CN104580117B - Auth method, apparatus and system - Google Patents
Auth method, apparatus and system Download PDFInfo
- Publication number
- CN104580117B CN104580117B CN201310515705.2A CN201310515705A CN104580117B CN 104580117 B CN104580117 B CN 104580117B CN 201310515705 A CN201310515705 A CN 201310515705A CN 104580117 B CN104580117 B CN 104580117B
- Authority
- CN
- China
- Prior art keywords
- terminal
- confirmation information
- validation confirmation
- verified
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Abstract
The invention discloses auth method, apparatus and system, method therein includes:Server receives the authentication request that first terminal is sent;According to the authentication request, verification code information to be verified and preset validation confirmation information are generated, and verification code information to be verified is sent to the first terminal and is shown;According to the authentication request, the second terminal mutually bound to the account number with the first terminal sends validation confirmation information acquisition request, and the validation confirmation information acquisition request is corresponding with the authentication request;The validation confirmation information of the second terminal acquisition is received, and the validation confirmation information is verified, is verified result;And the verification result is returned into the first terminal.The present invention can solve the problems, such as existing image authentication code from multiple angles, enhance the safety of subscriber authentication.
Description
Technical field
The present invention relates to a kind of Internet technical field more particularly to a kind of internet security technical fields, and in particular to
A kind of auth method, apparatus and system.
Background technology
With becoming increasingly popular for computer and computer network, internet has been deep into people's work, studying and living
Every field.The development of network also brings various challenges while providing convenient for people.Some can utilize robot
Program is improper in large quantities to use Internet resources, such as mass-sending spam etc., and server efficiency is made to be greatly lowered.Also someone utilizes
Program constantly sends out service request response, carries out " saturation attack " to achieve the purpose that make servers go down.Even somebody tastes
Examination the means such as cracks using sudden huge profits and carries out the behaviors such as malice decryption.To avoid above-mentioned malicious act, design is a set of to be allowed
The automatic resolution information of computer is the tool from reasonable user or the improper robot program used, is just seemed very heavy
It wants.
The use of image authentication code is now more current mode, the main purpose of image authentication code is to differentiate network service
User is program or the mankind.Image authentication code is the picture containing character string, and in verification, terminal shows the picture, and requires
User inputs the content of character string in picture in the terminal.Character string is usually made of upper and lower case letter and number, is partly tested
It includes Chinese character or mathematical formulae to demonstrate,prove code, and the length of character string can be random or fixed.In order to avoid by machine automatic identification,
Disturbing factor would generally be increased, such as increase various textured patterns, character is distorted etc., to machine automatic identification into
Row interference.
However, it is exactly to do technical antagonism on the basis of image analysis to crack image authentication code, compare with mutually, this disappears that
It is long.The problem of causing the setting of disturbing factor needed for image authentication code generation just to be difficult to balance as one in this way.If interference
Factor is done fairly simple, is visually easily identified, but the scanner recognition identifying code used in hacker is just very easy to, anti-to crack
Energy force difference, safety are not high enough.See clearly if more complicated such user that disturbing factor is done is again more difficult, influences authentication
Efficiency.Moreover, now socially there is the stamp worker (abbreviation code work) of occupation, hacker specially asks yard work to identify
Identifying code so that image authentication code loses original effect.Therefore it provides a kind of auth method of safety and reliability is
The present technical issues that need to address.
Invention content
A kind of auth method of offer of the embodiment of the present invention, apparatus and system can solve existing figure from multiple angles
As the problem of identifying code, the safety of subscriber authentication is enhanced.
An embodiment of the present invention provides a kind of auth methods, it may include:Server receives the body that first terminal is sent
Part checking request;According to the authentication request, verification code information to be verified and preset validation confirmation information are generated, and
Verification code information to be verified is sent to the first terminal to be shown;According to the authentication request, to it is described
The second terminal that the account number of first terminal is mutually bound sends validation confirmation information acquisition request;Receive the second terminal acquisition
Validation confirmation information, and the validation confirmation information that the second terminal acquires is carried out according to the preset validation confirmation information
Verification, is verified result;And the verification result is returned into the first terminal.
An embodiment of the present invention provides another auth methods, it may include:First terminal sends authentication request
To server;The server generates verification code information to be verified and preset verification is true according to the authentication request
Recognize information, verification code information to be verified be sent to the first terminal, and according to the authentication request to it is described
The second terminal that the account number of first terminal is mutually bound sends validation confirmation information acquisition request;The first terminal will be described to be tested
The verification code information of card shows user;After the second terminal receives validation confirmation information acquisition request, acquisition by
The validation confirmation information for the verification code information input that user is shown according to the first terminal, and the collected verification of institute is true
Recognize information and is sent to the server;The server acquires the second terminal according to the preset validation confirmation information
To validation confirmation information verified, be verified as a result, and the verification result is returned to the first terminal.
An embodiment of the present invention provides a kind of authentication means, can run on server comprising:Checking request receives
Module, the authentication request for receiving first terminal transmission;Validation confirmation information sending module, for according to the identity
Checking request generates verification code information to be verified and preset validation confirmation information, and verification code information to be verified is sent out
The first terminal is given to be shown;Request sending module is acquired, for according to the authentication request, to described the
The second terminal that the account number of one terminal is mutually bound sends validation confirmation information acquisition request;Answer receives authentication module, for connecing
The validation confirmation information of the second terminal acquisition is received, and the second terminal is adopted according to the preset validation confirmation information
The validation confirmation information of collection is verified, and result is verified;And verification result sending module, it is used for the verification result
Return to the first terminal.
An embodiment of the present invention provides a kind of authentication systems, it may include:First terminal, the account with the first terminal
Number second terminal mutually bound and server.The first terminal is for sending authentication request to the server;Institute
Server is stated to be used to, according to the authentication request, generate verification code information to be verified and preset validation confirmation information,
Verification code information to be verified is sent to the first terminal to be shown, and according to the authentication request and to described
Second terminal sends validation confirmation information acquisition request;The first terminal is additionally operable to the verification code information exhibition to be verified
Show to user;After the second terminal is for receiving the validation confirmation information acquisition request, acquisition is by user according to described
The validation confirmation information for the verification code information input that first terminal is shown, and the collected validation confirmation information of institute is sent to
The server;The server is additionally operable to test according to the preset validation confirmation information is collected to the second terminal
Card confirmation message is verified, and is verified as a result, and the verification result is returned to the first terminal.
An embodiment of the present invention provides a kind of computer storage media, the computer storage media has program stored therein, should
Program includes all or part of step of the above method when executing.
The embodiment of the present invention has the advantages that:
Authentication is carried out with line under type on bonding wire, is sent to verification code information with line upper type using server
Validation confirmation information acquisition request is sent to second terminal by first terminal, then lower acquisition verification confirms online by second terminal
Information finally verifies validation confirmation information by server, since validation confirmation information is by user according to first terminal
What the verification code information of displaying judged to obtain, machine can be effectively prevent to crack, and since second terminal is and first terminal
Account number mutually bind, there is uniqueness, can be existing so as to be solved from multiple angles to avoid code work decoded risk
The problem of image authentication code, enhances the safety of subscriber authentication.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
Obtain other attached drawings according to these attached drawings.
Fig. 1 is the applied environment figure of auth method provided in an embodiment of the present invention.
Fig. 2 is the flow chart for the auth method that first embodiment of the invention provides.
Fig. 3 is the flow chart for the auth method that second embodiment of the invention provides.
Fig. 4 is the flow chart for the auth method that third embodiment of the invention provides.
Fig. 5 is the flow chart for the auth method that fourth embodiment of the invention provides.
Fig. 6 is a kind of flow diagram for the auth method that fourth embodiment of the invention provides.
Fig. 7 be fourth embodiment of the invention a specific example in identifying code picture shown by first terminal and ask
Inscribe the effect diagram of description.
Fig. 8 is the validation confirmation information acquisition shown by second terminal in a specific example of fourth embodiment of the invention
The effect diagram at interface.
Fig. 9 is the structural schematic diagram for the authentication means that fifth embodiment of the invention provides.
Figure 10 is the structural schematic diagram for the authentication means that sixth embodiment of the invention provides.
Figure 11 is the structural schematic diagram for the authentication system that seventh embodiment of the invention provides.
Figure 12 is the structural schematic diagram for the authentication system that eighth embodiment of the invention provides.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Fig. 1 is the applied environment figure of auth method provided in an embodiment of the present invention.As shown in Figure 1, server 100 is logical
Wired or wireless network is crossed to connect with user terminal 200.Wherein, user terminal 200 may include:PC, tablet computer, mobile phone,
The terminal devices such as electronic reader, laptop, smart television, set-top box, car-mounted terminal.
In the embodiment of the present invention, first terminal and second terminal can be any type of user terminal, be equipped with net
Page browsing device or applications client.In the embodiment of the present invention, it is preferred that second terminal is mobile terminal, such as mobile phone.The present invention
In embodiment, first terminal, server and second terminal can be directly connected to by communication network.First terminal, server with
Second terminal can establish communication connection in Wi-Fi (Wireless Fidelity) network, 2G/3G networks or LAN.
Further, in the embodiment of the present invention, second terminal is preferably the mobile end mutually bound with the account number of first terminal
End.Wherein, the account number of first terminal is preferably the browser of first terminal or the user account number of application, such as:In first terminal
The user of instant messaging application log in account (can be user name, cell-phone number, email address etc.).In user's first time
When using account information, the essential information of account and first terminal can be reported to server by first terminal, service
Device can be recorded in Accounts List, and the basic letter of all terminals corresponding with each account is had recorded in Accounts List
Breath.Wherein, the essential information of terminal may include the information such as the identity of terminal, terminal type.Accounts List, which also records, to be had
Other account numbers associated with account, for example, the account number that user uses in registration is user name, with the user name account phase
Other associated accounts can be cell-phone number, the common email address etc. that user provides.
In related application (such as applications such as security centre) during user is using second terminal, which can guide user
Account number binding is carried out, which can bind with one or more account numbers of user, and user can also setting in the application
Set the binding released in interface with account number.In an embodiment of the present invention, the account number bound with application is preferably first whole
The account number at end or account number associated with the account number of first terminal.Preferably, during binding, user, which needs to input, to be somebody's turn to do
It completes to bind using the identifying code being sent in mobile phone.The application can be by the basic of user account number and account number after the completion of binding
Information reporting is to server.When user logs in the terminal without binding using account number, which is notified that user's account is stepped on
Lu Yichang, user can be with time update passwords.
In the embodiment of the present invention, first terminal and second terminal may be the difference installed in same user terminal
Browser or applications client, for example, first terminal can be QQ browsers, second terminal can be QQ security centres etc.,
Second terminal can be bound with the user account of first terminal.
It describes in detail to auth method provided in an embodiment of the present invention below in conjunction with attached drawing.
First embodiment
Fig. 2 is referred to, for the flow chart for the auth method that first embodiment of the invention provides;The present embodiment is service
Auth method performed by device, includes the following steps:
Step S11, server receive the authentication request that first terminal is sent.
When user using first terminal initiate transaction etc. need to verify identity sensitive operation or user in some time
Between log in that certain number of applications is excessive in section or user strange land log in certain application or user to log in the input of certain applied cryptography wrong
When situations such as accidentally number is excessive occurs, first terminal can send authentication request to server.
Step S12 generates verification code information to be verified and preset verification confirmation letter according to the authentication request
Breath, and verification code information to be verified is sent to the first terminal and is shown.
When server receives the authentication request of first terminal transmission, server can request to generate correspondence according to this
A pair verification code information to be verified and preset validation confirmation information (or being identifying code answer).Each authentication is asked
The verification code information to be verified asked can be random, unforeseen with preset validation confirmation information.
There are many method for generating verification code information to be verified and preset validation confirmation information pair, implement specifically
Cheng Zhong can select generating mode appropriate according to different verification code types, for example, if it is identifying code picture, server
Identifying code character string can be generated at random, preserved in memory, and picture is written, picture is issued into first terminal, the identifying code
Character string can also be used as preset validation confirmation information simultaneously, other specific generating modes no longer repeat one by one here.
Further, if it is the identifying code of topic pattern, the verification code information to be verified generated may include verification
Code, the problem corresponding with identifying code description.Certainly, identifying code itself can also be a problem description, in this case, i.e.,
Make to be the identifying code for inscribing pattern, the problem description that verification code information can also not corresponded to, and only corresponding preset verification
Confirmation message.It should be noted that the specific implementation mode of the present invention is not described with the concrete form of identifying code or problem
Concrete type be limited, identifying code such as can be identifying code picture, speech identifying code, video verification code, problem describes example
Such as can be multiple-choice question, gap-filling questions, interactive operation instruction.
When server generates a pair corresponding with authentication request verification code information to be verified and preset verification
When confirmation message, server records the authentication request, the verification code information to be verified and the preset verification and confirms
Correspondence between information, and verification code information to be verified is sent to the first terminal and is shown.
Step S13, according to the authentication request, the second terminal mutually bound to the account number with the first terminal is sent out
Send validation confirmation information acquisition request.
Server can inquire the second terminal mutually bound with first terminal account number according to Accounts List, be sent out to second terminal
Validation confirmation information acquisition request is sent, and records the corresponding pass of the authentication request and validation confirmation information acquisition request
System.
Can also include command id corresponding with acquisition mode in validation confirmation information acquisition request, the order mark
May include:Acquisition input character mark, for notifying the second terminal to acquire character input by user;Acquire voice signal
Mark, for notifying the second terminal to open speech signal collection equipment (such as microphone);Or acquisition touch control gesture mark
Show, for notifying the second terminal to be acquired (such as click, stroke etc.) to the touch control gesture of user using Touch Screen
Acquisition.
In a kind of specific implementation mode of the present invention, identifying code can be by first terminal exhibition with corresponding problem description
Show to user.In another specific implementation mode of the present invention, the verification code information to be verified only includes identifying code, institute
It states and carries the problem description corresponding with the identifying code in validation confirmation information acquisition request, described problem description is whole by second
End shows user.
Step S14 receives the validation confirmation information of the second terminal acquisition, and according to the preset verification confirmation letter
It ceases the validation confirmation information for acquiring the second terminal to verify, is verified result.
If the collected validation confirmation information of second terminal (or being identifying code answer) is voice signal, touching signals
When equal signals, server can further parse it after receiving the validation confirmation information that second terminal acquires, when
So, corresponding parsing can also be completed by second terminal.The authentication request, to be verified that server records before
The correspondence and the authentication request of verification code information and preset validation confirmation information and the validation confirmation information
The correspondence for acquiring request verifies the validation confirmation information of second terminal acquisition, is verified result.
The verification result is returned to the first terminal by step S15.
Verification result can be showed user by first terminal after receiving verification result, if verification result be by
Words, can also be directly entered next interface.
Auth method provided in this embodiment carries out authentication with line under type on bonding wire, utilizes server
Verification code information is sent to first terminal with line upper type, validation confirmation information acquisition request is sent to second terminal, then
Validation confirmation information is acquired by second terminal is lower online, finally validation confirmation information is verified by server, due to verification
Confirmation message is that the verification code information judgement shown according to first terminal by user obtains, machine can be effectively prevent to crack,
And since second terminal is mutually bound with the account number of first terminal, have uniqueness, can to avoid the decoded risk of code work,
So as to solve the problems, such as existing image authentication code from multiple angles, the safety of subscriber authentication is enhanced
Property.
Second embodiment
Fig. 3 is referred to, for the flow chart for the auth method that second embodiment of the invention provides;The present embodiment is service
Auth method performed by device, the server in the present embodiment may include WEB server and authentication server, can be with
Understand, in other specific implementation modes of the present invention, WEB server can also be integrated into a clothes with authentication server
Business device.The verification method of the present embodiment includes the following steps:
Step S21, WEB server receive the authentication request that first terminal is sent, are taken in the authentication request
Account number with the first terminal.
Step S22, the WEB server obtain and the identity according to the authentication request to authentication server
The corresponding verification code information to be verified of checking request and preset validation confirmation information, and verification code information to be verified is sent out
The first terminal is given to be shown.
In this step, authentication server can record the authentication request, the verification code information to be verified and
Correspondence between the preset validation confirmation information, and verification code information to be verified is sent to WEB server, then
Verification code information to be verified first terminal is sent to by WEB server to be shown.
Step S23, the authentication server are searched and described the according to the account number of the first terminal in Accounts List
The second terminal that the account number of one terminal is mutually bound.
Step S24, the authentication server will validation confirmation information acquisition requests corresponding with the authentication request
It is sent to the second terminal.
In this step, authentication server can also record the authentication request and be asked with validation confirmation information acquisition
Between correspondence.
Step S25, the authentication server receive the validation confirmation information of the second terminal acquisition.
Step S26, the validation confirmation information that the authentication server acquires the second terminal are preset with described
Validation confirmation information be compared, if comparison result is identical, verification result be pass through, if comparison result is different,
Verification result is not pass through.
Step S27, the verification result is returned to WEB server by the authentication server, and will be tested by WEB server
Card result is sent to the first terminal.
Above step similar part identical with first embodiment can also refer to the associated description in the first implementation,
This is not repeated.
Auth method provided in this embodiment carries out authentication with line under type on bonding wire, utilizes server
Verification code information is sent to first terminal with line upper type, validation confirmation information acquisition request is sent to second terminal, then
Validation confirmation information is acquired by second terminal is lower online, finally validation confirmation information is verified by server, due to verification
Confirmation message is that the verification code information judgement shown according to first terminal by user obtains, machine can be effectively prevent to crack,
And since second terminal is mutually bound with the account number of first terminal, have uniqueness, can to avoid the decoded risk of code work,
It solves the problems, such as existing image authentication code from multiple angles, enhances the safety of subscriber authentication.
3rd embodiment
Fig. 4 is referred to, for a kind of flow chart for auth method that third embodiment of the invention provides;The present embodiment is
First terminal, second terminal and server interact performed auth method;This method may include following steps:
Step S31, first terminal send authentication request to server.
Step S32, the server according to the authentication request, generate verification code information to be verified with it is preset
The verification code information to be verified is sent to the first terminal, and is asked according to the authentication by validation confirmation information
The second terminal mutually bound to the account number with the first terminal is asked to send validation confirmation information acquisition request.
The verification code information to be verified is showed user by step S33, the first terminal.
Step S34, after the second terminal receives the validation confirmation information acquisition request, acquisition is by user according to institute
The validation confirmation information for the verification code information input that first terminal is shown is stated, and the collected validation confirmation information of institute is sent
To the server.
Step S35, the server are tested according to the preset validation confirmation information is collected to the second terminal
Card confirmation message is verified, and is verified as a result, and the verification result is returned to the first terminal.
Above step can be referring to figs. 2 to the associated description of each embodiment in Fig. 3, and this will not be repeated here.
Auth method provided in this embodiment carries out authentication with line under type on bonding wire, utilizes server
Verification code information is sent to first terminal with line upper type, validation confirmation information acquisition request is sent to second terminal, then
Validation confirmation information is acquired by second terminal is lower online, finally validation confirmation information is verified by server, due to verification
Confirmation message is that the verification code information judgement shown according to first terminal by user obtains, machine can be effectively prevent to crack,
And since second terminal is mutually bound with the account number of first terminal, have uniqueness, can to avoid the decoded risk of code work,
It solves the problems, such as existing image authentication code from multiple angles, enhances the safety of subscriber authentication.
Fourth embodiment
Fig. 5 is referred to, Fig. 5 is the flow chart for the auth method that fourth embodiment of the invention provides;The present embodiment is
First terminal, second terminal and server interact performed auth method.This method may include following steps:
Step S401, first terminal send the authentication that authentication request is sent to server, the first terminal
The account number of the first terminal is carried in request.
Step S402, the server generate verification code information to be verified and verification according to the authentication request
Verification code information to be verified is sent to the first terminal by confirmation message.
Step S403, the server are searched and described first according to the account number of the first terminal in Accounts List
Validation confirmation information acquisition request is sent to the second terminal by the second terminal that the account number of terminal is mutually bound.
The verification code information to be verified is showed user, issues the user with and carry by step S404, the first terminal
Show information, the prompt message prompt user according to the verification code information to be verified, by with the identifying code to be verified
The corresponding validation confirmation information of information inputs the speech signal collection equipment of the second terminal.
Step S405 opens voice signal and adopts after the second terminal receives the validation confirmation information acquisition request
Collect equipment.
Step S406, the second terminal receive the collected voice input by user of speech signal collection equipment
Signal.
Step S407, the second terminal parse the voice signal acquired, obtain the validation confirmation information.
Step S408, the server receive the validation confirmation information of the second terminal acquisition;
Step S409, the validation confirmation information that the second terminal is acquired and the preset validation confirmation information
It is compared, if comparison result is identical, verification result is to pass through, if comparison result is different, verification result is obstructed
It crosses.
The verification result is returned to the first terminal by step S410.
Fig. 6 is a kind of idiographic flow schematic diagram of auth method provided in this embodiment, below in conjunction with Fig. 6, with
First terminal is laptop, second terminal is mobile phone, server includes WEB server and authentication server and verification
Code information include identifying code picture and problem description for, the present embodiment is further described in detail.
First terminal sends authentication request to WEB server, and the first terminal is carried in authentication request
Account number.After WEB server receives authentication request, verification corresponding with authentication request is obtained to authentication server
Code picture, problem description and validation confirmation information, authentication server can record that the authentication request, this to be verified tests
Demonstrate,prove the correspondence between code picture, problem description and validation confirmation information, and by identifying code picture to be verified, problem
Description is sent to WEB server, then identifying code picture to be verified and problem description are sent to first eventually by WEB server
End is shown.
Fig. 7 is please referred to, Fig. 7 is the identifying code picture shown by first terminal in a specific example of the embodiment of the present invention
And the effect diagram of problem description.In the example, the identifying code picture that first terminal is shown is a nine grids figure
Piece, nine grids picture include the image of 5 lattice kittens, the image of 2 lattice rabbits, 2 lattice doggies image, problem is described as " picture
The most animal of middle occurrence number is (for option:Butterfly, elephant) ", corresponding default validation confirmation information is " elephant ".Further
, first terminal can be sent out prompt message, prompt user to open the application of second terminal, such as QQ security centres, and say
Go out the most animal of occurrence number in picture.
In addition, account number of the authentication server according to the first terminal, is searched and described first in Accounts List
The second terminal that the account number of terminal is mutually bound.Authentication server adopts validation confirmation information corresponding with the authentication request
Collection request is sent to the second terminal.Authentication server can also record the authentication request and be adopted with the validation confirmation information
Correspondence between collection request.In this example, acquisition voice signal mark is carried in validation confirmation information acquisition request
Show, for notifying the second terminal to open speech signal collection equipment.
Fig. 8 is please referred to, Fig. 8 is the verification confirmation letter shown by second terminal in a specific example of the embodiment of the present invention
Cease the effect diagram of acquisition interface.In the example, user can be guided to be inputted by voice on the application interface of second terminal
Validation confirmation information unclamps i.e. stopping etc. for example, guiding user pins button says validation confirmation information against microphone.Into
One step, corresponding problem can also be described include in the interface, user see the identifying code picture that first terminal shows,
After the operation indicating that problem describes and second terminal is shown, validation confirmation information, the Mike of second terminal are said by voice
The sound that elegance collection user says in that time pinned, and it is identified parsing, it is converted into validation confirmation information.By
It needs user that can just obtain answer by simply thinking deeply in this category information, therefore machine can be effectively prevented from and cracked.
Validation confirmation information after parsing is sent to authentication server by second terminal, and authentication server adopts second terminal
The validation confirmation information of collection is compared with the preset validation confirmation information, if comparison result is identical, verification result
To pass through, if comparison result is different, verification result is not pass through.In above-mentioned specific example, if what user said is butterfly
Butterfly is then verified and is not passed through, if what user said is elephant, is verified.Finally, it is verified that server returns the verification result
The first terminal is transmitted verification result to back to WEB server, and by WEB server.First terminal can tie verification
Fruit shows user, if the verification passes, can also be directly entered next interface.
Bodily movement of practising Wushu verification method provided in an embodiment of the present invention carries out authentication with line under type on bonding wire, utilizes clothes
Verification code information is sent to first terminal with line upper type, validation confirmation information acquisition request is sent to second eventually by business device
End, then validation confirmation information is acquired by second terminal is lower online, finally validation confirmation information is verified by server, due to
Validation confirmation information is that the verification code information judgement shown according to first terminal by user obtains, machine can be effectively prevent broken
Solution, and since second terminal is mutually bound with the account number of first terminal, there is uniqueness, it can be to avoid the decoded wind of code work
Danger, solves the problems, such as existing image authentication code from multiple angles, enhances the safety of subscriber authentication.Separately
Outside, in this present embodiment, it needs to look at identifying code picture shown on first terminal and problem description with eyes in user,
Answer is said against second terminal again, completely without being manually entered, reduces the interaction threshold of user, in user
Also good improvement has been obtained in experience.
An embodiment of the present invention provides a kind of computer storage media, the computer storage media has program stored therein, should
Program includes all or part of step of method shown in Fig. 2 to Fig. 8 any embodiments when executing.
5th embodiment
Fig. 9 is referred to, for the structural schematic diagram for the authentication means that fifth embodiment of the invention provides;The present embodiment carries
The device of confession can run on server, and the authentication means 50 may include:Checking request receiving module 51, verification confirm
Information sending module 52, acquisition request sending module 53, answer receive authentication module 54, verification result sending module 55.
Wherein, checking request receiving module 51 is used to receive the authentication request of first terminal transmission;Verify confirmation letter
Sending module 52 is ceased to be used to, according to the authentication request, generate verification code information to be verified and preset verification confirmation letter
Breath, and verification code information to be verified is sent to the first terminal and is shown;It acquires request sending module 53 and is used for root
According to the authentication request, the second terminal mutually bound to the account number with the first terminal sends validation confirmation information acquisition
Request;Answer receives the validation confirmation information that authentication module 54 is used to receive the second terminal acquisition, and according to described default
Validation confirmation information validation confirmation information that the second terminal is acquired verify, be verified result;And verification
As a result sending module 55 is used to the verification result returning to the first terminal.
In a kind of specific implementation mode of the present invention, the verification code information to be verified may include:Identifying code with
And the problem description corresponding with the identifying code.
In another specific implementation mode of the present invention, the verification code information to be verified includes identifying code, described
The problem description corresponding with the identifying code is carried in validation confirmation information acquisition request.
It should be noted that the function of each function module of the embodiment of the present invention can be according to the side in above method embodiment
Method implements, and specific implementation process is referred to the associated description of above method embodiment, and this will not be repeated here.
Authentication means provided in this embodiment carry out authentication with line under type on bonding wire, utilize server
Verification code information is sent to first terminal with line upper type, validation confirmation information acquisition request is sent to second terminal, then
Validation confirmation information is acquired by second terminal is lower online, finally validation confirmation information is verified by server, due to verification
Confirmation message is that the verification code information judgement shown according to first terminal by user obtains, machine can be effectively prevent to crack,
And since second terminal is mutually bound with the account number of first terminal, have uniqueness, can to avoid the decoded risk of code work,
So as to solve the problems, such as existing image authentication code from multiple angles, the safety of subscriber authentication is enhanced
Property.
Sixth embodiment
Figure 10 is referred to, for the structural schematic diagram for the authentication means that sixth embodiment of the invention provides;The present embodiment
The device of offer can run on server, and the authentication means 60 may include:Checking request receiving module 61, verification are true
Recognize information sending module 62, acquisition request sending module 63, answer reception authentication module 64, verification result sending module 65.
Wherein, checking request receiving module 61 is used to receive the authentication request of first terminal transmission;Verify confirmation letter
Sending module 62 is ceased to be used to, according to the authentication request, generate verification code information to be verified and preset verification confirmation letter
Breath, and verification code information to be verified is sent to the first terminal and is shown;It acquires request sending module 63 and is used for root
According to the authentication request, the second terminal mutually bound to the account number with the first terminal sends validation confirmation information acquisition
Request;Answer receives the validation confirmation information that authentication module 64 is used to receive the second terminal acquisition, and according to described default
Validation confirmation information validation confirmation information that the second terminal is acquired verify, be verified result;And verification
As a result sending module 65 is used to the verification result returning to the first terminal.
In this present embodiment, the first terminal can be carried in the authentication request that the first terminal is sent
Account number, further, the acquisition request sending module 63 may include:Searching unit 631, for according to the first terminal
Account number, searched in Accounts List and the second terminal mutually bound of account number of the first terminal;Transmission unit 632, is used for
Validation confirmation information acquisition request is sent to the second terminal.
In this present embodiment, the answer reception authentication module 64 may include:Receiving unit 641, it is described for receiving
The validation confirmation information of second terminal acquisition;Comparing unit 642, the verification confirmation letter for acquiring the second terminal
Breath is compared with the preset validation confirmation information, if comparison result is identical, verification result is to pass through, if compared
As a result different, then verification result is not pass through.
Further, the validation confirmation information acquisition request includes command id corresponding with acquisition mode, described
Order indicates:Acquisition input character mark, for notifying the second terminal to acquire character input by user;Acquire voice
Signal signature, for notifying the second terminal to open speech signal collection equipment;Or acquisition touch control gesture mark, for leading to
Know that the second terminal is acquired the touch control gesture of user using Touch Screen.
It should be noted that the function of each function module of the device of the embodiment of the present invention can be according to above method embodiment
In method specific implementation, specific implementation process is referred to the associated description of above method embodiment, and this will not be repeated here.
Authentication means provided in this embodiment carry out authentication with line under type on bonding wire, utilize server
Verification code information is sent to first terminal with line upper type, validation confirmation information acquisition request is sent to second terminal, then
Validation confirmation information is acquired by second terminal is lower online, finally validation confirmation information is verified by server, due to verification
Confirmation message is that the verification code information judgement shown according to first terminal by user obtains, machine can be effectively prevent to crack,
And since second terminal is mutually bound with the account number of first terminal, have uniqueness, can to avoid the decoded risk of code work,
So as to solve the problems, such as existing image authentication code from multiple angles, the safety of subscriber authentication is enhanced
Property.
7th embodiment
Figure 11 is referred to, for the structural schematic diagram for the authentication system that seventh embodiment of the invention provides;The present embodiment
The system 70 of offer may include:First terminal 71, the second terminal 72 mutually bound with the account number of the first terminal and clothes
Business device 73.
Wherein, first terminal 71 is for sending authentication request to the server 73;
The server 73, according to the authentication request, generates to be verified for receiving the authentication request
Verification code information and preset validation confirmation information, verification code information to be verified is sent to the first terminal 71, and
According to the authentication request validation confirmation information acquisition request is sent to the second terminal 72;
The first terminal 71 is additionally operable to the verification code information to be verified showing user;
After the second terminal 72 is for receiving the validation confirmation information acquisition request, acquisition is by user according to described
The validation confirmation information for the verification code information input that first terminal is shown, and the collected validation confirmation information of institute is sent to
The server;
The server is additionally operable to test according to the preset validation confirmation information is collected to the second terminal 72
Card confirmation message is verified, and is verified as a result, and the verification result is returned to the first terminal 71;And
The first terminal 71 is additionally operable to the verification result showing the user.
In a kind of specific implementation mode of the present invention, the verification code information to be verified may include:Identifying code with
And the problem description corresponding with the identifying code.
In another specific implementation mode of the present invention, the verification code information to be verified includes identifying code, described
The problem description corresponding with the identifying code is carried in validation confirmation information acquisition request.
It should be noted that the function of each function module of the device of the embodiment of the present invention can be according to above method embodiment
In method specific implementation, specific implementation process is referred to the associated description of above method embodiment, and this will not be repeated here.
Authentication system provided in this embodiment carries out authentication with line under type on bonding wire, utilizes server
Verification code information is sent to first terminal with line upper type, validation confirmation information acquisition request is sent to second terminal, then
Validation confirmation information is acquired by second terminal is lower online, finally validation confirmation information is verified by server, due to verification
Confirmation message is that the verification code information judgement shown according to first terminal by user obtains, machine can be effectively prevent to crack,
And since second terminal is mutually bound with the account number of first terminal, have uniqueness, can to avoid the decoded risk of code work,
So as to solve the problems, such as existing image authentication code from multiple angles, the safety of subscriber authentication is enhanced
Property.
8th embodiment
Figure 12 is referred to, for the structural schematic diagram for the authentication system that eighth embodiment of the invention provides;The present embodiment
The system 80 of offer may include:First terminal 81, the second terminal 82 mutually bound with the account number of the first terminal and clothes
Business device 83.
Wherein, first terminal 81 is for sending authentication request to the server 83;
The server 83, according to the authentication request, generates to be verified for receiving the authentication request
Verification code information and preset validation confirmation information, verification code information to be verified is sent to the first terminal 81, and
And send validation confirmation information acquisition request to the second terminal 82;
The first terminal 81 is additionally operable to the verification code information to be verified showing user;
After the second terminal 82 is for receiving the validation confirmation information acquisition request, acquisition is by user according to described
The validation confirmation information of verification code information input, and the collected validation confirmation information of institute is sent to the server;
The server is additionally operable to according to the preset validation confirmation information, collected to the second terminal 82 to test
Card confirmation message is verified, and is verified as a result, and the verification result is returned to the first terminal 81;And
The first terminal 81 is additionally operable to the verification result showing the user.
While the verification code information to be verified is showed user by the first terminal 81, it is additionally operable to send out to user
Go out prompt message, the prompt message prompts user according to the verification code information, corresponding with the verification code information will test
It demonstrate,proves confirmation message and inputs the second terminal 82.
In the specific implementation mode of the present invention, the second terminal 82 includes speech signal collection equipment 821, described
Second terminal 82 further includes:
Collecting device opening module 822 opens voice signal after receiving the validation confirmation information acquisition request
Collecting device;
Voice signal receiving module 823, it is collected input by user for receiving the speech signal collection equipment
Voice signal;
Voice signal parsing module 824 obtains the validation confirmation information for being parsed to the voice signal.
It should be noted that the function of each function module of the device of the embodiment of the present invention can be according to above method embodiment
In method specific implementation, specific implementation process is referred to the associated description of above method embodiment, and this will not be repeated here.
Authentication system provided in this embodiment carries out authentication with line under type on bonding wire, utilizes server
Verification code information is sent to first terminal with line upper type, validation confirmation information acquisition request is sent to second terminal, then
Validation confirmation information is acquired by second terminal is lower online, finally validation confirmation information is verified by server, due to verification
Confirmation message is that the verification code information judgement shown according to first terminal by user obtains, machine can be effectively prevent to crack,
And since second terminal is mutually bound with the account number of first terminal, have uniqueness, can to avoid the decoded risk of code work,
So as to solve the problems, such as existing image authentication code from multiple angles, the safety of subscriber authentication is enhanced
Property.
It should be noted that each embodiment in this specification is described in a progressive manner, each embodiment weight
Point explanation is all difference from other examples, and the same or similar parts between the embodiments can be referred to each other.
For device class embodiment, since it is basically similar to the method embodiment, so fairly simple, the related place ginseng of description
See the part explanation of embodiment of the method.
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements include not only those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including institute
State in process, method, article or the device of element that there is also other identical elements.
One of ordinary skill in the art will appreciate that realizing that all or part of step of above-described embodiment can pass through hardware
It completes, relevant hardware can also be instructed to complete by program, the program can be stored in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The above described is only a preferred embodiment of the present invention, be not intended to limit the present invention in any form, though
So the present invention has been disclosed as a preferred embodiment, and however, it is not intended to limit the invention, any technology people for being familiar with this profession
Member, without departing from the scope of the present invention, when the technology contents using the disclosure above make a little change or modification
For the equivalent embodiment of equivalent variations, as long as be without departing from technical solution of the present invention content, it is right according to the technical essence of the invention
Any simple modification, equivalent change and modification made by above example, in the range of still falling within technical solution of the present invention.
Claims (24)
1. a kind of auth method, which is characterized in that including:
Server receives the authentication request that first terminal is sent;
According to the authentication request, verification code information to be verified and preset validation confirmation information are generated, and will be to be tested
The verification code information of card is sent to the first terminal and is shown;
According to the authentication request, the second terminal mutually bound to the account number with the first terminal sends verification confirmation letter
Breath acquisition request, so that second terminal acquisition is inputted by user according to the verification code information that the first terminal is shown
Validation confirmation information;
The validation confirmation information of the second terminal acquisition is received, and according to the preset validation confirmation information to described second
The validation confirmation information of terminal acquisition is verified, and result is verified;And
The verification result is returned into the first terminal.
2. the method as described in claim 1, which is characterized in that carried in the authentication request that the first terminal is sent
The account number of the first terminal, the second terminal mutually bound to the account number with the first terminal send validation confirmation information
The step of acquisition request, including:
The server is searched in Accounts List and is mutually tied up with the account number of the first terminal according to the account number of the first terminal
Fixed second terminal;
Validation confirmation information acquisition request is sent to the second terminal by the server.
3. the method as described in claim 1, which is characterized in that the verification confirmation letter for receiving the second terminal acquisition
Breath, and verified according to the validation confirmation information that the preset validation confirmation information acquires the second terminal, it obtains
The step of verification result, including:
The server receives the validation confirmation information of the second terminal acquisition;
The validation confirmation information that the second terminal acquires is compared with the preset validation confirmation information;
If comparison result is identical, verification result is to pass through, if comparison result is different, verification result is not pass through.
4. the method as described in claim 1, which is characterized in that the verification code information to be verified includes:Identifying code and
The problem description corresponding with the identifying code.
5. the method as described in claim 1, which is characterized in that the verification code information to be verified includes identifying code, described
The problem description corresponding with the identifying code is carried in validation confirmation information acquisition request, described problem is described by described second
Terminal display is to user.
6. the method as described in claim 1, which is characterized in that the validation confirmation information acquires request and includes and acquisition side
The corresponding command id of formula, the order mark include:
Acquisition input character mark, for notifying the second terminal to acquire character input by user;
Voice signal mark is acquired, for notifying the second terminal to open speech signal collection equipment;Or
Touch control gesture mark is acquired, for notifying the second terminal to be adopted to the touch control gesture of user using Touch Screen
Collection.
7. a kind of auth method, which is characterized in that including:
First terminal sends authentication request to server;
The server generates verification code information to be verified and preset verification confirmation letter according to the authentication request
Verification code information to be verified is sent to the first terminal by breath, and according to the authentication request to described first
The second terminal that the account number of terminal is mutually bound sends validation confirmation information acquisition request;
The verification code information to be verified is showed user by the first terminal;
After the second terminal receives the validation confirmation information acquisition request, acquisition is by user according to the first terminal institute
The validation confirmation information of the verification code information input of displaying, and the collected validation confirmation information of institute is sent to the service
Device;And
The server according to the preset validation confirmation information to the collected validation confirmation information of the second terminal into
Row verification, is verified as a result, and the verification result is returned to the first terminal.
8. the method for claim 7, which is characterized in that the verification code information to be verified includes:Identifying code and
The problem description corresponding with the identifying code.
9. the method for claim 7, which is characterized in that the verification code information to be verified includes identifying code, described
The problem description corresponding with the identifying code is carried in validation confirmation information acquisition request, described problem is described by described second
Terminal display is to user.
10. the method for claim 7, which is characterized in that the first terminal is by the verification code information to be verified
While showing user, prompt message is also issued the user with, the prompt message prompts the user according to the identifying code
Validation confirmation information corresponding with the verification code information is inputted the second terminal by information.
11. the method for claim 7, which is characterized in that the validation confirmation information acquires request and includes and acquisition
The corresponding command id of mode, the order mark include:
Acquisition input character mark, to notify the second terminal to acquire character input by user;
Voice signal mark is acquired, to notify the second terminal to open speech signal collection equipment;Or
Touch control gesture mark is acquired, to notify the second terminal to be acquired to the touch control gesture of user using Touch Screen.
12. the method for claim 7, which is characterized in that the second terminal receives the validation confirmation information and adopts
The step of collecting after asking, acquiring the validation confirmation information inputted according to the verification code information by user, including:
After the second terminal receives the validation confirmation information acquisition request, speech signal collection equipment is opened;
Receive the collected voice signal input by user of the speech signal collection equipment;
The voice signal acquired is parsed, the validation confirmation information is obtained.
13. a kind of authentication means, run on server, which is characterized in that including:
Checking request receiving module, the authentication request for receiving first terminal transmission;
Validation confirmation information sending module, for according to the authentication request, generate verification code information to be verified with it is pre-
If validation confirmation information, and verification code information to be verified is sent to the first terminal and is shown;
Request sending module is acquired, for according to the authentication request, mutually being bound to the account number with the first terminal
Second terminal sends validation confirmation information acquisition request, so that the second terminal is acquired by user according to the first terminal
The validation confirmation information of the verification code information input shown;
Answer receives authentication module, the validation confirmation information for receiving the second terminal acquisition, and according to described preset
The validation confirmation information that validation confirmation information acquires the second terminal is verified, and result is verified;And
Verification result sending module, for the verification result to be returned to the first terminal.
14. device as claimed in claim 13, which is characterized in that carried in the authentication request that the first terminal is sent
There are the account number of the first terminal, the acquisition request sending module to include:
Searching unit searches the account number with the first terminal for the account number according to the first terminal in Accounts List
The mutually second terminal of binding;
Transmission unit, for validation confirmation information acquisition request to be sent to the second terminal.
15. device as claimed in claim 13, which is characterized in that the verification code information to be verified includes:Identifying code with
And the problem description corresponding with the identifying code.
16. device as claimed in claim 13, which is characterized in that the verification code information to be verified includes identifying code, institute
It states and carries corresponding with identifying code problem description in validation confirmation information acquisition request, described problem description is by described the
Two terminal displays are to user.
17. device as claimed in claim 13, which is characterized in that the answer receives authentication module and includes:
Receiving unit, the validation confirmation information for receiving the second terminal acquisition;
Comparing unit, the validation confirmation information for acquiring the second terminal and the preset validation confirmation information
It is compared, if comparison result is identical, verification result is to pass through, if comparison result is different, verification result is obstructed
It crosses.
18. device as claimed in claim 13, which is characterized in that the validation confirmation information acquires request and includes and acquisition
The corresponding command id of mode, the order mark include:
Acquisition input character mark, for notifying the second terminal to acquire character input by user;
Voice signal mark is acquired, for notifying the second terminal to open speech signal collection equipment;Or
Touch control gesture mark is acquired, for notifying the second terminal to be adopted to the touch control gesture of user using Touch Screen
Collection.
19. a kind of authentication system, which is characterized in that including:First terminal is mutually bound with the account number of the first terminal
Second terminal and server,
The first terminal is for sending authentication request to the server;
The server is used to, according to the authentication request, generate verification code information to be verified and with preset verification confirm
Verification code information to be verified is sent to the first terminal and is shown by information, and according to the authentication request to
The second terminal sends validation confirmation information acquisition request;
The first terminal is additionally operable to the verification code information to be verified showing user;
After the second terminal is for receiving the validation confirmation information acquisition request, acquisition is whole according to described first by user
The validation confirmation information of the shown verification code information input in end, and the collected validation confirmation information of institute is sent to the clothes
Business device;And
The server is additionally operable to be confirmed according to preset validation confirmation information verification collected to the second terminal
Information is verified, and is verified as a result, and the verification result is returned to the first terminal.
20. system as claimed in claim 19, which is characterized in that the verification code information to be verified includes:Identifying code with
And the problem description corresponding with the identifying code.
21. system as claimed in claim 19, which is characterized in that the verification code information to be verified includes identifying code, institute
It states and carries corresponding with identifying code problem description in validation confirmation information acquisition request, described problem description is by described the
Two terminal displays are to user.
22. system as claimed in claim 19, which is characterized in that the first terminal is additionally operable to issue the user with prompt letter
Breath, the prompt message prompt user according to the verification code information, will verification confirmation letter corresponding with the verification code information
Breath inputs the second terminal.
23. system as claimed in claim 19, which is characterized in that the validation confirmation information acquires request and includes and acquisition
The corresponding command id of mode, the order mark include:
Acquisition input character mark, for notifying the second terminal to acquire character input by user;
Voice signal mark is acquired, for notifying the second terminal to open speech signal collection equipment;Or
Touch control gesture mark is acquired, for notifying the second terminal to be adopted to the touch control gesture of user using Touch Screen
Collection.
24. system as claimed in claim 19, which is characterized in that the second terminal includes speech signal collection equipment, institute
Stating second terminal further includes:
Collecting device opening module is opened speech signal collection and is set after receiving the validation confirmation information acquisition request
It is standby;
Voice signal receiving module, for receiving the collected voice letter input by user of the speech signal collection equipment
Number;
Voice signal parsing module obtains the validation confirmation information for being parsed to the voice signal acquired.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310515705.2A CN104580117B (en) | 2013-10-28 | 2013-10-28 | Auth method, apparatus and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310515705.2A CN104580117B (en) | 2013-10-28 | 2013-10-28 | Auth method, apparatus and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104580117A CN104580117A (en) | 2015-04-29 |
CN104580117B true CN104580117B (en) | 2018-07-27 |
Family
ID=53095312
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310515705.2A Active CN104580117B (en) | 2013-10-28 | 2013-10-28 | Auth method, apparatus and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104580117B (en) |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10015364B2 (en) * | 2015-05-11 | 2018-07-03 | Pictureworks Pte Ltd | System and method for previewing digital content |
CN105100067B (en) * | 2015-06-26 | 2018-09-18 | 上海庆科信息技术有限公司 | A kind of high in the clouds Activiation method and system |
CN105208011B (en) * | 2015-08-31 | 2019-07-30 | 努比亚技术有限公司 | A kind of verifying system and method |
US10657244B2 (en) | 2015-10-26 | 2020-05-19 | Tencent Technology (Shenzhen) Company Limited | Identity authentication method and apparatus |
CN106612181A (en) * | 2015-10-26 | 2017-05-03 | 腾讯科技(深圳)有限公司 | Identity verification method and device |
CN106713241B (en) * | 2015-11-16 | 2019-09-27 | 腾讯科技(深圳)有限公司 | A kind of auth method, device and system |
WO2017084337A1 (en) | 2015-11-16 | 2017-05-26 | 腾讯科技(深圳)有限公司 | Identity verification method, apparatus and system |
CN105721468B (en) * | 2016-02-17 | 2021-11-16 | 阿里巴巴集团控股有限公司 | Communication method and device |
CN106487785B (en) * | 2016-09-28 | 2019-07-23 | 武汉理工大学 | A kind of authentication identifying method and system based on mobile terminal |
CN106878018B (en) * | 2016-12-30 | 2020-04-07 | 腾讯科技(深圳)有限公司 | Operation verification method and device |
CN111835714A (en) * | 2017-07-11 | 2020-10-27 | 创新先进技术有限公司 | Information verification processing method, client and server |
CN109271773A (en) * | 2017-07-18 | 2019-01-25 | 阿里巴巴集团控股有限公司 | Man-machine identification, verifying, data processing method and device |
CN109670291B (en) | 2017-10-17 | 2022-08-09 | 腾讯科技(深圳)有限公司 | Verification code implementation method and device and storage medium |
CN111353140B (en) * | 2018-12-24 | 2024-03-22 | 阿里巴巴集团控股有限公司 | Verification code generation and display method, device and system |
CN110941805B (en) * | 2019-11-21 | 2022-06-10 | 北京达佳互联信息技术有限公司 | Identity authentication method and device |
CN110929237A (en) * | 2019-11-22 | 2020-03-27 | 支付宝(杭州)信息技术有限公司 | Identity verification system, method and device and information verification system |
CN111695096B (en) * | 2020-05-29 | 2023-11-21 | 拉卡拉支付股份有限公司 | Identity verification method and device |
CN111667274A (en) * | 2020-06-16 | 2020-09-15 | 中国银行股份有限公司 | Authentication method and related equipment |
CN112328990A (en) * | 2020-10-30 | 2021-02-05 | 平安信托有限责任公司 | Screen control method and device based on identity authentication and computer equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102841997A (en) * | 2012-07-10 | 2012-12-26 | 郭小卫 | Method and device for achieving authentication on intelligent device by mobile terminal |
CN103067381A (en) * | 2012-12-26 | 2013-04-24 | 百度在线网络技术(北京)有限公司 | Third-party service login method, login system and login device by means of platform-party account |
CN103327100A (en) * | 2013-06-21 | 2013-09-25 | 华为技术有限公司 | Resource processing method and site server |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012042262A1 (en) * | 2010-09-28 | 2012-04-05 | Barclays Bank Plc | Mobile payment system |
-
2013
- 2013-10-28 CN CN201310515705.2A patent/CN104580117B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102841997A (en) * | 2012-07-10 | 2012-12-26 | 郭小卫 | Method and device for achieving authentication on intelligent device by mobile terminal |
CN103067381A (en) * | 2012-12-26 | 2013-04-24 | 百度在线网络技术(北京)有限公司 | Third-party service login method, login system and login device by means of platform-party account |
CN103327100A (en) * | 2013-06-21 | 2013-09-25 | 华为技术有限公司 | Resource processing method and site server |
Also Published As
Publication number | Publication date |
---|---|
CN104580117A (en) | 2015-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104580117B (en) | Auth method, apparatus and system | |
CN103533392B (en) | A kind of account login method, electronic equipment and system | |
CN104702406B (en) | Auth method and device | |
CN103840944B (en) | A kind of short message authentication method, server and system | |
CN104113551B (en) | A kind of platform authorization method, platform service end and applications client and system | |
CN104917612B (en) | Auth method and device | |
CN104618315B (en) | A kind of method, apparatus and system of verification information push and Information Authentication | |
CN105407074A (en) | Authentication method, apparatus and system | |
CN106209725A (en) | Method, video conference central server and system for video conference certification | |
CN103514773A (en) | Monitoring realization-based on-line examination system and method | |
CN104820944A (en) | Method and system for bank self-service terminal authentication, and device | |
CN104954131B (en) | The verification method and system of identifying code | |
CN105162802B (en) | Portal authentication method and certificate server | |
CN105827406A (en) | Identity verification method, identity verification device, and identity verification system | |
CN103001934B (en) | The method and system that terminal applies logs in | |
CN104901924A (en) | Internet account verifying method and device | |
CN102946396A (en) | User agent device, host web server and user authentication method | |
CN105119880B (en) | A kind of account login method, system, user terminal and server | |
CN104935436B (en) | A kind of user authentication method and system | |
CN107483208A (en) | Generation, verification method and the device of identifying code picture | |
CN105871900A (en) | Identity authentication method and system | |
CN105577692A (en) | Website login authentication method and device | |
EP2824953A1 (en) | User terminal for password-based authentication, and password-based trading terminal, system, and method | |
CN105205382A (en) | Two-dimension code identity authentication method and device | |
CN108521443B (en) | The upgrade method and system and terminal and computer readable storage medium of a kind of application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |