CN105610806A - Method and device for generating verification code - Google Patents

Method and device for generating verification code Download PDF

Info

Publication number
CN105610806A
CN105610806A CN201510977025.1A CN201510977025A CN105610806A CN 105610806 A CN105610806 A CN 105610806A CN 201510977025 A CN201510977025 A CN 201510977025A CN 105610806 A CN105610806 A CN 105610806A
Authority
CN
China
Prior art keywords
client
identifying code
logging
credit grade
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510977025.1A
Other languages
Chinese (zh)
Inventor
赵宇翔
任建峰
李跃红
梁敬彪
袁研根
刘文娇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510977025.1A priority Critical patent/CN105610806A/en
Publication of CN105610806A publication Critical patent/CN105610806A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The invention provides a method and a device for generating a verification code. The method comprises the steps of receiving a login request from a client, and judging whether the client logins for the first time; when the login of the client is not the first time, determining the credit grade of this time of login for the client according to the login information of the client in this time and the login information of the client in the previous time; selecting a corresponding verification code scheme according to the credit grade, thus providing the verification code for this time of login to the client. According to the method, the credit grade of the user can be determined according to the login history of the user, and the different grades of verification codes can be distributed for the users according to the credit grades of the users, thus the user security can be ensured while the user experience is enhanced.

Description

Generate method and the device of identifying code
Technical field
The present invention relates to field of computer technology, particularly, the present invention relates to a kind of identifying code that generatesMethod and device.
Background technology
In the scheme of existing authentication, normally please by the client-based authentication of service endSeek survival into identifying code, and identifying code is sent to user, wherein, identifying code can be treatedThe picture of the combination that comprises some abstract numerals, English or Chinese character, and require user to identify alsoFill in character corresponding in picture, thereby complete authentication.
But for being assert the higher user of security by system, logging at every turn or carrying out some behaviourIn the process of doing, still by system requirements input validation code, thereby cause inconvenience to user,Reduce user's experience.
Therefore, need a kind of scheme of dispense validation code, can test accordingly for different user assignmentsCard code, reduces the identifying code input difficulty that often uses or be considered to the higher user of security, withJust it can complete and log in fast.
Summary of the invention
For overcoming above-mentioned technical problem or solving the problems of the technologies described above at least in part, below special propositionTechnical scheme:
Embodiments of the invention have proposed a kind of method that generates identifying code, comprising:
While receiving the logging request from client, judge that whether client is for logging in first;
When client is non-while logging in first, the log-on message of client and previously while logging according to thisWhile logging in, the logon information of client is the credit grade that client is determined this login;
Select corresponding identifying code scheme according to described credit grade, think that described client is provided forThe identifying code of this login.
Preferably, the method for generation identifying code also comprises:
When client is when logging in first, select identifying code scheme according to default credit grade, think instituteState the identifying code that client is provided for this login.
Preferably, the method for generation identifying code also comprises: generate checking according to the identifying code scheme of selectingCode also offers described client.
Preferably, different identifying code scheme corresponding to credit grade, and higher credit gradeCorresponding better simply identifying code scheme.
Preferably, the log-on message of described client comprises following at least one: the IP ground of clientLocation, browser information, number of operations, operating time, operation system information, client mac groundThe WIFI title of location information and access.
Preferably, when client is non-while logging in first, log in the log-on message of client according to thisThe logon information that had previously logged in client is the credit grade that client is determined this login, specifically bagDraw together:
Client when judging IP address in the logon information of client when this logs in and previously having logged inLogon information in IP address whether at the same network segment,
If at the same network segment, improve described credit grade,
Otherwise, reduce described credit grade.
Preferably, when client is non-while logging in first, log in the log-on message of client according to thisThe logon information that had previously logged in client is the credit grade that client is determined this login, specifically bagDraw together:
Judge the browser mark in the browser information in the logon information of client when this logs inBrowser mark in browser information when previously logging in the logon information of client whether oneCause,
If consistent, improve described credit grade,
Otherwise, reduce described credit grade.
Preferably, when client is non-while logging in first, log in the log-on message of client according to thisThe logon information that had previously logged in client is the credit grade that client is determined this login, specifically bagDraw together:
Judge operating system that client when this logs in uses whether when previously logging in client makeWith operating system consistent,
If consistent, improve described credit grade,
Otherwise, reduce described credit grade.
Preferably, when client is non-while logging in first, log in the log-on message of client according to thisThe logon information that had previously logged in client is the credit grade that client is determined this login, specifically bagDraw together:
The whether operation of client when previously logging in of the operating time that judges client when this logs inWhether the time interval between the time exceedes predetermined threshold value,
If the described time interval does not exceed default threshold, keep described credit grade;
Otherwise, reduce described credit grade.
Preferably, when client is non-while logging in first, log in the log-on message of client according to thisThe logon information that had previously logged in client is the credit grade that client is determined this login, specifically bagDraw together:
Client is used the MAC Address that judges client when this logs in when previously logging inMAC Address is consistent,
If consistent, improve described credit grade,
Otherwise, reduce described credit grade.
Preferably, when client is non-while logging in first, log in the log-on message of client according to thisThe logon information that had previously logged in client is the credit grade that client is determined this login, specifically bagDraw together:
Whether the WIFI title that judges this access of client while logging in first client when previously logging inThe WIFI title that termination enters is consistent,
If consistent, improve described credit grade,
Otherwise, reduce described credit grade.
Preferably, described identifying code scheme specifically comprise sort from low to high according to complexity as belowCase:
The digital any combination of the first predetermined quantity;
Any combination of the English character of the second predetermined quantity;
The English character of the 3rd predetermined quantity and digital any combination;
Any combination of the Chinese character of the 4th predetermined quantity.
Preferably, according to select identifying code scheme generate identifying code and offer described client itAfter, described method also comprises:
In the time detecting the identifying code of user's input error, reduce described credit grade and according to reduce afterDescribed credit grade reselect identifying code scheme, think that described client is provided for again againThe identifying code of login.
Another embodiment of the present invention has also proposed a kind of device that generates identifying code, comprising:
Judge module, when receiving the logging request from client, judges that whether client isLog in first;
Credit grade determination module, for being non-while logging in first when client, while logging according to thisThe log-on message of client and while previously having logged in the logon information of client be that client determines that this steps onThe credit grade of record;
First selects module, for select corresponding identifying code scheme according to described credit grade, thinksDescribed client is provided for the identifying code of this login.
Preferably, generate the device of identifying code, also comprise:
Second selects module, for when client is when logging in first, according to presetting credit grade selectionIdentifying code scheme, thinks that described client is provided for the identifying code of this login.
Preferably, generate the device of identifying code, also comprise:
Identifying code generation module, generates identifying code and offers institute for the identifying code scheme according to selectingState client.
Preferably, generate the device of identifying code, wherein, different checking corresponding to credit gradeCode plan, and the corresponding better simply identifying code scheme of higher credit grade.
Preferably, generate the device of identifying code, the log-on message of described client comprises following at least one:
The IP address of client, browser information, number of operations, operating time, operating system letterThe WIFI title of breath, client mac address information and access.
Preferably, described credit grade determination module is for judging the letter that logs in of client when this logs inWhether the IP address in the logon information of the client when previously having logged in of the IP address in breath is at same netSection,
If at the same network segment, improve described credit grade,
Otherwise, reduce described credit grade.
Preferably, described credit grade determination module is for judging the letter that logs in of client when this logs inWhen browser in browser information in breath identifies and previously logged in the logon information of clientWhether the browser mark in browser information is consistent,
If consistent, improve described credit grade,
Otherwise, reduce described credit grade.
Preferably, the behaviour of described credit grade determination module for judging that when this logs in, client is usedMake the system operating system whether client is used when previously logging in consistent,
If consistent, improve described credit grade,
Otherwise, reduce described credit grade.
Preferably, when described credit grade determination module is used for judging the operation of client when this logs inBetween whether and while previously having logged in the time interval between operating time of client whether exceed default thresholdValue,
If the described time interval does not exceed default threshold, keep described credit grade;
Otherwise, reduce described credit grade.
Preferably, described credit grade determination module is for judging the MAC of client when this logs inThe address MAC Address that client is used when previously logging in is consistent,
If consistent, improve described credit grade,
Otherwise, reduce described credit grade.
Preferably, the access of client when described credit grade determination module logs in first for judging thisWIFI title whether when previously logging in the WIFI title of client access consistent,
If consistent, improve described credit grade,
Otherwise, reduce described credit grade.
Preferably, described identifying code scheme specifically comprise sort from low to high according to complexity as belowCase:
The digital any combination of the first predetermined quantity;
Any combination of the English character of the second predetermined quantity;
The English character of the 3rd predetermined quantity and digital any combination;
Any combination of the Chinese character of the 4th predetermined quantity.
Preferably, generate the device of identifying code, also comprise:
Reselect module, generate identifying code and offer described visitor in the identifying code scheme according to selectingAfter the end of family, in the time detecting the identifying code of user's input error, reduce described credit grade alsoReselect identifying code scheme according to the described credit grade after reducing, think that described client carries againFor the identifying code for again logining.
Embodiments of the invention provide a kind of scheme that generates identifying code, receive from clientWhen logging request, judge that whether client is for logging in first, when judging that client is non-while logging in first,While logging according to this log-on message of client and while previously having logged in the logon information of client be visitorFamily end is determined the credit grade of this login, selects corresponding identifying code side subsequently according to credit gradeCase, thinks that client is provided for the identifying code of this login. In the present invention, can be according to clientMultiple login index judge the credit grade of the client of current login, and according to current creditGrade is that client is distributed corresponding identifying code scheme, and follow-up based on identifying code scheme generation checkingCode is considered objectively terminal use's operation history and habit in the assigning process of identifying code schemeBe used to, reduce the identifying code input difficulty that often uses or be considered to the higher user of security, so thatIt can complete and log in fast, experiences thereby can improve user; In addition logging in by client,Information is determined the credit grade of client, has ensured the processing safety of client.
The aspect that the present invention is additional and advantage in the following description part provide, and these will be from belowDescription in become obviously, or recognize by practice of the present invention.
Brief description of the drawings
The present invention above-mentioned and/or additional aspect and advantage below in conjunction with accompanying drawing retouching embodimentState middle becoming obviously and easily and understand, wherein:
Fig. 1 is the schematic flow sheet of the method for the generation identifying code of one embodiment of the present of invention;
Fig. 2 is the schematic flow sheet of the method for the generation identifying code of one embodiment of the present of invention;
Fig. 3 is the schematic flow sheet of the method for the generation identifying code of one embodiment of the present of invention;
Fig. 4 is the schematic flow sheet of the method for the generation identifying code of one embodiment of the present of invention;
Fig. 5 is the schematic flow sheet of the method for the generation identifying code of one embodiment of the present of invention;
Fig. 6 is the schematic flow sheet of the method for the generation identifying code of one embodiment of the present of invention;
Fig. 7 is the schematic flow sheet of the method for the generation identifying code of one embodiment of the present of invention;
Fig. 8 is the schematic flow sheet of the method for the generation identifying code of one embodiment of the present of invention;
Fig. 9 is the schematic flow sheet of the method for the generation identifying code of one embodiment of the present of invention;
Figure 10 is the structural representation of the device of the generation identifying code of an alternative embodiment of the invention;
Figure 11 is the structural representation of the device of the generation identifying code of an alternative embodiment of the invention;
Figure 12 is the structural representation of the device of the generation identifying code of an alternative embodiment of the invention;
Figure 13 is the structural representation of the device of the generation identifying code of an alternative embodiment of the invention.
Detailed description of the invention
Describe embodiments of the invention below in detail, the example of described embodiment is shown in the drawings, itsIn from start to finish same or similar label represent same or similar element or have identical or similarThe element of function. Exemplary below by the embodiment being described with reference to the drawings, only for explaining thisInvention, and can not be interpreted as limitation of the present invention.
Unless those skilled in the art of the present technique are appreciated that specially statement, singulative used herein" one ", " one ", " described " and " being somebody's turn to do " also can comprise plural form. Should be further understood that,The wording using in description of the present invention " comprises " and refers to and have described feature, integer, step, behaviourWork, element and/or assembly, but do not get rid of existence or add one or more other features, wholeNumber, step, operation, element, assembly and/or their group. Should be appreciated that, when we claim elementBe " connected " or " coupling " when another element, it can be directly connected or coupled to other elements, orAlso can there is intermediary element in person. In addition, " connection " used herein or " coupling " can comprise wirelessConnect or wireless coupling. Wording "and/or" used herein comprises listing that one or more is associatedWhole or arbitrary unit of item and all combination.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein(comprising technical term and scientific terminology), have with the present invention under those of ordinary skill in fieldThe identical meaning of general understanding. Should also be understood that such as those arts that define in general dictionaryLanguage, should be understood to have the meaning consistent with meaning in the context of prior art, and removeNon-as here by specific definitions, otherwise can not explain by idealized or too formal implication.
Fig. 1 is the schematic flow sheet of the method for the generation identifying code of one embodiment of the present of invention, as figureShown in 1, this method comprises:
Step S110, while receiving the logging request from client, judge that client whether headed byInferior logging in.
Step S120, when client is non-while logging in first, while logging according to this, client steps onRecord information and while previously having logged in the logon information of client be client credit of determining this login etc.Level.
Step S130, selects corresponding identifying code scheme according to credit grade, to carry for clientFor the identifying code for this login.
Embodiments of the invention provide a kind of scheme that generates identifying code, receive from clientWhen logging request, judge that whether client is for logging in first, when judging that client is non-while logging in first,While logging according to this log-on message of client and while previously having logged in the logon information of client be visitorFamily end is determined the credit grade of this login, selects corresponding identifying code side subsequently according to credit gradeCase, thinks that client is provided for the identifying code of this login. In the present invention, can be according to clientMultiple login index judge the credit grade of the client of current login, and according to current creditGrade is that client is distributed corresponding identifying code scheme, and follow-up based on identifying code scheme generation checkingCode is considered objectively terminal use's operation history and habit in the assigning process of identifying code schemeBe used to, reduce the identifying code input difficulty that often uses or be considered to the higher user of security, so thatIt can complete and log in fast, experiences thereby can improve user; In addition logging in by client,Information is determined the credit grade of client, has ensured the processing safety of client.
In an embodiment of the present invention, the log-on message of client comprises following at least one: clientIP address, browser information, number of operations, operating time, operation system information, clientThe WIFI title of mac address information and access.
Identifying code scheme specifically comprises the following scheme sorting according to complexity from low to high:
The digital any combination of the first predetermined quantity;
Any combination of the English character of the second predetermined quantity;
The English character of the 3rd predetermined quantity and digital any combination;
Any combination of the Chinese character of the 4th predetermined quantity.
For example, identifying code scheme sorts from low to high and is divided into following scheme according to complexity: first-class difficultyScheme is the digital any combination of the first predetermined quantity, as 4 digital combinations; Second-class difficulty sideCase is any combination of the English character of the second determined number, as the combination of the 4th English alphabet; Third-classDifficulty scheme is the English character of the 3rd predetermined quantity and digital any combination, as 4 English alphabetsAdd digital combination; Fourth class difficulty scheme is any combination of the Chinese character of the 4th predetermined quantity, as 4The combination of Chinese character; Its difficulty is deepened successively.
In an embodiment of the present invention, different identifying code scheme corresponding to credit grade, andThe corresponding better simply identifying code scheme of high credit grade.
Fig. 2 is the schematic flow sheet of the method for the generation identifying code of one embodiment of the present of invention, as figureShown in 2, this method comprises:
Step S210, while receiving the logging request from client, judge that client whether headed byInferior logging in.
When judging that client is non-while logging in first, continue execution step S220 and step S230,Wherein:
Step S220, when client is non-while logging in first, while logging according to this, client steps onRecord information and while previously having logged in the logon information of client be client credit of determining this login etc.Level.
Step S230, selects corresponding identifying code scheme according to credit grade, so that client providesFor the identifying code of this login.
For example, credit grade from one by the time the fourth class arrange from high to low, client is non-while logging in first,While logging according to this log-on message of client and while previously having logged in the logon information of client be visitorFamily end determines that the credit grade of this login is secondary credit grade, and corresponding identifying code difficulty is twoEtc. difficulty scheme.
When judging that client is when logging in first, continue execution step S240:
Step S240, when client is when logging in first, selects identifying code according to default credit gradeScheme, to be provided for the identifying code of this login for client.
For example, client is when logging in first, and default credit grade is three grades of credit grades, correspondingIdentifying code scheme is third-class difficulty scheme.
Fig. 3 is the schematic flow sheet of the method for the generation identifying code of one embodiment of the present of invention, as figureShown in 3, this method comprises:
Step S310, while receiving the logging request from client, judge that client whether headed byInferior logging in.
Step S320, when judging that client is non-while logging in first, continues to judge visitor when this logs inIP address in the logon information of the client when previously having logged in of the IP address in the logon information of family endWhether at the same network segment. For example, in LAN, gateway device is that the terminal in LAN is divided at randomJoin the IP address of the same network segment, due to the randomness of IP address assignment, therefore may cause occurring sameThe situation of the different IP addresses that the IP address that one twice, terminal logs in is the same network segment, therefore can rootRealize the judgement of the credit grade to user according to this situation.
The IP address logging in for twice if judge, in the time of the same network segment, performs step S350, improves thisThe inferior credit grade logging in.
The IP address logging in for twice if judge is at the same network segment, therefore can judge this time to log inTerminal may not be the terminal of previously logining, and may reduce the security of system, therefore execution stepS340, reduces the credit grade that this logs in.
Step S350, selects corresponding identifying code scheme according to selected credit grade.
Step S360, generates identifying code according to the identifying code scheme of selected correspondence, and offersClient, so that the identifying code that client input generates logs in thereby complete.
Fig. 4 is the schematic flow sheet of the method for the generation identifying code of one embodiment of the present of invention, as figureShown in 4, this method comprises:
Step S410, while receiving the logging request from client, judge that client whether headed byInferior logging in.
Step S420, when judging that client is non-while logging in first, continues to judge visitor when this logs inClear in the logon information of browser in the logon information of family end mark client when previously having logged inWhether the device of looking at mark is unanimously.
For example, user, in the time carrying out logon operation, can select the mode logging in by webpage to step onLand, therefore it logs in the information that can comprise browser mark in request so that notice high in the clouds orIts use of service end be which kind of browser, high in the clouds or service end can identify according to browserUser distinguished by which kind of browser uses log in.
The browser in browser information when if this logs in the logon information of client mark withBrowser mark while previously logging in the logon information of client is consistent, performs step S430,Improve the credit grade that this logs in.
The browser in browser information when if this logs in the logon information of client mark withBrowser mark while previously logging in the logon information of client is inconsistent, performs step S440,Reduce the credit grade that this logs in.
Step S450, selects corresponding identifying code scheme according to selected credit grade.
Step S460, generates identifying code according to the identifying code scheme of selected correspondence, and offersClient, so that the identifying code that client input generates logs in thereby complete.
Fig. 5 is the schematic flow sheet of the method for the generation identifying code of one embodiment of the present of invention, as figureShown in 5, this method comprises:
Step S510, while receiving the logging request from client, judge that client whether headed byInferior logging in.
Step S520, when judging that client is non-while logging in first, continues to judge visitor when this logs inWhether the operating system of the operating system of family end client when previously logging in is consistent.
The behaviour that the operating system that when if this logs in, client is used client when previously having logged in is usedMake systems compliant, perform step S530, improve the credit grade that this logs in.
The behaviour that the operating system that when if this logs in, client is used client when previously having logged in is usedMake system inconsistent, perform step S540, reduce the credit grade that this logs in.
Step S550, selects corresponding identifying code scheme according to selected credit grade.
Step S560, generates identifying code according to the identifying code scheme of selected correspondence, and offersClient, so that the identifying code that client input generates logs in thereby complete.
Fig. 6 is the schematic flow sheet of the method for the generation identifying code of one embodiment of the present of invention, as figureShown in 6, this method comprises:
Step S610, while receiving the logging request from client, judge that client whether headed byInferior logging in.
Step S620, when judging that client is non-while logging in first, according to the logon information of clientIn operating time information, continue judge the operating time of client when this logs in and previously while having logged inWhether the interval between the operating time of client exceedes default threshold.
When if this logs in the operating time of the operating time of client client when previously having logged in itBetween interval do not exceed default threshold, perform step S630, improve this credit logging in etc.Level. Wherein, if the operation that client often logs within some period also canImprove the credit grade of client within this period of time.
When if this logs in the operating time of the operating time of client client when previously having logged in itBetween interval exceed default threshold, perform step S640, reduce the credit grade that this logs in.
Step S650, selects corresponding identifying code scheme according to selected credit grade.
Step S660, generates identifying code according to the identifying code scheme of selected correspondence, and offersClient, so that the identifying code that client input generates logs in thereby complete.
Fig. 7 is the schematic flow sheet of the method for the generation identifying code of one embodiment of the present of invention, as figureShown in 7, this method comprises:
Step S710, when receive from client logging request time, judge that whether client isLog in first.
Step S720, when judging that client is non-while logging in first, according to the logon information of clientIn MAC Address, continue judge the MAC of client when this logs in and previous client while having logged inWhether the MAC Address of end is consistent.
If consistent, perform step S730, improve the credit grade that this logs in.
If inconsistent, perform step S740, reduce the credit grade that this logs in.
Step S750, selects corresponding identifying code scheme according to selected credit grade.
Step S760, generates identifying code according to the identifying code scheme of selected correspondence, and offersClient, so that the identifying code that client input generates logs in thereby complete.
Fig. 8 is the schematic flow sheet of the method for the generation identifying code of one embodiment of the present of invention, as figureShown in 8, this method comprises:
Step S810, when receive from client logging request time, judge that whether client isLog in first.
Step S820, when judging that client is non-while logging in first, according to the logon information of clientIn the WIFI title of client access, continue to judge in the logon information of client when this logs inThe logon information of WIFI title client when previously having logged in of access in the WIFI name of accessWhether unanimously claim.
If consistent, perform step S830, improve the credit grade that this logs in.
If inconsistent, perform step S840, reduce the credit grade that this logs in.
Step S850, selects corresponding identifying code scheme according to selected credit grade.
Step S860, generates identifying code according to the identifying code scheme of selected correspondence, and offersClient, so that the identifying code that client input generates logs in thereby complete.
In addition,, if pay in the authentication of link at some, can also detect and receive in payerThe credit grade of money side, for example, be to regular legal Website Payments, can improve its credit grade,If strange or uncertain whether regular legal Website Payments can reduce its credit etc.Level; And if pay to individual, can by detecting individual whether the paying of beneficiaryIn the address list of money side, or detect the transaction record of beneficiary and judge its credit grade, therebyFor it distributes corresponding identifying code.
Fig. 9 is the schematic flow sheet of the method for the generation identifying code of one embodiment of the present of invention, as figureShown in 9, this method comprises:
Step S910, while receiving the logging request from client, judge that client whether headed byInferior logging in.
Step S920, when client is non-while logging in first, while logging according to this, client steps onRecord information and while previously having logged in the logon information of client be client credit of determining this login etc.Level.
Step S930, selects corresponding identifying code scheme according to credit grade, thinks that client providesFor the identifying code of this login.
Step S940, in the time detecting the identifying code of user's input error, reduces credit grade rootReselect identifying code scheme according to the credit grade after reducing, to be again provided for again for clientThe identifying code of inferior login.
For example, if when the identifying code of user's input error for the first time, can be considered to operate miss,This is left intact.
When user is repeatedly when the identifying code of input error, reduce credit grade and according to the credit after reducingGrade reselects identifying code scheme, and redistributes the identifying code again logging in for client.
In the time that the number of times of the identifying code of user's input error exceedes threshold, can be within the regular hourForbid the operation that user logs in.
Figure 10 is the structural representation of the device of the generation identifying code of an alternative embodiment of the invention.As shown in figure 10, the device of this generation identifying code comprises: judge module 1010, credit grade are determinedModule 1020 and first is selected module 1030.
Judge module 1010, when receiving the logging request from client, judges clientWhether for logging in first.
Credit grade determination module 1020, for being non-while logging in first when client, according to thisWhile logging in the log-on message of client and while previously having logged in the logon information of client be that client is determinedThe credit grade of this login.
First selects module 1030, for select corresponding identifying code scheme according to credit grade, withFor client is provided for the identifying code of this login.
Figure 11 is the structural representation of the device of the generation identifying code of an alternative embodiment of the invention.In a preferred embodiment, as shown in figure 11, the device of this generation identifying code also comprises: the second choosingSelect module 1140, for when client is when logging in first, select checking according to default credit gradeCode plan, thinks that client is provided for the identifying code of this login.
Figure 12 is the structural representation of the device of the generation identifying code of an alternative embodiment of the invention.In another preferred embodiment, as shown in figure 12, the device of this generation identifying code also comprises: checkingCode generation module 1250, generates identifying code and offers client for the identifying code scheme according to selectingEnd.
In an embodiment of the present invention, different identifying code scheme corresponding to credit grade, andThe corresponding better simply identifying code scheme of high credit grade.
In an embodiment of the present invention, the log-on message of client comprises following at least one:
The IP address of client, browser information, number of operations, operating time, operating system letterThe WIFI title of breath, client mac address information and access.
In an embodiment of the present invention, credit grade determination module 1020 is when judging that this logs inIP ground in the logon information of the client when previously having logged in of the IP address in the logon information of clientWhether location at the same network segment,
If at the same network segment, improve credit grade,
Otherwise, reduce credit grade.
In an embodiment of the present invention, credit grade determination module 1020 is when judging that this logs inClient when browser in browser information in the logon information of client identifies and previously logged inLogon information in browser information in browser mark whether consistent,
If consistent, improve credit grade,
Otherwise, reduce credit grade.
In an embodiment of the present invention, credit grade determination module 1020 is when judging that this logs inThe operating system that client the is used operating system that client is used when previously logging in is consistent,
If consistent, improve credit grade,
Otherwise, reduce credit grade.
In an embodiment of the present invention, credit grade determination module 1020 is when judging that this logs inThe time interval between the operating time of the operating time of client client whether and while previously having logged inWhether exceed predetermined threshold value, if the time interval does not exceed default threshold, keep credit grade; Otherwise,Reduce credit grade.
In an embodiment of the present invention, credit grade determination module 1020 is when judging that this logs inThe MAC Address of the client MAC Address that client is used when previously logging in is consistent,
If consistent, improve credit grade,
Otherwise, reduce credit grade.
In an embodiment of the present invention, credit grade determination module 1020 logs in first for judging thisTime client the whether WIFI title of client access when previously logging in of WIFI title of accessUnanimously,
If consistent, improve credit grade,
Otherwise, reduce credit grade.
In an embodiment of the present invention, identifying code scheme specifically comprises according to complexity and sorting from low to highFollowing scheme:
The digital any combination of the first predetermined quantity;
Any combination of the English character of the second predetermined quantity;
The English character of the 3rd predetermined quantity and digital any combination;
Any combination of the Chinese character of the 4th predetermined quantity.
Figure 13 is the structural representation of the device of the generation identifying code of an alternative embodiment of the invention.In another preferred embodiment, as shown in figure 13, the device of this generation identifying code also comprises: againSelect module 1360, according to select identifying code scheme generate identifying code and offer client itAfter, in the time detecting the identifying code of user's input error, reduce credit grade and according to reduce afterCredit grade reselect identifying code scheme, think testing that client is provided for again logining againCard code.
Those skilled in the art of the present technique are appreciated that the present invention includes and relate to for carrying out the application instituteState the one or more equipment in operation. These equipment can be for required object specialized designs andManufacture, or also can comprise the known device in all-purpose computer. These equipment have and are stored in itInterior computer program, these computer programs optionally activate or reconstruct. Such computer journeyOrder for example can be stored in, in equipment (, computer) computer-readable recording medium or be stored in and be suitable for store electricitySub-instructions is also coupled to respectively in the medium of any type of bus, and described computer-readable medium comprisesBut be not limited to any type dish (comprising floppy disk, hard disk, CD, CD-ROM and magneto-optic disk),ROM (Read-OnlyMemory, read-only storage), RAM (RandomAccessMemory,Memory immediately), (ErasableProgrammableRead-OnlyMemory, can for EPROMErasable programmable read only memory), EEPROM (ElectricallyErasableProgrammableRead-OnlyMemory, EEPROM), flash memory, magnetic card or lightCard. Namely, computer-readable recording medium for example comprises, by equipment (, computer) and depositing with the form that can readAny medium of storage or transmission information.
Those skilled in the art of the present technique are appreciated that and can realize these knots with computer program instructionsEach frame in composition and/or block diagram and/or flow graph and these structure charts and/or block diagram and/or flow graphIn the combination of frame. Those skilled in the art of the present technique are appreciated that and these computer programs can be referred toThe processor that order offers all-purpose computer, special purpose computer or other programmable data processing methods comesRealize, thereby carry out the present invention by the processor of computer or other programmable data processing methodsThe scheme of specifying in the frame of disclosed structure chart and/or block diagram and/or flow graph or multiple frame.
Those skilled in the art of the present technique are appreciated that various operations, the side in the present invention, discussedStep in method, flow process, measure, scheme can be replaced, be changed, be combined or be deleted. FurtherGround, has other steps in the various operations discussed in the present invention, method, flow process, arrangesExecute, scheme also can by alternately, change, reset, decompose, combination or delete. Further, existingHave in technology have with the present invention in step in disclosed various operations, method, flow process, measure,Scheme also can be replaced, be changed, be reset, decomposed, be combined or deletion.
The above is only part embodiment of the present invention, it should be pointed out that for the artThose of ordinary skill, under the premise without departing from the principles of the invention, can also make some improvementAnd retouching, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (10)

1. a method that generates identifying code, comprising:
While receiving the logging request from client, judge that whether client is for logging in first;
When client is non-while logging in first, the log-on message of client and previously while logging according to thisWhile logging in, the logon information of client is the credit grade that client is determined this login;
Select corresponding identifying code scheme according to described credit grade, think that described client is provided forThe identifying code of this login.
2. method according to claim 1, also comprises:
When client is when logging in first, select identifying code scheme according to default credit grade, think instituteState the identifying code that client is provided for this login.
3. method according to claim 1 and 2, also comprises:
Generate identifying code and offer described client according to the identifying code scheme of selecting.
4. according to the method described in any one in claim 1-3, wherein, different credit grades pairAnswer different identifying code schemes, and the corresponding better simply identifying code scheme of higher credit grade.
5. method according to claim 1, the log-on message of described client comprise with down toOne item missing:
The IP address of client, browser information, number of operations, operating time, operating system letterThe WIFI title of breath, client mac address information and access.
6. a device that generates identifying code, comprising:
Judge module, when receiving the logging request from client, judges that whether client isLog in first;
Credit grade determination module, for being non-while logging in first when client, while logging according to thisThe log-on message of client and while previously having logged in the logon information of client be that client determines that this steps onThe credit grade of record;
First selects module, for select corresponding identifying code scheme according to described credit grade, thinksDescribed client is provided for the identifying code of this login.
7. device according to claim 6, also comprises:
Second selects module, for when client is when logging in first, according to presetting credit grade selectionIdentifying code scheme, thinks that described client is provided for the identifying code of this login.
8. according to the device described in claim 6 or 7, also comprise:
Identifying code generation module, generates identifying code and offers institute for the identifying code scheme according to selectingState client.
9. according to the device described in any one in claim 6-8, wherein, different credit grades pairAnswer different identifying code schemes, and the corresponding better simply identifying code scheme of higher credit grade.
10. device according to claim 6, the log-on message of described client comprise with down toOne item missing:
The IP address of client, browser information, number of operations, operating time, operating system letterThe WIFI title of breath, client mac address information and access.
CN201510977025.1A 2015-12-23 2015-12-23 Method and device for generating verification code Pending CN105610806A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510977025.1A CN105610806A (en) 2015-12-23 2015-12-23 Method and device for generating verification code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510977025.1A CN105610806A (en) 2015-12-23 2015-12-23 Method and device for generating verification code

Publications (1)

Publication Number Publication Date
CN105610806A true CN105610806A (en) 2016-05-25

Family

ID=55990344

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510977025.1A Pending CN105610806A (en) 2015-12-23 2015-12-23 Method and device for generating verification code

Country Status (1)

Country Link
CN (1) CN105610806A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295278A (en) * 2016-08-11 2017-01-04 深圳市金立通信设备有限公司 A kind of method sending checking information and terminal
CN107564341A (en) * 2017-08-08 2018-01-09 广东小天才科技有限公司 A kind of character teaching method and user terminal based on user terminal
CN108171837A (en) * 2017-12-27 2018-06-15 合肥美的智能科技有限公司 Access control system and its control method
CN108650226A (en) * 2018-03-30 2018-10-12 平安科技(深圳)有限公司 A kind of login validation method, device, terminal device and storage medium
WO2020252880A1 (en) * 2019-06-19 2020-12-24 同盾控股有限公司 Reverse turing verification method and apparatus, storage medium, and electronic device
CN112948812A (en) * 2021-03-29 2021-06-11 天津车之家数据信息技术有限公司 Verification code distribution method, computing device and storage medium
CN114143046A (en) * 2021-08-30 2022-03-04 统信软件技术有限公司 User isolation method, data transmission method, computing device and storage medium
CN114745178A (en) * 2022-04-11 2022-07-12 中国南方电网有限责任公司 Identity authentication method, identity authentication device, computer equipment, storage medium and program product

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102347929A (en) * 2010-07-28 2012-02-08 阿里巴巴集团控股有限公司 Verification method of user identity and apparatus thereof
CN102957682A (en) * 2011-08-30 2013-03-06 北京百度网讯科技有限公司 Method and equipment for providing picture verification code based on verification security level
CN104038502A (en) * 2014-06-24 2014-09-10 五八同城信息技术有限公司 Verification method and system
WO2015021908A1 (en) * 2013-08-13 2015-02-19 Tencent Technology (Shenzhen) Company Limited Method, apparatus and system for security verification

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102347929A (en) * 2010-07-28 2012-02-08 阿里巴巴集团控股有限公司 Verification method of user identity and apparatus thereof
CN102957682A (en) * 2011-08-30 2013-03-06 北京百度网讯科技有限公司 Method and equipment for providing picture verification code based on verification security level
WO2015021908A1 (en) * 2013-08-13 2015-02-19 Tencent Technology (Shenzhen) Company Limited Method, apparatus and system for security verification
CN104038502A (en) * 2014-06-24 2014-09-10 五八同城信息技术有限公司 Verification method and system

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295278A (en) * 2016-08-11 2017-01-04 深圳市金立通信设备有限公司 A kind of method sending checking information and terminal
CN107564341A (en) * 2017-08-08 2018-01-09 广东小天才科技有限公司 A kind of character teaching method and user terminal based on user terminal
CN108171837A (en) * 2017-12-27 2018-06-15 合肥美的智能科技有限公司 Access control system and its control method
CN108650226A (en) * 2018-03-30 2018-10-12 平安科技(深圳)有限公司 A kind of login validation method, device, terminal device and storage medium
WO2019184122A1 (en) * 2018-03-30 2019-10-03 平安科技(深圳)有限公司 Login verification method and apparatus, terminal device and storage medium
WO2020252880A1 (en) * 2019-06-19 2020-12-24 同盾控股有限公司 Reverse turing verification method and apparatus, storage medium, and electronic device
CN112948812A (en) * 2021-03-29 2021-06-11 天津车之家数据信息技术有限公司 Verification code distribution method, computing device and storage medium
CN114143046A (en) * 2021-08-30 2022-03-04 统信软件技术有限公司 User isolation method, data transmission method, computing device and storage medium
CN114143046B (en) * 2021-08-30 2024-02-23 统信软件技术有限公司 User isolation method, data transmission method, computing device and storage medium
CN114745178A (en) * 2022-04-11 2022-07-12 中国南方电网有限责任公司 Identity authentication method, identity authentication device, computer equipment, storage medium and program product

Similar Documents

Publication Publication Date Title
CN105610806A (en) Method and device for generating verification code
CN104038502B (en) A kind of verification method and system
US8671165B2 (en) Method, cell phone and system for accessing a computer resource over a network via microphone-captured audio
US7983689B2 (en) Automatic quality of service based resource allocation
US9602274B2 (en) Secure password generation
CN110321479B (en) Privacy protection mobile service recommendation method, client and recommendation system
KR102217948B1 (en) Review management system based on NFC technology
CN104426847A (en) Method, system and server for securely accessing and verifying an Internet service
CN107733968A (en) Application message method for pushing, device, computer equipment and storage medium
CN108924238A (en) Track collision analysis method and device
CN110519405A (en) A kind of short chain address operation access method, device, equipment and storage medium
CN109960554A (en) Show method, equipment and the computer storage medium of reading content
CN109933738A (en) Show method, equipment and the computer storage medium of reading content
CN107451459A (en) The method and apparatus verified using picture validation code
CN110955905A (en) Block chain based asset transfer method, device, equipment and readable storage medium
CN100435061C (en) Method for activation of an access to a computer system or to a programme
CN107329945B (en) Short message display processing method and device and mobile terminal
CN105743890B (en) Authority information generation method and device
CN101552742B (en) Electronic mail receiving apparatus
CN108229127B (en) System and method for generating authentication data in advance to distinguish clients
CN103685146A (en) Data processing device and data processing method for safety information interaction
CN111787642B (en) Third-party application based authentication networking method and device
CN109726883A (en) A kind of risk management and control method of insurance business, device, equipment and storage medium
CN114297552A (en) Form expansion method and device, computer equipment and storage medium
CN108090392B (en) Method, system and mobile terminal for processing service based on universal identification function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160525