, and the present embodiment is applied in server;
In step 202., instructed and this information to be verified according to this user account, this assigned operation, verify whether to allow
This first terminal executes this assigned operation.
The method that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction
Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by
In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication
Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal
Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
This server instructs and this information to be verified according to this user account, this assigned operation, verify whether to allow this
One terminal executes this assigned operation and includes:
When this server instructs according to this user account and this assigned operation, when determining that this Information Authentication to be verified is passed through,
Execute this assigned operation;Or,
When this server instructs according to this user account and this assigned operation, determine that this Information Authentication to be verified is not passed through
When, do not allow this first terminal to execute this assigned operation.
When this server instructs according to this user account and this assigned operation, determine that this Information Authentication to be verified is not passed through
When, after not allowing this first terminal to execute this assigned operation, the method also includes:
This server sends authentication failed message to this second terminal so that this second terminal reacquires user input
Information to be verified.
Above-mentioned all optional technical schemes, can be using the alternative embodiment arbitrarily combining to form the present invention, and here is no longer
Repeat one by one.
In one embodiment, Fig. 3 is the exemplary process diagram of Information Authentication method, and referring to Fig. 3, methods described includes:
In step 301, the graphic code that scanning first terminal generates, obtains the user account of this first terminal use, is somebody's turn to do
The assigned operation instruction that first terminal identifies and this first terminal receives, the present embodiment is applied in second terminal;
In step 302, show the information input interface that this user account is instructed based on this assigned operation;
In step 303, obtain the information to be verified of user input;
In step 304, send checking request to server, this checking request carries this information to be verified, this user's account
Number, this first terminal mark and the instruction of this assigned operation be so that whether this server authentication allows this first terminal to execute this refers to
Fixed operation.
The method that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction
Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by
In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication
Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal
Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
The method also includes:
When this second terminal receives the authentication failed message of this server transmission, show this information input interface;
Reacquire the information to be verified of user input.
Above-mentioned all optional technical schemes, can be using the alternative embodiment arbitrarily combining to form the present invention, and here is no longer
Repeat one by one.
In one embodiment, Fig. 4 a is the exemplary process diagram of Information Authentication method, and the interaction agent of the present embodiment is
First terminal, second terminal server, referring to Fig. 4 a, methods described includes:
In step 401, first terminal receives assigned operation instruction, and this assigned operation instructs for indicating this first terminal
Execution assigned operation, this assigned operation needs to carry out Information Authentication;
This first terminal of the present embodiment can be that the giant-screen terminals or intelligent air condition etc. such as intelligent television are difficult to input word
The terminal of symbol, the present embodiment does not limit to this first terminal.
Wherein, this assigned operation instruct for indicate this first terminal execution assigned operation, can be triggered by user or by
This first terminal triggers automatically, and such as user can click on login option triggering logging request, or this first terminal is detecting
User does not trigger any operation in preset duration, when triggering any operation afterwards, automatically triggers this logging request, this enforcement
Example does not limit to this.
It should be noted that the instruction of this assigned operation is not to indicate that this first terminal directly executes this assigned operation
Instruction, but need to carry out the instruction of Information Authentication, that is to say, when this first terminal receives the instruction of this assigned operation, and
This assigned operation can not directly be executed, but need to input information to be verified, row information is entered to this information to be verified by server
Checking, when server authentication is passed through, could execute this assigned operation on this first terminal.As this first terminal receives use
During the logging request at family, can not directly log in, but need the password ability Successful login of user input account.
In the present embodiment, the difference according to the instruction of this assigned operation, this step 401 can include following any one:
(1)This first terminal receives logging request, and this logging request is used for indicating that this first terminal is logged in;
In the present embodiment, the webpage of user's current accessed provides and log in option, when this first terminal detects use
Family to log in option clicking operation when, enter login interface, at this time, it may be necessary to obtain the user account of user input and close
Code, to be logged in.
(2)This first terminal receives payment request, and this payment request carries numbering or the transaction journal number of order, and is used for
Indicate that this first terminal is paid the bill to this order;
In the present embodiment, this order can provide Payment Options, when this first terminal detects user to this pair
During the clicking operation of money option, enter payment interface, at this time, it may be necessary to obtain the payment cipher of user input to carry out to this order
Payment.
As shown in Figure 4 b, so that this first terminal is as intelligent television as a example, use remote control when this first terminal detects user
When device clicks " payment " button, determine that this first terminal receives payment request, this payment request is used for indicating this first end
Pay the bill to current order in end.
(3)The display request of this first terminal receiving encryption key, the display request of this encryption information carries encryption information mark,
And be used for indicating that this first terminal shows this encryption information.
In the present embodiment, the information of encryption can be stored in cloud disk, when this first terminal detect user to plus
During the unlatching operation of confidential information, need to obtain the password of user input, to show this encryption information.
It should be noted that the assigned operation instruction in the present embodiment is not limited to above-mentioned three kinds including, acceptable
For power on request etc., other instruct, and the present embodiment does not limit to this.
In step 402, this first terminal instructs according to this assigned operation, generates graphic code, and this graphic code at least carries
User account, this first terminal mark and the instruction of this assigned operation that this first terminal uses;
Wherein, this graphic code can be bar code, Quick Response Code etc., and this first terminal mark can be the end of this first terminal
End number etc..The present embodiment does not all limit to this.
In the present embodiment, this graphic code carries the user account of this first terminal use, this first terminal mark and is somebody's turn to do
Assigned operation instructs, so that subsequently this server carries out Information Authentication according to this user account and the instruction of this assigned operation, and root
Identify according to this first terminal and determine this first terminal, so that this assigned operation to be executed on this first terminal.
Based on the example of Fig. 4 b, this first terminal, when receiving this payment request, generates graphic code, as illustrated in fig. 4 c.
In step 403, second terminal scans the graphic code of this first terminal generation, obtains the use of this first terminal use
The assigned operation instruction that family account, this first terminal mark and this first terminal receive;
Wherein, this second terminal for the small screen terminal such as mobile phone or panel computer and can be easy to input the terminal of character,
The present embodiment does not limit to this second terminal.
In the present embodiment, the graphic code of this first terminal generation is scanned by this second terminal, can be by this first end
Terminate the assigned operation instruction receiving to transfer in this second terminal, information to be verified to be inputted on this second terminal, just
Carry out Information Authentication in this server follow-up, easy and simple to handle, safe.
In step 404, this second terminal shows the information input interface that this user account is instructed based on this assigned operation;
For different assigned operation instructs, this information input interface is also different, then this step 404 can adopt with
Any one mode lower:
(1)This assigned operation instructs as logging request, then in step 404, this second terminal shows login interface, and this is stepped on
Record interface at least includes user account input field and login password input field;
(2)This assigned operation instructs as payment request, then in step 404, this second terminal display payment interface, this pair
Money interface at least includes payment cipher input field;
Based on the example of Fig. 4 b and Fig. 4 c, this second terminal display payment interface, this payment interface is as shown in figure 4d.
(3)This assigned operation instructs and shows request for encryption information, then in step 404, this second terminal shows password
Inputting interface, this interface for password input at least includes Password Input hurdle.
Additionally, this information input interface can also include this user account, this first terminal mark or this assigned operation
Title of instruction etc., the present embodiment does not limit to the particular content of this information input interface.
In step 405, this second terminal obtains the information to be verified of user input;
In the present embodiment, this information to be verified can be the information of the type such as character, fingerprint, sound, and is referred to according to this
Determine the type difference of the information to be verified needed for operational order, this step 405 can include:
(1)This second terminal obtains the character that user inputs in the input field of this information input interface, and this is inputted
Character as information to be verified;Or,
(2)This second terminal obtains the finger print information that user inputs in this information input interface, and this finger print information is made
For information to be verified;Or,
(3)This second terminal obtains the acoustic information in this information input interface typing for the user, and the sound by this typing
Information is as information to be verified etc..
Certainly, the present embodiment does not limit to the type of this information to be verified and the input mode of this information to be verified.
For example, this information to be verified can be password code, and that is, this second terminal shows on this information input interface and is somebody's turn to do
The random password card coordinate generating of server is so that user can find this mouth according to this password card coordinate in password card
Make the corresponding password code of card coordinate, and input this password code in this information input interface.
In a step 406, this second terminal sends checking request to server, and this checking request carries this letter to be verified
Breath, this user account, this first terminal mark and the instruction of this assigned operation;
In the present embodiment, this server be used for this information to be verified is verified, with determine whether this first
Terminal executes this assigned operation.Wherein, this server can be associated by the website of this first terminal current accessed or software
Service associated by the website of any one of server cluster server or this first terminal current accessed or software
Functional module in device, the present embodiment does not limit to this.
In step 407, when this server receives this checking request, referred to according to this user account and this assigned operation
Order, judges whether this information to be verified is verified, if it is, execution step 408, if not, execution step 409;
In the present embodiment, this user account corresponds to different assigned operation instructions, may arrange different passwords
Information, therefore, this server, when storing the encrypted message of this user account, can store this user account respectively and be based on difference
Assigned operation instruction encrypted message, the such as login password of this this user account of server storage and this user account
Payment cipher etc..
When this server receives this checking request, inquire about this server storage, this user account be based on this specify
The encrypted message of operational order, and this information to be verified and this encrypted message are contrasted, when this information to be verified is close with this
During code information matches, it is verified, when this server determines that this information to be verified is mismatched with this encrypted message, determine input
Information errors to be verified, then verify and do not pass through.
According to the difference of this information type to be verified, the process that this information to be verified and this encrypted message are contrasted
When difference, information as to be verified in this and this encrypted message are character, can be contrasted by Text region, this information to be verified
When being acoustic information with this encrypted message, can carry out contrasting by speech recognition etc., will not be described here.
In a step 408, this server executes this assigned operation, terminates;
In the present embodiment, when this server determines that this Information Authentication to be verified is passed through it is allowed to this first terminal executes
This assigned operation, now, this server can perform this assigned operation.
Wherein, according to this assigned operation instruction difference, this server execute this assigned operation step can adopt with
Any one mode lower:
(1)This assigned operation instructs as logging request, then this first terminal is arranged in based on this use this server
The logging status of family account;
(2)This assigned operation instructs as payment request, then this server is paid the bill to this order;
(3)This assigned operation instructs and shows request for encryption information, then this server shows on this first terminal and should add
Confidential information.
In step 409, this server does not allow this first terminal to execute this assigned operation;
In step 410, this server sends authentication failed message so that this second terminal obtains again to this second terminal
Take the information to be verified of user input.
In the present embodiment, this server can send authentication failed message to this second terminal, notifies this second terminal
Checking is not passed through so that this second terminal, when receiving this authentication failed message, shows this information input interface, again to obtain
Take the information to be verified of user input, or this server can also when the number of times determining authentication failed reaches predetermined threshold value,
Directly close the authority that this first terminal executes this assigned operation.
The method that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction
Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by
In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication
Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal
Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
In one embodiment, Fig. 5 is the exemplary process diagram of Information Authentication method, and referring to Fig. 5, the method includes:
In step 501, receive assigned operation instruction, this assigned operation instructs specified for indicating the execution of this first terminal
Operation, this assigned operation needs to carry out Information Authentication, and the present embodiment is applied in first terminal;
In step 502, send checking request to this server, this checking request carries the user account of this first terminal
Instruct so that this server determines second terminal according to this user account with this assigned operation, send to this second terminal and treat school
Test information request, and when getting the information to be verified of this second terminal transmission, verify whether to allow this first terminal to execute
This assigned operation, this second terminal is logging status and the terminal different from this first terminal being in based on this user account.
The method that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction
Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by
In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication
Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal
Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
In one embodiment, Fig. 6 is the exemplary process diagram of Information Authentication method, and referring to Fig. 6, the method includes:
In step 601, receive the checking request that first terminal sends, this checking request carries the user of this first terminal
The assigned operation instruction that account and this first terminal receive, the present embodiment is applied in server;
In step 602, according to this user account, determine second terminal, this second terminal is to be in based on this user's account
Number logging status and the terminal different from this first terminal;
In step 603, send information request to be verified to this second terminal, this information request to be verified carries this user
Account and the instruction of this assigned operation are so that this second terminal display information inputting interface, and obtain the letter to be verified of user input
Breath, returns to this server;
In step 604, when receiving the information to be verified of this second terminal transmission, according to this user account, this refers to
Determine operational order and this information to be verified, verify whether to allow this first terminal to execute this assigned operation.
The method that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction
Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by
In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication
Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal
Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
According to this user account, the instruction of this assigned operation and this information to be verified, verify whether to allow this first terminal to hold
This assigned operation of row includes:
When this server instructs according to this user account and this assigned operation, when determining that this Information Authentication to be verified is passed through,
Execute this assigned operation;Or,
When this server instructs according to this user account and this assigned operation, determine that this Information Authentication to be verified is not passed through
When, do not allow this first terminal to execute this assigned operation.
When this server instructs according to this user account and this assigned operation, determine that this Information Authentication to be verified is not passed through
When, after not allowing this first terminal to execute this assigned operation, the method also includes:
This server sends authentication failed message to this second terminal so that this second terminal reacquires user input
Information to be verified.
Above-mentioned all optional technical schemes, can be using the alternative embodiment arbitrarily combining to form the present invention, and here is no longer
Repeat one by one.
In one embodiment, Fig. 7 is the exemplary process diagram of Information Authentication method, and the interaction agent of the present embodiment is the
One terminal, second terminal server, referring to Fig. 7, the method includes:
In step 701, first terminal receives assigned operation instruction, and this assigned operation instructs for indicating this first terminal
Execution assigned operation, this assigned operation needs to carry out Information Authentication;
This step 701 with this step 401 in the same manner, will not be described here.
In a step 702, this first terminal sends checking request to this server, and this checking request carries this first terminal
User account and this assigned operation instruct;
In the present embodiment, this server be used for this information to be verified is verified, with determine whether this first
Terminal executes this assigned operation.Wherein, this server can be associated by the website of this first terminal current accessed or software
Service associated by the website of any one of server cluster server or this first terminal current accessed or software
Functional module in device, the present embodiment does not limit to this.
In step 703, when this server receives this checking request, according to this user account, determine second terminal,
This second terminal is logging status and the terminal different from this first terminal being in based on this user account;
In the present embodiment, during each terminal is logged in using user account, this server preserves to log in and is somebody's turn to do
The corresponding terminal iidentification of user account, that is to say that preservation is in the terminal iidentification of the logging status based on this user account.Accordingly
, this step 703 includes:When this server receives this checking request, judge whether this server is preserved to be in and be based on
The logging status of this user account and the terminal iidentification different from this first terminal mark, if it is, this is in based on this use
Terminal belonging to the logging status of family account and the terminal iidentification different from this first terminal is defined as this second terminal, if
No, terminate.
There are multiple logging status being in based on this user account and different from this first terminal when this server determines
Terminal when, terminal minimum for display screen in the plurality of terminal can be defined as this second terminal, or, it will thus provide full keyboard
Terminal be defined as this second terminal.Wherein, this server can be according to the model of each terminal, terminal number in the plurality of terminal
Etc. information, determine the display screen size of each terminal, and then the display screen size according to each terminal, determine the plurality of end
The minimum terminal of display screen in end.
Further, the plurality of terminal can also be all defined as this second terminal by this server, i.e. this server follow-up
Send information request to be verified to each terminal in the plurality of terminal, therefrom select a second terminal to input this by user and treat
Check information.The present embodiment does not limit to how selecting this second terminal.
In step 704, this server sends information request to be verified to this second terminal, and this information request to be verified is taken
This user account and this assigned operation is carried to instruct;
In the present embodiment, this server, after determining this second terminal, sends this information to be verified to this second terminal
Request, to ask this second terminal to obtain this information to be verified it is achieved that receiving this first terminal after assigned operation instruction
Information Inputting Process to be verified transfer to the purpose in this second terminal.
In step 705, when this second terminal receives this information request to be verified, show that this user account is based on and be somebody's turn to do
The information input interface of assigned operation instruction;
In the present embodiment, when this second terminal receives this information request to be verified, obtain this user account and be somebody's turn to do
Assigned operation instructs, and is instructed according to this user account and this assigned operation, shows this information input interface.Wherein, this information
Information input interface in inputting interface and step 404 in the same manner, will not be described here.
In step 706, this second terminal obtains the information to be verified of user input;
This second terminal obtains the process of this information to be verified with this step 405 in the same manner, will not be described here.
In step 707, this information to be verified is sent to this server by this second terminal;
In step 708, when this server receives this information to be verified, according to this user account and this assigned operation
Instruction, judges whether this information to be verified is verified, if it is, execution step 709, if not, execution step 710;
This step 708 with this step 407 in the same manner, will not be described here.
In step 709, this server executes this assigned operation, terminates;
This step 709 with this step 408 in the same manner, will not be described here.
In step 720, this server does not allow this first terminal to execute this assigned operation;
In step 711, this server sends authentication failed message so that this second terminal obtains again to this second terminal
Take the information to be verified of user input.
The method that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction
Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by
In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication
Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal
Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
Fig. 8 is the example arrangement schematic diagram of Information Authentication device, and referring to Fig. 8, this device includes:
Command reception module 801, for receiving assigned operation instruction, this assigned operation instructs and refers to for indicating that local terminal executes
Fixed operation, this assigned operation needs to carry out Information Authentication;
Graphic code generation module 802 is connected with command reception module 801, for instructing according to this assigned operation, generates figure
Shape code, this graphic code at least carries the user account of this local terminal use, this local terminal mark and the instruction of this assigned operation so that second
Terminal is passed through to scan this graphic code, display information inputting interface, and obtains the information to be verified of user input, sends to server
Checking request, this checking request carries this information to be verified, this user account, this local terminal mark and the instruction of this assigned operation, makes
Obtain whether this server authentication allows this local terminal to execute this assigned operation.
This command reception module 801 includes:
First receiving unit, for receiving logging request, this logging request is used for indicating that this local terminal is logged in;Or,
Second receiving unit, receives payment request for this local terminal, this payment request carries the numbering of order, and is used for referring to
Show that this local terminal is paid the bill to this order;Or,
3rd receiving unit, shows request for this local terminal receiving encryption key, and the display request of this encryption information carries and adds
Confidential information identifies, and is used for indicating that this local terminal shows this encryption information.
The device that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction
Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by
In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication
Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal
Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
Fig. 9 is the example arrangement schematic diagram of Information Authentication device, and referring to Fig. 9, this device includes:
Checking request receiver module 901, for receiving the checking request of second terminal transmission, this checking request carry this
User account, this first terminal mark and this first terminal that the graphic code that two terminal scanning first terminals generate obtains receive
Assigned operation instruction, and the information to be verified of user input that this second terminal gets, this assigned operation instructs and is used for
Indicate this first terminal execution assigned operation, this assigned operation needs to carry out Information Authentication;
Authentication module 902 is connected with checking request receiver module 901, for being referred to according to this user account, this assigned operation
Order and this information to be verified, verify whether to allow this first terminal to execute this assigned operation.
This authentication module 902 includes:
First authentication unit, for when instructing according to this user account and this assigned operation, determining that this information to be verified is tested
When card passes through, execute this assigned operation;Or,
Second authentication unit, for when instructing according to this user account and this assigned operation, determining that this information to be verified is tested
When card does not pass through, this first terminal is not allowed to execute this assigned operation.
This device also includes:
Failed message sending module, for this second terminal send authentication failed message so that this second terminal again
Obtain the information to be verified of user input.
The device that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction
Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by
In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication
Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal
Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
Figure 10 is the example arrangement schematic diagram of Information Authentication device, and referring to Figure 10, this device includes:
Graphic code scan module 1001, for scanning the graphic code of first terminal generation, obtains the use of this first terminal
The assigned operation instruction that user account, this first terminal mark and this first terminal receive;
Interface display module 1002 is connected with graphic code scan module 1001, specifies for showing that this user account is based on this
The information input interface of operational order;
Data obtaining module 1003 to be verified is connected with interface display module 1002, for obtaining the to be verified of user input
Information;
Checking request sending module 1004 is connected with data obtaining module 1003 to be verified, for sending checking to server
Request, this checking request carries this information to be verified, this user account, this first terminal mark and the instruction of this assigned operation, makes
Obtain whether this server authentication allows this first terminal to execute this assigned operation.
This device also includes:
Authentication failed module, for when this second terminal receives the authentication failed message that this server sends, showing
This information input interface;
Reacquire module, for reacquiring the information to be verified of user input.
The device that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction
Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by
In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication
Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal
Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
Figure 11 is the example arrangement schematic diagram of Information Authentication device, and referring to Figure 11, this device includes:
Command reception module 1101, for receiving assigned operation instruction, this assigned operation instructs for indicating local terminal execution
Assigned operation, this assigned operation needs to carry out Information Authentication;
Checking request sending module 1102 is connected with command reception module 1101, please for sending checking to this server
Ask, this checking request carries the user account of this local terminal and this assigned operation instructs so that this server is according to this user account
Determine second terminal, send information request to be verified to this second terminal, and get the to be verified of this second terminal transmission
During information, verify whether to allow this local terminal to execute this assigned operation, this second terminal is the login being in based on this user account
State and the terminal different from this local terminal.
The device that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction
Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by
In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication
Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal
Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
Figure 12 is the example arrangement schematic diagram of Information Authentication device, and referring to Figure 12, this device includes:
Checking request receiver module 1201, receive first terminal send checking request, this checking request carry this first
The assigned operation instruction that the user account of terminal and this first terminal receive;
Second terminal determining module 1202 is connected with checking request receiver module 1201, for according to this user account, really
Determine second terminal, this second terminal is logging status and the terminal different from this first terminal being in based on this user account;
Information request sending module 1203 to be verified is connected with second terminal determining module 1202, for this second terminal
Send information request to be verified, this information request to be verified carry this user account and this assigned operation instruction so that this second
Terminal display information inputting interface, and obtain the information to be verified of user input, return to local terminal;
Authentication module 1204 is connected with information request sending module 1203 to be verified, sends out for receiving this second terminal
During the information to be verified sent, according to this user account, the instruction of this assigned operation and this information to be verified, verify whether to allow this
One terminal executes this assigned operation.
This authentication module 1204 includes:
First authentication unit, for when instructing according to this user account and this assigned operation, determining that this information to be verified is tested
When card passes through, execute this assigned operation;Or,
Second authentication unit, for when instructing according to this user account and this assigned operation, determining that this information to be verified is tested
When card does not pass through, this first terminal is not allowed to execute this assigned operation.
This device also includes:
Failed message sending module, for this second terminal send authentication failed message so that this second terminal again
Obtain the information to be verified of user input.
The device that the embodiment of the present disclosure provides, the information to be verified after first terminal is received assigned operation instruction
Input process is transferred in second terminal, can input the information to be verified needed for this first terminal in this second terminal, by
In compared with this first terminal, the process that this second terminal inputs information to be verified is easier, therefore, simplifies Information Authentication
Process, saves the time inputting information to be verified, thus improve the efficiency of Information Authentication, and showing due to this second terminal
Display screen curtain is significantly less than this first terminal, does not easily cause information leakage, improves safety.
It should be noted that:Above-described embodiment provide Information Authentication device in Information Authentication, only with above-mentioned each function
The division of module is illustrated, and in practical application, can distribute above-mentioned functions by different function moulds as desired
Block completes, and the internal structure of terminal unit will be divided into different functional modules, with complete described above all or portion
Divide function.In addition, the Information Authentication device that above-described embodiment provides belongs to same design with Information Authentication embodiment of the method, its tool
Body is realized process and is referred to embodiment of the method, repeats no more here.
Figure 13 is a kind of terminal unit provided in an embodiment of the present invention(Can be requesting party's terminal or associated terminal)
Structural representation.Referring to Figure 13, in above-described embodiment, the step of second terminal execution can structure based on this terminal unit.Excellent
Choosing:
Terminal unit 1300 can include communication unit 110, include one or more computer-readable storage mediums
The memorizer 120 of matter, input block 130, display unit 140, sensor 150, voicefrequency circuit 160, WIFI(Wireless
Fidelity, Wireless Fidelity)Module 170, the processor 180 including or more than one processing core and power supply
190 grade parts.It will be understood by those skilled in the art that the terminal unit structure shown in figure does not constitute the limit to terminal unit
Fixed, ratio can be included and illustrate more or less of part, or combine some parts, or different part arrangements.Wherein:
Communication unit 110 can be used for receiving and sending messages or communication process in, the reception of signal and transmission, this communication unit 110
Can be RF(Radio Frequency, radio frequency)Circuit, router, modem, etc. network communication equipment.Especially, when
When communication unit 110 is RF circuit, after the downlink information of base station is received, transfer at one or more than one processor 180
Reason;In addition, up data is activation will be related to base station.Usually as communication unit RF circuit include but is not limited to antenna,
At least one amplifier, tuner, one or more agitator, subscriber identity module(SIM)Card, transceiver, bonder,
LNA(Low Noise Amplifier, low-noise amplifier), duplexer etc..Additionally, communication unit 110 can also be by wireless
Communication is communicated with network and other equipment.Described radio communication can use arbitrary communication standard or agreement, including but not limited to
GSM(Global System of Mobile communication, global system for mobile communications)、GPRS(General
Packet Radio Service, general packet radio service)、CDMA(Code Division Multiple Access, code
Divide multiple access)、WCDMA(Wideband Code Division Multiple Access, WCDMA)、LTE(Long
Term Evolution, Long Term Evolution), Email, SMS(Short Messaging Service, Short Message Service)Deng.
Memorizer 120 can be used for storing software program and module, and processor 180 passes through to run the software journey being stored in memorizer 120
Sequence and module, thus execute various function application and data processing.Memorizer 120 can mainly include storing program area and deposit
Storage data field, wherein, storing program area can application program needed for storage program area, at least one function(Such as sound is broadcast
Playing function, image player function etc.)Deng;Storage data field can store according to terminal unit 1300 using the data being created
(Such as voice data, phone directory etc.)Deng.Additionally, memorizer 120 can include high-speed random access memory, can also include
Nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-state parts.Phase
Ying Di, memorizer 120 can also include Memory Controller, to provide processor 180 and input block 130 to memorizer 120
Access.
Input block 130 can be used for numeral or the character information of receives input, and produces and user setup and function
Control relevant keyboard, mouse, action bars, optics or trace ball signal input.Preferably, input block 130 may include tactile
Sensitive surfaces 131 and other input equipments 132.Touch sensitive surface 131, also referred to as touch display screen or Trackpad, can collect use
Family is thereon or neighbouring touch operation(Such as user uses any suitable object such as finger, stylus or adnexa in touch-sensitive table
Operation on face 131 or near Touch sensitive surface 131), and corresponding attachment means are driven according to formula set in advance.Optional
, Touch sensitive surface 131 may include touch detecting apparatus and two parts of touch controller.Wherein, touch detecting apparatus detection is used
The touch orientation at family, and detect the signal that touch operation brings, transmit a signal to touch controller;Touch controller is from touch
Receive touch information in detection means, and be converted into contact coordinate, then give processor 180, and can receiving processor 180
The order sent simultaneously is executed.Furthermore, it is possible to using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves
Realize Touch sensitive surface 131.Except Touch sensitive surface 131, input block 130 can also include other input equipments 132.Preferably,
Other input equipments 132 can include but is not limited to physical keyboard, function key(Such as volume control button, switch key etc.)、
One or more of trace ball, mouse, action bars etc..
Display unit 140 can be used for showing by the information of user input or the information and the terminal unit that are supplied to user
1300 various graphical user interface, these graphical user interface can be by figure, text, icon, video and its combination in any
To constitute.Display unit 140 may include display floater 141, optionally, can adopt LCD(Liquid Crystal
Display, liquid crystal display)、OLED(Organic Light-Emitting Diode, Organic Light Emitting Diode)Come etc. form
Configuration display floater 141.Further, Touch sensitive surface 131 can cover display floater 141, when Touch sensitive surface 131 detects at it
On or near touch operation after, send processor 180 to determine the type of touch event, with preprocessor 180 according to touch
The type touching event provides corresponding visual output on display floater 141.Although in fig. 13, Touch sensitive surface 131 and display
Panel 141 is to realize input and input function as two independent parts, but in some embodiments it is possible to will be touch-sensitive
Surface 131 is integrated with display floater 141 and realize input and output function.
Terminal unit 1300 may also include at least one sensor 150, such as optical sensor, motion sensor and other
Sensor.Optical sensor may include ambient light sensor and proximity transducer, and wherein, ambient light sensor can be according to ambient light
The brightness to adjust display floater 141 for the light and shade, proximity transducer can cut out display when terminal unit 1300 moves in one's ear
Panel 141 and/or backlight.As one kind of motion sensor, Gravity accelerometer can detect in all directions(Generally
Three axles)The size of acceleration, can detect that size and the direction of gravity when static, can be used for identifying the application of mobile phone attitude(Than
As horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function(Such as pedometer, percussion)Deng;Extremely
The other sensors such as the gyroscope that can also configure in terminal unit 1300, barometer, drimeter, thermometer, infrared ray sensor,
Will not be described here.
Voicefrequency circuit 160, speaker 161, microphone 162 can provide the audio frequency between user and terminal unit 1300 to connect
Mouthful.The signal of telecommunication after the voice data receiving conversion can be transferred to speaker 161, by speaker 161 by voicefrequency circuit 160
Be converted to acoustical signal output;On the other hand, the acoustical signal of collection is converted to the signal of telecommunication by microphone 162, by voicefrequency circuit
160 receive after be converted to voice data, then after voice data output processor 180 is processed, through RF circuit 110 to be sent to ratio
As another terminal unit, or voice data is exported to memorizer 120 to process further.Voicefrequency circuit 160 is also possible to
Including earphone jack, to provide the communication of peripheral hardware earphone and terminal unit 1300.
In order to realize radio communication, this terminal unit can be configured with wireless communication unit 170, this wireless communication unit
170 can be WIFI module.WIFI belongs to short range wireless transmission technology, and terminal unit 1300 passes through wireless communication unit 170
User can be helped to send and receive e-mail, browse webpage and access streaming video etc., it is mutual that it has provided the user wireless broadband
Internet interview.Although in figure shows wireless communication unit 170, but it is understood that, it is simultaneously not belonging to terminal unit
1300 must be configured into, can omit completely as needed in the scope of essence not changing invention.
Processor 180 is the control centre of terminal unit 1300, each using various interfaces and connection whole mobile phone
Individual part, is stored in software program and/or module in memorizer 120 by running or executing, and calls and be stored in storage
Data in device 120, the various functions of execution terminal unit 1300 and processing data, thus carry out integral monitoring to mobile phone.Can
Choosing, processor 180 may include one or more processing cores;Preferably, processor 180 can integrated application processor and modulation
Demodulation processor, wherein, application processor mainly processes operating system, user interface and application program etc., and modulation /demodulation is processed
Device mainly processes radio communication.It is understood that above-mentioned modem processor can not also be integrated in processor 180.
Terminal unit 1300 also includes the power supply 190 powered to all parts(Such as battery)It is preferred that power supply can lead to
Cross power-supply management system logically contiguous with processor 180, thus by power-supply management system realize management charge, electric discharge and
The functions such as power managed.Power supply 190 can also include one or more direct current or alternating current power supply, recharging system, electricity
The random component such as source failure detector circuit, power supply changeover device or inverter, power supply status indicator.
Although not shown, terminal unit 1300 can also include photographic head, bluetooth module etc., will not be described here.At this
In embodiment, terminal unit also includes memorizer, and one or more than one program, one of or one with
Upper program storage in memorizer, and be configured to by one or more than one computing device one or one with
Upper program bag contains the instruction for carrying out method provided in an embodiment of the present invention.
Figure 14 is a kind of server architecture schematic diagram provided in an embodiment of the present invention.This server 1400 can be because of configuration or property
Can the different and larger difference of producing ratio, one or more central processing units can be included(central processing
Units, CPU)1422(For example, one or more processors)With memorizer 1432, one or more storage applications
The storage medium 1430 of program 1442 or data 1444(Such as one or more mass memory units).Wherein, memorizer
1432 and storage medium 1430 can be of short duration storage or lasting store.The program being stored in storage medium 1430 can include one
Individual or more than one module(Diagram does not mark), each module can include in server series of instructions operation.More enter
One step ground, central processing unit 1422 could be arranged to communicate with storage medium 1430, executes storage medium on server 1400
Series of instructions operation in 1430.
Server 1400 can also include one or more power supplys 1426, one or more wired or wireless nets
Network interface 1450, one or more input/output interfaces 1458, one or more keyboards 1456, and/or, one or
More than one operating system 1441, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM
Etc..
The step performed by server described in above-described embodiment can be based on the server architecture shown in this Figure 14.
Additionally, typically, the terminal unit described in the disclosure can be various hand-held mobile terminals, such as mobile phone, individual number
Word assistant (PDA) etc., the protection domain of the therefore disclosure should not limit as certain certain types of terminal unit.
Additionally, be also implemented as the computer program being executed by CPU according to disclosed method.In this computer journey
When sequence is executed by CPU, the above-mentioned functions of restriction in execution disclosed method.
Additionally, said method step and system unit can also utilize controller and make controller real for storage
The computer readable storage devices of the computer program of existing above-mentioned steps or Elementary Function are realized.
In addition, it should be appreciated that computer readable storage devices (for example, memorizer) as herein described can be volatile
Property memorizer or nonvolatile memory, or volatile memory and nonvolatile memory can be included.As example
Son and nonrestrictive, nonvolatile memory can include read only memory (ROM), programming ROM (PROM), electrically programmable
ROM (EPROM), electrically erasable programmable ROM (EEPROM) or flash memory.Volatile memory can include random access memory
Memorizer (RAM), this RAM can serve as external cache.Nonrestrictive as an example, RAM can be with many
The form of kind obtains, such as synchronous random access memory (DRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate SDRAM
(DDR SDRAM), strengthen SDRAM (ESDRAM), synchronization link DRAM (SLDRAM) and direct RambusRAM (DRRAM).Institute
The storage device of disclosed aspect is intended to the memorizer of including but not limited to these and other suitable type.
Those skilled in the art will also understand is that, in conjunction with the various illustrative logical blocks described by disclosure herein, mould
Block, circuit and algorithm steps may be implemented as electronic hardware, computer software or a combination of both.Hard in order to clearly demonstrate
Part and this interchangeability of software, the function with regard to various exemplary components, square, module, circuit and step it is entered
Go general description.This function is implemented as software and is also implemented as hardware depending on concrete application and applying
Design constraint to whole system.Those skilled in the art can realize described in every way for every kind of concrete application
Function, but this realize decision and should not be interpreted as causing a departure from the scope of the present disclosure.
Can be using being designed in conjunction with the various illustrative logical blocks described by disclosure herein, module and circuit
Execute the following part of function described here to realize or to execute:General processor, digital signal processor (DSP), special collection
Become circuit (ASIC), field programmable gate array (FPGA) or other PLD, discrete gate or transistor logic, divide
Vertical nextport hardware component NextPort or any combinations of these parts.General processor can be microprocessor, but alternatively, processes
Device can be any conventional processors, controller, microcontroller or state machine.Processor can also be implemented as computing device
Combination, for example, the combination of DSP and microprocessor, multi-microprocessor, one or more microprocessors combine DSP core or any
Other this configurations.
Step in conjunction with the method described by disclosure herein or algorithm can be directly contained in hardware, by processor and holds
In the software module of row or in combination of the two.Software module may reside within RAM memory, flash memory, ROM storage
Device, eprom memory, eeprom memory, depositor, hard disk, removable disk, CD-ROM or known in the art any its
In the storage medium of its form.Exemplary storage medium is coupled to processor so that processor can be from this storage medium
Middle reading information or to this storage medium write information.In an alternative, described storage medium can be with processor collection
Become together.Processor and storage medium may reside within ASIC.ASIC may reside within user terminal.Replace at one
In scheme, processor and storage medium can be resident in the user terminal as discrete assembly.
In one or more exemplary design, described function can be real in hardware, software, firmware or its combination in any
Existing.If realized in software, described function can be stored in computer-readable as one or more instructions or code
Transmit on medium or by computer-readable medium.Computer-readable medium includes computer-readable storage medium and communication media,
This communication media includes contributing to computer program is sent to any medium of another position from a position.Storage medium
It can be any usable medium that can be accessed by a general purpose or special purpose computer.Nonrestrictive as an example, this computer
Computer-readable recording medium can include RAM, ROM, EEPROM, CD-ROM or other optical disc memory apparatus, disk storage equipment or other magnetic
Property storage device, or can be used for carrying or required program code that storage form is instruction or data structure and can
Any other medium being accessed by universal or special computer or universal or special processor.Additionally, any connection can
It is properly termed as computer-readable medium.For example, if using coaxial cable, optical fiber cable, twisted-pair feeder, digital subscriber line
(DSL) or the wireless technology of such as infrared ray, radio and microwave to send software from website, server or other remote source,
Then above-mentioned coaxial cable, optical fiber cable, the wireless technology of twisted-pair feeder, the first, radio of DSL or such as infrared and microwave are included in
The definition of medium.As used herein, disk and CD include compact disk (CD), laser disk, CD, digital versatile disc
(DVD) the usual magnetically reproduce data of, floppy disk, Blu-ray disc, wherein disk, and CD utilizes laser optics ground reproduce data.On
The combination stating content should also be as including in the range of computer-readable medium.
Although content disclosed above shows the exemplary embodiment of the disclosure, it should be noted that without departing substantially from power
On the premise of profit requires the scope of the present disclosure limiting, may be many modifications and change.According to described herein open real
Function, step and/or the action of applying the claim to a method of example are not required to execute with any particular order.Although additionally, the disclosure
Element with the description of individual form or can require, it is also contemplated that multiple, unless explicitly limited for odd number.
Above-described specific embodiment, purpose of this disclosure, technical scheme and beneficial effect have been carried out further
Describe in detail, be should be understood that the specific embodiment that the foregoing is only the disclosure, be not used to limit the disclosure
Protection domain, within all spirit in the disclosure and principle, any modification, equivalent substitution and improvement done etc., all should comprise
Within the protection domain of the disclosure.
Claims (22)
1. a kind of Information Authentication method is it is characterised in that methods described includes:
First terminal receives assigned operation instruction, and described assigned operation instructs for indicating described first terminal input letter to be verified
Breath, carries out Information Authentication by server, executes assigned operation when being verified;
Described first terminal instructs according to described assigned operation, generates graphic code, and described graphic code at least carries described first eventually
User account, described first terminal mark and the instruction of described assigned operation that end uses are so that second terminal is described by scanning
Graphic code, display information inputting interface, and obtain the information to be verified of user input, send checking request to described server,
Described checking request carries the information to be verified of described user input, described user account, described first terminal mark and described
Assigned operation instruction is so that whether described server authentication allows described first terminal to execute described assigned operation.
2. method according to claim 1 is it is characterised in that first terminal receives assigned operation instruction inclusion:
Described first terminal receives logging request, and described logging request is used for indicating that described first terminal is logged in;Or,
Described first terminal receives payment request, and described payment request carries the numbering of order, and is used for indicating described first eventually
Pay the bill to described order in end;Or,
Described first terminal receiving encryption key display request, described encryption information display request carries encryption information mark, and
For indicating that described first terminal shows described encryption information.
3. a kind of Information Authentication method is it is characterised in that methods described includes:
Server receives the checking request that second terminal sends, and described checking request carries described second terminal scanning first terminal
The assigned operation that user account, described first terminal mark and the described first terminal that the graphic code generating obtains receives refers to
Order, and the information to be verified of user input that described second terminal gets, described assigned operation instructs described for indicating
First terminal inputs information to be verified, carries out Information Authentication by described server, executes assigned operation when being verified;
Described server instructs and described information to be verified according to described user account, described assigned operation, verifies whether to allow
Described first terminal executes described assigned operation.
4. method according to claim 3 it is characterised in that described server according to described user account, described specify
Operational order and described information to be verified, verify whether that allowing described first terminal to execute described assigned operation includes:
When described server instructs according to described user account and described assigned operation, determine that described Information Authentication to be verified is passed through
When, execute described assigned operation;Or,
When described server instructs according to described user account and described assigned operation, determine that described Information Authentication to be verified is not led to
Out-of-date, do not allow described first terminal to execute described assigned operation.
5. method according to claim 4 is it is characterised in that work as described server according to described user account and described finger
Determine operational order, when determining that described Information Authentication to be verified is not passed through, do not allow described first terminal to execute described assigned operation
Afterwards, methods described also includes:
Described server sends authentication failed message to described second terminal so that described second terminal reacquires user input
Information to be verified.
6. a kind of Information Authentication method is it is characterised in that methods described includes:
Second terminal scans the graphic code that first terminal generates, and obtains user account, described first that described first terminal uses
The assigned operation instruction that terminal iidentification and described first terminal receive, described assigned operation instructs for indicating described first eventually
End inputs information to be verified, carries out Information Authentication by server, executes assigned operation when being verified;
Show the information input interface that described user account is instructed based on described assigned operation;
Obtain the information to be verified of user input;
Send checking request to described server, described checking request carries described information to be verified, described user account, described
First terminal mark and the instruction of described assigned operation are so that whether described server authentication allows described first terminal execution described
Assigned operation.
7. method according to claim 6 is it is characterised in that methods described also includes:
When described second terminal receives the authentication failed message that described server sends, show described information inputting interface;
Reacquire the information to be verified of user input.
8. a kind of Information Authentication method is it is characterised in that methods described includes:
First terminal receives assigned operation instruction, and described assigned operation instructs for indicating described first terminal input letter to be verified
Breath, carries out Information Authentication by server to described information to be verified, and when being verified, described first terminal executes assigned operation;
Described first terminal sends checking request to described server, and described checking request carries user's account of described first terminal
Number and described assigned operation instruct so that described server determines second terminal according to described user account, to described second eventually
End sends information request to be verified, and when getting the information to be verified that described second terminal sends, verifies whether to allow institute
State first terminal and execute described assigned operation, described second terminal be in logging status based on described user account and with
The different terminal of described first terminal.
9. a kind of Information Authentication method is it is characterised in that methods described includes:
Server receive first terminal send checking request, described checking request carry described first terminal user account and
The assigned operation instruction that described first terminal receives, described assigned operation instructs treats school for indicating that described first terminal inputs
Test information, Information Authentication is carried out to described information to be verified by described server, when being verified, described first terminal execution refers to
Fixed operation;
Described server, according to described user account, determines second terminal, and described second terminal is to be in based on described user's account
Number logging status and the terminal different from described first terminal;
Described server sends information request to be verified to described second terminal, and described information request to be verified carries described use
Family account and the instruction of described assigned operation are so that described second terminal display information inputting interface, and obtain treating of user input
Check information, returns to described server;
When described server receives the information to be verified that described second terminal sends, according to described user account, described finger
Determine operational order and described information to be verified, verify whether to allow described first terminal to execute described assigned operation.
10. method according to claim 9 it is characterised in that according to described user account, described assigned operation instruct and
Described information to be verified, verifies whether that allowing described first terminal to execute described assigned operation includes:
When described server instructs according to described user account and described assigned operation, determine that described Information Authentication to be verified is passed through
When, execute described assigned operation;Or,
When described server instructs according to described user account and described assigned operation, determine that described Information Authentication to be verified is not led to
Out-of-date, do not allow described first terminal to execute described assigned operation.
11. methods according to claim 10 are it is characterised in that when described server is according to described user account and described
Assigned operation instructs, and when determining that described Information Authentication to be verified is not passed through, does not allow described first terminal to execute described specified behaviour
After work, methods described also includes:
Described server sends authentication failed message to described second terminal so that described second terminal reacquires user input
Information to be verified.
A kind of 12. Information Authentication devices are it is characterised in that described device includes:
Command reception module, for receiving assigned operation instruction, described assigned operation instructs to be verified for indicating local terminal input
Information, carries out Information Authentication by server to described information to be verified, and when being verified, described local terminal executes assigned operation;
Graphic code generation module, for instructing according to described assigned operation, generates graphic code, described graphic code at least carries described
User account, described local terminal mark and the instruction of described assigned operation that local terminal uses are so that second terminal is passed through to scan described figure
Shape code, display information inputting interface, and obtain the information to be verified of user input, send checking request, institute to described server
State information to be verified, described user account, described local terminal mark and the described specified behaviour that checking request carries described user input
Instruct so that whether described server authentication allows described local terminal to execute described assigned operation.
13. devices according to claim 12 are it is characterised in that described command reception module includes:
First receiving unit, for receiving logging request, described logging request is used for indicating that described local terminal is logged in;Or,
Second receiving unit, receives payment request for described local terminal, described payment request carries the numbering of order, and is used for referring to
Show that described local terminal is paid the bill to described order;Or,
3rd receiving unit, shows request for described local terminal receiving encryption key, and described encryption information display request carries and adds
Confidential information identifies, and is used for indicating that described local terminal shows described encryption information.
A kind of 14. Information Authentication devices are it is characterised in that described device includes:
Checking request receiver module, for receiving the checking request of second terminal transmission, described checking request carries described second
User account, described first terminal mark and described first terminal that the graphic code that terminal scanning first terminal generates obtains receive
The assigned operation instruction arrived, and the information to be verified of user input that described second terminal gets, described assigned operation refers to
Make for indicating described first terminal input information to be verified, Information Authentication is carried out by local terminal, executes when being verified and specify
Operation;
Authentication module, for according to described user account, the instruction of described assigned operation and described information to be verified, verifying whether to permit
Permitted described first terminal and executed described assigned operation.
15. devices according to claim 14 are it is characterised in that described authentication module includes:
First authentication unit, for when according to described user account and the instruction of described assigned operation, determining described information to be verified
When being verified, execute described assigned operation;Or,
Second authentication unit, for when according to described user account and the instruction of described assigned operation, determining described information to be verified
When checking is not passed through, described first terminal is not allowed to execute described assigned operation.
16. devices according to claim 15 are it is characterised in that described device also includes:
Failed message sending module, for described second terminal send authentication failed message so that described second terminal again
Obtain the information to be verified of user input.
A kind of 17. Information Authentication devices are it is characterised in that described device includes:
Graphic code scan module, for scanning the graphic code of first terminal generation, obtains user's account that described first terminal uses
Number, the assigned operation instruction that receives of described first terminal mark and described first terminal, described assigned operation instructs for referring to
Show that described first terminal inputs information to be verified, Information Authentication is carried out by server, execute assigned operation when being verified;
Interface display module, for showing the information input interface that described user account is instructed based on described assigned operation;
Data obtaining module to be verified, for obtaining the information to be verified of user input;
Checking request sending module, for sending checking request to described server, described checking request carries described to be verified
Information, described user account, described first terminal mark and described assigned operation instruct so that whether described server authentication is permitted
Permitted described first terminal and executed described assigned operation.
18. devices according to claim 17 are it is characterised in that described device also includes:
Authentication failed module, for when receiving the authentication failed message that described server sends, display described information inputs
Interface;
Reacquire module, for reacquiring the information to be verified of user input.
A kind of 19. Information Authentication devices are it is characterised in that described device includes:
Command reception module, for receiving assigned operation instruction, described assigned operation instructs to be verified for indicating local terminal input
Information, carries out Information Authentication by server to described information to be verified, and when being verified, described local terminal executes assigned operation;
Checking request sending module, for sending checking request to described server, described checking request carries described local terminal
User account and described assigned operation instruct so that described server determines second terminal according to described user account, to described
Second terminal sends information request to be verified, and when getting the information to be verified that described second terminal sends, verifies whether
Allow described local terminal to execute described assigned operation, described second terminal be in logging status based on described user account and
The terminal different from described local terminal.
A kind of 20. Information Authentication devices are it is characterised in that described device includes:
Checking request receiver module, receives the checking request that first terminal sends, and described checking request carries described first terminal
User account and the assigned operation instruction that receives of described first terminal, described assigned operation instructs for indicating described first
Terminal inputs information to be verified, carries out Information Authentication by local terminal to described information to be verified, when being verified, described first terminal
Execution assigned operation;
Second terminal determining module, for according to described user account, determining second terminal, described second terminal is to be in be based on
The logging status of described user account and the terminal different from described first terminal;
Information request sending module to be verified, for sending information request to be verified, described letter to be verified to described second terminal
Breath request carries described user account and the instruction of described assigned operation so that described second terminal display information inputting interface, and
Obtain the information to be verified of user input, return to described local terminal;
Authentication module, for when receiving the information to be verified that described second terminal sends, according to described user account, described
Assigned operation instruction and described information to be verified, verify whether to allow described first terminal to execute described assigned operation.
21. devices according to claim 20 are it is characterised in that described authentication module includes:
First authentication unit, for when according to described user account and the instruction of described assigned operation, determining described information to be verified
When being verified, execute described assigned operation;Or,
Second authentication unit, for when according to described user account and the instruction of described assigned operation, determining described information to be verified
When checking is not passed through, described first terminal is not allowed to execute described assigned operation.
22. devices according to claim 21 are it is characterised in that described device also includes:
Failed message sending module, for described second terminal send authentication failed message so that described second terminal again
Obtain the information to be verified of user input.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310533351.4A CN103634294B (en) | 2013-10-31 | 2013-10-31 | Information verifying method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310533351.4A CN103634294B (en) | 2013-10-31 | 2013-10-31 | Information verifying method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103634294A CN103634294A (en) | 2014-03-12 |
CN103634294B true CN103634294B (en) | 2017-02-08 |
Family
ID=50214922
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310533351.4A Active CN103634294B (en) | 2013-10-31 | 2013-10-31 | Information verifying method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103634294B (en) |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104954126B (en) * | 2014-03-26 | 2020-01-10 | 腾讯科技(深圳)有限公司 | Sensitive operation verification method, device and system |
CN104967586B (en) * | 2014-05-04 | 2018-02-27 | 腾讯科技(深圳)有限公司 | A kind of user ID authentication method, apparatus and system |
CN104217328A (en) * | 2014-08-12 | 2014-12-17 | 小米科技有限责任公司 | Multi-verification payment method and multi-verification payment device |
IL290691B2 (en) * | 2014-11-06 | 2025-02-01 | Altria Client Services Llc | Methods and products for product tracing and authentication using conductive inks |
CN104484114B (en) * | 2014-11-24 | 2017-05-03 | 腾讯科技(深圳)有限公司 | Data transfer method, mobile terminal and data transfer system |
CN104394230B (en) * | 2014-12-08 | 2018-03-23 | 网易有道信息技术(北京)有限公司 | The method, apparatus and system that a kind of information is presented |
CN104639533B (en) * | 2014-12-30 | 2018-09-04 | 小米科技有限责任公司 | Method of controlling security based on terminal and device |
CN105867317B (en) * | 2015-01-21 | 2019-08-20 | 阿里巴巴集团控股有限公司 | A kind of instruction issuing, method of reseptance, device and smart home system |
CN105989418B (en) * | 2015-02-15 | 2021-04-02 | 中兴通讯股份有限公司 | Method and device for remote reservation of Internet access service |
CN104915579A (en) * | 2015-05-06 | 2015-09-16 | 腾讯科技(深圳)有限公司 | Information processing method and device |
CN107451813B (en) * | 2016-06-01 | 2021-05-18 | 华为终端有限公司 | Payment method, payment device and payment server |
CN105938527B (en) * | 2016-06-02 | 2019-04-12 | 百度在线网络技术(北京)有限公司 | A kind of method and apparatus of account verifying |
CN106161448A (en) * | 2016-07-15 | 2016-11-23 | 珠海格力电器股份有限公司 | Permission control method, device and system for large unit air conditioner |
CN106228364A (en) * | 2016-07-15 | 2016-12-14 | 珠海市魅族科技有限公司 | A kind of information demonstrating method and present device |
CN111615105B (en) | 2016-07-18 | 2023-08-04 | 创新先进技术有限公司 | Information providing and acquiring method, device and terminal |
CN106204027A (en) * | 2016-07-22 | 2016-12-07 | 珠海市魅族科技有限公司 | A kind of method of payment and mobile terminal |
CN106230702B (en) * | 2016-08-29 | 2019-05-10 | 北京小米移动软件有限公司 | Identity information verification method, apparatus and system |
CN106878018B (en) * | 2016-12-30 | 2020-04-07 | 腾讯科技(深圳)有限公司 | Operation verification method and device |
CN107734036B (en) * | 2017-10-19 | 2021-01-19 | 威盛电子股份有限公司 | Communication method and communication system using this method |
CN109672941B (en) * | 2018-12-29 | 2022-03-11 | 深圳Tcl新技术有限公司 | Information input method, television and computer readable storage medium |
CN110321752B (en) * | 2019-06-03 | 2023-07-14 | 创新先进技术有限公司 | Method and device for checking offline graphic codes |
CN110417784B (en) * | 2019-07-30 | 2021-10-12 | 腾讯科技(深圳)有限公司 | Authorization method and device of access control equipment |
CN113777909A (en) * | 2021-09-06 | 2021-12-10 | 珠海格力电器股份有限公司 | Master-slave communication control method, device, storage medium and master-slave communication control system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7043230B1 (en) * | 2003-02-20 | 2006-05-09 | Sprint Spectrum L.P. | Method and system for multi-network authorization and authentication |
CN101523859A (en) * | 2006-10-19 | 2009-09-02 | 高通股份有限公司 | System and method for authenticating remote server access |
CN102842081A (en) * | 2011-06-23 | 2012-12-26 | 上海易悠通信息科技有限公司 | Method for generating two-dimensional code and implementing mobile payment by mobile phone |
CN103020818A (en) * | 2013-01-09 | 2013-04-03 | 重庆新亚盟电子科技有限公司 | Payment system utilizing dynamic two-dimensional verification codes |
CN103248680A (en) * | 2013-04-26 | 2013-08-14 | 北京小米科技有限责任公司 | Method and system for sharing network disk data |
CN103297231A (en) * | 2012-03-01 | 2013-09-11 | 盛大计算机(上海)有限公司 | Identity authentication method and system |
CN103366269A (en) * | 2013-07-05 | 2013-10-23 | 李卓桓 | Fast payment method, equipment and system |
-
2013
- 2013-10-31 CN CN201310533351.4A patent/CN103634294B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7043230B1 (en) * | 2003-02-20 | 2006-05-09 | Sprint Spectrum L.P. | Method and system for multi-network authorization and authentication |
CN101523859A (en) * | 2006-10-19 | 2009-09-02 | 高通股份有限公司 | System and method for authenticating remote server access |
CN102842081A (en) * | 2011-06-23 | 2012-12-26 | 上海易悠通信息科技有限公司 | Method for generating two-dimensional code and implementing mobile payment by mobile phone |
CN103297231A (en) * | 2012-03-01 | 2013-09-11 | 盛大计算机(上海)有限公司 | Identity authentication method and system |
CN103020818A (en) * | 2013-01-09 | 2013-04-03 | 重庆新亚盟电子科技有限公司 | Payment system utilizing dynamic two-dimensional verification codes |
CN103248680A (en) * | 2013-04-26 | 2013-08-14 | 北京小米科技有限责任公司 | Method and system for sharing network disk data |
CN103366269A (en) * | 2013-07-05 | 2013-10-23 | 李卓桓 | Fast payment method, equipment and system |
Also Published As
Publication number | Publication date |
---|---|
CN103634294A (en) | 2014-03-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103634294B (en) | Information verifying method and device | |
CN103634109B (en) | Operation right authentication method and device | |
CN103716793B (en) | Access-in point information sharing method and device | |
CN104468464B (en) | verification method, device and system | |
US9703971B2 (en) | Sensitive operation verification method, terminal device, server, and verification system | |
CN103731810B (en) | access point sharing method and device | |
CN104580167B (en) | A kind of methods, devices and systems transmitting data | |
CN104836664B (en) | A kind of methods, devices and systems executing business processing | |
CN104219050B (en) | Voice print verification method, server, client and system | |
CN103701926A (en) | Method, device and system for obtaining fault reason information | |
CN104902531B (en) | Connect method, application authorization server, terminal and the router of network | |
CN105704123A (en) | Business processing method, device and system | |
CN104852885A (en) | Method, device and system for verifying verification code | |
CN104796385A (en) | Terminal binding method, device and system | |
CN103763112B (en) | A kind of user identity protection method and apparatus | |
CN104519197A (en) | User login method, user login device and terminal devices | |
CN103678502B (en) | Information collection method and device | |
CN105491067A (en) | Key-based business security verification method and device | |
CN106156597A (en) | The implementation method of a kind of identifying code, and device | |
CN106126174A (en) | The control method of a kind of scene audio and electronic equipment | |
CN108234124A (en) | Auth method, device and system | |
CN108090345A (en) | Linux system external command performs method and device | |
CN104573437A (en) | Information authentication method, device and terminal | |
CN104899488B (en) | Numeric value transfer and device | |
CN103824003B (en) | application program protecting method, device and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |