CN103856475A - Method and device for providing verification - Google Patents
Method and device for providing verification Download PDFInfo
- Publication number
- CN103856475A CN103856475A CN201210551657.8A CN201210551657A CN103856475A CN 103856475 A CN103856475 A CN 103856475A CN 201210551657 A CN201210551657 A CN 201210551657A CN 103856475 A CN103856475 A CN 103856475A
- Authority
- CN
- China
- Prior art keywords
- client
- character
- character string
- identifying code
- randomly ordered
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention relates to a method and device for providing verification. Particularly, the method comprises the steps of presenting a group of verification codes at random, generating character sequences comprising the verification codes, ranking the character sequences at random in a preset mode, and judging whether a client terminal is a real user or not according to characters selected by the client terminal. In addition, the embodiment of the invention provides the device corresponding to the method. According to the method and device for providing verification, the problem that when the user browses webpages or browses application programs with a mobile device and verification codes need to be input, user experience is poor is solved, in other words, user operation fluency is improved.
Description
Technical field
The embodiments of the present invention relate generally to computer safety field, and more specifically, the embodiments of the present invention relate to a kind of for the method and apparatus of checking is provided.
Background technology
The description here can comprise those sought concepts, but needs not to be the concept that those had previously been conceived or sought.Therefore, unless separately there is instruction here, otherwise the content of describing in this part is not description in the application and the prior art of claim, and this content is included in this this part and does not mean that and admit that it is prior art.
Network robot refers generally to automatically perform the software program of preplanned mission on the networks such as internet.Many network robots are used to realize malicious intent and/or take too much bandwidth resources, computational resource, and it is very important therefore identifying these network robots and limiting its behavior.Again because many network robots imitate the behavior of human user to a certain extent, so recognition network robot difficulty often.
In prior art, the means of a kind of recognition network robot are identifying codes, for example, show a stringly may and require client to input shown character string through the character string of deformation process, thereby the client that can not correctly identify this character string is identified as robot.But along with spreading unchecked of malice Brute Force technology, the appearance of identifying code is more and more frequent.Although identifying code can ensure the fail safe of application to a certain extent, also greatly reduce user simultaneously and experience.In addition, most identifying codes all needs user for example to utilize keyboard (or keypad) to input at present, therefore expect to provide a kind of can, under the prerequisite of guarantee higher-security, changing the mode of conventional keyboard input validation code into for example click in order by mouse mode and input.
Summary of the invention
In order to address the above problem, in the present context, it is a kind of for the method and apparatus of checking is provided that one of object of the each execution mode of the present invention is to provide.
According to some execution mode of one aspect of the invention, provide a kind of for the method for checking is provided, for example can comprise: present at random one group of identifying code; The character string that generation comprises described identifying code; By predetermined way by randomly ordered described character string; And the character of selecting according to client judges whether described client is real user.
Some execution mode according to a further aspect of the invention, provides a kind of for the equipment of checking is provided, for example, can comprise: present device, be configured for and present at random one group of identifying code; Generating apparatus, is configured for and generates the character string that comprises described identifying code; Collator, is configured for by predetermined way randomly ordered described character string; And judgment means, be configured for the character of selecting according to client and judge whether described client is real user.
The exemplary solution that exemplary embodiment of the invention provides at least can be brought following significant technique effect: the situation that all needs user for example to utilize keyboard (or keypad) to input for the current overwhelming majority's identifying code, exemplary embodiment of the invention can, under the prerequisite of guarantee higher-security, change the mode of conventional keyboard input validation code into for example click in order by mouse mode and input.Particularly, solved user at browsing page, use mobile device to carry out application program while browsing, in the time needing input validation code, user experiences poor problem,, has improved the fluency of user's operation that is.
Brief description of the drawings
Read detailed description below by reference to accompanying drawing, above-mentioned and other objects of exemplary embodiment of the invention, feature and advantage will become easy to understand.In the accompanying drawings, show some execution modes of the present invention in exemplary and nonrestrictive mode, wherein:
Fig. 1 has schematically shown the applied environment according to exemplary embodiment of the invention;
Fig. 2 schematically shown according to exemplary embodiment of the invention, for the method flow diagram of checking is provided;
Fig. 3 schematically shown according to exemplary embodiment of the invention, for the equipment block diagram of checking is provided; And
Fig. 4 has schematically shown and will from exemplary embodiment of the invention, be benefited and can be the block diagram of the computing equipment of exemplary embodiment of the invention exemplary device.
In the accompanying drawings, identical or corresponding label represents identical or corresponding part.
Embodiment
With reference to some illustrative embodiments, principle of the present invention and spirit are described herein.Should be appreciated that providing these execution modes is only used to make those skilled in the art can understand better and then realize the present invention, and not limit the scope of the invention by any way.
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described.
First with reference to figure 1, wherein Fig. 1 shows the system 10 that can use therein according to the embodiments of the present invention, comprises multiple communication equipments that can communicate by network.System 10 can comprise the combination in any of wired or wireless network, and wherein these networks include but not limited to one or more ad hoc networks between mobile telephone network, WLAN (wireless local area network) (LAN), Bluetooth personal local area network, ethernet lan, token LAN, wide area network, internet, communication equipment etc.System 10 can comprise wire communication facility and Wireless Telecom Equipment.
For example, system 10 shown in Fig. 1 comprises mobile telephone network 11 and Internet 28.The connection of leading to Internet 28 can include but not limited to that long distance wireless connects, short-distance radio connects, and various wired connection, and wired connection includes but not limited to telephone wire, cable line, power line etc.
The exemplary communication device of system 10 can include but not limited to mobile phone 12, composite type PDA and mobile phone 14, PDA 16, integrated message transmission equipment (IMD) 18, desktop computer 20, and notebook 22.Communication equipment can be fix or in the time being carried by the people in advancing, be mobile.Some or all in communication equipment can be called out and message by wireless connections 25 sending and receivings that lead to base station 24, and communicate with service provider by the wireless connections 25 of leading to base station 24.Base station 24 can be connected to the webserver 26, and this webserver 26 is supported the communication between mobile telephone network 11 and Internet 28.System 10 can comprise additional communication equipment and dissimilar communication equipment.Communication equipment is direct communication each other.
Should be appreciated that base station 24 is only the representative for the network access equipment of wireless access, the present invention is unrestricted in this regard.According to some other illustrative embodiments of the present invention, can substitute base station 24 by WiFi access point.In addition, it should also be understood that, communication equipment can use various transmission technologys to communicate, include but not limited to code division multiple access (CDMA), global system for mobile communications (GSM), universal mobile telecommunications system (UMTS), time division multiple access (TDMA), frequency division multiple access (FDMA), transmission control protocol/Internet Protocol (TCP/IP), short messaging service (SMS), multimedia information transferring service (MMS), Email, instant message transferring service (IMS), bluetooth, IEEE 802.11 etc.Communication equipment can use various media to communicate, and includes but not limited to, wireless, infrared, laser, cable connection etc.
Below in conjunction with the application scenarios of Fig. 1, be described with reference to Figure 2 according to exemplary embodiment of the invention, for the method for checking is provided.
It will be appreciated that, in the following description, using desktop computer 20 (any one mobile device 22,14,12,18 or 16 in Fig. 1 all can), as the exemplary representative (hereinafter referred to as client 20) of client, by network access equipment, (any one network access equipment 24 in Fig. 1 all can for it; For example, base station 24 or WiFi access point 25) enter the Internet 28; And using the webserver 26 for example, as the server (hereinafter referred to as the webserver 26) of website (, social network sites) that service is provided.
As shown in Figure 2, according to each illustrative embodiments of the present invention, method 200 for example can comprise and presents at random one group of identifying code (S201).
In an illustrative embodiments, described identifying code is provided by service provider.Specific to Fig. 1, user visits by client 20 service being positioned on the webserver 26 conventionally.For example, because the service on some webserver 26 (relates to privacy of user, user's Real Name, home address, contact method etc.), therefore need to provide identifying code to verify that whether described client 20 is that real user is to improve fail safe by service provider (, the webserver 26).Wherein, described identifying code can be but be not limited to: numeral, letter, Chinese character, picture, symbol, color etc.
Further, the method 200 for example can comprise the character string (S202) that generation comprises described identifying code.
In an illustrative embodiments, generate the character string that comprises described identifying code and be included in the random character that adds predetermined number on the basis of described identifying code.Specific to Fig. 1, the webserver 26, in providing one group of identifying code to client 20, also provides one group of character string that provided identifying code is provided to client 20, has wherein added at random the character of predetermined number.And described predetermined number is to be set in advance by equipment according to level of security or by user-defined number.The character that it will be understood by those skilled in the art that described predetermined number can be 3 to 5 characters.Wherein said character and identifying code are similar, can be but be not limited to: numeral, letter, Chinese character, picture, symbol, color etc.
Further, the method 200 for example can comprise by predetermined way randomly ordered described character string (S203).
In an illustrative embodiments, by predetermined way, on the one-dimensional space carried out randomly ordered by described character string randomly ordered described character string comprising.It will be understood by those skilled in the art that and can utilize one-dimension array that described character string is carried out randomly ordered in the one-dimensional space., offer client 20 with the form of character string.
In an illustrative embodiments, by predetermined way, on two-dimensional space carried out randomly ordered by described character string randomly ordered described character string comprising.It will be understood by those skilled in the art that and can utilize two-dimensional array that described character string is carried out randomly ordered on two-dimensional space., offer client 20 with the form of character matrix.
In an illustrative embodiments, by predetermined way, on three dimensions carried out randomly ordered by described character string randomly ordered described character string comprising.It will be understood by those skilled in the art that and can utilize three-dimensional array that described character string is carried out randomly ordered on three dimensions., offer client 20 with the cubical form of character.
Further, the method 200 for example can comprise that the character of selecting according to client 20 judges whether described client 20 is real user (S204).
In an illustrative embodiments, the character of selecting according to client 20 judges whether described client 20 is that real user comprises: if the character that client 20 is selected is described identifying code, judge that described client 20 is real users.Particularly, client 20 for example can utilize mouse that the identifying code in provided character string is provided in order, for example, if the identifying code of clicking is in order identical (with the current identifying code providing together, can comprise order, the capital and small letter etc. of character), judge that described client 20 is real users.Alternatively or additionally, if client 20 has correctly been clicked the position of the described content of identifying code or identifying code, judge that described client 20 is real users.For example, identifying code is: red blue green, and the character string providing is seven kinds of colors including redness, blueness, green, if therefore client 20 can correctly be clicked redness, blueness and green these three colors, judge that described client 20 is real users.Again for example, the character string providing is a character matrix, can present certain figure (for example, " Z " font), thereby judge that described client 20 is real users in the time of the client 20 correct identifying code of clicking wherein.It will be appreciated by those skilled in the art that mentioned above is that the present invention can also realize by other means for exemplary illustration the embodiments of the present invention.
In an illustrative embodiments, the character of selecting according to client 20 judges whether described client 20 is that real user comprises: if the character that client 20 is selected is not described identifying code, re-start above-mentioned steps S201, S202, S203 and S204, and if the character that described client 20 is selected in pre-determined number is not all described identifying code, judge that described client 20 is not real user.Specific to Fig. 1, when the character of selecting when client 20 is not described identifying code, the webserver 26 can prompting authentication errors, and again send new identifying code and comprise the new character string of described new identifying code to client 20.And described pre-determined number is to be set in advance by equipment according to level of security or by user-defined number.It will be understood by those skilled in the art that described pre-determined number can be 3 times.
It will be understood by those skilled in the art that mode mentioned above is that the exemplary of described ad hoc fashion is not limited in this for example, described ad hoc fashion can also be other modes.
Below with reference to Fig. 3, its show according to exemplary embodiment of the invention, for the schematic block diagram of equipment 300 of checking is provided.Equipment 300 for example can comprise: present device, be configured for and present at random one group of identifying code; Generating apparatus, is configured for and generates the character string that comprises described identifying code; Collator, is configured for by predetermined way randomly ordered described character string; And judgment means, be configured for the character of selecting according to client 20 and judge whether described client 20 is real user.
In an illustrative embodiments, generate the character string that comprises described identifying code and be included in the random character that adds predetermined number on the basis of described identifying code.
In an illustrative embodiments, described predetermined number is to be set in advance by equipment according to level of security or by user-defined number.
In an illustrative embodiments, by predetermined way, on the one-dimensional space carried out randomly ordered by described character string randomly ordered described character string comprising.
In an illustrative embodiments, by predetermined way, on two-dimensional space carried out randomly ordered by described character string randomly ordered described character string comprising.
In an illustrative embodiments, by predetermined way, on three dimensions carried out randomly ordered by described character string randomly ordered described character string comprising.
In an illustrative embodiments, the character of selecting according to client 20 judges whether described client 20 is that real user comprises: if the character that client 20 is selected is described identifying code, judge that described client 20 is real users.
In an illustrative embodiments, the character of selecting according to client 20 judges whether described client 20 is that real user comprises: if the character that client 20 is selected is not described identifying code, re-start above-mentioned steps S201, S202, S203 and S204, and if the character that described client 20 is selected in pre-determined number is not all described identifying code, judge that described client 20 is not real user.
In an illustrative embodiments, described pre-determined number is to be set in advance by equipment according to level of security or by user-defined number.
In an illustrative embodiments, described character for example can comprise with lower one or more: numeral, letter, Chinese character, picture, symbol, color etc.
For clarity, the sub-device that also not shown each device comprises in Fig. 3.But, should be appreciated that the device of recording in equipment 300 is corresponding with the step in the method 200 of describing with reference to figure 2 respectively.Thus, the operation of above describing for the method 200 of Fig. 2 and feature are equally applicable to equipment 300 and the device wherein comprising and sub-device, do not repeat them here.
Should be appreciated that equipment 300 can utilize variety of way to realize.For example, in some embodiments, equipment 300 can utilize software and/or firmware module to realize.In addition, equipment 300 also can utilize hardware module to realize.For example, equipment 300 can be implemented as integrated circuit (IC) chip or application-specific integrated circuit (ASIC) (ASIC).Equipment 300 also can be implemented as SOC (system on a chip) (SOC).In addition, equipment 300 also can utilize the combination of hardware module and software and/or firmware module to realize.Other modes known or exploitation in the future are also feasible now, and scope of the present invention is unrestricted in this regard.
Below, describe and can realize computer equipment of the present invention with reference to Fig. 4.Fig. 4 has schematically shown the block diagram that can realize computing equipment according to the embodiment of the present invention.
Computer system shown in Fig. 4 comprises CPU (CPU) 401, RAM (random access memory) 402, ROM (read-only memory) 403, system bus 404, hard disk controller 405, keyboard controller 406, serial interface controller 407, parallel interface controller 408, display controller 409, hard disk 410, keyboard 411, serial external equipment 412, parallel external equipment 413 and display 414.In these parts, what be connected with system bus 404 has CPU 401, RAM 402, ROM 403, hard disk controller 405, keyboard controller 406, serial interface controller 407, parallel interface controller 408 and a display controller 409.Hard disk 410 is connected with hard disk controller 405, keyboard 411 is connected with keyboard controller 406, serial external equipment 412 is connected with serial interface controller 407, and parallel external equipment 413 is connected with parallel interface controller 408, and display 414 is connected with display controller 409.
Block diagram described in Fig. 4 illustrates just to the object of example, is not limitation of the present invention.In some cases, can add as required or reduce some equipment wherein.
Embodiments of the present invention can realize by the combination of hardware, software or software and hardware.Hardware components can utilize special logic to realize; Software section can be stored in memory, and by suitable instruction execution system, for example microprocessor or special designs hardware are carried out.Those having ordinary skill in the art will appreciate that above-mentioned equipment and method can and/or be included in processor control routine with computer executable instructions realizes, for example, at the mounting medium such as disk, CD or DVD-ROM, provide such code on such as the programmable memory of read-only memory (firmware) or the data medium such as optics or electronic signal carrier.Equipment of the present invention and module thereof can be by such as very lagre scale integrated circuit (VLSIC) or gate array, realize such as the semiconductor of logic chip, transistor etc. or such as the hardware circuit of the programmable hardware device of field programmable gate array, programmable logic device etc., also can use the software of being carried out by various types of processors to realize, also can be realized by for example firmware of the combination of above-mentioned hardware circuit and software.
Although it should be noted that some devices or the sub-device of having mentioned subscriber equipment in above-detailed, this division is only not enforceable.In fact, according to the embodiment of the present invention, the feature of above-described two or more devices and function can be specialized in a device.Otherwise, the feature of an above-described device and function can Further Division for to be specialized by multiple devices.
In addition, although described in the accompanying drawings the operation of the inventive method with particular order,, this not requires or hint must be carried out these operations according to this particular order, or the operation shown in must carrying out all could realize the result of expecting.On the contrary, the step of describing in flow chart can change execution sequence.Additionally or alternatively, can omit some step, multiple steps be merged into a step and carry out, and/or a step is decomposed into multiple steps carries out.
Although described the present invention with reference to some embodiments, should be appreciated that, the present invention is not limited to disclosed embodiment.The present invention is intended to contain interior included various amendments and the equivalent arrangements of spirit and scope of claims.The scope of claims meets the most wide in range explanation, thereby comprises all such amendments and equivalent structure and function.
Claims (20)
1. for a method for checking is provided, comprising:
Present at random one group of identifying code;
The character string that generation comprises described identifying code;
By predetermined way by randomly ordered described character string; And
The character of selecting according to client judges whether described client is real user.
2. method according to claim 1, wherein generates the character string that comprises described identifying code and is included in the random character that adds predetermined number on the basis of described identifying code.
3. method according to claim 2, wherein said predetermined number is to be set in advance by equipment according to level of security or by user-defined number.
4. method according to claim 1, wherein on the one-dimensional space carries out randomly ordered by randomly ordered described character string comprising by described character string by predetermined way.
5. method according to claim 1, wherein on two-dimensional space carries out randomly ordered by randomly ordered described character string comprising by described character string by predetermined way.
6. method according to claim 1, wherein on three dimensions carries out randomly ordered by randomly ordered described character string comprising by described character string by predetermined way.
7. method according to claim 1, the character of selecting according to client judges whether described client is that real user comprises: if the character that client is selected is described identifying code, judge that described client is real user.
8. method according to claim 1, the character of selecting according to client judges whether described client is that real user comprises: if the character that client is selected is not described identifying code, re-start step claimed in claim 1, and if the character that described client is selected in pre-determined number is not all described identifying code, judge that described client is not real user.
9. method according to claim 8, wherein said pre-determined number is to be set in advance by equipment according to level of security or by user-defined number.
10. according to the method described in claim 1 to 9, wherein said character is with lower one or more: numeral, letter, Chinese character, picture, symbol, color.
11. 1 kinds for providing the equipment of checking, comprising:
Present device, be configured for and present at random one group of identifying code;
Generating apparatus, is configured for and generates the character string that comprises described identifying code;
Collator, is configured for by predetermined way randomly ordered described character string; And
Judgment means, is configured for the character of selecting according to client and judges whether described client is real user.
12. equipment according to claim 11, wherein generate the character string that comprises described identifying code and are included in the random character that adds predetermined number on the basis of described identifying code.
13. equipment according to claim 12, wherein said predetermined number is to be set in advance by equipment according to level of security or by user-defined number.
14. equipment according to claim 11, wherein on the one-dimensional space carry out randomly ordered by randomly ordered described character string comprising by described character string by predetermined way.
15. equipment according to claim 11, wherein on two-dimensional space carry out randomly ordered by randomly ordered described character string comprising by described character string by predetermined way.
16. methods according to claim 11, wherein on three dimensions carry out randomly ordered by randomly ordered described character string comprising by described character string by predetermined way.
17. equipment according to claim 11, the character of selecting according to client judges whether described client is that real user comprises: if the character that client is selected is described identifying code, judge that described client is real user.
18. equipment according to claim 11, the character of selecting according to client judges whether described client is that real user comprises: if the character that client is selected is not described identifying code, re-start the step described in claim 11, and if the character that described client is selected in pre-determined number is not all described identifying code, judge that described client is not real user.
19. equipment according to claim 18, wherein said pre-determined number is to be set in advance by equipment according to level of security or by user-defined number.
20. according to claim 11 to the equipment described in 19, and wherein said character is with lower one or more: numeral, letter, Chinese character, picture, symbol, color.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210551657.8A CN103856475A (en) | 2012-11-29 | 2012-11-29 | Method and device for providing verification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210551657.8A CN103856475A (en) | 2012-11-29 | 2012-11-29 | Method and device for providing verification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103856475A true CN103856475A (en) | 2014-06-11 |
Family
ID=50863693
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210551657.8A Pending CN103856475A (en) | 2012-11-29 | 2012-11-29 | Method and device for providing verification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103856475A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105245489A (en) * | 2014-07-09 | 2016-01-13 | 腾讯科技(深圳)有限公司 | Verification method and verification device |
CN105491010A (en) * | 2015-11-19 | 2016-04-13 | 上海携程商务有限公司 | Cross validation method and system for verification codes |
CN106529269A (en) * | 2016-12-01 | 2017-03-22 | 微梦创科网络科技(中国)有限公司 | Security verification method and system |
CN106778194A (en) * | 2016-11-16 | 2017-05-31 | 广东欧珀移动通信有限公司 | Verification method, device and electronic equipment |
CN108229127A (en) * | 2016-12-21 | 2018-06-29 | 英业达科技有限公司 | Verification data are generated in advance to distinguish the system and method for client |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101261669A (en) * | 2007-03-09 | 2008-09-10 | 吴天际 | A method for visual validation system based on mouse operation |
US20090235327A1 (en) * | 2008-03-11 | 2009-09-17 | Palo Alto Research Center Incorporated | Selectable captchas |
CN102143161A (en) * | 2011-01-21 | 2011-08-03 | 杭州乐港科技有限公司 | Web game cheating program recognition method based on handwritten character pictures |
US20120023549A1 (en) * | 2010-07-23 | 2012-01-26 | Academia Sinica | CAPTCHA AND reCAPTCHA WITH SINOGRAPHS |
-
2012
- 2012-11-29 CN CN201210551657.8A patent/CN103856475A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101261669A (en) * | 2007-03-09 | 2008-09-10 | 吴天际 | A method for visual validation system based on mouse operation |
US20090235327A1 (en) * | 2008-03-11 | 2009-09-17 | Palo Alto Research Center Incorporated | Selectable captchas |
US20120023549A1 (en) * | 2010-07-23 | 2012-01-26 | Academia Sinica | CAPTCHA AND reCAPTCHA WITH SINOGRAPHS |
CN102143161A (en) * | 2011-01-21 | 2011-08-03 | 杭州乐港科技有限公司 | Web game cheating program recognition method based on handwritten character pictures |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105245489A (en) * | 2014-07-09 | 2016-01-13 | 腾讯科技(深圳)有限公司 | Verification method and verification device |
CN105245489B (en) * | 2014-07-09 | 2020-06-26 | 腾讯科技(深圳)有限公司 | Verification method and device |
CN105491010A (en) * | 2015-11-19 | 2016-04-13 | 上海携程商务有限公司 | Cross validation method and system for verification codes |
CN106778194A (en) * | 2016-11-16 | 2017-05-31 | 广东欧珀移动通信有限公司 | Verification method, device and electronic equipment |
CN106529269A (en) * | 2016-12-01 | 2017-03-22 | 微梦创科网络科技(中国)有限公司 | Security verification method and system |
CN108229127A (en) * | 2016-12-21 | 2018-06-29 | 英业达科技有限公司 | Verification data are generated in advance to distinguish the system and method for client |
CN108229127B (en) * | 2016-12-21 | 2021-08-17 | 英业达科技有限公司 | System and method for generating authentication data in advance to distinguish clients |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10831802B2 (en) | Techniques to respond to user requests using natural-language machine learning based on example conversations | |
CN103037538B (en) | Data transmission method and mobile terminal | |
CN106656944B (en) | Method and device for sliding verification of handheld mobile equipment | |
US20160210632A1 (en) | Secured payment method and relevant device and system | |
US20130179773A1 (en) | Method for online editing and publishing and device thereof | |
CN103856475A (en) | Method and device for providing verification | |
CN104615414B (en) | A kind of channel packet method for customizing and device | |
CN104618488A (en) | Information processing method, client side and server | |
CN105721462A (en) | Information pushing method and device | |
CN103547342A (en) | Information sending method, information reading and notifying method, information receiving method and device | |
CN105516246A (en) | Method for preventing application program downloading hijacking and server | |
CN109344345A (en) | Data access system and access method, terminal and storage medium based on block chain | |
CN104601582A (en) | File transfer method, device and system | |
US8620315B1 (en) | Multi-tiered anti-abuse registration for a mobile device user | |
CN105141632A (en) | Method and device used for checking pages | |
CN106605231A (en) | Accounts control | |
CN104052757A (en) | Identity recognition system and method based on client-side application in mobile phone | |
CN103092638A (en) | Method and device for propagating mobile application software | |
CN103873251A (en) | Method and equipment for establishing connection by audio frequency | |
US10530592B2 (en) | Method and apparatus for sharing browser contents | |
CN107294704A (en) | The generation method of password, the execution method of password and terminal | |
CN103853421A (en) | Method and equipment for character and picture mixed input | |
US20150281212A1 (en) | Method for providing confidential data-based login service | |
CN104598782A (en) | Data packaging and analysis method and device | |
CN103516720A (en) | Method and device for logging in target application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140611 |