CN104580117B - Auth method, apparatus and system - Google Patents

Auth method, apparatus and system Download PDF

Info

Publication number
CN104580117B
CN104580117B CN201310515705.2A CN201310515705A CN104580117B CN 104580117 B CN104580117 B CN 104580117B CN 201310515705 A CN201310515705 A CN 201310515705A CN 104580117 B CN104580117 B CN 104580117B
Authority
CN
China
Prior art keywords
terminal
confirmation information
validation confirmation
verified
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310515705.2A
Other languages
Chinese (zh)
Other versions
CN104580117A (en
Inventor
唐艳平
陈梦
陈荣
陈远斌
董梁
孙增昕
刘飞飞
李德春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Computer Systems Co Ltd
Original Assignee
Shenzhen Tencent Computer Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tencent Computer Systems Co Ltd filed Critical Shenzhen Tencent Computer Systems Co Ltd
Priority to CN201310515705.2A priority Critical patent/CN104580117B/en
Publication of CN104580117A publication Critical patent/CN104580117A/en
Application granted granted Critical
Publication of CN104580117B publication Critical patent/CN104580117B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The invention discloses auth method, apparatus and system, method therein includes:Server receives the authentication request that first terminal is sent;According to the authentication request, verification code information to be verified and preset validation confirmation information are generated, and verification code information to be verified is sent to the first terminal and is shown;According to the authentication request, the second terminal mutually bound to the account number with the first terminal sends validation confirmation information acquisition request, and the validation confirmation information acquisition request is corresponding with the authentication request;The validation confirmation information of the second terminal acquisition is received, and the validation confirmation information is verified, is verified result;And the verification result is returned into the first terminal.The present invention can solve the problems, such as existing image authentication code from multiple angles, enhance the safety of subscriber authentication.

Description

Auth method, apparatus and system
Technical field
The present invention relates to a kind of Internet technical field more particularly to a kind of internet security technical fields, and in particular to A kind of auth method, apparatus and system.
Background technology
With becoming increasingly popular for computer and computer network, internet has been deep into people's work, studying and living Every field.The development of network also brings various challenges while providing convenient for people.Some can utilize robot Program is improper in large quantities to use Internet resources, such as mass-sending spam etc., and server efficiency is made to be greatly lowered.Also someone utilizes Program constantly sends out service request response, carries out " saturation attack " to achieve the purpose that make servers go down.Even somebody tastes Examination the means such as cracks using sudden huge profits and carries out the behaviors such as malice decryption.To avoid above-mentioned malicious act, design is a set of to be allowed The automatic resolution information of computer is the tool from reasonable user or the improper robot program used, is just seemed very heavy It wants.
The use of image authentication code is now more current mode, the main purpose of image authentication code is to differentiate network service User is program or the mankind.Image authentication code is the picture containing character string, and in verification, terminal shows the picture, and requires User inputs the content of character string in picture in the terminal.Character string is usually made of upper and lower case letter and number, is partly tested It includes Chinese character or mathematical formulae to demonstrate,prove code, and the length of character string can be random or fixed.In order to avoid by machine automatic identification, Disturbing factor would generally be increased, such as increase various textured patterns, character is distorted etc., to machine automatic identification into Row interference.
However, it is exactly to do technical antagonism on the basis of image analysis to crack image authentication code, compare with mutually, this disappears that It is long.The problem of causing the setting of disturbing factor needed for image authentication code generation just to be difficult to balance as one in this way.If interference Factor is done fairly simple, is visually easily identified, but the scanner recognition identifying code used in hacker is just very easy to, anti-to crack Energy force difference, safety are not high enough.See clearly if more complicated such user that disturbing factor is done is again more difficult, influences authentication Efficiency.Moreover, now socially there is the stamp worker (abbreviation code work) of occupation, hacker specially asks yard work to identify Identifying code so that image authentication code loses original effect.Therefore it provides a kind of auth method of safety and reliability is The present technical issues that need to address.
Invention content
A kind of auth method of offer of the embodiment of the present invention, apparatus and system can solve existing figure from multiple angles As the problem of identifying code, the safety of subscriber authentication is enhanced.
An embodiment of the present invention provides a kind of auth methods, it may include:Server receives the body that first terminal is sent Part checking request;According to the authentication request, verification code information to be verified and preset validation confirmation information are generated, and Verification code information to be verified is sent to the first terminal to be shown;According to the authentication request, to it is described The second terminal that the account number of first terminal is mutually bound sends validation confirmation information acquisition request;Receive the second terminal acquisition Validation confirmation information, and the validation confirmation information that the second terminal acquires is carried out according to the preset validation confirmation information Verification, is verified result;And the verification result is returned into the first terminal.
An embodiment of the present invention provides another auth methods, it may include:First terminal sends authentication request To server;The server generates verification code information to be verified and preset verification is true according to the authentication request Recognize information, verification code information to be verified be sent to the first terminal, and according to the authentication request to it is described The second terminal that the account number of first terminal is mutually bound sends validation confirmation information acquisition request;The first terminal will be described to be tested The verification code information of card shows user;After the second terminal receives validation confirmation information acquisition request, acquisition by The validation confirmation information for the verification code information input that user is shown according to the first terminal, and the collected verification of institute is true Recognize information and is sent to the server;The server acquires the second terminal according to the preset validation confirmation information To validation confirmation information verified, be verified as a result, and the verification result is returned to the first terminal.
An embodiment of the present invention provides a kind of authentication means, can run on server comprising:Checking request receives Module, the authentication request for receiving first terminal transmission;Validation confirmation information sending module, for according to the identity Checking request generates verification code information to be verified and preset validation confirmation information, and verification code information to be verified is sent out The first terminal is given to be shown;Request sending module is acquired, for according to the authentication request, to described the The second terminal that the account number of one terminal is mutually bound sends validation confirmation information acquisition request;Answer receives authentication module, for connecing The validation confirmation information of the second terminal acquisition is received, and the second terminal is adopted according to the preset validation confirmation information The validation confirmation information of collection is verified, and result is verified;And verification result sending module, it is used for the verification result Return to the first terminal.
An embodiment of the present invention provides a kind of authentication systems, it may include:First terminal, the account with the first terminal Number second terminal mutually bound and server.The first terminal is for sending authentication request to the server;Institute Server is stated to be used to, according to the authentication request, generate verification code information to be verified and preset validation confirmation information, Verification code information to be verified is sent to the first terminal to be shown, and according to the authentication request and to described Second terminal sends validation confirmation information acquisition request;The first terminal is additionally operable to the verification code information exhibition to be verified Show to user;After the second terminal is for receiving the validation confirmation information acquisition request, acquisition is by user according to described The validation confirmation information for the verification code information input that first terminal is shown, and the collected validation confirmation information of institute is sent to The server;The server is additionally operable to test according to the preset validation confirmation information is collected to the second terminal Card confirmation message is verified, and is verified as a result, and the verification result is returned to the first terminal.
An embodiment of the present invention provides a kind of computer storage media, the computer storage media has program stored therein, should Program includes all or part of step of the above method when executing.
The embodiment of the present invention has the advantages that:
Authentication is carried out with line under type on bonding wire, is sent to verification code information with line upper type using server Validation confirmation information acquisition request is sent to second terminal by first terminal, then lower acquisition verification confirms online by second terminal Information finally verifies validation confirmation information by server, since validation confirmation information is by user according to first terminal What the verification code information of displaying judged to obtain, machine can be effectively prevent to crack, and since second terminal is and first terminal Account number mutually bind, there is uniqueness, can be existing so as to be solved from multiple angles to avoid code work decoded risk The problem of image authentication code, enhances the safety of subscriber authentication.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is the applied environment figure of auth method provided in an embodiment of the present invention.
Fig. 2 is the flow chart for the auth method that first embodiment of the invention provides.
Fig. 3 is the flow chart for the auth method that second embodiment of the invention provides.
Fig. 4 is the flow chart for the auth method that third embodiment of the invention provides.
Fig. 5 is the flow chart for the auth method that fourth embodiment of the invention provides.
Fig. 6 is a kind of flow diagram for the auth method that fourth embodiment of the invention provides.
Fig. 7 be fourth embodiment of the invention a specific example in identifying code picture shown by first terminal and ask Inscribe the effect diagram of description.
Fig. 8 is the validation confirmation information acquisition shown by second terminal in a specific example of fourth embodiment of the invention The effect diagram at interface.
Fig. 9 is the structural schematic diagram for the authentication means that fifth embodiment of the invention provides.
Figure 10 is the structural schematic diagram for the authentication means that sixth embodiment of the invention provides.
Figure 11 is the structural schematic diagram for the authentication system that seventh embodiment of the invention provides.
Figure 12 is the structural schematic diagram for the authentication system that eighth embodiment of the invention provides.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Fig. 1 is the applied environment figure of auth method provided in an embodiment of the present invention.As shown in Figure 1, server 100 is logical Wired or wireless network is crossed to connect with user terminal 200.Wherein, user terminal 200 may include:PC, tablet computer, mobile phone, The terminal devices such as electronic reader, laptop, smart television, set-top box, car-mounted terminal.
In the embodiment of the present invention, first terminal and second terminal can be any type of user terminal, be equipped with net Page browsing device or applications client.In the embodiment of the present invention, it is preferred that second terminal is mobile terminal, such as mobile phone.The present invention In embodiment, first terminal, server and second terminal can be directly connected to by communication network.First terminal, server with Second terminal can establish communication connection in Wi-Fi (Wireless Fidelity) network, 2G/3G networks or LAN.
Further, in the embodiment of the present invention, second terminal is preferably the mobile end mutually bound with the account number of first terminal End.Wherein, the account number of first terminal is preferably the browser of first terminal or the user account number of application, such as:In first terminal The user of instant messaging application log in account (can be user name, cell-phone number, email address etc.).In user's first time When using account information, the essential information of account and first terminal can be reported to server by first terminal, service Device can be recorded in Accounts List, and the basic letter of all terminals corresponding with each account is had recorded in Accounts List Breath.Wherein, the essential information of terminal may include the information such as the identity of terminal, terminal type.Accounts List, which also records, to be had Other account numbers associated with account, for example, the account number that user uses in registration is user name, with the user name account phase Other associated accounts can be cell-phone number, the common email address etc. that user provides.
In related application (such as applications such as security centre) during user is using second terminal, which can guide user Account number binding is carried out, which can bind with one or more account numbers of user, and user can also setting in the application Set the binding released in interface with account number.In an embodiment of the present invention, the account number bound with application is preferably first whole The account number at end or account number associated with the account number of first terminal.Preferably, during binding, user, which needs to input, to be somebody's turn to do It completes to bind using the identifying code being sent in mobile phone.The application can be by the basic of user account number and account number after the completion of binding Information reporting is to server.When user logs in the terminal without binding using account number, which is notified that user's account is stepped on Lu Yichang, user can be with time update passwords.
In the embodiment of the present invention, first terminal and second terminal may be the difference installed in same user terminal Browser or applications client, for example, first terminal can be QQ browsers, second terminal can be QQ security centres etc., Second terminal can be bound with the user account of first terminal.
It describes in detail to auth method provided in an embodiment of the present invention below in conjunction with attached drawing.
First embodiment
Fig. 2 is referred to, for the flow chart for the auth method that first embodiment of the invention provides;The present embodiment is service Auth method performed by device, includes the following steps:
Step S11, server receive the authentication request that first terminal is sent.
When user using first terminal initiate transaction etc. need to verify identity sensitive operation or user in some time Between log in that certain number of applications is excessive in section or user strange land log in certain application or user to log in the input of certain applied cryptography wrong When situations such as accidentally number is excessive occurs, first terminal can send authentication request to server.
Step S12 generates verification code information to be verified and preset verification confirmation letter according to the authentication request Breath, and verification code information to be verified is sent to the first terminal and is shown.
When server receives the authentication request of first terminal transmission, server can request to generate correspondence according to this A pair verification code information to be verified and preset validation confirmation information (or being identifying code answer).Each authentication is asked The verification code information to be verified asked can be random, unforeseen with preset validation confirmation information.
There are many method for generating verification code information to be verified and preset validation confirmation information pair, implement specifically Cheng Zhong can select generating mode appropriate according to different verification code types, for example, if it is identifying code picture, server Identifying code character string can be generated at random, preserved in memory, and picture is written, picture is issued into first terminal, the identifying code Character string can also be used as preset validation confirmation information simultaneously, other specific generating modes no longer repeat one by one here.
Further, if it is the identifying code of topic pattern, the verification code information to be verified generated may include verification Code, the problem corresponding with identifying code description.Certainly, identifying code itself can also be a problem description, in this case, i.e., Make to be the identifying code for inscribing pattern, the problem description that verification code information can also not corresponded to, and only corresponding preset verification Confirmation message.It should be noted that the specific implementation mode of the present invention is not described with the concrete form of identifying code or problem Concrete type be limited, identifying code such as can be identifying code picture, speech identifying code, video verification code, problem describes example Such as can be multiple-choice question, gap-filling questions, interactive operation instruction.
When server generates a pair corresponding with authentication request verification code information to be verified and preset verification When confirmation message, server records the authentication request, the verification code information to be verified and the preset verification and confirms Correspondence between information, and verification code information to be verified is sent to the first terminal and is shown.
Step S13, according to the authentication request, the second terminal mutually bound to the account number with the first terminal is sent out Send validation confirmation information acquisition request.
Server can inquire the second terminal mutually bound with first terminal account number according to Accounts List, be sent out to second terminal Validation confirmation information acquisition request is sent, and records the corresponding pass of the authentication request and validation confirmation information acquisition request System.
Can also include command id corresponding with acquisition mode in validation confirmation information acquisition request, the order mark May include:Acquisition input character mark, for notifying the second terminal to acquire character input by user;Acquire voice signal Mark, for notifying the second terminal to open speech signal collection equipment (such as microphone);Or acquisition touch control gesture mark Show, for notifying the second terminal to be acquired (such as click, stroke etc.) to the touch control gesture of user using Touch Screen Acquisition.
In a kind of specific implementation mode of the present invention, identifying code can be by first terminal exhibition with corresponding problem description Show to user.In another specific implementation mode of the present invention, the verification code information to be verified only includes identifying code, institute It states and carries the problem description corresponding with the identifying code in validation confirmation information acquisition request, described problem description is whole by second End shows user.
Step S14 receives the validation confirmation information of the second terminal acquisition, and according to the preset verification confirmation letter It ceases the validation confirmation information for acquiring the second terminal to verify, is verified result.
If the collected validation confirmation information of second terminal (or being identifying code answer) is voice signal, touching signals When equal signals, server can further parse it after receiving the validation confirmation information that second terminal acquires, when So, corresponding parsing can also be completed by second terminal.The authentication request, to be verified that server records before The correspondence and the authentication request of verification code information and preset validation confirmation information and the validation confirmation information The correspondence for acquiring request verifies the validation confirmation information of second terminal acquisition, is verified result.
The verification result is returned to the first terminal by step S15.
Verification result can be showed user by first terminal after receiving verification result, if verification result be by Words, can also be directly entered next interface.
Auth method provided in this embodiment carries out authentication with line under type on bonding wire, utilizes server Verification code information is sent to first terminal with line upper type, validation confirmation information acquisition request is sent to second terminal, then Validation confirmation information is acquired by second terminal is lower online, finally validation confirmation information is verified by server, due to verification Confirmation message is that the verification code information judgement shown according to first terminal by user obtains, machine can be effectively prevent to crack, And since second terminal is mutually bound with the account number of first terminal, have uniqueness, can to avoid the decoded risk of code work, So as to solve the problems, such as existing image authentication code from multiple angles, the safety of subscriber authentication is enhanced Property.
Second embodiment
Fig. 3 is referred to, for the flow chart for the auth method that second embodiment of the invention provides;The present embodiment is service Auth method performed by device, the server in the present embodiment may include WEB server and authentication server, can be with Understand, in other specific implementation modes of the present invention, WEB server can also be integrated into a clothes with authentication server Business device.The verification method of the present embodiment includes the following steps:
Step S21, WEB server receive the authentication request that first terminal is sent, are taken in the authentication request Account number with the first terminal.
Step S22, the WEB server obtain and the identity according to the authentication request to authentication server The corresponding verification code information to be verified of checking request and preset validation confirmation information, and verification code information to be verified is sent out The first terminal is given to be shown.
In this step, authentication server can record the authentication request, the verification code information to be verified and Correspondence between the preset validation confirmation information, and verification code information to be verified is sent to WEB server, then Verification code information to be verified first terminal is sent to by WEB server to be shown.
Step S23, the authentication server are searched and described the according to the account number of the first terminal in Accounts List The second terminal that the account number of one terminal is mutually bound.
Step S24, the authentication server will validation confirmation information acquisition requests corresponding with the authentication request It is sent to the second terminal.
In this step, authentication server can also record the authentication request and be asked with validation confirmation information acquisition Between correspondence.
Step S25, the authentication server receive the validation confirmation information of the second terminal acquisition.
Step S26, the validation confirmation information that the authentication server acquires the second terminal are preset with described Validation confirmation information be compared, if comparison result is identical, verification result be pass through, if comparison result is different, Verification result is not pass through.
Step S27, the verification result is returned to WEB server by the authentication server, and will be tested by WEB server Card result is sent to the first terminal.
Above step similar part identical with first embodiment can also refer to the associated description in the first implementation, This is not repeated.
Auth method provided in this embodiment carries out authentication with line under type on bonding wire, utilizes server Verification code information is sent to first terminal with line upper type, validation confirmation information acquisition request is sent to second terminal, then Validation confirmation information is acquired by second terminal is lower online, finally validation confirmation information is verified by server, due to verification Confirmation message is that the verification code information judgement shown according to first terminal by user obtains, machine can be effectively prevent to crack, And since second terminal is mutually bound with the account number of first terminal, have uniqueness, can to avoid the decoded risk of code work, It solves the problems, such as existing image authentication code from multiple angles, enhances the safety of subscriber authentication.
3rd embodiment
Fig. 4 is referred to, for a kind of flow chart for auth method that third embodiment of the invention provides;The present embodiment is First terminal, second terminal and server interact performed auth method;This method may include following steps:
Step S31, first terminal send authentication request to server.
Step S32, the server according to the authentication request, generate verification code information to be verified with it is preset The verification code information to be verified is sent to the first terminal, and is asked according to the authentication by validation confirmation information The second terminal mutually bound to the account number with the first terminal is asked to send validation confirmation information acquisition request.
The verification code information to be verified is showed user by step S33, the first terminal.
Step S34, after the second terminal receives the validation confirmation information acquisition request, acquisition is by user according to institute The validation confirmation information for the verification code information input that first terminal is shown is stated, and the collected validation confirmation information of institute is sent To the server.
Step S35, the server are tested according to the preset validation confirmation information is collected to the second terminal Card confirmation message is verified, and is verified as a result, and the verification result is returned to the first terminal.
Above step can be referring to figs. 2 to the associated description of each embodiment in Fig. 3, and this will not be repeated here.
Auth method provided in this embodiment carries out authentication with line under type on bonding wire, utilizes server Verification code information is sent to first terminal with line upper type, validation confirmation information acquisition request is sent to second terminal, then Validation confirmation information is acquired by second terminal is lower online, finally validation confirmation information is verified by server, due to verification Confirmation message is that the verification code information judgement shown according to first terminal by user obtains, machine can be effectively prevent to crack, And since second terminal is mutually bound with the account number of first terminal, have uniqueness, can to avoid the decoded risk of code work, It solves the problems, such as existing image authentication code from multiple angles, enhances the safety of subscriber authentication.
Fourth embodiment
Fig. 5 is referred to, Fig. 5 is the flow chart for the auth method that fourth embodiment of the invention provides;The present embodiment is First terminal, second terminal and server interact performed auth method.This method may include following steps:
Step S401, first terminal send the authentication that authentication request is sent to server, the first terminal The account number of the first terminal is carried in request.
Step S402, the server generate verification code information to be verified and verification according to the authentication request Verification code information to be verified is sent to the first terminal by confirmation message.
Step S403, the server are searched and described first according to the account number of the first terminal in Accounts List Validation confirmation information acquisition request is sent to the second terminal by the second terminal that the account number of terminal is mutually bound.
The verification code information to be verified is showed user, issues the user with and carry by step S404, the first terminal Show information, the prompt message prompt user according to the verification code information to be verified, by with the identifying code to be verified The corresponding validation confirmation information of information inputs the speech signal collection equipment of the second terminal.
Step S405 opens voice signal and adopts after the second terminal receives the validation confirmation information acquisition request Collect equipment.
Step S406, the second terminal receive the collected voice input by user of speech signal collection equipment Signal.
Step S407, the second terminal parse the voice signal acquired, obtain the validation confirmation information.
Step S408, the server receive the validation confirmation information of the second terminal acquisition;
Step S409, the validation confirmation information that the second terminal is acquired and the preset validation confirmation information It is compared, if comparison result is identical, verification result is to pass through, if comparison result is different, verification result is obstructed It crosses.
The verification result is returned to the first terminal by step S410.
Fig. 6 is a kind of idiographic flow schematic diagram of auth method provided in this embodiment, below in conjunction with Fig. 6, with First terminal is laptop, second terminal is mobile phone, server includes WEB server and authentication server and verification Code information include identifying code picture and problem description for, the present embodiment is further described in detail.
First terminal sends authentication request to WEB server, and the first terminal is carried in authentication request Account number.After WEB server receives authentication request, verification corresponding with authentication request is obtained to authentication server Code picture, problem description and validation confirmation information, authentication server can record that the authentication request, this to be verified tests Demonstrate,prove the correspondence between code picture, problem description and validation confirmation information, and by identifying code picture to be verified, problem Description is sent to WEB server, then identifying code picture to be verified and problem description are sent to first eventually by WEB server End is shown.
Fig. 7 is please referred to, Fig. 7 is the identifying code picture shown by first terminal in a specific example of the embodiment of the present invention And the effect diagram of problem description.In the example, the identifying code picture that first terminal is shown is a nine grids figure Piece, nine grids picture include the image of 5 lattice kittens, the image of 2 lattice rabbits, 2 lattice doggies image, problem is described as " picture The most animal of middle occurrence number is (for option:Butterfly, elephant) ", corresponding default validation confirmation information is " elephant ".Further , first terminal can be sent out prompt message, prompt user to open the application of second terminal, such as QQ security centres, and say Go out the most animal of occurrence number in picture.
In addition, account number of the authentication server according to the first terminal, is searched and described first in Accounts List The second terminal that the account number of terminal is mutually bound.Authentication server adopts validation confirmation information corresponding with the authentication request Collection request is sent to the second terminal.Authentication server can also record the authentication request and be adopted with the validation confirmation information Correspondence between collection request.In this example, acquisition voice signal mark is carried in validation confirmation information acquisition request Show, for notifying the second terminal to open speech signal collection equipment.
Fig. 8 is please referred to, Fig. 8 is the verification confirmation letter shown by second terminal in a specific example of the embodiment of the present invention Cease the effect diagram of acquisition interface.In the example, user can be guided to be inputted by voice on the application interface of second terminal Validation confirmation information unclamps i.e. stopping etc. for example, guiding user pins button says validation confirmation information against microphone.Into One step, corresponding problem can also be described include in the interface, user see the identifying code picture that first terminal shows, After the operation indicating that problem describes and second terminal is shown, validation confirmation information, the Mike of second terminal are said by voice The sound that elegance collection user says in that time pinned, and it is identified parsing, it is converted into validation confirmation information.By It needs user that can just obtain answer by simply thinking deeply in this category information, therefore machine can be effectively prevented from and cracked.
Validation confirmation information after parsing is sent to authentication server by second terminal, and authentication server adopts second terminal The validation confirmation information of collection is compared with the preset validation confirmation information, if comparison result is identical, verification result To pass through, if comparison result is different, verification result is not pass through.In above-mentioned specific example, if what user said is butterfly Butterfly is then verified and is not passed through, if what user said is elephant, is verified.Finally, it is verified that server returns the verification result The first terminal is transmitted verification result to back to WEB server, and by WEB server.First terminal can tie verification Fruit shows user, if the verification passes, can also be directly entered next interface.
Bodily movement of practising Wushu verification method provided in an embodiment of the present invention carries out authentication with line under type on bonding wire, utilizes clothes Verification code information is sent to first terminal with line upper type, validation confirmation information acquisition request is sent to second eventually by business device End, then validation confirmation information is acquired by second terminal is lower online, finally validation confirmation information is verified by server, due to Validation confirmation information is that the verification code information judgement shown according to first terminal by user obtains, machine can be effectively prevent broken Solution, and since second terminal is mutually bound with the account number of first terminal, there is uniqueness, it can be to avoid the decoded wind of code work Danger, solves the problems, such as existing image authentication code from multiple angles, enhances the safety of subscriber authentication.Separately Outside, in this present embodiment, it needs to look at identifying code picture shown on first terminal and problem description with eyes in user, Answer is said against second terminal again, completely without being manually entered, reduces the interaction threshold of user, in user Also good improvement has been obtained in experience.
An embodiment of the present invention provides a kind of computer storage media, the computer storage media has program stored therein, should Program includes all or part of step of method shown in Fig. 2 to Fig. 8 any embodiments when executing.
5th embodiment
Fig. 9 is referred to, for the structural schematic diagram for the authentication means that fifth embodiment of the invention provides;The present embodiment carries The device of confession can run on server, and the authentication means 50 may include:Checking request receiving module 51, verification confirm Information sending module 52, acquisition request sending module 53, answer receive authentication module 54, verification result sending module 55.
Wherein, checking request receiving module 51 is used to receive the authentication request of first terminal transmission;Verify confirmation letter Sending module 52 is ceased to be used to, according to the authentication request, generate verification code information to be verified and preset verification confirmation letter Breath, and verification code information to be verified is sent to the first terminal and is shown;It acquires request sending module 53 and is used for root According to the authentication request, the second terminal mutually bound to the account number with the first terminal sends validation confirmation information acquisition Request;Answer receives the validation confirmation information that authentication module 54 is used to receive the second terminal acquisition, and according to described default Validation confirmation information validation confirmation information that the second terminal is acquired verify, be verified result;And verification As a result sending module 55 is used to the verification result returning to the first terminal.
In a kind of specific implementation mode of the present invention, the verification code information to be verified may include:Identifying code with And the problem description corresponding with the identifying code.
In another specific implementation mode of the present invention, the verification code information to be verified includes identifying code, described The problem description corresponding with the identifying code is carried in validation confirmation information acquisition request.
It should be noted that the function of each function module of the embodiment of the present invention can be according to the side in above method embodiment Method implements, and specific implementation process is referred to the associated description of above method embodiment, and this will not be repeated here.
Authentication means provided in this embodiment carry out authentication with line under type on bonding wire, utilize server Verification code information is sent to first terminal with line upper type, validation confirmation information acquisition request is sent to second terminal, then Validation confirmation information is acquired by second terminal is lower online, finally validation confirmation information is verified by server, due to verification Confirmation message is that the verification code information judgement shown according to first terminal by user obtains, machine can be effectively prevent to crack, And since second terminal is mutually bound with the account number of first terminal, have uniqueness, can to avoid the decoded risk of code work, So as to solve the problems, such as existing image authentication code from multiple angles, the safety of subscriber authentication is enhanced Property.
Sixth embodiment
Figure 10 is referred to, for the structural schematic diagram for the authentication means that sixth embodiment of the invention provides;The present embodiment The device of offer can run on server, and the authentication means 60 may include:Checking request receiving module 61, verification are true Recognize information sending module 62, acquisition request sending module 63, answer reception authentication module 64, verification result sending module 65.
Wherein, checking request receiving module 61 is used to receive the authentication request of first terminal transmission;Verify confirmation letter Sending module 62 is ceased to be used to, according to the authentication request, generate verification code information to be verified and preset verification confirmation letter Breath, and verification code information to be verified is sent to the first terminal and is shown;It acquires request sending module 63 and is used for root According to the authentication request, the second terminal mutually bound to the account number with the first terminal sends validation confirmation information acquisition Request;Answer receives the validation confirmation information that authentication module 64 is used to receive the second terminal acquisition, and according to described default Validation confirmation information validation confirmation information that the second terminal is acquired verify, be verified result;And verification As a result sending module 65 is used to the verification result returning to the first terminal.
In this present embodiment, the first terminal can be carried in the authentication request that the first terminal is sent Account number, further, the acquisition request sending module 63 may include:Searching unit 631, for according to the first terminal Account number, searched in Accounts List and the second terminal mutually bound of account number of the first terminal;Transmission unit 632, is used for Validation confirmation information acquisition request is sent to the second terminal.
In this present embodiment, the answer reception authentication module 64 may include:Receiving unit 641, it is described for receiving The validation confirmation information of second terminal acquisition;Comparing unit 642, the verification confirmation letter for acquiring the second terminal Breath is compared with the preset validation confirmation information, if comparison result is identical, verification result is to pass through, if compared As a result different, then verification result is not pass through.
Further, the validation confirmation information acquisition request includes command id corresponding with acquisition mode, described Order indicates:Acquisition input character mark, for notifying the second terminal to acquire character input by user;Acquire voice Signal signature, for notifying the second terminal to open speech signal collection equipment;Or acquisition touch control gesture mark, for leading to Know that the second terminal is acquired the touch control gesture of user using Touch Screen.
It should be noted that the function of each function module of the device of the embodiment of the present invention can be according to above method embodiment In method specific implementation, specific implementation process is referred to the associated description of above method embodiment, and this will not be repeated here.
Authentication means provided in this embodiment carry out authentication with line under type on bonding wire, utilize server Verification code information is sent to first terminal with line upper type, validation confirmation information acquisition request is sent to second terminal, then Validation confirmation information is acquired by second terminal is lower online, finally validation confirmation information is verified by server, due to verification Confirmation message is that the verification code information judgement shown according to first terminal by user obtains, machine can be effectively prevent to crack, And since second terminal is mutually bound with the account number of first terminal, have uniqueness, can to avoid the decoded risk of code work, So as to solve the problems, such as existing image authentication code from multiple angles, the safety of subscriber authentication is enhanced Property.
7th embodiment
Figure 11 is referred to, for the structural schematic diagram for the authentication system that seventh embodiment of the invention provides;The present embodiment The system 70 of offer may include:First terminal 71, the second terminal 72 mutually bound with the account number of the first terminal and clothes Business device 73.
Wherein, first terminal 71 is for sending authentication request to the server 73;
The server 73, according to the authentication request, generates to be verified for receiving the authentication request Verification code information and preset validation confirmation information, verification code information to be verified is sent to the first terminal 71, and According to the authentication request validation confirmation information acquisition request is sent to the second terminal 72;
The first terminal 71 is additionally operable to the verification code information to be verified showing user;
After the second terminal 72 is for receiving the validation confirmation information acquisition request, acquisition is by user according to described The validation confirmation information for the verification code information input that first terminal is shown, and the collected validation confirmation information of institute is sent to The server;
The server is additionally operable to test according to the preset validation confirmation information is collected to the second terminal 72 Card confirmation message is verified, and is verified as a result, and the verification result is returned to the first terminal 71;And
The first terminal 71 is additionally operable to the verification result showing the user.
In a kind of specific implementation mode of the present invention, the verification code information to be verified may include:Identifying code with And the problem description corresponding with the identifying code.
In another specific implementation mode of the present invention, the verification code information to be verified includes identifying code, described The problem description corresponding with the identifying code is carried in validation confirmation information acquisition request.
It should be noted that the function of each function module of the device of the embodiment of the present invention can be according to above method embodiment In method specific implementation, specific implementation process is referred to the associated description of above method embodiment, and this will not be repeated here.
Authentication system provided in this embodiment carries out authentication with line under type on bonding wire, utilizes server Verification code information is sent to first terminal with line upper type, validation confirmation information acquisition request is sent to second terminal, then Validation confirmation information is acquired by second terminal is lower online, finally validation confirmation information is verified by server, due to verification Confirmation message is that the verification code information judgement shown according to first terminal by user obtains, machine can be effectively prevent to crack, And since second terminal is mutually bound with the account number of first terminal, have uniqueness, can to avoid the decoded risk of code work, So as to solve the problems, such as existing image authentication code from multiple angles, the safety of subscriber authentication is enhanced Property.
8th embodiment
Figure 12 is referred to, for the structural schematic diagram for the authentication system that eighth embodiment of the invention provides;The present embodiment The system 80 of offer may include:First terminal 81, the second terminal 82 mutually bound with the account number of the first terminal and clothes Business device 83.
Wherein, first terminal 81 is for sending authentication request to the server 83;
The server 83, according to the authentication request, generates to be verified for receiving the authentication request Verification code information and preset validation confirmation information, verification code information to be verified is sent to the first terminal 81, and And send validation confirmation information acquisition request to the second terminal 82;
The first terminal 81 is additionally operable to the verification code information to be verified showing user;
After the second terminal 82 is for receiving the validation confirmation information acquisition request, acquisition is by user according to described The validation confirmation information of verification code information input, and the collected validation confirmation information of institute is sent to the server;
The server is additionally operable to according to the preset validation confirmation information, collected to the second terminal 82 to test Card confirmation message is verified, and is verified as a result, and the verification result is returned to the first terminal 81;And
The first terminal 81 is additionally operable to the verification result showing the user.
While the verification code information to be verified is showed user by the first terminal 81, it is additionally operable to send out to user Go out prompt message, the prompt message prompts user according to the verification code information, corresponding with the verification code information will test It demonstrate,proves confirmation message and inputs the second terminal 82.
In the specific implementation mode of the present invention, the second terminal 82 includes speech signal collection equipment 821, described Second terminal 82 further includes:
Collecting device opening module 822 opens voice signal after receiving the validation confirmation information acquisition request Collecting device;
Voice signal receiving module 823, it is collected input by user for receiving the speech signal collection equipment Voice signal;
Voice signal parsing module 824 obtains the validation confirmation information for being parsed to the voice signal.
It should be noted that the function of each function module of the device of the embodiment of the present invention can be according to above method embodiment In method specific implementation, specific implementation process is referred to the associated description of above method embodiment, and this will not be repeated here.
Authentication system provided in this embodiment carries out authentication with line under type on bonding wire, utilizes server Verification code information is sent to first terminal with line upper type, validation confirmation information acquisition request is sent to second terminal, then Validation confirmation information is acquired by second terminal is lower online, finally validation confirmation information is verified by server, due to verification Confirmation message is that the verification code information judgement shown according to first terminal by user obtains, machine can be effectively prevent to crack, And since second terminal is mutually bound with the account number of first terminal, have uniqueness, can to avoid the decoded risk of code work, So as to solve the problems, such as existing image authentication code from multiple angles, the safety of subscriber authentication is enhanced Property.
It should be noted that each embodiment in this specification is described in a progressive manner, each embodiment weight Point explanation is all difference from other examples, and the same or similar parts between the embodiments can be referred to each other. For device class embodiment, since it is basically similar to the method embodiment, so fairly simple, the related place ginseng of description See the part explanation of embodiment of the method.
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements include not only those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including institute State in process, method, article or the device of element that there is also other identical elements.
One of ordinary skill in the art will appreciate that realizing that all or part of step of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can be stored in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The above described is only a preferred embodiment of the present invention, be not intended to limit the present invention in any form, though So the present invention has been disclosed as a preferred embodiment, and however, it is not intended to limit the invention, any technology people for being familiar with this profession Member, without departing from the scope of the present invention, when the technology contents using the disclosure above make a little change or modification For the equivalent embodiment of equivalent variations, as long as be without departing from technical solution of the present invention content, it is right according to the technical essence of the invention Any simple modification, equivalent change and modification made by above example, in the range of still falling within technical solution of the present invention.

Claims (24)

1. a kind of auth method, which is characterized in that including:
Server receives the authentication request that first terminal is sent;
According to the authentication request, verification code information to be verified and preset validation confirmation information are generated, and will be to be tested The verification code information of card is sent to the first terminal and is shown;
According to the authentication request, the second terminal mutually bound to the account number with the first terminal sends verification confirmation letter Breath acquisition request, so that second terminal acquisition is inputted by user according to the verification code information that the first terminal is shown Validation confirmation information;
The validation confirmation information of the second terminal acquisition is received, and according to the preset validation confirmation information to described second The validation confirmation information of terminal acquisition is verified, and result is verified;And
The verification result is returned into the first terminal.
2. the method as described in claim 1, which is characterized in that carried in the authentication request that the first terminal is sent The account number of the first terminal, the second terminal mutually bound to the account number with the first terminal send validation confirmation information The step of acquisition request, including:
The server is searched in Accounts List and is mutually tied up with the account number of the first terminal according to the account number of the first terminal Fixed second terminal;
Validation confirmation information acquisition request is sent to the second terminal by the server.
3. the method as described in claim 1, which is characterized in that the verification confirmation letter for receiving the second terminal acquisition Breath, and verified according to the validation confirmation information that the preset validation confirmation information acquires the second terminal, it obtains The step of verification result, including:
The server receives the validation confirmation information of the second terminal acquisition;
The validation confirmation information that the second terminal acquires is compared with the preset validation confirmation information;
If comparison result is identical, verification result is to pass through, if comparison result is different, verification result is not pass through.
4. the method as described in claim 1, which is characterized in that the verification code information to be verified includes:Identifying code and The problem description corresponding with the identifying code.
5. the method as described in claim 1, which is characterized in that the verification code information to be verified includes identifying code, described The problem description corresponding with the identifying code is carried in validation confirmation information acquisition request, described problem is described by described second Terminal display is to user.
6. the method as described in claim 1, which is characterized in that the validation confirmation information acquires request and includes and acquisition side The corresponding command id of formula, the order mark include:
Acquisition input character mark, for notifying the second terminal to acquire character input by user;
Voice signal mark is acquired, for notifying the second terminal to open speech signal collection equipment;Or
Touch control gesture mark is acquired, for notifying the second terminal to be adopted to the touch control gesture of user using Touch Screen Collection.
7. a kind of auth method, which is characterized in that including:
First terminal sends authentication request to server;
The server generates verification code information to be verified and preset verification confirmation letter according to the authentication request Verification code information to be verified is sent to the first terminal by breath, and according to the authentication request to described first The second terminal that the account number of terminal is mutually bound sends validation confirmation information acquisition request;
The verification code information to be verified is showed user by the first terminal;
After the second terminal receives the validation confirmation information acquisition request, acquisition is by user according to the first terminal institute The validation confirmation information of the verification code information input of displaying, and the collected validation confirmation information of institute is sent to the service Device;And
The server according to the preset validation confirmation information to the collected validation confirmation information of the second terminal into Row verification, is verified as a result, and the verification result is returned to the first terminal.
8. the method for claim 7, which is characterized in that the verification code information to be verified includes:Identifying code and The problem description corresponding with the identifying code.
9. the method for claim 7, which is characterized in that the verification code information to be verified includes identifying code, described The problem description corresponding with the identifying code is carried in validation confirmation information acquisition request, described problem is described by described second Terminal display is to user.
10. the method for claim 7, which is characterized in that the first terminal is by the verification code information to be verified While showing user, prompt message is also issued the user with, the prompt message prompts the user according to the identifying code Validation confirmation information corresponding with the verification code information is inputted the second terminal by information.
11. the method for claim 7, which is characterized in that the validation confirmation information acquires request and includes and acquisition The corresponding command id of mode, the order mark include:
Acquisition input character mark, to notify the second terminal to acquire character input by user;
Voice signal mark is acquired, to notify the second terminal to open speech signal collection equipment;Or
Touch control gesture mark is acquired, to notify the second terminal to be acquired to the touch control gesture of user using Touch Screen.
12. the method for claim 7, which is characterized in that the second terminal receives the validation confirmation information and adopts The step of collecting after asking, acquiring the validation confirmation information inputted according to the verification code information by user, including:
After the second terminal receives the validation confirmation information acquisition request, speech signal collection equipment is opened;
Receive the collected voice signal input by user of the speech signal collection equipment;
The voice signal acquired is parsed, the validation confirmation information is obtained.
13. a kind of authentication means, run on server, which is characterized in that including:
Checking request receiving module, the authentication request for receiving first terminal transmission;
Validation confirmation information sending module, for according to the authentication request, generate verification code information to be verified with it is pre- If validation confirmation information, and verification code information to be verified is sent to the first terminal and is shown;
Request sending module is acquired, for according to the authentication request, mutually being bound to the account number with the first terminal Second terminal sends validation confirmation information acquisition request, so that the second terminal is acquired by user according to the first terminal The validation confirmation information of the verification code information input shown;
Answer receives authentication module, the validation confirmation information for receiving the second terminal acquisition, and according to described preset The validation confirmation information that validation confirmation information acquires the second terminal is verified, and result is verified;And
Verification result sending module, for the verification result to be returned to the first terminal.
14. device as claimed in claim 13, which is characterized in that carried in the authentication request that the first terminal is sent There are the account number of the first terminal, the acquisition request sending module to include:
Searching unit searches the account number with the first terminal for the account number according to the first terminal in Accounts List The mutually second terminal of binding;
Transmission unit, for validation confirmation information acquisition request to be sent to the second terminal.
15. device as claimed in claim 13, which is characterized in that the verification code information to be verified includes:Identifying code with And the problem description corresponding with the identifying code.
16. device as claimed in claim 13, which is characterized in that the verification code information to be verified includes identifying code, institute It states and carries corresponding with identifying code problem description in validation confirmation information acquisition request, described problem description is by described the Two terminal displays are to user.
17. device as claimed in claim 13, which is characterized in that the answer receives authentication module and includes:
Receiving unit, the validation confirmation information for receiving the second terminal acquisition;
Comparing unit, the validation confirmation information for acquiring the second terminal and the preset validation confirmation information It is compared, if comparison result is identical, verification result is to pass through, if comparison result is different, verification result is obstructed It crosses.
18. device as claimed in claim 13, which is characterized in that the validation confirmation information acquires request and includes and acquisition The corresponding command id of mode, the order mark include:
Acquisition input character mark, for notifying the second terminal to acquire character input by user;
Voice signal mark is acquired, for notifying the second terminal to open speech signal collection equipment;Or
Touch control gesture mark is acquired, for notifying the second terminal to be adopted to the touch control gesture of user using Touch Screen Collection.
19. a kind of authentication system, which is characterized in that including:First terminal is mutually bound with the account number of the first terminal Second terminal and server,
The first terminal is for sending authentication request to the server;
The server is used to, according to the authentication request, generate verification code information to be verified and with preset verification confirm Verification code information to be verified is sent to the first terminal and is shown by information, and according to the authentication request to The second terminal sends validation confirmation information acquisition request;
The first terminal is additionally operable to the verification code information to be verified showing user;
After the second terminal is for receiving the validation confirmation information acquisition request, acquisition is whole according to described first by user The validation confirmation information of the shown verification code information input in end, and the collected validation confirmation information of institute is sent to the clothes Business device;And
The server is additionally operable to be confirmed according to preset validation confirmation information verification collected to the second terminal Information is verified, and is verified as a result, and the verification result is returned to the first terminal.
20. system as claimed in claim 19, which is characterized in that the verification code information to be verified includes:Identifying code with And the problem description corresponding with the identifying code.
21. system as claimed in claim 19, which is characterized in that the verification code information to be verified includes identifying code, institute It states and carries corresponding with identifying code problem description in validation confirmation information acquisition request, described problem description is by described the Two terminal displays are to user.
22. system as claimed in claim 19, which is characterized in that the first terminal is additionally operable to issue the user with prompt letter Breath, the prompt message prompt user according to the verification code information, will verification confirmation letter corresponding with the verification code information Breath inputs the second terminal.
23. system as claimed in claim 19, which is characterized in that the validation confirmation information acquires request and includes and acquisition The corresponding command id of mode, the order mark include:
Acquisition input character mark, for notifying the second terminal to acquire character input by user;
Voice signal mark is acquired, for notifying the second terminal to open speech signal collection equipment;Or
Touch control gesture mark is acquired, for notifying the second terminal to be adopted to the touch control gesture of user using Touch Screen Collection.
24. system as claimed in claim 19, which is characterized in that the second terminal includes speech signal collection equipment, institute Stating second terminal further includes:
Collecting device opening module is opened speech signal collection and is set after receiving the validation confirmation information acquisition request It is standby;
Voice signal receiving module, for receiving the collected voice letter input by user of the speech signal collection equipment Number;
Voice signal parsing module obtains the validation confirmation information for being parsed to the voice signal acquired.
CN201310515705.2A 2013-10-28 2013-10-28 Auth method, apparatus and system Active CN104580117B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310515705.2A CN104580117B (en) 2013-10-28 2013-10-28 Auth method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310515705.2A CN104580117B (en) 2013-10-28 2013-10-28 Auth method, apparatus and system

Publications (2)

Publication Number Publication Date
CN104580117A CN104580117A (en) 2015-04-29
CN104580117B true CN104580117B (en) 2018-07-27

Family

ID=53095312

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310515705.2A Active CN104580117B (en) 2013-10-28 2013-10-28 Auth method, apparatus and system

Country Status (1)

Country Link
CN (1) CN104580117B (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10015364B2 (en) * 2015-05-11 2018-07-03 Pictureworks Pte Ltd System and method for previewing digital content
CN105100067B (en) * 2015-06-26 2018-09-18 上海庆科信息技术有限公司 A kind of high in the clouds Activiation method and system
CN105208011B (en) * 2015-08-31 2019-07-30 努比亚技术有限公司 A kind of verifying system and method
US10657244B2 (en) 2015-10-26 2020-05-19 Tencent Technology (Shenzhen) Company Limited Identity authentication method and apparatus
CN106612181A (en) * 2015-10-26 2017-05-03 腾讯科技(深圳)有限公司 Identity verification method and device
CN106713241B (en) * 2015-11-16 2019-09-27 腾讯科技(深圳)有限公司 A kind of auth method, device and system
WO2017084337A1 (en) 2015-11-16 2017-05-26 腾讯科技(深圳)有限公司 Identity verification method, apparatus and system
CN105721468B (en) * 2016-02-17 2021-11-16 阿里巴巴集团控股有限公司 Communication method and device
CN106487785B (en) * 2016-09-28 2019-07-23 武汉理工大学 A kind of authentication identifying method and system based on mobile terminal
CN106878018B (en) * 2016-12-30 2020-04-07 腾讯科技(深圳)有限公司 Operation verification method and device
CN111835714A (en) * 2017-07-11 2020-10-27 创新先进技术有限公司 Information verification processing method, client and server
CN109271773A (en) * 2017-07-18 2019-01-25 阿里巴巴集团控股有限公司 Man-machine identification, verifying, data processing method and device
CN109670291B (en) 2017-10-17 2022-08-09 腾讯科技(深圳)有限公司 Verification code implementation method and device and storage medium
CN111353140B (en) * 2018-12-24 2024-03-22 阿里巴巴集团控股有限公司 Verification code generation and display method, device and system
CN110941805B (en) * 2019-11-21 2022-06-10 北京达佳互联信息技术有限公司 Identity authentication method and device
CN110929237A (en) * 2019-11-22 2020-03-27 支付宝(杭州)信息技术有限公司 Identity verification system, method and device and information verification system
CN111695096B (en) * 2020-05-29 2023-11-21 拉卡拉支付股份有限公司 Identity verification method and device
CN111667274A (en) * 2020-06-16 2020-09-15 中国银行股份有限公司 Authentication method and related equipment
CN112328990A (en) * 2020-10-30 2021-02-05 平安信托有限责任公司 Screen control method and device based on identity authentication and computer equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102841997A (en) * 2012-07-10 2012-12-26 郭小卫 Method and device for achieving authentication on intelligent device by mobile terminal
CN103067381A (en) * 2012-12-26 2013-04-24 百度在线网络技术(北京)有限公司 Third-party service login method, login system and login device by means of platform-party account
CN103327100A (en) * 2013-06-21 2013-09-25 华为技术有限公司 Resource processing method and site server

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012042262A1 (en) * 2010-09-28 2012-04-05 Barclays Bank Plc Mobile payment system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102841997A (en) * 2012-07-10 2012-12-26 郭小卫 Method and device for achieving authentication on intelligent device by mobile terminal
CN103067381A (en) * 2012-12-26 2013-04-24 百度在线网络技术(北京)有限公司 Third-party service login method, login system and login device by means of platform-party account
CN103327100A (en) * 2013-06-21 2013-09-25 华为技术有限公司 Resource processing method and site server

Also Published As

Publication number Publication date
CN104580117A (en) 2015-04-29

Similar Documents

Publication Publication Date Title
CN104580117B (en) Auth method, apparatus and system
CN103533392B (en) A kind of account login method, electronic equipment and system
CN104702406B (en) Auth method and device
CN103840944B (en) A kind of short message authentication method, server and system
CN104113551B (en) A kind of platform authorization method, platform service end and applications client and system
CN104917612B (en) Auth method and device
CN104618315B (en) A kind of method, apparatus and system of verification information push and Information Authentication
CN105407074A (en) Authentication method, apparatus and system
CN106209725A (en) Method, video conference central server and system for video conference certification
CN103514773A (en) Monitoring realization-based on-line examination system and method
CN104820944A (en) Method and system for bank self-service terminal authentication, and device
CN104954131B (en) The verification method and system of identifying code
CN105162802B (en) Portal authentication method and certificate server
CN105827406A (en) Identity verification method, identity verification device, and identity verification system
CN103001934B (en) The method and system that terminal applies logs in
CN104901924A (en) Internet account verifying method and device
CN102946396A (en) User agent device, host web server and user authentication method
CN105119880B (en) A kind of account login method, system, user terminal and server
CN104935436B (en) A kind of user authentication method and system
CN107483208A (en) Generation, verification method and the device of identifying code picture
CN105871900A (en) Identity authentication method and system
CN105577692A (en) Website login authentication method and device
EP2824953A1 (en) User terminal for password-based authentication, and password-based trading terminal, system, and method
CN105205382A (en) Two-dimension code identity authentication method and device
CN108521443B (en) The upgrade method and system and terminal and computer readable storage medium of a kind of application

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant