CN106529265A - Extraction method of verification code, extraction device of verification code and terminal - Google Patents

Extraction method of verification code, extraction device of verification code and terminal Download PDF

Info

Publication number
CN106529265A
CN106529265A CN201610937791.XA CN201610937791A CN106529265A CN 106529265 A CN106529265 A CN 106529265A CN 201610937791 A CN201610937791 A CN 201610937791A CN 106529265 A CN106529265 A CN 106529265A
Authority
CN
China
Prior art keywords
information
pushed information
target
verification code
identifying code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610937791.XA
Other languages
Chinese (zh)
Inventor
杨佳佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610937791.XA priority Critical patent/CN106529265A/en
Publication of CN106529265A publication Critical patent/CN106529265A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Abstract

The invention provides an extraction method of a verification code, an extraction device of the verification code and a terminal. The extraction method of the verification code comprises the steps of obtaining a verification request instruction after a verification interface is generated in any application program; traversing pushed information within a preset time period after the verification request instruction is obtained so as to determine target pushed information including the target verification code based on the attribute information of the pushed information; and copying the target verification code to a verification code input region of the verification interface. Through the technical scheme of the invention, the extraction process of the target verification code is simplified, convenience is brought for a user to check, and the use experience of the user is improved.

Description

The extracting method of identifying code, the extraction element of identifying code and terminal
Technical field
The present invention relates to field of terminal technology, in particular to a kind of extracting method of identifying code, a kind of identifying code Extraction element and a kind of terminal.
Background technology
In the related, in order to lift the safety of business, when the business of application program is performed by terminal (such as The business such as register, log in, paying), identifying code is sent by request server, to perform corresponding business after by verifying, But user is after the pushed information including identifying code is received, it is still necessary to be manually entered identifying code, and if user does not have In real time during input validation code, in addition it is also necessary to reopen pushed information and check and extract, have impact on the experience of user.
Therefore, a kind of extraction scheme of new identifying code how is designed, is become urgently with the extraction process for simplifying identifying code The technical problem of solution.
The content of the invention
The present invention is based at least one above-mentioned technical problem, it is proposed that a kind of extraction scheme of new identifying code, leads to Cross and checking interface is generated in arbitrary application program, and get in the preset time period after checking request instruction, traversal is pushed Information, so that the target push information for including target verification code is determined according to the attribute information of pushed information, so as to target is being tested After card code is prompted to user, target verification code is copied to into the identifying code input area at checking interface, target verification code is simplified Extraction process, facilitates checking for user, improves the experience of user.
In view of this, the present invention proposes a kind of extracting method of identifying code, including:Generate in arbitrary application program and test Behind card interface, checking request instruction is obtained;Pushed information is traveled through in preset time period after checking request instruction is obtained, with root The target push information for including target verification code is determined according to the attribute information of pushed information;Target verification code is copied to into checking circle The identifying code input area in face.
In the technical scheme, by checking interface is generated in arbitrary application program, and checking request instruction is got In preset time period afterwards, pushed information is traveled through, so that the mesh for including target verification code is determined according to the attribute information of pushed information Mark pushed information, so that, after target verification code is prompted to user, target verification code is copied to the identifying code at checking interface Input area, simplifies the extraction process of target verification code, facilitates checking for user, improves the experience of user.
Specifically, after checking request instruction is got, target push information is determined by traveling through pushed information, target is pushed away Breath of delivering letters can be one, or multiple, when target push information is one, can be pushed by extracting directly target Target verification code in information, realizes the duplication of target verification code, and when target push information is multiple, target verification code is at least For one, now multiple target push informations all can be prompted to user, to determine target verification code by the selection of user, At least one target verification code can also be determined by the automatic screening of system, so as to realize the duplication of target verification code.
In above-mentioned technical proposal, it is preferable that in the preset time period after checking request instruction is obtained, traversal pushes letter Breath, so that the target push information for including target verification code is determined according to the attribute information of pushed information, specifically includes following steps: Determine the attribute information of pushed information;Whether have in detection attribute information and be proved to be successful feedback parameter;Detecting attribute letter The pushed information including target verification code target push information is not defined as into when being proved to be successful feedback parameter in breath.
In the technical scheme, by the attribute information for determining pushed information, tested with detecting whether to have in attribute information Successfully feedback parameter is demonstrate,proved, is not had when being proved to be successful feedback parameter in attribute information is detected, show testing in pushed information Card code is not authenticated or verifies unsuccessful, and pushed information not authenticated or that checking is unsuccessful is defined as target push information, It is achieved thereby that the determination of target push information, it is ensured that the effectiveness of the target verification code in target push information.
Specifically, after identifying code is proved to be successful, server can be issued and be proved to be successful note, the checking being now proved to be successful Code fails at once, is proved to be successful feedback parameter by determining whether to have in attribute information, determines the effectiveness of identifying code, prevent The identifying code of actual effect is interfered to user.
In any of the above-described technical scheme, it is preferable that do not have in attribute information is detected and be proved to be successful feedback ginseng During number, the pushed information including target verification code is defined as into target push information, following steps are specifically included:Detection pushes letter Whether with the keyword message with checking interphase match in breath;When there is keyword message in pushed information is detected, will Pushed information is defined as target push information.
In the technical scheme, by detecting whether with the keyword message with checking interphase match in pushed information, During so that there is the keyword message for matching in pushed information is detected, show that pushed information is the application with current authentication interface The pushed information of program association, by the checking to keyword message, further optimizes the prompting range of target push information, The prompting to the incoherent pushed information of user is reduced, so as to further improve the experience of user.
Wherein, keyword message can be the Apply Names of application program.
Specifically, such as when being paid using Alipay, need to receive the transaction verification code of server transmission, connecing In the pushed information including transaction verification code for receiving, including the information of " you are currently in use Alipay and are paid ", now will " Alipay " as keyword message, to be matched with currently used application program.
In any of the above-described technical scheme, it is preferable that also include:Determine the actual effect parameter in attribute information;According to reality Whether effect parameter detecting pushed information possesses ageing;When detecting pushed information and having ageing, pushed information is determined For target push information.
In the technical scheme, by determining the actual effect parameter in attribute information, further discharge not with ageing Pushed information, so as to obtain more accurate target push information, for user's touch-control replicates paste operation, further subtracts Lack the touch control operation number of times of user, improve the reliability of checking.
Specifically, for the pushed information of real-time reception, actual effect parameter can be the reception time of pushed information, for prolonging The pushed information for receiving late, actual effect parameter can be the transmission time of pushed information, generally after checking request instruction is got, With the pushed information that the proving time of 60 seconds, actual effect parameter were matched with 60 second proving time, with reference to not authenticated or checking not It is successful, and regulation is limited with keyword message for matching etc., you can acquisition meets the target push of current authentication requirement and believes Breath.
In any of the above-described technical scheme, it is preferable that target verification code is copied to the identifying code input at checking interface Area, specifically includes following steps:Generate the prompting suspension windows of target push information;Getting to pointing out in suspension windows When replicating the touch command of button, target verification code is copied to into shear plate;Getting to pointing out the stickup in suspension windows During the touch command of button, target verification code is affixed to into the input area of identifying code.
The prompting suspension windows of target push information in the technical scheme, are generated, points out suspension windows only can show Target verification code, and point out suspension windows include the touch controlled keys such as duplication, stickup and insertion, can be by obtaining Touch command of the user to duplication button, directly replicates the target verification code in prompting suspension windows, then by obtaining user Target verification code is affixed to the input area of identifying code by the touch command to pasting button, to realize to the copied of identifying code Journey, on the one hand, complete target push information need not be shown, you can realize that the duplication of target verification code is pasted, on the other hand, Virtual key is replicated by arranging, the selection operation process to target verification code is simplified, be further simplify the operation of user.
According to a second aspect of the present invention, it is also proposed that a kind of extraction element of identifying code, including:Acquiring unit, for After checking interface is generated in arbitrary application program, checking request instruction is obtained;Traversal Unit, for obtaining checking request instruction Traversal pushed information in preset time period afterwards, so that the target for including target verification code is determined according to the attribute information of pushed information Pushed information;Copied cells, for target verification code to be copied to the identifying code input area at checking interface.
In the technical scheme, by checking interface is generated in arbitrary application program, and checking request instruction is got In preset time period afterwards, pushed information is traveled through, so that the mesh for including target verification code is determined according to the attribute information of pushed information Mark pushed information, so that, after target verification code is prompted to user, target verification code is copied to the identifying code at checking interface Input area, simplifies the extraction process of target verification code, facilitates checking for user, improves the experience of user.
Specifically, after checking request instruction is got, target push information is determined by traveling through pushed information, target is pushed away Breath of delivering letters can be one, or multiple, when target push information is one, can be pushed by extracting directly target Target verification code in information, realizes the duplication of target verification code, and when target push information is multiple, target verification code is at least For one, now multiple target push informations all can be prompted to user, to determine target verification code by the selection of user, At least one target verification code can also be determined by the automatic screening of system, so as to realize the duplication of target verification code.
In above-mentioned technical proposal, it is preferable that also include:Determining unit, for determining the attribute information of pushed information;Inspection Unit is surveyed, and feedback parameter is proved to be successful for detecting whether to have in attribute information;Determining unit is additionally operable to:Detecting attribute The pushed information including target verification code target push information is not defined as into when being proved to be successful feedback parameter in information.
In the technical scheme, by the attribute information for determining pushed information, tested with detecting whether to have in attribute information Successfully feedback parameter is demonstrate,proved, is not had when being proved to be successful feedback parameter in attribute information is detected, show testing in pushed information Card code is not authenticated or verifies unsuccessful, and pushed information not authenticated or that checking is unsuccessful is defined as target push information, It is achieved thereby that the determination of target push information, it is ensured that the effectiveness of the target verification code in target push information.
Specifically, after identifying code is proved to be successful, server can be issued and be proved to be successful note, the checking being now proved to be successful Code fails at once, is proved to be successful feedback parameter by determining whether to have in attribute information, determines the effectiveness of identifying code, prevent The identifying code of actual effect is interfered to user.
In any of the above-described technical scheme, it is preferable that detector unit is additionally operable to:Do not have in attribute information is detected When being proved to be successful feedback parameter, whether with the keyword message with checking interphase match in detection pushed information;Determining unit It is additionally operable to:When there is keyword message in pushed information is detected, pushed information is defined as into target push information.
In the technical scheme, by detecting whether with the keyword message with checking interphase match in pushed information, During so that there is the keyword message for matching in pushed information is detected, show that pushed information is the application with current authentication interface The pushed information of program association, by the checking to keyword message, further optimizes the prompting range of target push information, The prompting to the incoherent pushed information of user is reduced, so as to further improve the experience of user.
Wherein, keyword message can be the Apply Names of application program.
Specifically, such as when being paid using Alipay, need to receive the transaction verification code of server transmission, connecing In the pushed information including transaction verification code for receiving, including the information of " you are currently in use Alipay and are paid ", now will " Alipay " as keyword message, to be matched with currently used application program.
In any of the above-described technical scheme, it is preferable that determining unit is additionally operable to:Determine that the actual effect in attribute information is joined Number;Detector unit is additionally operable to:Whether possess ageing according to actual effect parameter detecting pushed information;Determining unit is additionally operable to:In inspection When measuring pushed information and having ageing, pushed information is defined as into target push information.
In the technical scheme, by determining the actual effect parameter in attribute information, further discharge not with ageing Pushed information, so as to obtain more accurate target push information, for user's touch-control replicates paste operation, further subtracts Lack the touch control operation number of times of user, improve the reliability of checking.
Specifically, for the pushed information of real-time reception, actual effect parameter can be the reception time of pushed information, for prolonging The pushed information for receiving late, actual effect parameter can be the transmission time of pushed information, generally after checking request instruction is got, With the pushed information that the proving time of 60 seconds, actual effect parameter were matched with 60 second proving time, with reference to not authenticated or checking not It is successful, and regulation is limited with keyword message for matching etc., you can acquisition meets the target push of current authentication requirement and believes Breath.
In any of the above-described technical scheme, it is preferable that also include:Signal generating unit:For generating target push information Prompting suspension windows;Copied cells is additionally operable to:When the touch command to pointing out the duplication button in suspension windows is got, will Target verification code is copied to shear plate;The extraction element of identifying code also includes:Application unit, for getting to prompting suspension During the touch command of the stickup button on window, target verification code is affixed to into the input area of identifying code.
The prompting suspension windows of target push information in the technical scheme, are generated, points out suspension windows only can show Target verification code, and point out suspension windows include the touch controlled keys such as duplication, stickup and insertion, can be by obtaining Touch command of the user to duplication button, directly replicates the target verification code in prompting suspension windows, then by obtaining user Target verification code is affixed to the input area of identifying code by the touch command to pasting button, to realize to the copied of identifying code Journey, on the one hand, complete target push information need not be shown, you can realize that the duplication of target verification code is pasted, on the other hand, Virtual key is replicated by arranging, the selection operation process to target verification code is simplified, be further simplify the operation of user.
According to a third aspect of the present invention, it is also proposed that a kind of terminal, including the checking described in any of the above-described technical scheme The extraction element of code, therefore, the terminal includes the technology effect of the extraction element of the identifying code described in any of the above-described technical scheme Really, will not be described here.
By above technical scheme, by checking interface is generated in arbitrary application program, and get checking request and refer to In preset time period after order, pushed information is traveled through, include target verification code to determine according to the attribute information of pushed information Target push information, so that, after target verification code is prompted to user, target verification code is copied to the checking at checking interface Code input area, simplifies the extraction process of target verification code, facilitates checking for user, improve the experience of user.
Description of the drawings
Fig. 1 shows the schematic flow diagram of the extracting method of identifying code according to an embodiment of the invention;
Fig. 2 shows the schematic block diagram of the extraction element of identifying code according to an embodiment of the invention;
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention;
Fig. 4 shows the interface schematic diagram of the extraction scheme of identifying code according to an embodiment of the invention;
Fig. 5 shows the interface schematic diagram of the extraction scheme of identifying code according to another embodiment of the invention;
Fig. 6 shows the schematic block diagram of terminal according to another embodiment of the invention.
Specific embodiment
It is in order to be more clearly understood that the above objects, features and advantages of the present invention, below in conjunction with the accompanying drawings and concrete real Apply mode to be further described in detail the present invention.It should be noted that in the case where not conflicting, the enforcement of the application Feature in example and embodiment can be mutually combined.
Many details are elaborated in the following description in order to fully understand the present invention, but, the present invention may be used also Implemented with being different from third party's mode described here using third party, therefore, protection scope of the present invention is not by following The restriction of disclosed specific embodiment.
Fig. 1 shows the schematic flow diagram of the extracting method of identifying code according to an embodiment of the invention.
As shown in figure 1, the extracting method of identifying code according to an embodiment of the invention, including:Step 102, answers arbitrary With generating in program behind checking interface, checking request instruction is obtained;Step 104, obtain checking request instruction after it is default when Between traversal pushed information in section, so that the target push information for including target verification code is determined according to the attribute information of pushed information; Target verification code is copied to the identifying code input area at checking interface by step 106.
In the technical scheme, by checking interface is generated in arbitrary application program, and checking request instruction is got In preset time period afterwards, pushed information is traveled through, so that the mesh for including target verification code is determined according to the attribute information of pushed information Mark pushed information, so that, after target verification code is prompted to user, target verification code is copied to the identifying code at checking interface Input area, simplifies the extraction process of target verification code, facilitates checking for user, improves the experience of user.
Specifically, after checking request instruction is got, target push information is determined by traveling through pushed information, target is pushed away Breath of delivering letters can be one, or multiple, when target push information is one, can be pushed by extracting directly target Target verification code in information, realizes the duplication of target verification code, and when target push information is multiple, target verification code is at least For one, now multiple target push informations all can be prompted to user, to determine target verification code by the selection of user, At least one target verification code can also be determined by the automatic screening of system, so as to realize the duplication of target verification code.
In above-mentioned technical proposal, it is preferable that in the preset time period after checking request instruction is obtained, traversal pushes letter Breath, so that the target push information for including target verification code is determined according to the attribute information of pushed information, specifically includes following steps: Determine the attribute information of pushed information;Whether have in detection attribute information and be proved to be successful feedback parameter;Detecting attribute letter The pushed information including target verification code target push information is not defined as into when being proved to be successful feedback parameter in breath.
In the technical scheme, by the attribute information for determining pushed information, tested with detecting whether to have in attribute information Successfully feedback parameter is demonstrate,proved, is not had when being proved to be successful feedback parameter in attribute information is detected, show testing in pushed information Card code is not authenticated or verifies unsuccessful, and pushed information not authenticated or that checking is unsuccessful is defined as target push information, It is achieved thereby that the determination of target push information, it is ensured that the effectiveness of the target verification code in target push information.
Specifically, after identifying code is proved to be successful, server can be issued and be proved to be successful note, the checking being now proved to be successful Code fails at once, is proved to be successful feedback parameter by determining whether to have in attribute information, determines the effectiveness of identifying code, prevent The identifying code of actual effect is interfered to user.
In any of the above-described technical scheme, it is preferable that do not have in attribute information is detected and be proved to be successful feedback ginseng During number, the pushed information including target verification code is defined as into target push information, following steps are specifically included:Detection pushes letter Whether with the keyword message with checking interphase match in breath;When there is keyword message in pushed information is detected, will Pushed information is defined as target push information.
In the technical scheme, by detecting whether with the keyword message with checking interphase match in pushed information, During so that there is the keyword message for matching in pushed information is detected, show that pushed information is the application with current authentication interface The pushed information of program association, by the checking to keyword message, further optimizes the prompting range of target push information, The prompting to the incoherent pushed information of user is reduced, so as to further improve the experience of user.
Wherein, keyword message can be the Apply Names of application program.
Specifically, such as when being paid using Alipay, need to receive the transaction verification code of server transmission, connecing In the pushed information including transaction verification code for receiving, including the information of " you are currently in use Alipay and are paid ", now will " Alipay " as keyword message, to be matched with currently used application program.
In any of the above-described technical scheme, it is preferable that also include:Determine the actual effect parameter in attribute information;According to reality Whether effect parameter detecting pushed information possesses ageing;When detecting pushed information and having ageing, pushed information is determined For target push information.
In the technical scheme, by determining the actual effect parameter in attribute information, further discharge not with ageing Pushed information, so as to obtain more accurate target push information, for user's touch-control replicates paste operation, further subtracts Lack the touch control operation number of times of user, improve the reliability of checking.
Specifically, for the pushed information of real-time reception, actual effect parameter can be the reception time of pushed information, for prolonging The pushed information for receiving late, actual effect parameter can be the transmission time of pushed information, generally after checking request instruction is got, With the pushed information that the proving time of 60 seconds, actual effect parameter were matched with 60 second proving time, with reference to not authenticated or checking not It is successful, and regulation is limited with keyword message for matching etc., you can acquisition meets the target push of current authentication requirement and believes Breath.
In any of the above-described technical scheme, it is preferable that target verification code is copied to the identifying code input at checking interface Area, specifically includes following steps:Generate the prompting suspension windows of target push information;Getting to pointing out in suspension windows When replicating the touch command of button, target verification code is copied to into shear plate;Getting to pointing out the stickup in suspension windows During the touch command of button, target verification code is affixed to into the input area of identifying code.
The prompting suspension windows of target push information in the technical scheme, are generated, points out suspension windows only can show Target verification code, and point out suspension windows include the touch controlled keys such as duplication, stickup and insertion, can be by obtaining Touch command of the user to duplication button, directly replicates the target verification code in prompting suspension windows, then by obtaining user Target verification code is affixed to the input area of identifying code by the touch command to pasting button, to realize to the copied of identifying code Journey, on the one hand, complete target push information need not be shown, you can realize that the duplication of target verification code is pasted, on the other hand, Virtual key is replicated by arranging, the selection operation process to target verification code is simplified, be further simplify the operation of user.
Step in the extracting method of embodiment of the present invention identifying code can carry out order adjustment according to actual needs, merge With delete.
Fig. 2 shows the schematic block diagram of the extraction element of identifying code according to an embodiment of the invention.
As shown in Fig. 2 the extraction element 200 of identifying code according to an embodiment of the invention, including:Acquiring unit 202, uses After checking interface is generated in arbitrary application program, checking request instruction is obtained;Traversal Unit 204, for obtaining checking Traversal pushed information in preset time period after request instruction, includes target verification to determine according to the attribute information of pushed information The target push information of code;Copied cells 206, for target verification code to be copied to the identifying code input area at checking interface.
In the technical scheme, by checking interface is generated in arbitrary application program, and checking request instruction is got In preset time period afterwards, pushed information is traveled through, so that the mesh for including target verification code is determined according to the attribute information of pushed information Mark pushed information, so that, after target verification code is prompted to user, target verification code is copied to the identifying code at checking interface Input area, simplifies the extraction process of target verification code, facilitates checking for user, improves the experience of user.
Specifically, after checking request instruction is got, target push information is determined by traveling through pushed information, target is pushed away Breath of delivering letters can be one, or multiple, when target push information is one, can be pushed by extracting directly target Target verification code in information, realizes the duplication of target verification code, and when target push information is multiple, target verification code is at least For one, now multiple target push informations all can be prompted to user, to determine target verification code by the selection of user, At least one target verification code can also be determined by the automatic screening of system, so as to realize the duplication of target verification code.
In above-mentioned technical proposal, it is preferable that also include:Determining unit 208, for determining that the attribute of pushed information is believed Breath;Detector unit 210, is proved to be successful feedback parameter for detecting whether to have in attribute information;Determining unit 208 is additionally operable to: The pushed information including target verification code mesh is not defined as into when being proved to be successful feedback parameter in attribute information is detected Mark pushed information.
In the technical scheme, by the attribute information for determining pushed information, tested with detecting whether to have in attribute information Successfully feedback parameter is demonstrate,proved, is not had when being proved to be successful feedback parameter in attribute information is detected, show testing in pushed information Card code is not authenticated or verifies unsuccessful, and pushed information not authenticated or that checking is unsuccessful is defined as target push information, It is achieved thereby that the determination of target push information, it is ensured that the effectiveness of the target verification code in target push information.
Specifically, after identifying code is proved to be successful, server can be issued and be proved to be successful note, the checking being now proved to be successful Code fails at once, is proved to be successful feedback parameter by determining whether to have in attribute information, determines the effectiveness of identifying code, prevent The identifying code of actual effect is interfered to user.
In any of the above-described technical scheme, it is preferable that detector unit 210 is additionally operable to:In attribute information is detected not During with being proved to be successful feedback parameter, whether with the keyword message with checking interphase match in detection pushed information;It is determined that Unit 208 is additionally operable to:When there is keyword message in pushed information is detected, pushed information is defined as into target and pushes letter Breath.
In the technical scheme, by detecting whether with the keyword message with checking interphase match in pushed information, During so that there is the keyword message for matching in pushed information is detected, show that pushed information is the application with current authentication interface The pushed information of program association, by the checking to keyword message, further optimizes the prompting range of target push information, The prompting to the incoherent pushed information of user is reduced, so as to further improve the experience of user.
Wherein, keyword message can be the Apply Names of application program.
Specifically, such as when being paid using Alipay, need to receive the transaction verification code of server transmission, connecing In the pushed information including transaction verification code for receiving, including the information of " you are currently in use Alipay and are paid ", now will " Alipay " as keyword message, to be matched with currently used application program.
In any of the above-described technical scheme, it is preferable that determining unit 208 is additionally operable to:Determine the actual effect in attribute information Parameter;Detector unit 210 is additionally operable to:Whether possess ageing according to actual effect parameter detecting pushed information;Determining unit 208 is also used In:When detecting pushed information and having ageing, pushed information is defined as into target push information.
In the technical scheme, by determining the actual effect parameter in attribute information, further discharge not with ageing Pushed information, so as to obtain more accurate target push information, for user's touch-control replicates paste operation, further subtracts Lack the touch control operation number of times of user, improve the reliability of checking.
Specifically, for the pushed information of real-time reception, actual effect parameter can be the reception time of pushed information, for prolonging The pushed information for receiving late, actual effect parameter can be the transmission time of pushed information, generally after checking request instruction is got, With the pushed information that the proving time of 60 seconds, actual effect parameter were matched with 60 second proving time, with reference to not authenticated or checking not It is successful, and regulation is limited with keyword message for matching etc., you can acquisition meets the target push of current authentication requirement and believes Breath.
In any of the above-described technical scheme, it is preferable that also include:Signal generating unit 212:For generating target push information Prompting suspension windows;Copied cells 206 is additionally operable to:Getting the touch command to pointing out the duplication button in suspension windows When, target verification code is copied to into shear plate;The extraction element 200 of identifying code also includes:Application unit 214, for obtaining To pointing out, during the touch command of the stickup button in suspension windows, target verification code to be affixed to the input area of identifying code.
The prompting suspension windows of target push information in the technical scheme, are generated, points out suspension windows only can show Target verification code, and point out suspension windows include the touch controlled keys such as duplication, stickup and insertion, can be by obtaining Touch command of the user to duplication button, directly replicates the target verification code in prompting suspension windows, then by obtaining user Target verification code is affixed to the input area of identifying code by the touch command to pasting button, to realize to the copied of identifying code Journey, on the one hand, complete target push information need not be shown, you can realize that the duplication of target verification code is pasted, on the other hand, Virtual key is replicated by arranging, the selection operation process to target verification code is simplified, be further simplify the operation of user.
Unit in embodiment of the present invention terminal can be merged according to actual needs, divides and be deleted.
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention.As shown in figure 3, reality of the invention The terminal 300 of example is applied, including the extraction element 200 of the identifying code described in any of the above-described technical scheme, therefore, the terminal 300 Including the technique effect of the extraction element 200 of the identifying code described in any of the above-described technical scheme, will not be described here.
Fig. 4 and Fig. 5 respectively illustrate the interface schematic diagram of the extraction scheme of identifying code according to an embodiment of the invention.
As shown in figure 4, after touch control operation of the user to " acquisition identifying code " is received, when pushed information is received, By traveling through pushed information, it is determined that whether the pushed information being currently received is target push information, it is determined that being currently received Pushed information when being target push information, generate suspension prompting frame or drop-down prompting menu, display content " note registration checking Code:123456 " target verification code and " duplication " button, user can be replicated by the touch control operation to " duplication " button Target verification code, and " 123456 " are shown in identifying code input area, by the touch control operation to " checking " button, complete authenticated Journey.
As shown in figure 5, after user switches to other application programs, switching to the checking of application program to be verified again During interface, by pressing operation of the receive user to identifying code input area, pushed information is traveled through, to obtain target push information, After target verification code being determined in target push information, generate operation indicating menu, including " duplication ", " stickup " and " insertion ", User can realize that target verification code replicates operation, it is also possible to by direct by clicking on " duplication " and " stickup " button " insertion " button is clicked on, is realized that target verification code replicates operation, is simplified the operating process of user.
Fig. 6 shows the schematic block diagram of terminal according to another embodiment of the invention.
As shown in fig. 6, the terminal of second embodiment of the invention, including:Processor 1, sensor 2, display screen 3rd, memorizer 4 and communication component 5.
Wherein, memorizer 5 is used to store batch processing code, the program code that processor 1 is stored in calling memorizer 4, For performing following operation:
By sensor 2, after checking interface is generated in arbitrary application program, checking request instruction is obtained;
Pushed information is traveled through in preset time period after checking request instruction is obtained, to believe according to the attribute of pushed information Breath determines the target push information for including target verification code;
Target verification code is copied to into the identifying code input area at checking interface, and is shown in display screen 3.
As a kind of optional embodiment, the program code that processor 1 is stored in calling memorizer 4, checking is being obtained Traversal pushed information in preset time period after request instruction, includes target verification to determine according to the attribute information of pushed information The target push information of code, specially:
Determine the attribute information of pushed information;
Feedback information is proved to be successful according to whether communication component 5 receives, whether is had in detection attribute information and is verified into Work(feedback parameter;
The pushed information of target verification code will not included with when being proved to be successful feedback parameter in attribute information is detected It is defined as target push information.
As a kind of optional embodiment, the program code that processor 1 is stored in calling memorizer 4, category is being detected Property information in do not have when being proved to be successful feedback parameter, the pushed information including target verification code is defined as into target and pushes letter Breath, specially:
Do not have when being proved to be successful feedback parameter in attribute information is detected, in detection pushed information whether with test The keyword message of card interphase match;
When there is keyword message in pushed information is detected, pushed information is defined as into target push information.
As a kind of optional embodiment, the program code that processor 1 is stored in calling memorizer 4, also include:
Determine the actual effect parameter in attribute information;
Whether possess ageing according to actual effect parameter detecting pushed information;
When detecting pushed information and having ageing, pushed information is defined as into target push information.
As a kind of optional embodiment, the program code that processor 1 is stored in calling memorizer 4,
By display screen 3, the prompting suspension windows of target push information are generated;
According to display screen 3 and sensor 2, when the touch command to pointing out the duplication button in suspension windows is got, Target verification code is copied to into shear plate;
According to display screen 3 and sensor 2 when the touch command to pointing out the stickup button in suspension windows is got, will Target verification code affixes to the input area of identifying code.
One of ordinary skill in the art will appreciate that whole in the extracting method of the various identifying codes of above-described embodiment or Part steps can be by program to instruct the hardware of correlation to complete, and the program can be stored in computer-readable storage In medium, storage medium includes read only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), programmable read only memory (Programmable Read-only Memory, PROM), erasable programmable Read only memory (Erasable Programmable Read Only Memory, EPROM), disposable programmable read only memory (One-time Programmable Read-Only Memory, OTPROM), the electronics formula of erasing can make carbon copies read only memory (Electrically-Erasable Programmable Read-Only Memory, EEPROM), read-only optical disc (Compact Disc Read-Only Memory, CD-ROM) or other disk storages, disk memory, magnetic tape storage or can For carrying or computer-readable any other medium of data storage.
Technical scheme is described in detail above in association with accompanying drawing, it is contemplated that in correlation technique, how to simplify identifying code Extraction process technical problem, the present invention propose a kind of extraction scheme of new identifying code, simplify target verification code Extraction process, facilitates checking for user, improves the experience of user.
The preferred embodiments of the present invention are the foregoing is only, the present invention is not limited to, for the skill of this area For art personnel, the present invention can have various modifications and variations.It is all within the spirit and principles in the present invention, made any repair Change, equivalent, improvement etc., should be included within the scope of the present invention.

Claims (11)

1. a kind of extracting method of identifying code, it is characterised in that include:
After checking interface is generated in arbitrary application program, checking request instruction is obtained;
Pushed information is traveled through in preset time period after the checking request instruction is obtained, with the category according to the pushed information Property information determine and include the target push information of target verification code;
The target verification code is copied to into the identifying code input area at the checking interface.
2. the extracting method of identifying code according to claim 1, it is characterised in that described to refer to obtaining the checking request Traversal pushed information in preset time period after order, includes target verification code to determine according to the attribute information of the pushed information Target push information, specifically include following steps:
Determine the attribute information of the pushed information;
Whether have in detecting the attribute information and be proved to be successful feedback parameter;
Do not have described when being proved to be successful feedback parameter in the attribute information is detected, the target verification code will be included The pushed information is defined as the target push information.
3. the extracting method of identifying code according to claim 2, it is characterised in that described to detect the attribute information In do not have described when being proved to be successful feedback parameter, the pushed information including the target verification code is defined as into the mesh Mark pushed information, specifically includes following steps:
Do not have described when being proved to be successful feedback parameter in the attribute information is detected, whether detect in the pushed information With the keyword message with the checking interphase match;
When there is the keyword message in the pushed information is detected, the pushed information is defined as into the target and is pushed away Deliver letters breath.
4. the extracting method of identifying code according to claim 2, it is characterised in that also include:
Determine the actual effect parameter in the attribute information;
Whether the pushed information according to the actual effect parameter detecting possesses ageing;
When detecting the pushed information and having described ageing, the pushed information is defined as into the target and pushes letter Breath.
5. the extracting method of the identifying code according to Claims 1-4, it is characterised in that described by the target verification code The identifying code input area at the checking interface is copied to, following steps are specifically included:
Generate the prompting suspension windows of the target push information;
When the touch command to the duplication button in the prompting suspension windows is got, the target verification code is copied to Shear plate;
When the touch command to the stickup button in the prompting suspension windows is got, the target verification code is affixed to The input area of the identifying code.
6. a kind of extraction element of identifying code, it is characterised in that include:
Acquiring unit, for generating in arbitrary application program behind checking interface, obtains checking request instruction;
Traversal Unit, for traveling through pushed information in the preset time period after the checking request instruction is obtained, with according to institute The attribute information for stating pushed information determines the target push information for including target verification code;
Copied cells, for the target verification code to be copied to the identifying code input area at the checking interface.
7. the extraction element of identifying code according to claim 6, it is characterised in that also include:
Determining unit, for determining the attribute information of the pushed information;
Detector unit, is proved to be successful feedback parameter for detecting whether to have in the attribute information;
The determining unit is additionally operable to:Do not have in the attribute information is detected it is described when being proved to be successful feedback parameter, will It is defined as the target push information including the pushed information of the target verification code.
8. the extraction element of identifying code according to claim 7, it is characterised in that
The detector unit is additionally operable to:There is no in the attribute information is detected described when being proved to be successful feedback parameter, inspection Whether survey in the pushed information with the keyword message with the checking interphase match;
The determining unit is additionally operable to:When there is the keyword message in the pushed information is detected, by the push Information is defined as the target push information.
9. the extraction element of identifying code according to claim 7, it is characterised in that
The determining unit is additionally operable to:Determine the actual effect parameter in the attribute information;
The detector unit is additionally operable to:Whether the pushed information according to the actual effect parameter detecting possesses ageing;
The determining unit is additionally operable to:When detecting the pushed information and having described ageing, will be the pushed information true It is set to the target push information.
10. the extraction element of the identifying code according to claim 6 to 9, it is characterised in that also include:
Signal generating unit:For generating the prompting suspension windows of the target push information;
The copied cells is additionally operable to:When the touch command to the duplication button in the prompting suspension windows is got, will The target verification code is copied to shear plate;
The extraction element of the identifying code also includes:
Application unit, for when the touch command to the stickup button in the prompting suspension windows is got, by the mesh Mark identifying code affixes to the input area of the identifying code.
11. a kind of terminals, it is characterised in that include:The extraction dress of the identifying code as any one of claim 6 to 10 Put.
CN201610937791.XA 2016-10-24 2016-10-24 Extraction method of verification code, extraction device of verification code and terminal Pending CN106529265A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610937791.XA CN106529265A (en) 2016-10-24 2016-10-24 Extraction method of verification code, extraction device of verification code and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610937791.XA CN106529265A (en) 2016-10-24 2016-10-24 Extraction method of verification code, extraction device of verification code and terminal

Publications (1)

Publication Number Publication Date
CN106529265A true CN106529265A (en) 2017-03-22

Family

ID=58292646

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610937791.XA Pending CN106529265A (en) 2016-10-24 2016-10-24 Extraction method of verification code, extraction device of verification code and terminal

Country Status (1)

Country Link
CN (1) CN106529265A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108702413A (en) * 2017-05-10 2018-10-23 华为技术有限公司 A kind of input method and device of identifying code
CN108932173A (en) * 2018-07-05 2018-12-04 厦门美图移动科技有限公司 Identifying code inserts method and device
CN109033800A (en) * 2018-07-20 2018-12-18 北京云测信息技术有限公司 A kind of extracting method and device of verification information
CN111221599A (en) * 2018-11-23 2020-06-02 奇酷互联网络科技(深圳)有限公司 Method for displaying floating window, mobile terminal and storage medium
CN111752398A (en) * 2020-05-29 2020-10-09 维沃移动通信有限公司 Verification code input method and device, electronic equipment and readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1093264A2 (en) * 1999-10-14 2001-04-18 Alcatel Networks Corporation Societe Par Actions De Regime Federal De Reseaux Alcatel Method and apparatus for providing cell payload integrity verification and detecting defective modules in telecommunication devices
CN104935744A (en) * 2015-06-10 2015-09-23 腾讯科技(深圳)有限公司 Verification code display method, verification code display device and mobile terminal
CN105376204A (en) * 2014-08-28 2016-03-02 宇龙计算机通信科技(深圳)有限公司 User terminal, authority granting method and system thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1093264A2 (en) * 1999-10-14 2001-04-18 Alcatel Networks Corporation Societe Par Actions De Regime Federal De Reseaux Alcatel Method and apparatus for providing cell payload integrity verification and detecting defective modules in telecommunication devices
CN105376204A (en) * 2014-08-28 2016-03-02 宇龙计算机通信科技(深圳)有限公司 User terminal, authority granting method and system thereof
CN104935744A (en) * 2015-06-10 2015-09-23 腾讯科技(深圳)有限公司 Verification code display method, verification code display device and mobile terminal

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108702413A (en) * 2017-05-10 2018-10-23 华为技术有限公司 A kind of input method and device of identifying code
WO2018205168A1 (en) * 2017-05-10 2018-11-15 华为技术有限公司 Method and device for inputting verification code
CN108932173A (en) * 2018-07-05 2018-12-04 厦门美图移动科技有限公司 Identifying code inserts method and device
CN109033800A (en) * 2018-07-20 2018-12-18 北京云测信息技术有限公司 A kind of extracting method and device of verification information
CN111221599A (en) * 2018-11-23 2020-06-02 奇酷互联网络科技(深圳)有限公司 Method for displaying floating window, mobile terminal and storage medium
CN111752398A (en) * 2020-05-29 2020-10-09 维沃移动通信有限公司 Verification code input method and device, electronic equipment and readable storage medium

Similar Documents

Publication Publication Date Title
CN106529265A (en) Extraction method of verification code, extraction device of verification code and terminal
CN106469261B (en) Identity verification method and device
CN107026836B (en) Service implementation method and device
EP3617973A1 (en) Electronic ticket admission verification anti-counterfeiting system and method thereof
US20180365699A9 (en) Systems and methods for tokenless authentication of consumers during payment transactions
CN110011800B (en) Block chain data reading method and device
JP2016502169A (en) Detection of embossed characters on form factors
CN110175849B (en) Collecting method, device, equipment, server and system
CN109951289A (en) A kind of recognition methods, device, equipment and readable storage medium storing program for executing
TW201346843A (en) Ticket processing method and program of the same
CN106204046A (en) The method and device that order pays
CN106572081B (en) The method of logon rights verifying
CN110674048B (en) Buried point test characteristic acquisition method and related device
CN105550628B (en) Fingerprint input method and device
Yang et al. An automated student attendance tracking system based on voiceprint and location
CN106570367B (en) Method for identifying ID and device based on keyboard operation
CN110945552A (en) Product sales reporting method, payment method and terminal equipment
CN113196323A (en) Financial transaction providing method, program and system based on virtual legal card
CN107480516A (en) A kind of method and apparatus for filling input frame
US11756038B2 (en) Transaction authentication using multiple biometric inputs
CN105763565A (en) Account login method and apparatus, and game system
CN110866205A (en) Method and apparatus for storing information
CN111340635A (en) Data checking method, equipment, server and readable storage medium
CN106797386A (en) Safe verification method, device, terminal device and server
CN106600396A (en) Account information upgrading method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination