CN104639519B - A kind of verification method and device - Google Patents

A kind of verification method and device Download PDF

Info

Publication number
CN104639519B
CN104639519B CN201310572031.XA CN201310572031A CN104639519B CN 104639519 B CN104639519 B CN 104639519B CN 201310572031 A CN201310572031 A CN 201310572031A CN 104639519 B CN104639519 B CN 104639519B
Authority
CN
China
Prior art keywords
wlan
wlans
residing
terminal
specified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310572031.XA
Other languages
Chinese (zh)
Other versions
CN104639519A (en
Inventor
王磊
孟超峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201310572031.XA priority Critical patent/CN104639519B/en
Priority to CN201810785097.XA priority patent/CN109067715B/en
Publication of CN104639519A publication Critical patent/CN104639519A/en
Application granted granted Critical
Publication of CN104639519B publication Critical patent/CN104639519B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

A kind of verification method of the application offer and device, this method include:Receive the request of specific operation, the WLAN information for asking to carry one or more WLANs that the terminal for sending the request is presently in;According to the WLAN information, verify whether at least one of one or more WLANs residing for the terminal are specified WLANs, wherein the specified WLAN is pre-set one or more specified WLANs;And according to verification as a result, the specific operation is further processed.By using the technical solution of the application, when the specific operation of application is triggered, only used terminal is in specified WLAN, which is just allowed to run, and can enhance the safety in utilization of the specific operation of application.

Description

A kind of verification method and device
Technical field
This application involves Internet technical field more particularly to a kind of verification methods and device.
Background technology
Currently, various applications emerge one after another, the safety in utilization of application is particularly important, and is paid close attention to by users, There is the safety in utilization Means of Ensuring of the applications such as short-message verification, the hardware digital certification authentication based on mobile terminal at present.
Short-message verification is mainly used in mobile phone terminal, and when being verified, system can be tied up to user account Fixed phone number sends short message verification code, when user inputs correct identifying code on the page in corresponding input frame, that is, leads to Cross verification.The process of this verification mode, verification is comparatively safe and simple, but in the case that the account of user is stolen, verification Code is also easy to be defrauded of, and entire security system can be caused to be broken, What is more by way of reporting the loss original SIM card and mending card Directly get around all safety measures.
Hardware digital certificate(USBkey)Verification, USB Key are a kind of hardware devices of USB interface, it is built-in CPU, Memory, chip operating system can store and represent user's unique identities digital certificate and private key for user, using built in USBKey Certification of the cryptographic algorithms' implementation to user identity.The private key of user is generated in the USBKey of high degree of safety, and lifelong It can not export to outside USBKey.Based on the verification mode of USB Key, special hardware is needed, is generally only used for desk-top Computer, laptop etc. have in the equipment of USB interface, and it is further desired that digital certificate drive software is installed in equipment, Therefore, be not suitable for using on mobile terminals.
Therefore, need at present it is a kind of can improve using safety, and safe verification method easy to implement.
Invention content
The main purpose of the application is to provide a kind of verification method and device, to solve of the existing technology above-mentioned ask Topic, wherein:
The application provides a kind of verification method, including:The request of specific operation is received, the request carries transmission, and this is asked The WLAN information of one or more WLANs residing for the terminal asked;According to the WLAN information, test Demonstrate,prove whether at least one of one or more WLANs residing for the terminal are specified WLANs, wherein The specified WLAN is pre-set one or more specified WLANs;And the knot according to verification The specific operation is further processed in fruit.
The another aspect of the application provides a kind of verification device, including:Receiving module, for receiving asking for specific operation It asks, the request carries the WLAN information of one or more WLANs residing for the terminal for sending the request; Authentication module, for according to the WLAN information, verifying in one or more WLANs residing for the terminal It is at least one whether be specified WLAN, wherein the specified WLAN be pre-set one or Multiple specified WLANs;And processing module, it is used for according to verification as a result, being carried out in next step to the specific operation Processing.
Compared with prior art, according to the technical solution of the application, it can be set only in pre- for specific operation It is just allowed to run in the specified WLAN being first arranged, enhances the safety in utilization of the specific operation of application.
Description of the drawings
Attached drawing described herein is used for providing further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please do not constitute the improper restriction to the application for explaining the application.In the accompanying drawings:
Fig. 1 is a kind of flow chart of verification method of the embodiment of the present application;
Fig. 2 is a kind of flow chart of embodiment of verification method of the embodiment of the present application;
Fig. 3 is the schematic diagram of the verification of the embodiment of the present application;And
Fig. 4 is a kind of structure diagram of verification device of the embodiment of the present application.
Specific implementation mode
The main idea of the present application lies in that for the specific operation of application, specified WLAN can be set(Such as Wi-fi LANs)As the WLAN of safety, and specific operation ability in the specified radio local network environment is set Be allowed to execute, with enhance using when safety.
To keep the purpose, technical scheme and advantage of the application clearer, below in conjunction with the application specific embodiment and Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing Go out the every other embodiment obtained under the premise of creative work, shall fall in the protection scope of this application.
According to an embodiment of the present application, a kind of verification method is provided, this method can be applied to can access wireless local To the verification of the safety in utilization of the specific operation of application in the terminal of net, it is particularly possible to be applied to wi-fi functions The safety in utilization of the specific operation of client application on mobile terminal is verified.
With reference to figure 1, Fig. 1 is a kind of flow chart of verification method of the embodiment of the present application, as shown in Figure 1, in step S101 In, the request of specific operation is received, the request carries the terminal for sending the request(Run the terminal of the specific operation) The WLAN information of residing one or more WLANs.Wherein, one residing for the terminal for sending the request A or multiple WLANs may include:The WLAN and/or the terminal that the terminal has currently accessed currently may be used One or more WLANs of access.The WLAN information includes:The WLAN that is currently accessed and/or work as The information of preceding accessible WLAN.
For example, user triggers the delivery operation of payment application, then the delivery operation sends to correspondingly server and pays Request.To which server receives the payment request, wherein the request carries the terminal for sending the request(Such as mobile phone) The WLAN information of residing one or more WLANs.Since user is provided with wireless local for delivery operation Net authentication function, so the request carries the WLAN information of one or more WLANs residing for the terminal.
In step s 102, according to the WLAN information, the one or more verified residing for the terminal is wireless Whether at least one of LAN is specified WLAN.
The specified WLAN is pre-set one or more specified WLANs, when the terminal When having accessed or can access one or more of specified WLANs, the specific operation is allowed to run.
In step s 103, according to verification as a result, the specific operation is further processed.Wherein, to described The next step that specific operation carries out is handled:If in one or more WLANs residing for the terminal extremely Few one is the specified WLAN, then the operation for the specific operation of letting pass;If one residing for the terminal Or multiple WLANs are not the specified WLANs, then intercept the request and/or termination of the specific operation The operation of the specific operation.
According to one embodiment of the application, when receiving the request of the specific operation(Carry out step S102 it Before), can also include the steps that whether inquiry needs to verify residing WLAN for the specific operation, if be directed to The WLAN that the specific operation need not be verified, the then operation for the specific operation of letting pass;If for described specific Operation needs to verify residing WLAN, then carries out step S102~S103 again.
In order to more clearly describe the technical solution of the embodiment of the present application, it is described in detail below with reference to Fig. 2.
As shown in Fig. 2, in step s 201, receiving the request of specific operation.Wherein, the specific operation can be application Specific operation.
For example, user triggers the delivery operation of payment application, delivery operation sends payment request to server accordingly.
Wherein, the request carries the wireless office of one or more WLANs residing for the terminal for sending the request Domain net information.The specific operation can be one or more operations of application, for example, when being paid using payment application Delivery operation etc., and it is possible to be in advance specific operation by one or more operation settings of application.The transmission request Terminal(Run the terminal of the specific operation)Residing one or more WLANs may include:The terminal has currently connect The currently accessible one or more WLANs of the WLAN and/or the terminal that enter, that is to say, that the terminal is worked as Which or the coverage area of multiple WLANs the WLAN of preceding access and/or the terminal are in.It is described wireless LAN Information includes:The information of the current WLAN accessed and/or the currently accessible wireless office of one or more The information of domain net.The WLAN information may include:The network identity of the current WLAN accessed(For example, SSID)And/or access device identification(For example, the addresses mac)And/or the net of currently accessible one or more WLANs Network identifies and/or access device identification.
For example, user triggers the delivery operation of payment application using application is paid on mobile phone(The delivery operation is should One specific operation of application), then the delivery operation is to correspondingly server transmission payment request.To which server receives The request, and the mobile phone for sending the request is carried in the request(That is, the mobile phone that user uses)WLAN information, That is, the mobile phone is currently accessed which WLAN or the mobile phone is currently at the covering of which or multiple WLANs In range.The mobile phone may currently access a WLAN or the mobile phone is currently at covering for multiple WLANs Within the scope of lid, for example, the mobile phone is currently in the coverage area of wi-fi LANs A, B, C, D, E, F, and access wi-fi innings Net B in domain.Then the WLAN information of the WLAN residing for the mobile phone may include:Wi-fi LANs A, B, C, D, E, F Network identity and/or access device identification.
Verification method provided by the present application can be used for move eventually in mobile phone, tablet computer etc. with wi-fi functions It is verified when on end using the specific operation of application, can be used for that wireless office can be being accessed by equipment such as wireless network cards It is verified when in the terminals such as laptop, the desktop computer of domain net using the specific operation of application.As long as used end End has access to WLAN, and can run application on the terminal(The application is not limited to client application, webpage Using).For example, user is paid on the laptop for have access to WLAN by webpage payment application, use Family triggers delivery operation(The delivery operation is a specific operation of the application)When, which is verified.
In step S202, whether inquiry needs to verify residing WLAN for the specific operation.For institute It states whether specific operation needs to verify residing WLAN, is configured in advance, can account be advanced with by user Number logging in application is configured, and can be stored in server end.If need not be verified for the specific operation residing WLAN thens follow the steps S205, the operation for the specific operation of letting pass.That is, allowing the specific operation according to normal Flow is executed to execute, for example, when user executes the confirmation delivery operation of payment application, if inquiry is for confirmation payment behaviour Work need not verify current radio local network environment, then the confirmation operation of letting pass, and be executed according to normal flow, for example, carrying Showing that user inputs payment cipher, whether after user inputs payment cipher, it is correct to verify the password, if password is correct, basis The information such as the amount of money input by user, the side's of being paid for account execute payment.
The WLAN verified is needed for the specific operation if inquired, thens follow the steps S203.For example, with Family is safety when ensureing to carry out online payment using payment application, and the delivery operation pre-set for payment application needs Residing WLAN is verified, S203 is thened follow the steps, to verify current WLAN.
It should be understood that step S202 is optional, the judgement can not also be carried out, step S203 is directly entered and carries out wirelessly The verification of LAN Information.
In step S203, according to the WLAN information, the one or more verified residing for the terminal is wireless Whether at least one of LAN is specified WLAN.
The WLAN information may include:The network identity and/or access device identification of WLAN.Its In, the network identity of WLAN for example can be the service set identifier of WLAN(SSID), access device identification Can be the physical address of access device, for example, when user accesses internet by wireless router, which is For access device, access device identification can be the physical address of the wireless router(MAC).
The specified WLAN is pre-set one or more specified WLANs, when the terminal When having accessed or can access one or more of specified WLANs, the specific operation is allowed to run, also, this one The network identity and/or access device identification of a or multiple specified WLANs can be stored in server end.
Specifically, can be using pre-set one or more WLANs as specified WLAN, when this When specific operation is triggered, if terminal has accessed any one in the specified WLAN of the one or more(It is i.e. logical It crosses, or any one access internet in the WLAN that the one or more is specified)Or used terminal is worked as Preceding accessible WLAN includes any one in the specified WLAN of the one or more, i.e., the terminal is in In the specified WLAN of the one or more in the coverage area of any one WLAN, then this can be allowed specific Operation operation.
One or more of specified WLANs are pre-set in the following way:
First way:One that one or more WLAN information input by user are identified can be arranged Or multiple WLANs are specified WLAN;Then, the wireless office of one or more of WLANs is preserved The correspondence of domain net information and the account of the user.
Specifically, server end can show an input frame on a user interface, and user's input is prompted to want to set up to refer to The WLAN information of one or more WLANs of fixed WLAN(Network identity and/or access device mark Know), for example, user can input the network identity of the wi-fi LANs of wi-fi LANs or job site in own home And/or access device identification.After user inputs completion or user's confirmation input, setting one or more nothings input by user One or more WLANs that line LAN Information is identified are the WLAN specified, and preserve the one or more The correspondence of the WLAN information of specified WLAN and the account of the user.
The second way:Obtain history WLAN information when user in certain time executes the specific operation; Count one or more WLANs that occurrence number in the history WLAN information is more than pre-determined number;Prompt is used Family selects any one or more for specified WLAN in one or more of WLANs;Then, it preserves The WLAN information of the selected one or more specified WLANs of user is corresponding with the account of the user Relationship.
Wherein, the history WLAN information at least may include:User executes specific operation when institute every time The WLAN information of one or more WLANs residing for the terminal used, that is to say, that user executes every time should When specific operation, WLAN and/or accessible one or more WLANs that used terminal has accessed.
Specifically, server end can obtain history wireless local when user in certain time executes the specific operation Net information, and count one or more wireless locals that occurrence number in the history WLAN information is more than pre-determined number Net, such as user is often at home using the specific operation of application, when user uses the specific operation at home, used end One or more WLANs that end may access a WLAN and/or the terminal can access, if one In fixing time(For example, in 30 days before current time)The specific operation is used in the radio local network environment of user at home Be more than pre-determined number, then user use at home the specific operation when WLAN that accesses or accessible WLAN The number that will occur in history WLAN information is more than pre-determined number, and it is wireless that server end can count the history Occurrence number is more than one or more WLANs of pre-determined number in LAN Information;And be shown on User Page, it carries Show that user can select any one or more WLANs therein as specified WLAN;It is then possible to protect Deposit the correspondence of user's selected one or more specified WLAN information and the account of the user.
Occurrence number in the history WLAN information of statistics can also be more than the one of pre-determined number by server A or multiple WLANs are automatically set as the user and execute WLAN specified when the specific operation, when user holds Row the specific operation when, if used terminal be not on one or more specify WLAN in it is any When one WLAN, then WLAN that user can be prompted to be currently at unknown WLAN or do not trust.
The third mode:When receiving the request of the specific operation, one residing for the terminal for sending the request is obtained The WLAN information of a or multiple WLANs;Prompt user selects appointing in one or more of WLANs Meaning is one or more for specified WLAN;Preserve the wireless of the specified WLAN of one or more of user's selection The correspondence of LAN Information and the account of the user.
Specifically, when receiving the request of specific operation, server end can obtain residing for the terminal for sending the request One or more WLANs WLAN information, by the one or more specify WLAN wireless office Domain net information(Network identity and/or access device identification)Display on a user interface, and prompts user's selection therein arbitrary One or more WLANs are as specified WLAN, and specified wireless of the one or more that preserves user's selection The correspondence of LAN Information and the account of the user.
Server end preserves pre-set one or more specified WLANs pass corresponding with user account System, therefore, correspondence and the terminal of the WLAN and user account that can be specified according to the one or more The network identity and/or access device identification of residing one or more WLANs verify one residing for the terminal Or whether at least one of multiple WLANs are the specified WLANs.
Specifically, can verify in one or more WLANs residing for the terminal with the presence or absence of it is at least one with The consistent WLAN of the network identity and/or access device identification of any one in the specified WLAN, that is, It verifies in the WLAN that the terminal accesses or one or more WLANs that the terminal can access with the presence or absence of at least One with the network identity and/or access device identification one of any one WLAN in the specified WLAN The WLAN of cause.The WLAN that wherein terminal has accessed refers to the terminal by connecting the WLAN Internet is accessed, for example, mobile phone is wirelessly connected by being established with wireless router, to access internet.The terminal can access One or more WLANs refer to one or more WLANs that the terminal position is covered, that is, covering Range includes one or more WLANs of the terminal current location, or may be considered what the terminal may search for One or more WLANs, for example, mobile phone may search for one or more wi-fi locals near present position Net(Wi-fi access points), and be shown in available network list.
If there are at least one and specified wireless offices in one or more WLANs residing for the terminal The network identity and/or the consistent WLAN of access device identification of any one in the net of domain, it is determined that residing for the terminal At least one of one or more WLANs be the specified WLAN.If it does not exist, then determining institute It is not the specified WLAN to state one or more WLANs residing for terminal.
That is, if network identity and/or access device identification and the institute of the WLAN that the terminal has accessed Network identity and/or the access device identification for stating any one WLAN in specified WLAN are consistent, or There are at least one and specified WLAN in the currently accessible one or more WLANs of the terminal The network identity and/or access device identification of any one are consistent, then can determine one or more nothings residing for the terminal At least one of line LAN is the specified WLAN.If the network for the WLAN that the terminal has accessed Mark and/or access device identification with specify WLAN in each WLAN network identity and/or connect Enter that device identification is all inconsistent, and be also not present in the currently accessible one or more WLANs of the terminal with it is described The consistent WLAN of the network identity and/or access device identification of any one in specified WLAN, then can be with It is not the specified WLAN to determine one or more WLANs residing for the terminal.
For example, as shown in figure 3, mobile phone 300 has accessed WLAN B(That is, accessing internet by access point B), and And the WLAN that mobile phone 300 is accessible(The current WLAN that may search for)Further include wi-fi LANs A, C, D, E, F, that is, mobile phone 300 is in WLAN A, C, D, E, F coverage area, wherein wi-fi LANs A, B, C, D, E, F's Network identity is respectively IDa, IDb, IDc, IDd, IDe, IDf.If pre-set specified WLAN is wi-fi innings A, B, C are netted in domain, and since B is the WLAN that mobile phone 300 has accessed, also, A, C are the currently accessible nothings of mobile phone 300 Line LAN can then determine that at least one of one or more WLANs residing for mobile phone 300 are specified wireless LAN.Or if pre-set specified WLAN is wi-fi LAN F, although mobile phone 300 does not access F (Such as in the case that mobile phone uses 3G or 2G network internets), but F is one of the WLAN that mobile phone 300 can access, (Mobile phone 300 is in wi-fi LAN F coverage areas)It can also then determine one or more wireless locals residing for mobile phone 300 At least one of net is specified WLAN.And if pre-set specified WLAN is wi-fi LANs H, K does not include in the accessible WLAN of WLAN or mobile phone 300 that then either mobile phone 300 has accessed Wi-fi LAN H, K can then determine one or more WLANs residing for mobile phone 300 and not be specified wireless office Domain net.
It should be noted that be omitted for ease of description in above-mentioned citing to verify WLAN network identity and/or The description of the whether consistent process of access device identification.
After step S203, according to verification as a result, the specific operation is further processed.If the end The residing one or more WLANs in end are not the specified WLANs, then follow the steps S204, intercept institute It states the request of specific operation and/or terminates the operation of the specific operation.
For example, when user executes the delivery operation of payment application, if the terminal that uses of verification user be not in it is specified Radio local network environment in, then intercept the delivery operation, or can also directly terminate the operation of the delivery operation, simultaneously also It can prompt user not in preset security wireless local area network environment, therefore the delivery operation cannot be executed.
If at least one of one or more WLANs residing for the terminal are the specified wireless offices Domain net, thens follow the steps S205, the operation for the specific operation of letting pass.That is, the specific operation can be according to normally executing stream Cheng Zhihang.For example, the normal flow according to the application verifies user password etc..
Present invention also provides a kind of verification devices.
Fig. 4 schematically shows the structure diagrams for verifying device according to the application one embodiment.According to the application One embodiment, which includes:Receiving module 401, authentication module 402 and processing module 403.
Wherein, receiving module 401 can be used for receiving the request of specific operation, and the request, which carries, sends the request Terminal residing for one or more WLANs WLAN information.
Authentication module 402 can be used for, according to the WLAN information, verifying one or more residing for the terminal Whether at least one of a WLAN is specified WLAN, wherein the specified WLAN is pre- The WLAN that the one or more being first arranged is specified.
Processing module 403 can be used for according to verification as a result, the specific operation is further processed.
According to one embodiment of the application, device 400 can also include:Enquiry module, the enquiry module can be used for When receiving the request of the specific operation, whether inquiry needs to verify residing wireless local for the specific operation Net.Wherein, whether need to verify residing WLAN for the specific operation and be configured in advance;The processing If module 403 can be further used for that residing WLAN need not be verified for the specific operation, let pass institute State the operation of specific operation.
According to one embodiment of the application, one or more WLANs residing for the terminal for sending the request Including:The currently accessible one or more wireless locals of WLAN or the terminal that the terminal has currently accessed Net.The WLAN information includes:The information of the current WLAN accessed or currently accessible one or more The information of a WLAN.
According to one embodiment of the application, the authentication module 402 can be further used for:Residing for the terminal One or more WLANs network identity and/or access device identification, verify one or more residing for the terminal Whether at least one of a WLAN is the specified WLAN.
Authentication module 402 may include:Verify submodule and determination sub-module.
Wherein, whether verification submodule can be used for verifying deposits in one or more WLANs residing for the terminal In at least one nothing consistent with the network identity of any one in the specified WLAN and/or access device identification Line LAN.
If determination sub-module can be used for having at least one in one or more WLANs residing for the terminal A wireless local consistent with the network identity of any one in the specified WLAN and/or access device identification Net, it is determined that at least one of one or more WLANs residing for the terminal are the specified wireless locals Net;If in one or more WLANs residing for the terminal there is no with it is any in the specified WLAN The consistent WLAN of one network identity and/or access device identification, it is determined that one or more residing for the terminal A WLAN is not the specified WLAN.
According to one embodiment of the application, processing module 403 can be further used for:If one residing for the terminal At least one of a or multiple WLANs are the specified WLANs, then the fortune for the specific operation of letting pass Row;If one or more WLANs residing for the terminal are not the specified WLANs, institute is intercepted It states the request of specific operation and/or terminates the operation of the specific operation.
According to one embodiment of the application, one or more of specified WLANs can be in the following way It is pre-set:
One or more WLANs that one or more WLAN information input by user are identified, which are arranged, is Specified WLAN;Preserve the account of the WLAN information and the user of one or more of WLANs Correspondence.
Alternatively, obtaining history WLAN information when user in certain time executes the specific operation, wherein institute History WLAN information is stated to include at least:The user is executed when the specific operation every time residing for used terminal The WLAN information of one or more WLANs;Counting occurrence number in the history WLAN information is more than One or more WLANs of pre-determined number;The user is prompted to select appointing in one or more of WLANs Meaning is one or more for specified WLAN;Preserve the specified WLAN of one or more of user's selection The correspondence of WLAN information and the account of the user.
Alternatively, when receiving the request of the specific operation, one or more residing for the terminal for sending the request is obtained The WLAN information of a WLAN;Prompt user selects any one in one or more of WLANs Or it is multiple for specified WLAN;Preserve the wireless office of the specified WLAN of one or more of user's selection The correspondence of domain net information and the account of the user.
Since the function that the device of the present embodiment is realized essentially corresponds to earlier figures 1 to embodiment of the method shown in Fig. 3, Therefore not detailed place in the description of the present embodiment, the related description in previous embodiment is may refer to, this will not be repeated here.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology realizes information storage.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, tape magnetic disk storage or other magnetic storage apparatus Or any other non-transmission medium, it can be used for storage and can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include non-temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability Including so that process, method, commodity or equipment including a series of elements include not only those elements, but also wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that wanted including described There is also other identical elements in the process of element, method, commodity or equipment.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, the application can be used in one or more wherein include computer usable program code computer Usable storage medium(Including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)The computer program of upper implementation produces The form of product.
Above is only an example of the present application, it is not intended to limit this application, for those skilled in the art For member, the application can have various modifications and variations.Any modification made by within the spirit and principles of this application, Equivalent replacement, improvement etc., should be included within the scope of claims hereof.

Claims (8)

1. a kind of verification method, which is characterized in that including:
The request of specific operation is received, the request carries one or more wireless locals residing for the terminal for sending the request The WLAN information of net;
According to the WLAN information, at least one of one or more WLANs residing for the terminal are verified Whether it is specified WLAN, wherein the specified WLAN is pre-set one or more specified WLAN;And
According to verification as a result, the specific operation is further processed;
Wherein, one or more WLANs residing for the terminal for sending the request include:The terminal can currently connect The one or more WLANs entered;The WLAN information includes:The currently accessible wireless office of one or more The information of domain net.
2. according to the method described in claim 1, it is characterized in that, further including:
When receiving the request of the specific operation, whether inquiry needs to verify residing wireless office for the specific operation Domain net;Wherein, whether need to verify residing WLAN for the specific operation and be configured in advance;And
If residing WLAN, the operation for the specific operation of letting pass need not be verified for the specific operation.
3. according to the method described in claim 1, it is characterized in that, according to the WLAN information, the terminal is verified Whether at least one of residing one or more WLANs are specified WLANs, including:
The network identity and/or access device identification of one or more WLANs residing for the terminal verify institute State whether at least one of one or more WLANs residing for terminal are the specified WLANs.
4. according to the method described in claim 3, it is characterized in that, one or more wireless locals residing for the terminal The network identity and/or access device identification of net are verified in one or more WLANs residing for the terminal at least Whether one be the specified WLAN, including:
Verify in one or more WLANs residing for the terminal with the presence or absence of it is at least one with it is described specified wireless The consistent WLAN of the network identity and/or access device identification of any one in LAN;
If it is present determining that at least one of one or more WLANs residing for the terminal are described specified WLAN;
If it does not exist, then determining that one or more WLANs residing for the terminal are not the specified wireless offices Domain net.
5. according to the method described in claim 1, it is characterized in that, according to verification as a result, being carried out down to the specific operation The processing of one step, including:
If at least one of one or more WLANs residing for the terminal are the specified WLANs, It then lets pass the operation of the specific operation;
If one or more WLANs residing for the terminal are not the specified WLANs, institute is intercepted It states the request of specific operation and/or terminates the operation of the specific operation.
6. according to the method described in claim 1, it is characterized in that, one or more of specified WLANs pass through such as Under type is pre-set:
It is specified that one or more WLANs that one or more WLAN information input by user are identified, which are arranged, WLAN;Preserve pair of the WLAN information of one or more of WLANs and the account of the user It should be related to;
Alternatively, obtaining history WLAN information when user in certain time executes the specific operation, wherein described to go through History WLAN information includes at least:The user executes one residing for used terminal when the specific operation every time Or the WLAN information of multiple WLANs;It is more than predetermined to count occurrence number in the history WLAN information One or more WLANs of number;The user is prompted to select any one in one or more of WLANs It is a or multiple for specified WLAN;Preserve the wireless local of the specified WLAN of one or more of user's selection The correspondence of net information and the account of the user;
Alternatively, when receiving the request of the specific operation, one or more nothings residing for the terminal for sending the request are obtained The WLAN information of line LAN;Prompt user select in one or more of WLANs any one or it is more A WLAN to specify;Preserve the WLAN of the specified WLAN of one or more of user's selection The correspondence of information and the account of the user.
7. a kind of verification device, which is characterized in that including:
Receiving module, the request for receiving specific operation, the request carry one residing for the terminal for sending the request Or the WLAN information of multiple WLANs;
Authentication module, for according to the WLAN information, verifying one or more wireless locals residing for the terminal Whether at least one of net is specified WLAN, wherein the specified WLAN is pre-set one A or multiple specified WLANs;And
Processing module, for according to verification as a result, the specific operation is further processed;
Wherein, one or more WLANs residing for the terminal for sending the request include:The terminal can currently connect The one or more WLANs entered;The WLAN information includes:The currently accessible wireless office of one or more The information of domain net.
8. device according to claim 7, which is characterized in that further include:
Enquiry module, for when receiving the request of the specific operation, whether inquiry to need to test for the specific operation The residing WLAN of card;Wherein, whether need to verify residing WLAN to be pre- advanced for the specific operation Row setting;And
The processing module, if being further used for that residing WLAN need not be verified for the specific operation, It lets pass the operation of the specific operation.
CN201310572031.XA 2013-11-15 2013-11-15 A kind of verification method and device Active CN104639519B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310572031.XA CN104639519B (en) 2013-11-15 2013-11-15 A kind of verification method and device
CN201810785097.XA CN109067715B (en) 2013-11-15 2013-11-15 Verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310572031.XA CN104639519B (en) 2013-11-15 2013-11-15 A kind of verification method and device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201810785097.XA Division CN109067715B (en) 2013-11-15 2013-11-15 Verification method and device

Publications (2)

Publication Number Publication Date
CN104639519A CN104639519A (en) 2015-05-20
CN104639519B true CN104639519B (en) 2018-07-24

Family

ID=53217839

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201310572031.XA Active CN104639519B (en) 2013-11-15 2013-11-15 A kind of verification method and device
CN201810785097.XA Active CN109067715B (en) 2013-11-15 2013-11-15 Verification method and device

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201810785097.XA Active CN109067715B (en) 2013-11-15 2013-11-15 Verification method and device

Country Status (1)

Country Link
CN (2) CN104639519B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106713247A (en) * 2015-11-17 2017-05-24 中国移动通信集团公司 Message creditability verification method and apparatus thereof
CN106325922A (en) * 2016-08-16 2017-01-11 捷开通讯(深圳)有限公司 Mobile terminal and management method for application programs of mobile terminal
CN106548072A (en) * 2016-10-21 2017-03-29 维沃移动通信有限公司 A kind of method and mobile terminal of safety detection

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101373528A (en) * 2007-08-21 2009-02-25 联想(北京)有限公司 Electronic payment system, device and method based on position authentication
CN101668007A (en) * 2009-08-19 2010-03-10 北京握奇数据系统有限公司 Public key infrastructure equipment and using method thereof
CN103368941A (en) * 2013-04-22 2013-10-23 北京奇虎科技有限公司 User network access scenario-based protection method and device

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7162525B2 (en) * 2001-08-07 2007-01-09 Nokia Corporation Method and system for visualizing a level of trust of network communication operations and connection of servers
US20040156372A1 (en) * 2003-02-12 2004-08-12 Timo Hussa Access point service for mobile users
CN1705290A (en) * 2004-06-03 2005-12-07 华为技术有限公司 Method for accessing WLAN
US7272728B2 (en) * 2004-06-14 2007-09-18 Iovation, Inc. Network security and fraud detection system and method
US7886351B2 (en) * 2006-06-19 2011-02-08 Microsoft Corporation Network aware firewall
JP2009146193A (en) * 2007-12-14 2009-07-02 Funai Electric Co Ltd Wireless communication terminal, method for protecting data of wireless communication terminal, program for having wireless communication terminal protect data, and recording medium storing the program
KR101015665B1 (en) * 2009-03-16 2011-02-22 삼성전자주식회사 Method and system for conneting between mobile communication terminal and access point
US9756076B2 (en) * 2009-12-17 2017-09-05 American Express Travel Related Services Company, Inc. Dynamically reacting policies and protections for securing mobile financial transactions
CN102740366A (en) * 2012-07-06 2012-10-17 华为技术有限公司 Method, device and system for realizing wireless network access

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101373528A (en) * 2007-08-21 2009-02-25 联想(北京)有限公司 Electronic payment system, device and method based on position authentication
CN101668007A (en) * 2009-08-19 2010-03-10 北京握奇数据系统有限公司 Public key infrastructure equipment and using method thereof
CN103368941A (en) * 2013-04-22 2013-10-23 北京奇虎科技有限公司 User network access scenario-based protection method and device

Also Published As

Publication number Publication date
CN109067715A (en) 2018-12-21
CN104639519A (en) 2015-05-20
CN109067715B (en) 2022-05-03

Similar Documents

Publication Publication Date Title
US11329965B2 (en) Method for dynamic encryption and signing, terminal, and server
US10432656B2 (en) Method and system for assessing data security
US20150312265A1 (en) Method for Verifying Sensitive Operations, Terminal Device, Server, and Verification System
WO2015160781A1 (en) Portal authentication
CN105812332A (en) Data protection method
WO2016145116A1 (en) System and method for secure device authentication
CN104104654A (en) Method and device for setting Wifi access authority and Wifi authentication
WO2016188335A1 (en) Access control method, apparatus and system for user data
CN104468552B (en) A kind of connection control method and device
CN104935435A (en) Login methods, terminal and application server
CN106304264A (en) A kind of wireless network access method and device
US20190281053A1 (en) Method and apparatus for facilitating frictionless two-factor authentication
CN104639519B (en) A kind of verification method and device
CN106302345B (en) A kind of terminal authentication method and device
JP7300799B2 (en) Computing device, method of protecting data, and computer program
WO2020025056A1 (en) Method, device, system, and mobile terminal for security authorization
CN106209569A (en) The method for authenticating of a kind of enterprise instant communication and device
CN106603472A (en) Method, server and system for user authentication
CN105871851B (en) Based on SaaS identity identifying method
CN108541000A (en) A kind of method, medium and the equipment of detection network connection
JP7300800B2 (en) Computing device, method of protecting data, and computer program
US11032708B2 (en) Securing public WLAN hotspot network access
US20140215592A1 (en) Method, apparatus and system for user authentication
US10165126B2 (en) Method for securing a transaction between a mobile terminal and a server of a service provider through a platform
CN105635059A (en) WLAN access authentication method, related equipment, and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20191209

Address after: P.O. Box 31119, grand exhibition hall, hibiscus street, 802 West Bay Road, Grand Cayman, Cayman Islands

Patentee after: Innovative advanced technology Co., Ltd

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Co., Ltd.