CN106529265A - Extraction method of verification code, extraction device of verification code and terminal - Google Patents
Extraction method of verification code, extraction device of verification code and terminal Download PDFInfo
- Publication number
- CN106529265A CN106529265A CN201610937791.XA CN201610937791A CN106529265A CN 106529265 A CN106529265 A CN 106529265A CN 201610937791 A CN201610937791 A CN 201610937791A CN 106529265 A CN106529265 A CN 106529265A
- Authority
- CN
- China
- Prior art keywords
- information
- pushed information
- target
- verification code
- identifying code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Abstract
The invention provides an extraction method of a verification code, an extraction device of the verification code and a terminal. The extraction method of the verification code comprises the steps of obtaining a verification request instruction after a verification interface is generated in any application program; traversing pushed information within a preset time period after the verification request instruction is obtained so as to determine target pushed information including the target verification code based on the attribute information of the pushed information; and copying the target verification code to a verification code input region of the verification interface. Through the technical scheme of the invention, the extraction process of the target verification code is simplified, convenience is brought for a user to check, and the use experience of the user is improved.
Description
Technical field
The present invention relates to field of terminal technology, in particular to a kind of extracting method of identifying code, a kind of identifying code
Extraction element and a kind of terminal.
Background technology
In the related, in order to lift the safety of business, when the business of application program is performed by terminal (such as
The business such as register, log in, paying), identifying code is sent by request server, to perform corresponding business after by verifying,
But user is after the pushed information including identifying code is received, it is still necessary to be manually entered identifying code, and if user does not have
In real time during input validation code, in addition it is also necessary to reopen pushed information and check and extract, have impact on the experience of user.
Therefore, a kind of extraction scheme of new identifying code how is designed, is become urgently with the extraction process for simplifying identifying code
The technical problem of solution.
The content of the invention
The present invention is based at least one above-mentioned technical problem, it is proposed that a kind of extraction scheme of new identifying code, leads to
Cross and checking interface is generated in arbitrary application program, and get in the preset time period after checking request instruction, traversal is pushed
Information, so that the target push information for including target verification code is determined according to the attribute information of pushed information, so as to target is being tested
After card code is prompted to user, target verification code is copied to into the identifying code input area at checking interface, target verification code is simplified
Extraction process, facilitates checking for user, improves the experience of user.
In view of this, the present invention proposes a kind of extracting method of identifying code, including:Generate in arbitrary application program and test
Behind card interface, checking request instruction is obtained;Pushed information is traveled through in preset time period after checking request instruction is obtained, with root
The target push information for including target verification code is determined according to the attribute information of pushed information;Target verification code is copied to into checking circle
The identifying code input area in face.
In the technical scheme, by checking interface is generated in arbitrary application program, and checking request instruction is got
In preset time period afterwards, pushed information is traveled through, so that the mesh for including target verification code is determined according to the attribute information of pushed information
Mark pushed information, so that, after target verification code is prompted to user, target verification code is copied to the identifying code at checking interface
Input area, simplifies the extraction process of target verification code, facilitates checking for user, improves the experience of user.
Specifically, after checking request instruction is got, target push information is determined by traveling through pushed information, target is pushed away
Breath of delivering letters can be one, or multiple, when target push information is one, can be pushed by extracting directly target
Target verification code in information, realizes the duplication of target verification code, and when target push information is multiple, target verification code is at least
For one, now multiple target push informations all can be prompted to user, to determine target verification code by the selection of user,
At least one target verification code can also be determined by the automatic screening of system, so as to realize the duplication of target verification code.
In above-mentioned technical proposal, it is preferable that in the preset time period after checking request instruction is obtained, traversal pushes letter
Breath, so that the target push information for including target verification code is determined according to the attribute information of pushed information, specifically includes following steps:
Determine the attribute information of pushed information;Whether have in detection attribute information and be proved to be successful feedback parameter;Detecting attribute letter
The pushed information including target verification code target push information is not defined as into when being proved to be successful feedback parameter in breath.
In the technical scheme, by the attribute information for determining pushed information, tested with detecting whether to have in attribute information
Successfully feedback parameter is demonstrate,proved, is not had when being proved to be successful feedback parameter in attribute information is detected, show testing in pushed information
Card code is not authenticated or verifies unsuccessful, and pushed information not authenticated or that checking is unsuccessful is defined as target push information,
It is achieved thereby that the determination of target push information, it is ensured that the effectiveness of the target verification code in target push information.
Specifically, after identifying code is proved to be successful, server can be issued and be proved to be successful note, the checking being now proved to be successful
Code fails at once, is proved to be successful feedback parameter by determining whether to have in attribute information, determines the effectiveness of identifying code, prevent
The identifying code of actual effect is interfered to user.
In any of the above-described technical scheme, it is preferable that do not have in attribute information is detected and be proved to be successful feedback ginseng
During number, the pushed information including target verification code is defined as into target push information, following steps are specifically included:Detection pushes letter
Whether with the keyword message with checking interphase match in breath;When there is keyword message in pushed information is detected, will
Pushed information is defined as target push information.
In the technical scheme, by detecting whether with the keyword message with checking interphase match in pushed information,
During so that there is the keyword message for matching in pushed information is detected, show that pushed information is the application with current authentication interface
The pushed information of program association, by the checking to keyword message, further optimizes the prompting range of target push information,
The prompting to the incoherent pushed information of user is reduced, so as to further improve the experience of user.
Wherein, keyword message can be the Apply Names of application program.
Specifically, such as when being paid using Alipay, need to receive the transaction verification code of server transmission, connecing
In the pushed information including transaction verification code for receiving, including the information of " you are currently in use Alipay and are paid ", now will
" Alipay " as keyword message, to be matched with currently used application program.
In any of the above-described technical scheme, it is preferable that also include:Determine the actual effect parameter in attribute information;According to reality
Whether effect parameter detecting pushed information possesses ageing;When detecting pushed information and having ageing, pushed information is determined
For target push information.
In the technical scheme, by determining the actual effect parameter in attribute information, further discharge not with ageing
Pushed information, so as to obtain more accurate target push information, for user's touch-control replicates paste operation, further subtracts
Lack the touch control operation number of times of user, improve the reliability of checking.
Specifically, for the pushed information of real-time reception, actual effect parameter can be the reception time of pushed information, for prolonging
The pushed information for receiving late, actual effect parameter can be the transmission time of pushed information, generally after checking request instruction is got,
With the pushed information that the proving time of 60 seconds, actual effect parameter were matched with 60 second proving time, with reference to not authenticated or checking not
It is successful, and regulation is limited with keyword message for matching etc., you can acquisition meets the target push of current authentication requirement and believes
Breath.
In any of the above-described technical scheme, it is preferable that target verification code is copied to the identifying code input at checking interface
Area, specifically includes following steps:Generate the prompting suspension windows of target push information;Getting to pointing out in suspension windows
When replicating the touch command of button, target verification code is copied to into shear plate;Getting to pointing out the stickup in suspension windows
During the touch command of button, target verification code is affixed to into the input area of identifying code.
The prompting suspension windows of target push information in the technical scheme, are generated, points out suspension windows only can show
Target verification code, and point out suspension windows include the touch controlled keys such as duplication, stickup and insertion, can be by obtaining
Touch command of the user to duplication button, directly replicates the target verification code in prompting suspension windows, then by obtaining user
Target verification code is affixed to the input area of identifying code by the touch command to pasting button, to realize to the copied of identifying code
Journey, on the one hand, complete target push information need not be shown, you can realize that the duplication of target verification code is pasted, on the other hand,
Virtual key is replicated by arranging, the selection operation process to target verification code is simplified, be further simplify the operation of user.
According to a second aspect of the present invention, it is also proposed that a kind of extraction element of identifying code, including:Acquiring unit, for
After checking interface is generated in arbitrary application program, checking request instruction is obtained;Traversal Unit, for obtaining checking request instruction
Traversal pushed information in preset time period afterwards, so that the target for including target verification code is determined according to the attribute information of pushed information
Pushed information;Copied cells, for target verification code to be copied to the identifying code input area at checking interface.
In the technical scheme, by checking interface is generated in arbitrary application program, and checking request instruction is got
In preset time period afterwards, pushed information is traveled through, so that the mesh for including target verification code is determined according to the attribute information of pushed information
Mark pushed information, so that, after target verification code is prompted to user, target verification code is copied to the identifying code at checking interface
Input area, simplifies the extraction process of target verification code, facilitates checking for user, improves the experience of user.
Specifically, after checking request instruction is got, target push information is determined by traveling through pushed information, target is pushed away
Breath of delivering letters can be one, or multiple, when target push information is one, can be pushed by extracting directly target
Target verification code in information, realizes the duplication of target verification code, and when target push information is multiple, target verification code is at least
For one, now multiple target push informations all can be prompted to user, to determine target verification code by the selection of user,
At least one target verification code can also be determined by the automatic screening of system, so as to realize the duplication of target verification code.
In above-mentioned technical proposal, it is preferable that also include:Determining unit, for determining the attribute information of pushed information;Inspection
Unit is surveyed, and feedback parameter is proved to be successful for detecting whether to have in attribute information;Determining unit is additionally operable to:Detecting attribute
The pushed information including target verification code target push information is not defined as into when being proved to be successful feedback parameter in information.
In the technical scheme, by the attribute information for determining pushed information, tested with detecting whether to have in attribute information
Successfully feedback parameter is demonstrate,proved, is not had when being proved to be successful feedback parameter in attribute information is detected, show testing in pushed information
Card code is not authenticated or verifies unsuccessful, and pushed information not authenticated or that checking is unsuccessful is defined as target push information,
It is achieved thereby that the determination of target push information, it is ensured that the effectiveness of the target verification code in target push information.
Specifically, after identifying code is proved to be successful, server can be issued and be proved to be successful note, the checking being now proved to be successful
Code fails at once, is proved to be successful feedback parameter by determining whether to have in attribute information, determines the effectiveness of identifying code, prevent
The identifying code of actual effect is interfered to user.
In any of the above-described technical scheme, it is preferable that detector unit is additionally operable to:Do not have in attribute information is detected
When being proved to be successful feedback parameter, whether with the keyword message with checking interphase match in detection pushed information;Determining unit
It is additionally operable to:When there is keyword message in pushed information is detected, pushed information is defined as into target push information.
In the technical scheme, by detecting whether with the keyword message with checking interphase match in pushed information,
During so that there is the keyword message for matching in pushed information is detected, show that pushed information is the application with current authentication interface
The pushed information of program association, by the checking to keyword message, further optimizes the prompting range of target push information,
The prompting to the incoherent pushed information of user is reduced, so as to further improve the experience of user.
Wherein, keyword message can be the Apply Names of application program.
Specifically, such as when being paid using Alipay, need to receive the transaction verification code of server transmission, connecing
In the pushed information including transaction verification code for receiving, including the information of " you are currently in use Alipay and are paid ", now will
" Alipay " as keyword message, to be matched with currently used application program.
In any of the above-described technical scheme, it is preferable that determining unit is additionally operable to:Determine that the actual effect in attribute information is joined
Number;Detector unit is additionally operable to:Whether possess ageing according to actual effect parameter detecting pushed information;Determining unit is additionally operable to:In inspection
When measuring pushed information and having ageing, pushed information is defined as into target push information.
In the technical scheme, by determining the actual effect parameter in attribute information, further discharge not with ageing
Pushed information, so as to obtain more accurate target push information, for user's touch-control replicates paste operation, further subtracts
Lack the touch control operation number of times of user, improve the reliability of checking.
Specifically, for the pushed information of real-time reception, actual effect parameter can be the reception time of pushed information, for prolonging
The pushed information for receiving late, actual effect parameter can be the transmission time of pushed information, generally after checking request instruction is got,
With the pushed information that the proving time of 60 seconds, actual effect parameter were matched with 60 second proving time, with reference to not authenticated or checking not
It is successful, and regulation is limited with keyword message for matching etc., you can acquisition meets the target push of current authentication requirement and believes
Breath.
In any of the above-described technical scheme, it is preferable that also include:Signal generating unit:For generating target push information
Prompting suspension windows;Copied cells is additionally operable to:When the touch command to pointing out the duplication button in suspension windows is got, will
Target verification code is copied to shear plate;The extraction element of identifying code also includes:Application unit, for getting to prompting suspension
During the touch command of the stickup button on window, target verification code is affixed to into the input area of identifying code.
The prompting suspension windows of target push information in the technical scheme, are generated, points out suspension windows only can show
Target verification code, and point out suspension windows include the touch controlled keys such as duplication, stickup and insertion, can be by obtaining
Touch command of the user to duplication button, directly replicates the target verification code in prompting suspension windows, then by obtaining user
Target verification code is affixed to the input area of identifying code by the touch command to pasting button, to realize to the copied of identifying code
Journey, on the one hand, complete target push information need not be shown, you can realize that the duplication of target verification code is pasted, on the other hand,
Virtual key is replicated by arranging, the selection operation process to target verification code is simplified, be further simplify the operation of user.
According to a third aspect of the present invention, it is also proposed that a kind of terminal, including the checking described in any of the above-described technical scheme
The extraction element of code, therefore, the terminal includes the technology effect of the extraction element of the identifying code described in any of the above-described technical scheme
Really, will not be described here.
By above technical scheme, by checking interface is generated in arbitrary application program, and get checking request and refer to
In preset time period after order, pushed information is traveled through, include target verification code to determine according to the attribute information of pushed information
Target push information, so that, after target verification code is prompted to user, target verification code is copied to the checking at checking interface
Code input area, simplifies the extraction process of target verification code, facilitates checking for user, improve the experience of user.
Description of the drawings
Fig. 1 shows the schematic flow diagram of the extracting method of identifying code according to an embodiment of the invention;
Fig. 2 shows the schematic block diagram of the extraction element of identifying code according to an embodiment of the invention;
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention;
Fig. 4 shows the interface schematic diagram of the extraction scheme of identifying code according to an embodiment of the invention;
Fig. 5 shows the interface schematic diagram of the extraction scheme of identifying code according to another embodiment of the invention;
Fig. 6 shows the schematic block diagram of terminal according to another embodiment of the invention.
Specific embodiment
It is in order to be more clearly understood that the above objects, features and advantages of the present invention, below in conjunction with the accompanying drawings and concrete real
Apply mode to be further described in detail the present invention.It should be noted that in the case where not conflicting, the enforcement of the application
Feature in example and embodiment can be mutually combined.
Many details are elaborated in the following description in order to fully understand the present invention, but, the present invention may be used also
Implemented with being different from third party's mode described here using third party, therefore, protection scope of the present invention is not by following
The restriction of disclosed specific embodiment.
Fig. 1 shows the schematic flow diagram of the extracting method of identifying code according to an embodiment of the invention.
As shown in figure 1, the extracting method of identifying code according to an embodiment of the invention, including:Step 102, answers arbitrary
With generating in program behind checking interface, checking request instruction is obtained;Step 104, obtain checking request instruction after it is default when
Between traversal pushed information in section, so that the target push information for including target verification code is determined according to the attribute information of pushed information;
Target verification code is copied to the identifying code input area at checking interface by step 106.
In the technical scheme, by checking interface is generated in arbitrary application program, and checking request instruction is got
In preset time period afterwards, pushed information is traveled through, so that the mesh for including target verification code is determined according to the attribute information of pushed information
Mark pushed information, so that, after target verification code is prompted to user, target verification code is copied to the identifying code at checking interface
Input area, simplifies the extraction process of target verification code, facilitates checking for user, improves the experience of user.
Specifically, after checking request instruction is got, target push information is determined by traveling through pushed information, target is pushed away
Breath of delivering letters can be one, or multiple, when target push information is one, can be pushed by extracting directly target
Target verification code in information, realizes the duplication of target verification code, and when target push information is multiple, target verification code is at least
For one, now multiple target push informations all can be prompted to user, to determine target verification code by the selection of user,
At least one target verification code can also be determined by the automatic screening of system, so as to realize the duplication of target verification code.
In above-mentioned technical proposal, it is preferable that in the preset time period after checking request instruction is obtained, traversal pushes letter
Breath, so that the target push information for including target verification code is determined according to the attribute information of pushed information, specifically includes following steps:
Determine the attribute information of pushed information;Whether have in detection attribute information and be proved to be successful feedback parameter;Detecting attribute letter
The pushed information including target verification code target push information is not defined as into when being proved to be successful feedback parameter in breath.
In the technical scheme, by the attribute information for determining pushed information, tested with detecting whether to have in attribute information
Successfully feedback parameter is demonstrate,proved, is not had when being proved to be successful feedback parameter in attribute information is detected, show testing in pushed information
Card code is not authenticated or verifies unsuccessful, and pushed information not authenticated or that checking is unsuccessful is defined as target push information,
It is achieved thereby that the determination of target push information, it is ensured that the effectiveness of the target verification code in target push information.
Specifically, after identifying code is proved to be successful, server can be issued and be proved to be successful note, the checking being now proved to be successful
Code fails at once, is proved to be successful feedback parameter by determining whether to have in attribute information, determines the effectiveness of identifying code, prevent
The identifying code of actual effect is interfered to user.
In any of the above-described technical scheme, it is preferable that do not have in attribute information is detected and be proved to be successful feedback ginseng
During number, the pushed information including target verification code is defined as into target push information, following steps are specifically included:Detection pushes letter
Whether with the keyword message with checking interphase match in breath;When there is keyword message in pushed information is detected, will
Pushed information is defined as target push information.
In the technical scheme, by detecting whether with the keyword message with checking interphase match in pushed information,
During so that there is the keyword message for matching in pushed information is detected, show that pushed information is the application with current authentication interface
The pushed information of program association, by the checking to keyword message, further optimizes the prompting range of target push information,
The prompting to the incoherent pushed information of user is reduced, so as to further improve the experience of user.
Wherein, keyword message can be the Apply Names of application program.
Specifically, such as when being paid using Alipay, need to receive the transaction verification code of server transmission, connecing
In the pushed information including transaction verification code for receiving, including the information of " you are currently in use Alipay and are paid ", now will
" Alipay " as keyword message, to be matched with currently used application program.
In any of the above-described technical scheme, it is preferable that also include:Determine the actual effect parameter in attribute information;According to reality
Whether effect parameter detecting pushed information possesses ageing;When detecting pushed information and having ageing, pushed information is determined
For target push information.
In the technical scheme, by determining the actual effect parameter in attribute information, further discharge not with ageing
Pushed information, so as to obtain more accurate target push information, for user's touch-control replicates paste operation, further subtracts
Lack the touch control operation number of times of user, improve the reliability of checking.
Specifically, for the pushed information of real-time reception, actual effect parameter can be the reception time of pushed information, for prolonging
The pushed information for receiving late, actual effect parameter can be the transmission time of pushed information, generally after checking request instruction is got,
With the pushed information that the proving time of 60 seconds, actual effect parameter were matched with 60 second proving time, with reference to not authenticated or checking not
It is successful, and regulation is limited with keyword message for matching etc., you can acquisition meets the target push of current authentication requirement and believes
Breath.
In any of the above-described technical scheme, it is preferable that target verification code is copied to the identifying code input at checking interface
Area, specifically includes following steps:Generate the prompting suspension windows of target push information;Getting to pointing out in suspension windows
When replicating the touch command of button, target verification code is copied to into shear plate;Getting to pointing out the stickup in suspension windows
During the touch command of button, target verification code is affixed to into the input area of identifying code.
The prompting suspension windows of target push information in the technical scheme, are generated, points out suspension windows only can show
Target verification code, and point out suspension windows include the touch controlled keys such as duplication, stickup and insertion, can be by obtaining
Touch command of the user to duplication button, directly replicates the target verification code in prompting suspension windows, then by obtaining user
Target verification code is affixed to the input area of identifying code by the touch command to pasting button, to realize to the copied of identifying code
Journey, on the one hand, complete target push information need not be shown, you can realize that the duplication of target verification code is pasted, on the other hand,
Virtual key is replicated by arranging, the selection operation process to target verification code is simplified, be further simplify the operation of user.
Step in the extracting method of embodiment of the present invention identifying code can carry out order adjustment according to actual needs, merge
With delete.
Fig. 2 shows the schematic block diagram of the extraction element of identifying code according to an embodiment of the invention.
As shown in Fig. 2 the extraction element 200 of identifying code according to an embodiment of the invention, including:Acquiring unit 202, uses
After checking interface is generated in arbitrary application program, checking request instruction is obtained;Traversal Unit 204, for obtaining checking
Traversal pushed information in preset time period after request instruction, includes target verification to determine according to the attribute information of pushed information
The target push information of code;Copied cells 206, for target verification code to be copied to the identifying code input area at checking interface.
In the technical scheme, by checking interface is generated in arbitrary application program, and checking request instruction is got
In preset time period afterwards, pushed information is traveled through, so that the mesh for including target verification code is determined according to the attribute information of pushed information
Mark pushed information, so that, after target verification code is prompted to user, target verification code is copied to the identifying code at checking interface
Input area, simplifies the extraction process of target verification code, facilitates checking for user, improves the experience of user.
Specifically, after checking request instruction is got, target push information is determined by traveling through pushed information, target is pushed away
Breath of delivering letters can be one, or multiple, when target push information is one, can be pushed by extracting directly target
Target verification code in information, realizes the duplication of target verification code, and when target push information is multiple, target verification code is at least
For one, now multiple target push informations all can be prompted to user, to determine target verification code by the selection of user,
At least one target verification code can also be determined by the automatic screening of system, so as to realize the duplication of target verification code.
In above-mentioned technical proposal, it is preferable that also include:Determining unit 208, for determining that the attribute of pushed information is believed
Breath;Detector unit 210, is proved to be successful feedback parameter for detecting whether to have in attribute information;Determining unit 208 is additionally operable to:
The pushed information including target verification code mesh is not defined as into when being proved to be successful feedback parameter in attribute information is detected
Mark pushed information.
In the technical scheme, by the attribute information for determining pushed information, tested with detecting whether to have in attribute information
Successfully feedback parameter is demonstrate,proved, is not had when being proved to be successful feedback parameter in attribute information is detected, show testing in pushed information
Card code is not authenticated or verifies unsuccessful, and pushed information not authenticated or that checking is unsuccessful is defined as target push information,
It is achieved thereby that the determination of target push information, it is ensured that the effectiveness of the target verification code in target push information.
Specifically, after identifying code is proved to be successful, server can be issued and be proved to be successful note, the checking being now proved to be successful
Code fails at once, is proved to be successful feedback parameter by determining whether to have in attribute information, determines the effectiveness of identifying code, prevent
The identifying code of actual effect is interfered to user.
In any of the above-described technical scheme, it is preferable that detector unit 210 is additionally operable to:In attribute information is detected not
During with being proved to be successful feedback parameter, whether with the keyword message with checking interphase match in detection pushed information;It is determined that
Unit 208 is additionally operable to:When there is keyword message in pushed information is detected, pushed information is defined as into target and pushes letter
Breath.
In the technical scheme, by detecting whether with the keyword message with checking interphase match in pushed information,
During so that there is the keyword message for matching in pushed information is detected, show that pushed information is the application with current authentication interface
The pushed information of program association, by the checking to keyword message, further optimizes the prompting range of target push information,
The prompting to the incoherent pushed information of user is reduced, so as to further improve the experience of user.
Wherein, keyword message can be the Apply Names of application program.
Specifically, such as when being paid using Alipay, need to receive the transaction verification code of server transmission, connecing
In the pushed information including transaction verification code for receiving, including the information of " you are currently in use Alipay and are paid ", now will
" Alipay " as keyword message, to be matched with currently used application program.
In any of the above-described technical scheme, it is preferable that determining unit 208 is additionally operable to:Determine the actual effect in attribute information
Parameter;Detector unit 210 is additionally operable to:Whether possess ageing according to actual effect parameter detecting pushed information;Determining unit 208 is also used
In:When detecting pushed information and having ageing, pushed information is defined as into target push information.
In the technical scheme, by determining the actual effect parameter in attribute information, further discharge not with ageing
Pushed information, so as to obtain more accurate target push information, for user's touch-control replicates paste operation, further subtracts
Lack the touch control operation number of times of user, improve the reliability of checking.
Specifically, for the pushed information of real-time reception, actual effect parameter can be the reception time of pushed information, for prolonging
The pushed information for receiving late, actual effect parameter can be the transmission time of pushed information, generally after checking request instruction is got,
With the pushed information that the proving time of 60 seconds, actual effect parameter were matched with 60 second proving time, with reference to not authenticated or checking not
It is successful, and regulation is limited with keyword message for matching etc., you can acquisition meets the target push of current authentication requirement and believes
Breath.
In any of the above-described technical scheme, it is preferable that also include:Signal generating unit 212:For generating target push information
Prompting suspension windows;Copied cells 206 is additionally operable to:Getting the touch command to pointing out the duplication button in suspension windows
When, target verification code is copied to into shear plate;The extraction element 200 of identifying code also includes:Application unit 214, for obtaining
To pointing out, during the touch command of the stickup button in suspension windows, target verification code to be affixed to the input area of identifying code.
The prompting suspension windows of target push information in the technical scheme, are generated, points out suspension windows only can show
Target verification code, and point out suspension windows include the touch controlled keys such as duplication, stickup and insertion, can be by obtaining
Touch command of the user to duplication button, directly replicates the target verification code in prompting suspension windows, then by obtaining user
Target verification code is affixed to the input area of identifying code by the touch command to pasting button, to realize to the copied of identifying code
Journey, on the one hand, complete target push information need not be shown, you can realize that the duplication of target verification code is pasted, on the other hand,
Virtual key is replicated by arranging, the selection operation process to target verification code is simplified, be further simplify the operation of user.
Unit in embodiment of the present invention terminal can be merged according to actual needs, divides and be deleted.
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention.As shown in figure 3, reality of the invention
The terminal 300 of example is applied, including the extraction element 200 of the identifying code described in any of the above-described technical scheme, therefore, the terminal 300
Including the technique effect of the extraction element 200 of the identifying code described in any of the above-described technical scheme, will not be described here.
Fig. 4 and Fig. 5 respectively illustrate the interface schematic diagram of the extraction scheme of identifying code according to an embodiment of the invention.
As shown in figure 4, after touch control operation of the user to " acquisition identifying code " is received, when pushed information is received,
By traveling through pushed information, it is determined that whether the pushed information being currently received is target push information, it is determined that being currently received
Pushed information when being target push information, generate suspension prompting frame or drop-down prompting menu, display content " note registration checking
Code:123456 " target verification code and " duplication " button, user can be replicated by the touch control operation to " duplication " button
Target verification code, and " 123456 " are shown in identifying code input area, by the touch control operation to " checking " button, complete authenticated
Journey.
As shown in figure 5, after user switches to other application programs, switching to the checking of application program to be verified again
During interface, by pressing operation of the receive user to identifying code input area, pushed information is traveled through, to obtain target push information,
After target verification code being determined in target push information, generate operation indicating menu, including " duplication ", " stickup " and " insertion ",
User can realize that target verification code replicates operation, it is also possible to by direct by clicking on " duplication " and " stickup " button
" insertion " button is clicked on, is realized that target verification code replicates operation, is simplified the operating process of user.
Fig. 6 shows the schematic block diagram of terminal according to another embodiment of the invention.
As shown in fig. 6, the terminal of second embodiment of the invention, including:Processor 1, sensor 2, display screen
3rd, memorizer 4 and communication component 5.
Wherein, memorizer 5 is used to store batch processing code, the program code that processor 1 is stored in calling memorizer 4,
For performing following operation:
By sensor 2, after checking interface is generated in arbitrary application program, checking request instruction is obtained;
Pushed information is traveled through in preset time period after checking request instruction is obtained, to believe according to the attribute of pushed information
Breath determines the target push information for including target verification code;
Target verification code is copied to into the identifying code input area at checking interface, and is shown in display screen 3.
As a kind of optional embodiment, the program code that processor 1 is stored in calling memorizer 4, checking is being obtained
Traversal pushed information in preset time period after request instruction, includes target verification to determine according to the attribute information of pushed information
The target push information of code, specially:
Determine the attribute information of pushed information;
Feedback information is proved to be successful according to whether communication component 5 receives, whether is had in detection attribute information and is verified into
Work(feedback parameter;
The pushed information of target verification code will not included with when being proved to be successful feedback parameter in attribute information is detected
It is defined as target push information.
As a kind of optional embodiment, the program code that processor 1 is stored in calling memorizer 4, category is being detected
Property information in do not have when being proved to be successful feedback parameter, the pushed information including target verification code is defined as into target and pushes letter
Breath, specially:
Do not have when being proved to be successful feedback parameter in attribute information is detected, in detection pushed information whether with test
The keyword message of card interphase match;
When there is keyword message in pushed information is detected, pushed information is defined as into target push information.
As a kind of optional embodiment, the program code that processor 1 is stored in calling memorizer 4, also include:
Determine the actual effect parameter in attribute information;
Whether possess ageing according to actual effect parameter detecting pushed information;
When detecting pushed information and having ageing, pushed information is defined as into target push information.
As a kind of optional embodiment, the program code that processor 1 is stored in calling memorizer 4,
By display screen 3, the prompting suspension windows of target push information are generated;
According to display screen 3 and sensor 2, when the touch command to pointing out the duplication button in suspension windows is got,
Target verification code is copied to into shear plate;
According to display screen 3 and sensor 2 when the touch command to pointing out the stickup button in suspension windows is got, will
Target verification code affixes to the input area of identifying code.
One of ordinary skill in the art will appreciate that whole in the extracting method of the various identifying codes of above-described embodiment or
Part steps can be by program to instruct the hardware of correlation to complete, and the program can be stored in computer-readable storage
In medium, storage medium includes read only memory (Read-Only Memory, ROM), random access memory (Random Access
Memory, RAM), programmable read only memory (Programmable Read-only Memory, PROM), erasable programmable
Read only memory (Erasable Programmable Read Only Memory, EPROM), disposable programmable read only memory
(One-time Programmable Read-Only Memory, OTPROM), the electronics formula of erasing can make carbon copies read only memory
(Electrically-Erasable Programmable Read-Only Memory, EEPROM), read-only optical disc (Compact
Disc Read-Only Memory, CD-ROM) or other disk storages, disk memory, magnetic tape storage or can
For carrying or computer-readable any other medium of data storage.
Technical scheme is described in detail above in association with accompanying drawing, it is contemplated that in correlation technique, how to simplify identifying code
Extraction process technical problem, the present invention propose a kind of extraction scheme of new identifying code, simplify target verification code
Extraction process, facilitates checking for user, improves the experience of user.
The preferred embodiments of the present invention are the foregoing is only, the present invention is not limited to, for the skill of this area
For art personnel, the present invention can have various modifications and variations.It is all within the spirit and principles in the present invention, made any repair
Change, equivalent, improvement etc., should be included within the scope of the present invention.
Claims (11)
1. a kind of extracting method of identifying code, it is characterised in that include:
After checking interface is generated in arbitrary application program, checking request instruction is obtained;
Pushed information is traveled through in preset time period after the checking request instruction is obtained, with the category according to the pushed information
Property information determine and include the target push information of target verification code;
The target verification code is copied to into the identifying code input area at the checking interface.
2. the extracting method of identifying code according to claim 1, it is characterised in that described to refer to obtaining the checking request
Traversal pushed information in preset time period after order, includes target verification code to determine according to the attribute information of the pushed information
Target push information, specifically include following steps:
Determine the attribute information of the pushed information;
Whether have in detecting the attribute information and be proved to be successful feedback parameter;
Do not have described when being proved to be successful feedback parameter in the attribute information is detected, the target verification code will be included
The pushed information is defined as the target push information.
3. the extracting method of identifying code according to claim 2, it is characterised in that described to detect the attribute information
In do not have described when being proved to be successful feedback parameter, the pushed information including the target verification code is defined as into the mesh
Mark pushed information, specifically includes following steps:
Do not have described when being proved to be successful feedback parameter in the attribute information is detected, whether detect in the pushed information
With the keyword message with the checking interphase match;
When there is the keyword message in the pushed information is detected, the pushed information is defined as into the target and is pushed away
Deliver letters breath.
4. the extracting method of identifying code according to claim 2, it is characterised in that also include:
Determine the actual effect parameter in the attribute information;
Whether the pushed information according to the actual effect parameter detecting possesses ageing;
When detecting the pushed information and having described ageing, the pushed information is defined as into the target and pushes letter
Breath.
5. the extracting method of the identifying code according to Claims 1-4, it is characterised in that described by the target verification code
The identifying code input area at the checking interface is copied to, following steps are specifically included:
Generate the prompting suspension windows of the target push information;
When the touch command to the duplication button in the prompting suspension windows is got, the target verification code is copied to
Shear plate;
When the touch command to the stickup button in the prompting suspension windows is got, the target verification code is affixed to
The input area of the identifying code.
6. a kind of extraction element of identifying code, it is characterised in that include:
Acquiring unit, for generating in arbitrary application program behind checking interface, obtains checking request instruction;
Traversal Unit, for traveling through pushed information in the preset time period after the checking request instruction is obtained, with according to institute
The attribute information for stating pushed information determines the target push information for including target verification code;
Copied cells, for the target verification code to be copied to the identifying code input area at the checking interface.
7. the extraction element of identifying code according to claim 6, it is characterised in that also include:
Determining unit, for determining the attribute information of the pushed information;
Detector unit, is proved to be successful feedback parameter for detecting whether to have in the attribute information;
The determining unit is additionally operable to:Do not have in the attribute information is detected it is described when being proved to be successful feedback parameter, will
It is defined as the target push information including the pushed information of the target verification code.
8. the extraction element of identifying code according to claim 7, it is characterised in that
The detector unit is additionally operable to:There is no in the attribute information is detected described when being proved to be successful feedback parameter, inspection
Whether survey in the pushed information with the keyword message with the checking interphase match;
The determining unit is additionally operable to:When there is the keyword message in the pushed information is detected, by the push
Information is defined as the target push information.
9. the extraction element of identifying code according to claim 7, it is characterised in that
The determining unit is additionally operable to:Determine the actual effect parameter in the attribute information;
The detector unit is additionally operable to:Whether the pushed information according to the actual effect parameter detecting possesses ageing;
The determining unit is additionally operable to:When detecting the pushed information and having described ageing, will be the pushed information true
It is set to the target push information.
10. the extraction element of the identifying code according to claim 6 to 9, it is characterised in that also include:
Signal generating unit:For generating the prompting suspension windows of the target push information;
The copied cells is additionally operable to:When the touch command to the duplication button in the prompting suspension windows is got, will
The target verification code is copied to shear plate;
The extraction element of the identifying code also includes:
Application unit, for when the touch command to the stickup button in the prompting suspension windows is got, by the mesh
Mark identifying code affixes to the input area of the identifying code.
11. a kind of terminals, it is characterised in that include:The extraction dress of the identifying code as any one of claim 6 to 10
Put.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610937791.XA CN106529265A (en) | 2016-10-24 | 2016-10-24 | Extraction method of verification code, extraction device of verification code and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610937791.XA CN106529265A (en) | 2016-10-24 | 2016-10-24 | Extraction method of verification code, extraction device of verification code and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106529265A true CN106529265A (en) | 2017-03-22 |
Family
ID=58292646
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610937791.XA Pending CN106529265A (en) | 2016-10-24 | 2016-10-24 | Extraction method of verification code, extraction device of verification code and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106529265A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108702413A (en) * | 2017-05-10 | 2018-10-23 | 华为技术有限公司 | A kind of input method and device of identifying code |
CN108932173A (en) * | 2018-07-05 | 2018-12-04 | 厦门美图移动科技有限公司 | Identifying code inserts method and device |
CN109033800A (en) * | 2018-07-20 | 2018-12-18 | 北京云测信息技术有限公司 | A kind of extracting method and device of verification information |
CN111221599A (en) * | 2018-11-23 | 2020-06-02 | 奇酷互联网络科技(深圳)有限公司 | Method for displaying floating window, mobile terminal and storage medium |
CN111752398A (en) * | 2020-05-29 | 2020-10-09 | 维沃移动通信有限公司 | Verification code input method and device, electronic equipment and readable storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1093264A2 (en) * | 1999-10-14 | 2001-04-18 | Alcatel Networks Corporation Societe Par Actions De Regime Federal De Reseaux Alcatel | Method and apparatus for providing cell payload integrity verification and detecting defective modules in telecommunication devices |
CN104935744A (en) * | 2015-06-10 | 2015-09-23 | 腾讯科技(深圳)有限公司 | Verification code display method, verification code display device and mobile terminal |
CN105376204A (en) * | 2014-08-28 | 2016-03-02 | 宇龙计算机通信科技(深圳)有限公司 | User terminal, authority granting method and system thereof |
-
2016
- 2016-10-24 CN CN201610937791.XA patent/CN106529265A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1093264A2 (en) * | 1999-10-14 | 2001-04-18 | Alcatel Networks Corporation Societe Par Actions De Regime Federal De Reseaux Alcatel | Method and apparatus for providing cell payload integrity verification and detecting defective modules in telecommunication devices |
CN105376204A (en) * | 2014-08-28 | 2016-03-02 | 宇龙计算机通信科技(深圳)有限公司 | User terminal, authority granting method and system thereof |
CN104935744A (en) * | 2015-06-10 | 2015-09-23 | 腾讯科技(深圳)有限公司 | Verification code display method, verification code display device and mobile terminal |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108702413A (en) * | 2017-05-10 | 2018-10-23 | 华为技术有限公司 | A kind of input method and device of identifying code |
WO2018205168A1 (en) * | 2017-05-10 | 2018-11-15 | 华为技术有限公司 | Method and device for inputting verification code |
CN108932173A (en) * | 2018-07-05 | 2018-12-04 | 厦门美图移动科技有限公司 | Identifying code inserts method and device |
CN109033800A (en) * | 2018-07-20 | 2018-12-18 | 北京云测信息技术有限公司 | A kind of extracting method and device of verification information |
CN111221599A (en) * | 2018-11-23 | 2020-06-02 | 奇酷互联网络科技(深圳)有限公司 | Method for displaying floating window, mobile terminal and storage medium |
CN111752398A (en) * | 2020-05-29 | 2020-10-09 | 维沃移动通信有限公司 | Verification code input method and device, electronic equipment and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106529265A (en) | Extraction method of verification code, extraction device of verification code and terminal | |
CN106469261B (en) | Identity verification method and device | |
CN107026836B (en) | Service implementation method and device | |
EP3617973A1 (en) | Electronic ticket admission verification anti-counterfeiting system and method thereof | |
US20180365699A9 (en) | Systems and methods for tokenless authentication of consumers during payment transactions | |
CN110011800B (en) | Block chain data reading method and device | |
JP2016502169A (en) | Detection of embossed characters on form factors | |
CN110175849B (en) | Collecting method, device, equipment, server and system | |
CN109951289A (en) | A kind of recognition methods, device, equipment and readable storage medium storing program for executing | |
TW201346843A (en) | Ticket processing method and program of the same | |
CN106204046A (en) | The method and device that order pays | |
CN106572081B (en) | The method of logon rights verifying | |
CN110674048B (en) | Buried point test characteristic acquisition method and related device | |
CN105550628B (en) | Fingerprint input method and device | |
Yang et al. | An automated student attendance tracking system based on voiceprint and location | |
CN106570367B (en) | Method for identifying ID and device based on keyboard operation | |
CN110945552A (en) | Product sales reporting method, payment method and terminal equipment | |
CN113196323A (en) | Financial transaction providing method, program and system based on virtual legal card | |
CN107480516A (en) | A kind of method and apparatus for filling input frame | |
US11756038B2 (en) | Transaction authentication using multiple biometric inputs | |
CN105763565A (en) | Account login method and apparatus, and game system | |
CN110866205A (en) | Method and apparatus for storing information | |
CN111340635A (en) | Data checking method, equipment, server and readable storage medium | |
CN106797386A (en) | Safe verification method, device, terminal device and server | |
CN106600396A (en) | Account information upgrading method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |