CN106209742B - Security verification method and system - Google Patents
Security verification method and system Download PDFInfo
- Publication number
- CN106209742B CN106209742B CN201510229302.0A CN201510229302A CN106209742B CN 106209742 B CN106209742 B CN 106209742B CN 201510229302 A CN201510229302 A CN 201510229302A CN 106209742 B CN106209742 B CN 106209742B
- Authority
- CN
- China
- Prior art keywords
- user
- dynamic
- side application
- security
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application provides a security verification method and a system, wherein the security verification method comprises the following steps: receiving a user name and a static password which are transmitted by terminal equipment and input by a user; performing first security verification based on the user name and a static password; providing at least two ways for returning dynamic verification information generated by the user side application to the user; receiving dynamic authentication information returned by the user through one of the at least two ways; and comparing the dynamic authentication information returned by the user through one of the at least two ways with the locally generated dynamic authentication information so as to perform second security authentication. The method and the device avoid the security problem caused by the fact that the static password is easy to crack in the first security verification, and effectively guarantee the security and reliability of the user identity verification.
Description
Technical Field
The present application relates to the field of computers, and in particular, to a security verification method and system.
Background
With the rapid development and application of the internet, network security issues have become one of the most concerned issues for network providers and users. The security verification of the user identity is a necessary means for ensuring the network security. Currently, most network services perform security verification on the identity of a user through a user name and a static password. In order to ensure the security, the static password needs to be set more complicated, so that the password is difficult to remember and is inconvenient to input. In addition, static passwords are at risk of being broken by means such as brute force, hitting, dragging, peeping, trojan horse, etc.
Therefore, the current means for performing security verification on the user identity based on the user name and the static password has the risk that the static password is easy to crack, and therefore, the security of the user identity verification is not high enough.
Disclosure of Invention
One of the technical problems to be solved by the present application is to provide a security verification method and system, so as to further improve the security of user identity verification.
According to an embodiment of an aspect of the present application, there is provided a security authentication method including:
receiving a user name and a static password which are transmitted by terminal equipment and input by a user;
performing first security verification based on the user name and a static password;
providing at least two ways for returning dynamic verification information generated by the user side application to the user;
receiving dynamic authentication information returned by the user through one of the at least two ways;
and comparing the dynamic authentication information returned by the user through one of the at least two ways with the locally generated dynamic authentication information so as to perform second security authentication.
According to an embodiment of another aspect of the present application, there is provided a security authentication system including:
the first receiving unit is used for receiving a user name and a static password which are transmitted by the terminal equipment and input by a user;
the first security verification unit is used for performing first security verification based on the user name and the static password;
the providing unit is used for providing at least two ways for returning the dynamic verification information generated by the user side application to the user;
the second receiving unit is used for receiving the dynamic verification information returned by the user through one of the at least two ways;
and the second security authentication unit is used for comparing the dynamic authentication information returned by the user through one of the at least two ways with the locally generated dynamic authentication information so as to perform second security authentication.
According to the embodiment of the application, on the basis of carrying out first security verification based on the user name and the static password, second security verification based on dynamic verification information is carried out. Since the dynamic authentication information is dynamically generated, it is difficult to crack if a cracker is not configured with a user-side application (dynamic authentication information application) that generates the dynamic authentication information as with the user. Therefore, the security problem caused by the fact that the static password is easy to crack in the first security verification is avoided, and the security and the reliability of the user identity verification are effectively guaranteed. In addition, the embodiment provides at least two ways of returning the dynamic verification information generated by the user side application for the second security verification, so that the problem that the second security verification cannot be performed due to the fact that the dynamic verification information cannot be returned through the way because the network environment and/or the terminal capability of the terminal device are limited under the condition that only one way of returning the dynamic verification information generated by the user side application for the second security verification is provided is solved, and timely and accurate acquisition of the dynamic verification information is effectively ensured, so that the reliability of the user identity verification is further ensured.
It will be appreciated by those of ordinary skill in the art that although the following detailed description will proceed with reference being made to illustrative embodiments, the present application is not intended to be limited to these embodiments. Rather, the scope of the application is broad and is intended to be defined only by the claims that follow.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1a is a flow chart of an implementation sequence of a security authentication method according to an embodiment of the present application.
FIG. 1b is a flow diagram of another implementation sequence of a security verification method according to one embodiment of the present application.
FIG. 2 is a schematic interface diagram with an input box receiving dynamic authentication information according to one embodiment of the present application.
FIG. 3 is a schematic diagram of an interface for prompting a user for confirmation by a verification page according to an embodiment of the application.
FIG. 4 is a schematic diagram of an interface for prompting a user for confirmation by a user-side application according to an embodiment of the application.
FIG. 5 is a block diagram of a security verification system according to one embodiment of the present application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel, concurrently, or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
The computer equipment comprises user equipment and network equipment. Wherein the user equipment includes but is not limited to computers, smart phones, PDAs, etc.; the network device includes, but is not limited to, a single network server, a server group consisting of a plurality of network servers, or a Cloud Computing (Cloud Computing) based Cloud consisting of a large number of computers or network servers, wherein Cloud Computing is one of distributed Computing, a super virtual computer consisting of a collection of loosely coupled computers. The computer equipment can be independently operated to realize the application, and can also be accessed into a network to realize the application through the interactive operation with other computer equipment in the network. The network in which the computer device is located includes, but is not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, and the like.
It should be noted that the user equipment, the network device, the network, etc. are only examples, and other existing or future computer devices or networks may also be included in the scope of the present application, if applicable, and are included by reference.
The methods discussed below, some of which are illustrated by flow diagrams, may be implemented by hardware, software, firmware, middleware, microcode, hardware description languages, or any combination thereof. When implemented in software, firmware, middleware or microcode, the program code or code segments to perform the necessary tasks may be stored in a machine or computer readable medium such as a storage medium. The processor(s) may perform the necessary tasks.
Specific structural and functional details disclosed herein are merely representative and are provided for purposes of describing example embodiments of the present application. This application may, however, be embodied in many alternate forms and should not be construed as limited to only the embodiments set forth herein.
It will be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element may be termed a second element, and, similarly, a second element may be termed a first element, without departing from the scope of example embodiments. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may be present. In contrast, when an element is referred to as being "directly connected" or "directly coupled" to another element, there are no intervening elements present. Other words used to describe the relationship between elements (e.g., "between" versus "directly between", "adjacent" versus "directly adjacent to", etc.) should be interpreted in a similar manner.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be noted that, in some alternative implementations, the functions/acts noted may occur out of the order noted in the figures. For example, two figures shown in succession may, in fact, be executed substantially concurrently, or the figures may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
As described above, the method for performing security verification on the user identity based on the user name and the static password has a risk that the static password is easy to crack, and thus the security is not high. In order to solve the problem, the security verification based on the dynamic verification information is performed on the basis of the security verification based on the user name and the static password, so that the security and reliability of the user identity verification are effectively improved.
For convenience of description, the following embodiments refer to security authentication based on a user name and a static password as first security authentication, and security authentication based on dynamic authentication information as second security authentication.
The technical solution of the present application is further described in detail below with reference to the accompanying drawings.
Fig. 1a-1b are flow diagrams of two different execution sequences of a security authentication method according to an embodiment of the present application. The security verification method can be implemented by one server capable of implementing security verification, and also can be implemented by a group of servers. The set of servers may be, for example, two servers, one of which is a server for implementing a first security authentication and the other of which is a server for implementing a second security authentication. The set of servers may also be a cloud server set including a plurality of servers. As shown in fig. 1a-b, the security authentication method mainly comprises the following steps:
s10, receiving a user name and a static password which are transmitted by the terminal equipment and input by a user;
s11, performing first security verification based on the user name and the static password;
s12, providing at least two ways for returning the dynamic verification information generated by the user side application to the user;
s13, receiving dynamic verification information returned by the user through one of the at least two ways;
and S14, comparing the dynamic authentication information returned by the user through one of the at least two ways with the locally generated dynamic authentication information, thereby performing second security authentication.
The above steps are described in further detail below.
Steps S10 and S11 are processes for implementing the first security verification, and the first security verification method in the embodiment of the present application is not particularly limited, and may be implemented by using the existing technology.
Steps S12 to S14 are implementation procedures of the second security verification. It should be noted that the second security authentication in the embodiment of the present application may be performed after the first security authentication is passed, as shown in fig. 1a, or may be performed simultaneously with the first security authentication, that is, the second security authentication is performed based on the dynamic authentication information while performing the first security authentication based on the user name and the static password, as shown in fig. 1 b.
The user side application is an application which is bound with a user name (or ID) of a user in advance and can generate dynamic verification information, and the application can be borne in the intelligent mobile terminal. The dynamic verification information is generated in the user side application through the following algorithm:
dynamic verification information f (random string, time factor, password length) (1)
The server also generates a dynamic authentication message by the same algorithm as above. And if the dynamic verification information which is reported to the server by the user side application in real time is consistent with the dynamic verification information which is generated by the server in real time, the second security verification is passed.
In order to implement the security verification based on the dynamic verification information, in the embodiment of the present application, the random character string may be generated by a user side application or a server (hereinafter referred to as a server) for implementing a second security verification, and the random character string may be simultaneously stored in the user side application and the server, where the random character string is stored in association with a user side application ID, and the user side application ID is bound to a user name of a user holding a terminal where the user side application is installed, so that the random character string can be found by the user name of the user at both the user side application side and the server side, and the random character strings found by the same user are the same. In this way, it is ensured that the random string variables in the above algorithm (1) of the user side application side and the server side are the same.
When the initial configuration of the dynamic verification information application is carried out, the dynamic verification information application is communicated with the server to obtain the current system time of the server, and then the time difference value between the system time of the server and the system time of the system where the user side application is located is stored in the user side application. When the user side application needs to generate dynamic verification information, the system time of the system where the current user side application is located is added with the time difference value to be used as a time factor (actually, the calculated system time of the current server), and the time factor is substituted into the algorithm (1). When the server generates dynamic authentication information, algorithm (1) is substituted with the current system time of the server. In this way, it is ensured that the time factors in the above algorithm (1) of the user side application side and the server side are the same.
At the initial configuration of the dynamic authentication information application, the password length adopted by the dynamic authentication information application in the algorithm (1) is also configured to be the same as the password length adopted by the server in the algorithm (1).
Therefore, at the same time, the dynamic verification information generated and reported to the server by the user side application through the algorithm (1) in real time is consistent with the dynamic verification information generated by the server through the algorithm (1) in real time. And if the dynamic verification information reported to the server by the application of the user side in real time is verified to be consistent with the dynamic verification information generated by the server in real time, the second security verification is passed.
The ways for returning the dynamic authentication information generated by the user-side application, which can be provided in step S12, include, but are not limited to, the following three ways:
approach one) provides the user with an input box to enter dynamic authentication information generated by the user-side application.
Wherein the input box may be different from the input box for receiving the static password, that is, an input box is separately provided for receiving the dynamic authentication information, as shown in fig. 2, an input box for receiving the dynamic authentication information is provided in the authentication page;
the input box may be the same input box as the input box for receiving the static password, for example, in a scenario such as outlook that does not support changing of the authentication page, the input box for receiving the static password is directly used as the input box for receiving the dynamic authentication information, and the password with the specified number of bits in the input information received through the input box is recognized as the dynamic authentication information input by the user. In this embodiment, after the static password is input in the static password input box, the dynamic authentication information is input.
In a specific implementation, the dynamic authentication information received through the input box for receiving the dynamic authentication information may be directly transmitted to the server for implementing the second security authentication. The dynamic authentication information may also be transmitted to a server for implementing the second security authentication by the server for implementing the first security authentication (this is a scenario in which the corresponding static password input box and the dynamic authentication information input box are the same input box).
And the second way) sends a message to be confirmed to the user side application of the user, and triggers the user side application to send a verification request carrying the dynamic verification information generated by the user side application.
And sending a message to be confirmed to the user side application of the user, namely sending the message to be confirmed to the user side application bound with the user name. The to-be-confirmed message includes a user name and an event to be confirmed, for example, the to-be-confirmed message includes: the XX account requests login.
For example, a message to be confirmed is sent to the user side application bound by the user, and the user may be prompted to confirm to the user side application in the verification page, as shown in fig. 3, to prompt the user to "please open the mobile phone to confirm login".
And displaying the message to be confirmed in the user side application for the user to confirm, wherein the user can select acceptance or rejection to confirm, and the confirmation result is sent to the server together with the dynamic verification information generated by the user side application in a verification request mode.
It can be understood that the authentication request carrying the confirmation result and the dynamic authentication information sent by the user-side application may further include an ID of the user-side application.
And the third way) provides the two-dimensional code picture for the user, so that the user side application triggers and sends a verification request carrying the dynamic verification information generated by the user side application by scanning the two-dimensional code picture.
For example, a two-dimensional code picture may be displayed on the verification page, and the user may be prompted to scan the two-dimensional code picture to complete the verification, and after the user scans the two-dimensional code through the user-side application, an interface as shown in fig. 4 appears on the user-side application.
The user side application can obtain a message to be confirmed in the two-dimensional code picture by scanning the two-dimensional code picture, wherein the message to be confirmed includes a user name and an event to be confirmed, and for example, the content of the message to be confirmed is as follows: the XX account requests login. The user may choose to accept or reject the user interface (e.g., fig. 4) for confirmation, and the confirmation result is sent to the server in the form of a verification request together with the dynamic verification information generated by the user-side application.
It can be understood that the authentication request carrying the confirmation result and the dynamic authentication information sent by the user-side application may further include an ID of the user-side application.
Because there is a certain drawback in providing one of the above three approaches separately, for example, if the approach one is provided separately), the user needs to manually input the dynamic verification information, and the user experience is poor; if the second path is provided separately), network support is required, and delay exists under the condition of poor network quality; if the third path is provided separately), Network support is required, a certain display space is required for providing the two-dimensional code picture, and a terminal which does not support displaying the two-dimensional code picture, such as a VPN (virtual private Network) terminal or an SSH (Secure Shell Protocol) terminal, cannot display the two-dimensional code picture.
According to the embodiment of the application, at least two ways of returning the dynamic verification information are provided at the same time, so that the problem existing in a single way can be effectively avoided, the dynamic verification information can be acquired in time, the second safety verification based on the dynamic verification information is executed, and the verification speed is improved.
In addition, it should be noted that, in another embodiment, the server may determine, according to the network environment where the terminal device is located and/or the terminal capability of the terminal device, which user-side application-generated dynamic authentication information is returned to the user. That is, step S12 may include:
acquiring a network environment where the terminal equipment is located and/or terminal capacity of the terminal equipment;
and providing at least two ways for returning dynamic verification information generated by the application at the user side to the user according to the acquired network environment of the terminal equipment and/or the terminal capability of the terminal equipment.
The current network environment includes: whether to connect to a network, network speed, network signal strength, etc. The terminal capabilities include: whether display of the two-dimensional code is supported, whether providing a dynamic authentication information input box is supported, and the like. The acquiring comprises: receiving and/or detecting. For example, a box for filling out the network environment where the terminal device is located and/or the terminal capability of the user may be set on the verification interface of the terminal device, the user may perform input, and the server may learn the network environment where the terminal device is located and/or the terminal capability of the terminal device by acquiring the content filled out by the user. Examples of detection are, for example, the server detecting that there is a network connection or no network connection in the environment where the terminal device is currently located, which is possible in the current technology.
For example, the server detects that the network environment in which the terminal device is located is a network connection environment, but the terminal does not support two-dimensional code display, and in this case, the server only provides the user with the first route) and the second route), instead of providing all the routes to the user.
Step S13 is to receive the dynamic authentication information returned by the user through one of the at least two ways, that is, the user may return the dynamic authentication information through any one of the at least two ways. For example, if the above three ways are provided simultaneously, the user may directly verify the verification message in the user side application through the way two), and send the verification request carrying the dynamic verification information generated by the user side application, which does not require the user to input the dynamic verification information. Of course, dynamic authentication information may also be returned via way one) or way three).
Step S14 is to compare the dynamic authentication information returned by the user through one of the at least two ways with the locally generated dynamic authentication information, thereby performing a second security authentication.
The principle of this second security authentication is as described above. The locally generated dynamic authentication information is locally generated dynamic authentication information of a server executing the second security authentication, and the server is a server bound with the user side application.
According to the embodiment of the application, on the basis of carrying out the first security verification based on the user name and the static password, the second security verification based on the dynamic verification information is carried out, so that the security problem caused by the fact that the static password is easy to crack in the first security verification is avoided, and the security and reliability of the user identity verification are effectively guaranteed. In addition, the embodiment provides at least two ways of returning the dynamic verification information generated by the user side application for the second security verification, thereby effectively ensuring that the dynamic verification information is timely and accurately obtained to ensure the execution of the second security verification, and further ensuring the reliability of the user identity verification.
The embodiment of the application also provides a security verification system corresponding to the security verification method. The security authentication system may comprise a set of servers, which may be, for example, two servers, one of which is a server for implementing a first security authentication and the other of which is a server for implementing a second security authentication. Of course, the group of servers may also be a cloud server group including a plurality of servers. A security authentication system shown in fig. 5, comprising:
a first receiving unit 20, configured to receive a user name and a static password, which are transmitted by a terminal device and input by a user;
a first security authentication unit 21 configured to perform a first security authentication based on the user name and the static password;
a providing unit 22, configured to provide at least two ways for returning the dynamic authentication information generated by the user-side application to the user;
a second receiving unit 23, configured to receive dynamic authentication information returned by the user through one of the at least two ways;
and a second security authentication unit 24, configured to compare the dynamic authentication information returned by the user through one of the at least two ways with the locally generated dynamic authentication information, so as to perform a second security authentication.
Optionally, one of the at least two ways of returning the dynamic verification information generated by the user-side application is: an input box is provided to the user for inputting the dynamic authentication information generated by the user-side application.
Optionally, one of the at least two ways of returning the dynamic verification information generated by the user-side application is: and sending a message to be confirmed to the user side application of the user, and triggering the user side application to send a verification request carrying the dynamic verification information generated by the user side application.
Optionally, one of the at least two ways of returning the dynamic verification information generated by the user-side application is: and providing the two-dimensional code picture for the user, so that the user side application triggers and sends a verification request carrying the dynamic verification information generated by the user side application by scanning the two-dimensional code picture.
Optionally, the providing unit is further configured to:
acquiring a network environment where the terminal equipment is located and/or terminal capacity of the terminal equipment;
and providing at least two ways for returning dynamic verification information generated by the application at the user side to the user according to the acquired network environment of the terminal equipment and/or the terminal capability of the terminal equipment.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Program instructions which invoke the methods of the present application may be stored on a fixed or removable recording medium and/or transmitted via a data stream on a broadcast or other signal-bearing medium and/or stored within a working memory of a computer device operating in accordance with the program instructions. An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the system claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Claims (8)
1. A security authentication method, comprising:
receiving a user name and a static password which are transmitted by terminal equipment and input by a user;
performing first security verification based on the user name and a static password;
acquiring a network environment where the terminal equipment is located and/or terminal capacity of the terminal equipment;
providing at least two ways for returning dynamic verification information generated by user side application to the user according to the acquired network environment of the terminal equipment and/or the terminal capability of the terminal equipment; the user side application is an application which is bound with the user name in advance and can generate dynamic verification information, and the dynamic verification information is generated in the user side application through an algorithm consistent with a server;
receiving dynamic authentication information returned by the user through one of the at least two ways;
and comparing the dynamic authentication information returned by the user through one of the at least two ways with the locally generated dynamic authentication information so as to perform second security authentication.
2. The security authentication method of claim 1, wherein one of the at least two ways to return the dynamic authentication information generated by the user-side application is:
providing an input box for the user to input the dynamic authentication information generated by the user-side application.
3. The security authentication method of claim 1, wherein one of the at least two ways to return the dynamic authentication information generated by the user-side application is:
and sending a message to be confirmed to the user side application of the user, and triggering the user side application to send a verification request carrying the dynamic verification information generated by the user side application.
4. The security authentication method of claim 1, wherein one of the at least two ways to return the dynamic authentication information generated by the user-side application is:
and providing the two-dimensional code picture for the user, so that the user side application triggers and sends a verification request carrying the dynamic verification information generated by the user side application by scanning the two-dimensional code picture.
5. A security verification system, comprising:
the first receiving unit is used for receiving a user name and a static password which are transmitted by the terminal equipment and input by a user;
the first security verification unit is used for performing first security verification based on the user name and the static password;
a providing unit, configured to obtain a network environment where the terminal device is located and/or a terminal capability of the terminal device; providing at least two ways for returning dynamic verification information generated by user side application to the user according to the acquired network environment of the terminal equipment and/or the terminal capability of the terminal equipment; the user side application is an application which is bound with the user name in advance and can generate dynamic verification information, and the dynamic verification information is generated in the user side application through an algorithm consistent with a server;
the second receiving unit is used for receiving the dynamic verification information returned by the user through one of the at least two ways;
and the second security authentication unit is used for comparing the dynamic authentication information returned by the user through one of the at least two ways with the locally generated dynamic authentication information so as to perform second security authentication.
6. The security verification system of claim 5, wherein one of the at least two ways to return the dynamic verification information generated by the user-side application is:
providing an input box for the user to input the dynamic authentication information generated by the user-side application.
7. The security verification system of claim 5, wherein one of the at least two ways to return the dynamic verification information generated by the user-side application is:
and sending a message to be confirmed to the user side application of the user, and triggering the user side application to send a verification request carrying the dynamic verification information generated by the user side application.
8. The security verification system of claim 5, wherein one of the at least two ways to return the dynamic verification information generated by the user-side application is:
and providing the two-dimensional code picture for the user, so that the user side application triggers and sends a verification request carrying the dynamic verification information generated by the user side application by scanning the two-dimensional code picture.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510229302.0A CN106209742B (en) | 2015-05-07 | 2015-05-07 | Security verification method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510229302.0A CN106209742B (en) | 2015-05-07 | 2015-05-07 | Security verification method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106209742A CN106209742A (en) | 2016-12-07 |
CN106209742B true CN106209742B (en) | 2020-08-14 |
Family
ID=57459947
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510229302.0A Active CN106209742B (en) | 2015-05-07 | 2015-05-07 | Security verification method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106209742B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107341377A (en) * | 2017-06-16 | 2017-11-10 | 武汉斗鱼网络科技有限公司 | Time synchronization control method in one kind authentication |
CN108600156B (en) * | 2018-03-07 | 2021-05-07 | 华为技术有限公司 | Server and security authentication method |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE60012351T2 (en) * | 1999-10-19 | 2005-08-04 | Thomson Licensing S.A., Boulogne | SYSTEM AND METHOD FOR VERIFYING THE RIGHT TO TRANSFER PROTECTED INFORMATION |
CN1855810B (en) * | 2005-04-26 | 2010-09-08 | 上海盛大网络发展有限公司 | Dynamic code verification system, method and use |
CN101662364B (en) * | 2009-09-17 | 2011-12-28 | 飞天诚信科技股份有限公司 | Method and system for safe login |
US8233951B2 (en) * | 2010-01-25 | 2012-07-31 | Research In Motion Limited | Error correction for DTMF corruption on uplink |
CN103841130A (en) * | 2012-11-21 | 2014-06-04 | 深圳市腾讯计算机系统有限公司 | Verification information pushing method and device, and identity authentication method and device |
CN102946334B (en) * | 2012-11-28 | 2015-06-03 | 中国移动(深圳)有限公司 | Method and system for acquiring valid image verification code |
CN103927464A (en) * | 2013-01-11 | 2014-07-16 | 深圳市腾讯计算机系统有限公司 | Common validation method, and method, device and system for generating two dimensional code |
CN104038502B (en) * | 2014-06-24 | 2018-11-13 | 五八同城信息技术有限公司 | A kind of verification method and system |
CN104144058B (en) * | 2014-07-29 | 2017-10-17 | 诚迈科技(南京)股份有限公司 | A kind of Information Authentication method matched based on sound wave |
-
2015
- 2015-05-07 CN CN201510229302.0A patent/CN106209742B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN106209742A (en) | 2016-12-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10969943B2 (en) | Autofill for a user device | |
US9690923B2 (en) | Method, apparatus and system for verifying terminal | |
CN104468531B (en) | The authorization method of sensitive data, device and system | |
CN107249004B (en) | Identity authentication method, device and client | |
US10878212B2 (en) | Two-dimensional code scanning interaction methods and apparatuses | |
US11347835B2 (en) | Verification method and device | |
RU2595931C1 (en) | Method for cross junction, browser and domain name server | |
WO2017084290A1 (en) | Public account two-dimensional code generation method and server, and public account following method, server and terminal | |
CN105323066B (en) | Identity verification method and device | |
CN110574350B (en) | Method and system for performing a prioritized generation of a second factor certificate | |
CN110266497A (en) | Auth method, device, server, user terminal and storage medium | |
CN103237034A (en) | Login method and device | |
CN104580117A (en) | Authentication method, device and system | |
CN104580112B (en) | A kind of service authentication method, system and server | |
US11038870B2 (en) | Quick response (QR) code for secure provisioning | |
CN105657781B (en) | WiFi network access method and device | |
CN104348617A (en) | Verification code processing method and device, and terminal and server | |
WO2017071121A1 (en) | Method and device for establishing wireless connection | |
CN106209742B (en) | Security verification method and system | |
US9471771B1 (en) | Method of enhanced account authentication management integrated with real time script shifting | |
CN106339623A (en) | Login method and login device | |
US9722994B2 (en) | User terminal for password-based authentication, and password-based trading terminal, system, and method | |
KR101636708B1 (en) | Web site verification apparatus using two channel certification and method thereof | |
CN108471635B (en) | Method and apparatus for connecting wireless access points | |
CN109543398B (en) | Application program account migration method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |