CN106101125B - Verification processing method, device and system - Google Patents

Verification processing method, device and system Download PDF

Info

Publication number
CN106101125B
CN106101125B CN201610511248.3A CN201610511248A CN106101125B CN 106101125 B CN106101125 B CN 106101125B CN 201610511248 A CN201610511248 A CN 201610511248A CN 106101125 B CN106101125 B CN 106101125B
Authority
CN
China
Prior art keywords
client
server
verification
verification information
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610511248.3A
Other languages
Chinese (zh)
Other versions
CN106101125A (en
Inventor
龙官波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610511248.3A priority Critical patent/CN106101125B/en
Publication of CN106101125A publication Critical patent/CN106101125A/en
Application granted granted Critical
Publication of CN106101125B publication Critical patent/CN106101125B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

The embodiment of the invention provides a verification processing method, device and system, which are applied to the field of internet. The verification processing method is applied to a first server, and comprises the following steps: receiving a service request sent by a first client, and sending the service request to a second server; acquiring a verification code which is returned by the second server and generated aiming at the service request; sending the verification code to a second client so that the second client inputs verification information corresponding to the verification code; and receiving verification information returned by the second client, and sending the verification information to the second server.

Description

Verification processing method, device and system
Technical Field
The invention relates to the field of internet, in particular to a verification processing method, device and system.
Background
Along with the popularization of networks, verification codes need to be input in various operations such as registration, login, inquiry and downloading of more and more websites, and along with the prevention of malicious operations by the websites, the identification of the various verification codes is more and more difficult, and the input is more and more troublesome, so that a legal user often encounters the problem that the verification codes need to be input for many times due to input errors in the operation process, the time cost spent by the user is very high, and the user experience is not good enough.
Disclosure of Invention
In view of this, embodiments of the present invention provide a verification processing method, apparatus, and system, which send a verification code to be input to a client of a third party for input, so that the client initiating a service request can obtain corresponding service data without performing a verification code input operation, thereby improving poor user experience caused by cumbersome input of a total verification code in the prior art.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
an authentication processing method applied to a first server, the method comprising:
receiving a service request sent by a first client, and sending the service request to a second server; acquiring a verification code which is returned by the second server and generated aiming at the service request; sending the verification code to a second client so that the second client inputs verification information corresponding to the verification code; and receiving verification information returned by the second client, and sending the verification information to the second server.
An authentication processing method applied to a first server, the method comprising:
receiving a service request sent by a first client, and sending the service request to a second server; capturing a verification code generated for the service request and returned to the first client by the second server; sending the verification code to a second client so that the second client inputs verification information corresponding to the verification code; and receiving verification information returned by the second client, and sending the verification information to the second server.
An authentication processing apparatus, the apparatus comprising:
the request receiving module is used for receiving a service request sent by a first client; the request sending module is used for sending the service request to a second server; the verification code acquisition module is used for acquiring a verification code which is returned by the second server and generated aiming at the service request; the verification code sending module is used for sending the verification code to a second client so that the second client inputs verification information corresponding to the verification code; the verification information receiving module is used for receiving the verification information returned by the second client; and the verification information sending module is used for sending the verification information to the second server.
An authentication processing apparatus, the apparatus comprising:
the request receiving module is used for receiving a service request sent by a first client; a request sending module, configured to send the service request to the second server; the capturing module is used for capturing a verification code which is returned to the first client by the second server and is generated aiming at the service request; the verification code sending module is used for sending the verification code to a second client so that the second client inputs verification information corresponding to the verification code; the verification information receiving module is used for receiving the verification information returned by the second client; and the verification information sending module is used for sending the verification information to the second server.
A verification processing system comprises a first server, a first client and a second client, wherein the first client is used for sending a service request to the first server; the first server is used for receiving the service request and sending the service request to the second server so that the second server generates a verification code aiming at the service request;
the first server is also used for receiving the verification code and sending the verification code to a second client; the second client is used for receiving verification information which is input by a user and corresponds to the verification code, and sending the verification information to the first server; and the first server is also used for receiving the verification information returned by the second client and sending the verification information to the second server.
According to the verification processing method, device and system provided by the embodiment of the invention, after the first client inputs the service request, the first server sends the verification code returned by the second server aiming at the service request to the second client, so that the second client inputs the corresponding verification code, and the first server sends the verification code input by the second client to the second server, so that a user corresponding to the first client does not need to input the verification code when the service request is made, and the user experience is improved.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic diagram illustrating interaction between a server and a local terminal according to a preferred embodiment of the present invention;
FIG. 2 is a block diagram of a server provided in a preferred embodiment of the present invention;
fig. 3 is a flowchart illustrating a verification processing method according to a first embodiment of the present invention;
fig. 4 is a flowchart illustrating an authentication processing method according to a second embodiment of the present invention;
fig. 5 is a block diagram showing a configuration of an authentication processing apparatus according to a third embodiment of the present invention;
fig. 6 is a block diagram showing a configuration of an authentication processing apparatus according to a fourth embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present invention, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
Fig. 1 is a schematic diagram illustrating the interaction between a server 600 and a local terminal according to a preferred embodiment of the present invention. The server 600 is in communication connection with one or more local terminals through a network for data communication or interaction. The server 600 may be a web server, a database server, or the like. The local terminal may be a Personal Computer (PC), a tablet PC, a smart phone, a Personal Digital Assistant (PDA), or the like.
Fig. 2 is a block diagram of the server 600. The server includes an authentication processing device, a memory 101, a storage controller 102, a processor 103, a peripheral interface 104, and others.
The elements of the memory 101, memory controller 102, processor 103 and peripheral interface 104 are electrically connected to each other, directly or indirectly, to enable data transfer or interaction. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. The authentication processing means includes at least one software functional module that can be stored in the memory 101 in the form of software or firmware (firmware). The processor 103 is configured to execute an executable module stored in the memory 101, such as a software functional module or a computer program included in the authentication processing apparatus.
The Memory 101 may be, but is not limited to, a Random Access Memory 101 (RAM), a Read Only Memory 101 (ROM), a Programmable Read Only Memory 101 (PROM), an Erasable Read Only Memory 101 (EPROM), an electrically Erasable Read Only Memory 101 (EEPROM), and the like. The memory 101 is used for storing a program, and the processor 103 executes the program after receiving an execution instruction, and the method executed by the server/computer defined by the flow process disclosed in any embodiment of the present invention may be applied to the processor 103, or implemented by the processor 103.
The processor 103 may be an integrated circuit chip having signal processing capabilities. The Processor 103 may be a general-purpose Processor 103, and includes a Central Processing Unit (CPU) 103, a Network Processor 103 (NP), and the like; but may also be a digital signal processor 103(DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. The general purpose processor 103 may be a microprocessor 103 or the processor 103 may be any conventional processor 103 or the like.
The peripheral interface 104 couples various input/output devices to the processor 103 as well as to the memory 101. In some embodiments, the peripheral interface 104, the processor 103, and the memory controller 102 may be implemented in a single chip. In other examples, they may be implemented separately from the individual chips.
First embodiment
Fig. 3 is a flowchart of an authentication processing method according to a first embodiment of the present invention, which is applied to a first server, and please refer to fig. 3, the method includes:
s110: and receiving a service request sent by the first client, and sending the service request to the second server.
When a first client needs to make a service request to a second server to obtain corresponding service data, the service request is firstly sent to the first server. And after receiving the service request, the first server sends the service request to the second server. The second server is a server with corresponding service data, and the first client is a client with legal identity information.
In this embodiment, the service request may be an inquiry request, a login request, a purchase request, and the like, which is not limited in this embodiment.
S120: and acquiring a verification code which is returned by the second server and generated aiming at the service request.
The method provided by the embodiment of the invention is a verification processing method aiming at the fact that the second server can generate the corresponding verification code after receiving the service request. That is, after the first server sends the service request to the second server, the second server generates a random verification code for the service request, and sends the random verification code to the first server. Then, the first server obtains the verification code returned by the second server for processing.
S130: and sending the verification code to a second client so that the second client inputs verification information corresponding to the verification code.
After the first server acquires the verification code returned by the second server, the verification code is sent to the second client, after the second client receives the verification code, the verification information corresponding to the verification code is input according to the specific input requirement of the verification code, for example, the verification code is a letter or a number, and the corresponding letter or number needs to be correspondingly input, the verification information input by the second client is the corresponding letter or number, if the verification code is the addition or subtraction of the number, and the addition or subtraction result needs to be input, the verification information input by the second client is the corresponding sum or difference. And the second client returns the verification information to the first server after correspondingly inputting the verification information.
In this embodiment, the second client may be a client different from the first client, and is specifically configured to input the verification information corresponding to the verification code sent by the first server. Of course, the second client may also be the same client having different identity information from the first client, and after the second client authorizes the first server to send the verification code that needs to be input with the verification information, the server sends the verification code to the second client.
In addition, the second clients may also include a plurality of second clients, and the first server may first query the number of the verification information to be input of the plurality of second clients when the verification codes need to be sent to the second clients each time, that is, how many verification codes corresponding to the verification codes of each second client have not been input yet, and then send the verification codes of the verification information to be input to the second client with the smallest number of the input verification information, so as to ensure that the number of the verification information to be input between the plurality of second clients is not greatly different, thereby speeding up the verification completion time as much as possible.
S140: and receiving verification information returned by the second client, and sending the verification information to the second server.
And after receiving the verification information returned by the second client, the first server correspondingly sends the verification information to the second server so that the second server uses the verification information for verification.
Further, as shown in fig. 3, in this embodiment, after the second server verifies the corresponding verification information and the verification succeeds, the method further includes:
s150: and receiving service data which is sent by the second server after the verification of the verification information is successful and corresponds to the service request.
Each service request needs to correspondingly obtain corresponding service data. For example, the query needs to obtain corresponding query data correspondingly, the login needs to obtain a corresponding login page, and the purchase needs to obtain corresponding purchase feedback information. And after the second server successfully verifies, the service data corresponding to the service request is sent to the first server, and the first server receives the service data.
S160: and sending the service data to the first client.
And the first server sends the service data returned by the second server to the first client initiating the corresponding service request, so that the first client successfully acquires the corresponding service data.
In summary, the verification processing method provided in this embodiment is applied to a first server, where the first server sends a service request sent by a first client to a second server after obtaining the service request, receives a verification code returned by the second server, and directly sends the verification code to the second client, so that the second client inputs verification information corresponding to the verification code. And then the verification information returned by the second client is sent to the second server, so that corresponding service data is obtained after the second server is successfully verified, and the service data is sent to the first client, so that the first client does not need to input a verification code returned by the second server after sending a service request which can be met by the second server, and the first client can obtain the corresponding service data returned by the first server after the first server correspondingly processes the verification code through the second client.
Second embodiment
The embodiment provides a verification processing method which is applied to a first server. Referring to fig. 4, the method includes:
step S210: and receiving a service request sent by the first client, and sending the service request to the second server.
In this step, the first client sends a service request to the first server, and the first server sends the service request to the second client after receiving the service request. And the first client carries the address of the first client when sending the service request, and the first server sends the address to the second server together, so that the subsequent interaction of the second server for the service request can directly occur with the first client.
Step S220: and capturing the verification code generated for the service request and returned to the first client by the second server.
The second server generates a verification code for the service request sent by the first server, and returns the verification code to the first client according to the address of the first client. When the first server returns the verification code to the first client, the second server captures the verification code, so that the verification code does not reach the first client, and a user corresponding to the first client is not required to input the verification code.
Of course, the grabbing of the authentication code by the first server is under the condition of obtaining the corresponding authorization of the second server and the first client.
Step S230: and sending the verification code to a second client so that the second client inputs verification information corresponding to the verification code.
Step S240: and receiving verification information returned by the second client, and sending the verification information to the second server.
In this embodiment, step S230 is the same as the implementation manner of step S130 in the first embodiment, and both the first server sends the verification code to the second client. Step S240 is the same as the implementation manner of step S140 in the first embodiment, and receives the authentication information returned by the second client, and sends the authentication information to the second server.
However, in this embodiment, after receiving the verification information and successfully verifying, the second server directly sends the service data to the first client, so that the first client directly obtains the corresponding service data from the second server, the workload of the first server is reduced, and the speed of obtaining the service data by the first client is increased.
Third embodiment
Fig. 5 shows an authentication processing apparatus 300 according to an embodiment of the present invention, please refer to fig. 5, which includes:
a request receiving module 310, configured to receive a service request sent by a first client;
a request sending module 320, configured to send the service request to a second server;
a verification code obtaining module 330, configured to obtain a verification code generated for the service request and returned by the second server;
a verification code sending module 340, configured to send the verification code to a second client, so that the second client inputs verification information corresponding to the verification code;
a verification information receiving module 350, configured to receive verification information returned by the second client;
and an authentication information sending module 360, configured to send the authentication information to the second server.
After the second server succeeds in verification, the second server sends corresponding service data to the first server, and then, for the service data sent by the second server, the verification processing apparatus 300 further includes:
a data receiving module 370, configured to receive service data corresponding to the service request sent by the second server after the verification of the verification information is successful;
a data sending module 380, configured to send the service data to the first client.
In addition, the second client may include a plurality of second clients, and when the number of the second clients is plural, before the verification code is sent to the second client to enable the second client to input the verification information, the number of the verification information to be currently input by the second client may be queried, that is, the current task amount of each second client is known, and then it is determined to which second client the current verification code is sent. Then, specifically, the verification code sending module 340 may include:
the query unit is used for querying the number of the verification information to be input of the plurality of second clients;
and the verification code sending unit is used for sending the verification code to the second client side with the least verification information to be input.
Fourth embodiment
The present embodiment provides a verification processing apparatus 400, please refer to fig. 6, which includes:
a request receiving module 410, configured to receive a service request sent by a first client;
a request sending module 420, configured to send the service request to the second server;
a fetching module 430, configured to fetch a verification code generated for the service request and returned to the first client by the second server;
a verification code sending module 440, configured to send the verification code to a second client, so that the second client inputs verification information corresponding to the verification code;
a verification information receiving module 450, configured to receive verification information returned by the second client;
a verification information sending module 460, configured to send the verification information to the second server.
Fifth embodiment
An embodiment of the present invention provides a verification processing system, where the verification processing system includes a processing server and a second client, and fig. 1 includes an interaction diagram of the verification processing system provided in this embodiment. Wherein the content of the first and second substances,
the processing server is used for receiving the service request sent by the first client and sending the service request to the second server so that the second server generates a verification code aiming at the service request.
The processing server is further used for receiving the verification code and sending the verification code to the second client.
The second client is used for receiving verification information which is input by a user and corresponds to the verification code, and sending the verification information to the processing server.
The processing server is also used for receiving the verification information returned by the second client and sending the verification information to the second server.
And after the processing server sends the verification information to the second server and the second server verifies successfully, the second server sends the service data corresponding to the service request to the processing server, so that in the verification processing system, the processing server is also used for receiving the service data which is sent by the second server and corresponds to the service request. And the processing server is also used for sending the service data to the first client.
In summary, the verification processing method, the verification processing device, and the verification processing system provided in the embodiments of the present invention send the verification code generated by the second server when the first client requests the service to the second client for processing, so that the user corresponding to the first client can obtain the corresponding service data without performing cumbersome verification code input when initiating the service request, and thus the operation is convenient and the user experience is greatly improved.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes. It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention. It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (7)

1. An authentication processing method applied to a first server, the method comprising:
receiving a service request sent by a first client, and sending the service request to a second server; wherein the service request comprises: the system comprises a query request, a login request or a purchase request, wherein the query request is used for querying corresponding query data which needs to be obtained correspondingly, the login request is used for logging in a corresponding login page which needs to be obtained, and the purchase request is used for purchasing corresponding purchase feedback information which needs to be obtained;
acquiring a verification code which is returned by the second server and generated aiming at the service request;
sending the verification code to a second client to enable the second client to input verification information corresponding to the verification code, wherein the input of the verification information corresponding to the verification code by the second client comprises: if the verification code is a letter or a number, the verification information input by the second client is the corresponding letter or number; or if the verification code is the addition or subtraction of digits, the verification information input by the second client is the addition or subtraction result of the corresponding digits;
receiving verification information returned by the second client, and sending the verification information to the second server;
receiving service data corresponding to the service request sent by the second server after the verification of the verification information is successful;
sending the service data to the first client; wherein the service data includes: the first client and the second client are different clients, and the second client is used for correspondingly inputting verification information corresponding to a verification code sent by the first server.
2. The method of claim 1, wherein the second client comprises a plurality of clients, and wherein sending the authentication code to the second client comprises:
inquiring the quantity of the verification information to be input of a plurality of second clients;
and sending the verification code to a second client with the least verification information to be input.
3. An authentication processing method applied to a first server, the method comprising:
receiving a service request sent by a first client, and sending the service request to a second server; wherein the service request comprises: the system comprises a query request, a login request or a purchase request, wherein the query request is used for querying corresponding query data which needs to be obtained correspondingly, the login request is used for logging in a corresponding login page which needs to be obtained, and the purchase request is used for purchasing corresponding purchase feedback information which needs to be obtained;
capturing a verification code generated for the service request and returned to the first client by the second server;
sending the verification code to a second client to enable the second client to input verification information corresponding to the verification code, wherein the input of the verification information corresponding to the verification code by the second client comprises: if the verification code is a letter or a number, the verification information input by the second client is the corresponding letter or number; or if the verification code is the addition or subtraction of digits, the verification information input by the second client is the addition or subtraction result of the corresponding digits;
receiving verification information returned by the second client, and sending the verification information to the second server;
receiving service data corresponding to the service request sent by the second server after the verification of the verification information is successful;
sending the service data to the first client; wherein the service data includes: the first client and the second client are different clients, and the second client is used for correspondingly inputting verification information corresponding to a verification code sent by the first server.
4. An authentication processing apparatus, characterized in that the apparatus comprises:
the request receiving module is used for receiving a service request sent by a first client;
the request sending module is used for sending the service request to a second server; wherein the service request comprises: the system comprises a query request, a login request or a purchase request, wherein the query request is used for querying corresponding query data which needs to be obtained correspondingly, the login request is used for logging in a corresponding login page which needs to be obtained, and the purchase request is used for purchasing corresponding purchase feedback information which needs to be obtained;
the verification code acquisition module is used for acquiring a verification code which is returned by the second server and generated aiming at the service request;
a verification code sending module, configured to send the verification code to a second client, so that the second client inputs verification information corresponding to the verification code, where the inputting of the verification information corresponding to the verification code by the second client includes: if the verification code is a letter or a number, the verification information input by the second client is the corresponding letter or number; or if the verification code is the addition or subtraction of digits, the verification information input by the second client is the addition or subtraction result of the corresponding digits;
the verification information receiving module is used for receiving the verification information returned by the second client;
the verification information sending module is used for sending the verification information to the second server;
the data receiving module is used for receiving the service data which is sent by the second server after the verification information is successfully verified and corresponds to the service request;
the data sending module is used for sending the service data to the first client; wherein the service data includes: the first client and the second client are different clients, and the second client is used for correspondingly inputting verification information corresponding to a verification code sent by the first server.
5. The apparatus according to claim 4, wherein the second client includes a plurality of clients, and the verification code sending module includes:
the query unit is used for querying the number of the verification information to be input of the plurality of second clients;
and the verification code sending unit is used for sending the verification code to the second client side with the least verification information to be input.
6. An authentication processing apparatus, characterized in that the apparatus comprises:
the request receiving module is used for receiving a service request sent by a first client; wherein the service request comprises: the system comprises a query request, a login request or a purchase request, wherein the query request is used for querying corresponding query data which needs to be obtained correspondingly, the login request is used for logging in a corresponding login page which needs to be obtained, and the purchase request is used for purchasing corresponding purchase feedback information which needs to be obtained;
the request sending module is used for sending the service request to a second server;
the capturing module is used for capturing a verification code which is returned to the first client by the second server and is generated aiming at the service request;
a verification code sending module, configured to send the verification code to a second client, so that the second client inputs verification information corresponding to the verification code, where the inputting of the verification information corresponding to the verification code by the second client includes: if the verification code is a letter or a number, the verification information input by the second client is the corresponding letter or number; or if the verification code is the addition or subtraction of digits, the verification information input by the second client is the addition or subtraction result of the corresponding digits;
the verification information receiving module is used for receiving the verification information returned by the second client;
the verification information sending module is used for sending the verification information to the second server;
the data receiving module is used for receiving the service data which is sent by the second server after the verification information is successfully verified and corresponds to the service request;
the data sending module is used for sending the service data to the first client; wherein the service data includes: the first client and the second client are different clients, and the second client is used for correspondingly inputting verification information corresponding to a verification code sent by the first server.
7. An authentication processing system is characterized by comprising a processing server and a second client,
the processing server is used for receiving a service request sent by a first client and sending the service request to a second server so that the second server generates a verification code aiming at the service request; wherein the service request comprises: the system comprises a query request, a login request or a purchase request, wherein the query request is used for querying corresponding query data which needs to be obtained correspondingly, the login request is used for logging in a corresponding login page which needs to be obtained, and the purchase request is used for purchasing corresponding purchase feedback information which needs to be obtained;
the processing server is also used for receiving the verification code and sending the verification code to a second client;
the second client is configured to receive verification information corresponding to the verification code, which is input by a user, and send the verification information to the processing server, where the input of the verification information corresponding to the verification code by the second client includes: if the verification code is a letter or a number, the verification information input by the second client is the corresponding letter or number; or if the verification code is the addition or subtraction of digits, the verification information input by the second client is the addition or subtraction result of the corresponding digits;
the processing server is also used for receiving verification information returned by the second client and sending the verification information to the second server;
the processing server is further configured to receive service data corresponding to the service request sent by the second server;
the processing server is further configured to send the service data to the first client; wherein the service data includes: the first client and the second client are different clients, and the second client is used for correspondingly inputting verification information corresponding to a verification code sent by the first server.
CN201610511248.3A 2016-07-01 2016-07-01 Verification processing method, device and system Active CN106101125B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610511248.3A CN106101125B (en) 2016-07-01 2016-07-01 Verification processing method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610511248.3A CN106101125B (en) 2016-07-01 2016-07-01 Verification processing method, device and system

Publications (2)

Publication Number Publication Date
CN106101125A CN106101125A (en) 2016-11-09
CN106101125B true CN106101125B (en) 2020-09-22

Family

ID=57211852

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610511248.3A Active CN106101125B (en) 2016-07-01 2016-07-01 Verification processing method, device and system

Country Status (1)

Country Link
CN (1) CN106101125B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108011871A (en) * 2017-11-16 2018-05-08 青岛海信电器股份有限公司 A kind of remote assistance processing method and equipment
CN109684129B (en) * 2018-11-20 2020-05-05 北京深思数盾科技股份有限公司 Data backup recovery method, storage medium, encryption machine, client and server
CN113824628B (en) * 2021-09-30 2023-04-07 传仲智能数字科技(上海)有限公司 User identity authentication method, device, server and storage medium based on IM

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179098A (en) * 2011-12-23 2013-06-26 阿里巴巴集团控股有限公司 Method and device for retrieving password of network account number
CN104639533A (en) * 2014-12-30 2015-05-20 小米科技有限责任公司 Safety control method and device based on terminal
CN104901925A (en) * 2014-03-05 2015-09-09 中国移动通信集团北京有限公司 End-user identity authentication method, device and system and terminal device
CN105306199A (en) * 2014-05-28 2016-02-03 腾讯科技(深圳)有限公司 Identity verification method, device and system

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739667A (en) * 2012-06-21 2012-10-17 北京小米科技有限责任公司 Verification method, device and system based on verification prompt message and server
CN104954343B (en) * 2014-03-31 2018-04-17 腾讯科技(深圳)有限公司 Checking information processing method, server and system
US9467442B2 (en) * 2014-05-23 2016-10-11 Symantec Corporation Automated step-up digital certificate installation process
CN103971239A (en) * 2014-05-28 2014-08-06 中国农业银行股份有限公司 Verification method and device
CN105407074A (en) * 2014-09-11 2016-03-16 腾讯科技(深圳)有限公司 Authentication method, apparatus and system
CN105592005B (en) * 2014-10-22 2020-06-12 腾讯科技(深圳)有限公司 Security verification method, device and system
CN104700270A (en) * 2015-03-20 2015-06-10 酷派软件技术(深圳)有限公司 Payment request processing method, payment request processing device and terminal
CN105141624B (en) * 2015-09-17 2018-09-25 网易(杭州)网络有限公司 Login method, account management server and FTP client FTP
CN105471884B (en) * 2015-12-21 2019-05-31 联想(北京)有限公司 A kind of authentication method, server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179098A (en) * 2011-12-23 2013-06-26 阿里巴巴集团控股有限公司 Method and device for retrieving password of network account number
CN104901925A (en) * 2014-03-05 2015-09-09 中国移动通信集团北京有限公司 End-user identity authentication method, device and system and terminal device
CN105306199A (en) * 2014-05-28 2016-02-03 腾讯科技(深圳)有限公司 Identity verification method, device and system
CN104639533A (en) * 2014-12-30 2015-05-20 小米科技有限责任公司 Safety control method and device based on terminal

Also Published As

Publication number Publication date
CN106101125A (en) 2016-11-09

Similar Documents

Publication Publication Date Title
US20180374097A1 (en) A distributed user profile identity verification system for e-commerce transaction security
US9985944B2 (en) Method and apparatus for user authentication
US11349665B2 (en) Device attestation server and method for attesting to the integrity of a mobile device
CN105591743B (en) Method and device for identity authentication through equipment operation characteristics of user terminal
CN104468531A (en) Authorization method, device and system for sensitive data
CN109257321B (en) Secure login method and device
CN112235321B (en) Short message verification code anti-brushing method and device
JP2017535870A (en) Two-dimensional code scan interaction method and apparatus
CN106101125B (en) Verification processing method, device and system
CN111343168A (en) Identity authentication method and device, computer equipment and readable storage medium
CN110708335A (en) Access authentication method and device and terminal equipment
CN109145651B (en) Data processing method and device
CN111988418A (en) Data processing method, device, equipment and computer readable storage medium
CN111476633A (en) Product service recommendation platform, product service path recommendation method and medium
CN107623696B (en) User identity verification method and device based on user behavior characteristics
CN106790159B (en) Secret level checking method and device
CN107679865B (en) Identity verification method and device based on touch area
CN111078437A (en) Remote calling method and device of verification code, electronic equipment and readable storage medium
CN110888716A (en) Data processing method and device, storage medium and electronic equipment
US10587617B2 (en) Broadcast-based trust establishment
CN108270784B (en) Information configuration group sending method and device
CN107528819B (en) Account number binding method and device
CN113256366A (en) Order data processing method and system based on big data and cloud computing
CN106330882B (en) Security verification method and security verification device
CN111193729A (en) Cross-terminal user identity recognition method and device and computer readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant