CN107426163A - A kind of method and device of encryption - Google Patents
A kind of method and device of encryption Download PDFInfo
- Publication number
- CN107426163A CN107426163A CN201710325458.8A CN201710325458A CN107426163A CN 107426163 A CN107426163 A CN 107426163A CN 201710325458 A CN201710325458 A CN 201710325458A CN 107426163 A CN107426163 A CN 107426163A
- Authority
- CN
- China
- Prior art keywords
- user
- rule
- short message
- specified
- login password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiments of the invention provide a kind of method and device of encryption, it is related to communication technical field, the short message verification code that server is sent can be modified by using specified encryption rule, and then improve the confidentiality of identifying code, ensure the person of user and the safety of property.This method includes:First, the initial short message verification code for specifying the server of application to send is obtained;Then, the initial short message verification code is encrypted according to specified rule;Again, the short message verification code after display encryption.Technical scheme provided in an embodiment of the present invention is applied to during being authenticated, paid with short message verification code etc..
Description
【Technical field】
The present invention relates to communication technical field, more particularly to a kind of method and device of encryption.
【Background technology】
With the development of the communication technology, application market releases increasingly application software, provides the user more abundant answer
With service.In order to facilitate use, user uses the SIM of oneself mostly when registering the login account of each application
(Subscriber Identity Module, client identification module) number is registered, by by these application and the SIM of oneself
Number binding, when forgetting login password or changes some information, or during for e-payment, using oneself No. SIM,
The identifying code that each application server is sent is obtained, by inputting the identifying code, application is logged in, completes modification or the electricity of information
Son is paid.
During the present invention is realized, inventor has found that prior art at least has problems with:
After the communication equipment of user is lost or be stolen, other users need to only use No. SIM work of the communication equipment
For login account, the various login passwords using account are changed using the short message verification code can of reception, obtain the user's
Information, the wealth of user is usurped, the personal safety and property for making user are on the hazard.
【The content of the invention】
In view of this, the embodiments of the invention provide a kind of method and device of encryption, checking is improved to a certain extent
The confidentiality of code, ensure the person of user and the safety of property.
On the one hand, the embodiments of the invention provide a kind of method of encryption, suitable for mobile terminal, methods described bag
Include:
Obtain the initial short message verification code for specifying the server of application to send;
The initial short message verification code is encrypted according to specified rule;
Short message verification code after display encryption.
Aspect as described above and any implementation, it is further provided a kind of implementation, the acquisition is specified should
Before the initial short message verification code that server is sent, in addition to:
Obtain the rule specified that user is set;
The rule specified is stored in designated area.
Aspect as described above and any implementation, it is further provided a kind of implementation, the rule specified
Including all numerical value in initial short message verification code are added into the 1, order of the initial short message verification code of change or test initial short message
The second and the 3rd corresponding numerical value for demonstrate,proving code add at least one of 1 rule.
Aspect as described above and any implementation, it is further provided a kind of implementation, the acquisition user set
Before the rule specified put, in addition to:
When user access set encryption rule function, with set it is described specify rule when, obtain user input step on
Record password;
Judge whether the login password of user's input matches with default login password;
When the login password for judging user's input matches with default login password, the work(that encryption rule is set is accessed
Can, so that user sets the rule specified.
Aspect as described above and any implementation, it is further provided a kind of implementation, the default login
Password storage is in hidden state in specified location, the specified location, when the login password for judging user's input and presets
Login password matching after, methods described also includes:
Obtain the display authority of the specified location and show the specified location, so that user changes login password.
On the other hand, the embodiment of the present invention additionally provides a kind of device of encryption, suitable for mobile terminal, described device
Including:
First acquisition unit, the initial short message verification code for specifying the server of application to send for obtaining;
Ciphering unit, for the initial short message verification code to be encrypted according to specified rule;
Display unit, for showing the short message verification code after encrypting.
Aspect as described above and any implementation, it is further provided a kind of implementation, described device also include:
Second acquisition unit, for obtaining the rule specified of user's setting;
Memory cell, for the rule specified to be stored in into designated area.
Aspect as described above and any implementation, it is further provided a kind of implementation, the rule specified
Including all numerical value in initial short message verification code are added into the 1, order of the initial short message verification code of change or test initial short message
The second and the 3rd corresponding numerical value for demonstrate,proving code add at least one of 1 rule.
Aspect as described above and any implementation, it is further provided a kind of implementation, described device also include:
3rd acquiring unit, for when user access set encryption rule function, with set it is described specify rule when,
Obtain the login password of user's input;
Judging unit, for judging whether the login password of user's input matches with default login password;
Access unit, for when the login password for judging user's input matches with default login password, access to be set
The function of encryption rule is put, so that user sets the rule specified.
Aspect as described above and any implementation, it is further provided a kind of implementation, the default login
Password storage is in hidden state in specified location, the specified location, when the login password for judging user's input and presets
Login password matching after, described device also includes:
4th acquiring unit, for obtaining the display authority of the specified location and showing the specified location, to use
Change login password in family.
The method and device of encryption provided in an embodiment of the present invention, by the clothes for each application for arriving acquisition for mobile terminal
The initial short message verification code that device is sent of being engaged in is encrypted according to specified rule, then initial short-message verification is revised as to the short message of mistake
Identifying code, the wrong short message verification code is shown to user, if the user knows the encryption rule specified, can be got
Correct initial short message verification code;And if the user does not know the encryption rule specified, will be unable to obtain correctly initial short
Identifying code is believed, so that each application or progress electronics branch can just be logged in by only knowing the user for the encryption rule specified
Pay, and then improve the confidentiality of identifying code, ensure the person of user and the safety of property.
【Brief description of the drawings】
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by embodiment it is required use it is attached
Figure is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this area
For those of ordinary skill, without having to pay creative labor, it can also be obtained according to these accompanying drawings other attached
Figure.
Fig. 1 is a kind of method flow diagram of encryption provided in an embodiment of the present invention;
Fig. 2 is the method flow diagram of another encryption provided in an embodiment of the present invention;
Fig. 3 is the method flow diagram of another encryption provided in an embodiment of the present invention;
Fig. 4 is the method flow diagram of another encryption provided in an embodiment of the present invention;
Fig. 5 is a kind of composition frame chart of encryption device provided in an embodiment of the present invention;
Fig. 6 is the composition frame chart of another encryption device provided in an embodiment of the present invention;
Fig. 7 is the composition frame chart of another encryption device provided in an embodiment of the present invention;
Fig. 8 is the composition frame chart of another encryption device provided in an embodiment of the present invention.
【Embodiment】
In order to be better understood from technical scheme, the embodiment of the present invention is retouched in detail below in conjunction with the accompanying drawings
State.
It will be appreciated that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Base
Embodiment in the present invention, those of ordinary skill in the art obtained under the premise of creative work is not paid it is all its
Its embodiment, belongs to the scope of protection of the invention.
The term used in embodiments of the present invention is only merely for the purpose of description specific embodiment, and is not intended to be limiting
The present invention." one kind ", " described " and "the" of singulative used in the embodiment of the present invention and appended claims
It is also intended to including most forms, unless context clearly shows that other implications.
It will be appreciated that though acquiring unit, but this may be described using term first, second in embodiments of the present invention
A little acquiring units should not necessarily be limited by these terms.These terms are only used for acquiring unit being distinguished from each other out.For example, this is not being departed from
In the case of inventive embodiments scope, first acquisition unit can also be referred to as second acquisition unit, and similarly, second obtains list
Member can also be referred to as first acquisition unit.
Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ...
When " or " in response to determining " or " in response to detection ".Similarly, depending on linguistic context, phrase " if it is determined that " or " if detection
(condition or event of statement) " can be construed to " when it is determined that when " or " in response to determine " or " when the detection (condition of statement
Or event) when " or " in response to detecting (condition or event of statement) ".
The embodiments of the invention provide a kind of method of encryption, during mobile terminal, as shown in figure 1, described
Method includes:
Wherein, the mobile terminal in the embodiment of the present invention can include but is not limited to personal computer (Personal
Computer, PC), personal digital assistant (Personal Digital Assistant, PDA), radio hand-held equipment, flat board electricity
Brain (Tablet Computer), mobile phone etc..
101st, the initial short message verification code for specifying the server of application to send is obtained.
In this kind of short message for being used to verify that the server of application is sent, " check code ", " checking are had in its short message
The keyword such as code " or " dynamic code ".After mobile terminal receives short message, first judge whether there is above-mentioned key in the short message
Word, after it is determined that above-mentioned keyword be present, extract the initial short message verification code in the short message.
102nd, the initial short message verification code is encrypted according to specified rule.
Mobile terminal passes through certain algorithm process according to the encryption rule specified, by the initial short message verification code
It is converted into ill-formalness corresponding with the rule that this is specified.
Specifically, the rule for example specified is by the order of reverse initial short message verification code, got in mobile initial
Short message verification code is " 4369 ", then mobile terminal tests initial short message according to specified rule after certain algorithm process
Card code is changed into the form of " 9634 ";Or the rule specified is that all numerical value of initial short message verification code are added into 1, then mobile terminal
According to specified rule after certain algorithm process, initial short message verification code is changed into the form of " 5470 ".It is worth explanation
, above-mentioned is only two kinds of concrete application citings according to specified rule encryption to initial short message verification code, and the present invention is to this tool
Body implementation does not limit.
103rd, the short message verification code after display encryption.
Because the short message verification code that mobile terminal is shown to user is not the initial short message for the server transmission for specifying application
Identifying code, knowing how the user of the short message verification code shown to the mobile terminal knows the encryption rule of initial short message verification code
Then, the user can be easily obtained initial short message verification code;And knowing how the short-message verification shown to the mobile terminal
The user of code does not know the encryption rule of initial short message verification code, and the user can not learn initial short message verification code.
The method of encryption provided in an embodiment of the present invention, sent out by the server for each application for arriving acquisition for mobile terminal
The initial short message verification code sent is encrypted according to specified rule, then initial short-message verification is revised as to the short-message verification of mistake
Code, user is shown to by the wrong short message verification code, if the user knows the encryption rule specified, can be got correct
Initial short message verification code;And if the user does not know the encryption rule specified, it will be unable to obtain correctly initial short message and test
Code is demonstrate,proved, so that each application or progress e-payment can just be logged in by only knowing the user for the encryption rule specified,
And then the confidentiality of identifying code is improved, ensure the person of user and the safety of property.
Further, in order to ensure the encryption rule of short message verification code uniqueness, while the user using the method is also allowed
Initial short message verification code can be easier to learn, encryption rule can be set by user according to the custom of itself, based on this,
The embodiments of the invention provide another implementation method, as shown in Fig. 2 obtaining the specified server applied performing step 101
Before the initial short message verification code sent, it is also necessary to perform step 104,105, step 104,105 specifically include:
104th, the rule specified that user is set is obtained.
Wherein, the regular form specified have it is a variety of, specifically, include but is not limited to will be initial short for the rule specified
All numerical value in letter identifying code add 1, change the order of initial short message verification code or the second by initial short message verification code
Add at least one of 1 rule with the 3rd corresponding numerical value.The embodiment of the present invention is not limited specified regular form.
105th, the rule specified is stored in designated area.
Wherein, after the rule specified user set preserves, the storage zone is hidden.Therefore, in acquiescence feelings
The regular designated area specified is stored under condition and is in hidden state, user can not know the information stored in the designated area,
User the short message correlation function in removing mobile terminal it is data cached when, it is impossible to remove the rule specified.User passes through
When factory reset or refitting system are carried out to mobile terminal, the data in the designated area can not be eliminated.
Further, with reference to foregoing schemes, in order to ensure the confidentiality and security of the encryption rule of user's setting, acquiescence
In the case of user set the rule specified be hidden, when user want change oneself set the rule specified when, this
Inventive embodiments provide another implementation method, as shown in figure 3, obtaining the rule specified of user's setting in step 104
Before then, it is also necessary to perform following steps, specifically include:
106th, when user access set encryption rule function, with set it is described specify rule when, obtain user input
Login password.
107th, judge whether the login password of user's input matches with default login password.
108th, when the login password for judging user's input matches with default login password, access and encryption rule is set
Function so that user sets the rule specified.
The function of mobile terminal accessing encryption rule, the setting interface of encryption rule is recalled, encryption rule is shown to user
Setting interface so that user set encryption rule.The concrete form at setting interface of the embodiment of the present invention to encryption rule is not
Limit, every any human-computer interaction interface that can allow user that rule setting is encrypted can be setting for the encryption rule
Put interface.
Supplementary notes, it is mobile whole when the login password and default login password not timing of judging user's input
End can not access the function of setting encryption rule, and mobile terminal does not show the setting interface of encryption rule, and user also will be unable to pair
The rule of encryption carries out any modification.
In embodiments of the present invention, user only correctly inputs login password, so that mobile terminal judges that user is defeated
The login password entered matches with default login password, and after then accessing the function of setting encryption rule, user can just change
Encryption rule;And when the password bad of user's input, user can not change encryption rule, so as to ensure that user is set
Encryption rule security, the encryption rule for avoiding mobile terminal user from setting arbitrarily changed by other people, and destroys short message
Verify the effect of code encryption.
Further, it is described default in order to ensure the security of the function of the setting encryption rule with reference to foregoing schemes
Login password be stored in specified location, the specified location is in hidden state.Therefore, be directed to how to change log in it is close
Code, the embodiments of the invention provide a kind of implementation, as shown in figure 4, when the login password for judging user's input and presetting
Login password matching after, methods described also includes:
109th, obtain the display authority of the specified location and show the specified location, so that user's modification login is close
Code.
For mobile terminal to after storing the position display for presetting login password to user, user can edit the specified location
In data, by the specified location data delete, change, so as to reset login password.
Supplementary notes, if the login password of user's input mismatches with default login password, the specified location
Still in hiding state, user also will be unable to change login password.
Based on the encryption method in above-described embodiment, the embodiment of the present invention additionally provides a kind of device of encryption, is applied to
In mobile terminal, as shown in figure 4, described device includes:
First acquisition unit 21, the initial short message verification code for specifying the server of application to send for obtaining.
Ciphering unit 22, for the initial short message verification code to be encrypted according to specified rule.
Display unit 23, for showing the short message verification code after encrypting.
Optionally, as shown in figure 5, described device also includes:
Second acquisition unit 24, for obtaining the rule specified of user's setting.
Memory cell 25, for the rule specified to be stored in into designated area.
Optionally, the rule specified includes adding 1, change initial short all numerical value in initial short message verification code
Believe the order of identifying code or the second of initial short message verification code and the 3rd corresponding numerical value are added at least one of 1 rule
Then.
Optionally, as shown in fig. 6, described device also includes:
3rd acquiring unit 26, for accessing the function of setting encryption rule as user, to set the rule specified
When, obtain the login password that user inputs.
Judging unit 27, for judging whether the login password of user's input matches with default login password.
Access unit 28, for when the login password for judging user's input matches with default login password, accessing
The function of encryption rule is set, so that user sets the rule specified.
Optionally, as shown in figure 8, the default login password is stored in specified location, the specified location is in
Hidden state, after the login password for judging user's input matches with default login password, described device also includes:
4th acquiring unit 29, for obtaining the display authority of the specified location and showing the specified location, so that
User changes login password.
The device of encryption provided in an embodiment of the present invention, sent out by the server for each application for arriving acquisition for mobile terminal
The initial short message verification code sent is encrypted according to specified rule, then initial short-message verification is revised as to the short-message verification of mistake
Code, user is shown to by the wrong short message verification code, if the user knows the encryption rule specified, can be got correct
Initial short message verification code;And if the user does not know the encryption rule specified, it will be unable to obtain correctly initial short message and test
Code is demonstrate,proved, so that each application or progress e-payment can just be logged in by only knowing the user for the encryption rule specified,
And then the confidentiality of identifying code is improved, ensure the person of user and the safety of property.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
In several embodiments provided by the present invention, it should be understood that disclosed system, apparatus and method can be with
Realize by another way.For example, device embodiment described above is only schematical, for example, the unit
Division, only a kind of division of logic function, can there is other dividing mode, for example, multiple units or group when actually realizing
Part can combine or be desirably integrated into another system, or some features can be ignored, or not perform.It is another, it is shown
Or the mutual coupling discussed or direct-coupling or communication connection can be by some interfaces, device or unit it is indirect
Coupling or communication connection, can be electrical, mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list
Member can both be realized in the form of hardware, can also be realized in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in one and computer-readable deposit
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are causing a computer
It is each that device (can be personal computer, server, or network equipment etc.) or processor (Processor) perform the present invention
The part steps of embodiment methods described.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (Read-
Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various
Can be with the medium of store program codes.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
God any modification, equivalent substitution and improvements done etc., should be included within the scope of protection of the invention with principle.
Claims (10)
- A kind of 1. method of encryption, it is characterised in that suitable for mobile terminal, methods described includes:Obtain the initial short message verification code for specifying the server of application to send;The initial short message verification code is encrypted according to specified rule;Short message verification code after display encryption.
- 2. according to the method for claim 1, it is characterised in that the server for obtaining specified application sends initial short Before believing identifying code, in addition to:Obtain the rule specified that user is set;The rule specified is stored in designated area.
- 3. according to the method for claim 2, it is characterised in that the rule specified is included in initial short message verification code All numerical value add 1, change the order or second of initial short message verification code and the 3rd is right of initial short message verification code The numerical value answered adds at least one of 1 rule.
- 4. according to the method for claim 3, it is characterised in that the rule specified for obtaining user and setting Before, in addition to:When user access set encryption rule function, with set it is described specify rule when, obtain user input login it is close Code;Judge whether the login password of user's input matches with default login password;When the login password for judging user's input matches with default login password, the function that encryption rule is set is accessed, So that user sets the rule specified.
- 5. according to the method for claim 4, it is characterised in that the default login password is stored in specified location, institute State specified location and be in hidden state, it is described after the login password for judging user's input matches with default login password Method also includes:Obtain the display authority of the specified location and show the specified location, so that user changes login password.
- 6. a kind of device of encryption, it is characterised in that suitable for mobile terminal, described device includes:First acquisition unit, the initial short message verification code for specifying the server of application to send for obtaining;Ciphering unit, for the initial short message verification code to be encrypted according to specified rule;Display unit, for showing the short message verification code after encrypting.
- 7. device according to claim 6, it is characterised in that described device also includes:Second acquisition unit, for obtaining the rule specified of user's setting;Memory cell, for the rule specified to be stored in into designated area.
- 8. device according to claim 7, it is characterised in that the rule specified is included in initial short message verification code All numerical value add 1, change the order or second of initial short message verification code and the 3rd is right of initial short message verification code The numerical value answered adds at least one of 1 rule.
- 9. device according to claim 8, it is characterised in that described device also includes:3rd acquiring unit, for when user access set encryption rule function, with set it is described specify rule when, obtain The login password of user's input;Judging unit, for judging whether the login password of user's input matches with default login password;Access unit, add for when the login password for judging user's input matches with default login password, accessing to set Close regular function, so that user sets the rule specified.
- 10. device according to claim 9, it is characterised in that the default login password is stored in specified location, institute State specified location and be in hidden state, it is described after the login password for judging user's input matches with default login password Device also includes:4th acquiring unit, for obtaining the display authority of the specified location and showing the specified location, so that user repaiies Change login password.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710325458.8A CN107426163A (en) | 2017-05-10 | 2017-05-10 | A kind of method and device of encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710325458.8A CN107426163A (en) | 2017-05-10 | 2017-05-10 | A kind of method and device of encryption |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107426163A true CN107426163A (en) | 2017-12-01 |
Family
ID=60425699
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710325458.8A Pending CN107426163A (en) | 2017-05-10 | 2017-05-10 | A kind of method and device of encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107426163A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110830930A (en) * | 2019-11-19 | 2020-02-21 | 东北石油大学 | Verification code anti-sniffing processing method and device |
CN112364318A (en) * | 2020-11-24 | 2021-02-12 | 北京海联捷讯科技股份有限公司 | Operation and maintenance big data security management method, system, terminal and storage medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101056196A (en) * | 2006-04-12 | 2007-10-17 | 腾讯科技(深圳)有限公司 | Secure login method, client and its server |
CN102316120A (en) * | 2011-10-17 | 2012-01-11 | 北京信息科技大学 | Dynamic password lock based on network privacy protection |
CN102638447A (en) * | 2012-02-10 | 2012-08-15 | 宗祥后 | Method and device for system login based on autonomously generated password of user |
CN104320767A (en) * | 2014-11-10 | 2015-01-28 | 吴东辉 | Short message verification system and method |
US20150365232A1 (en) * | 2014-06-13 | 2015-12-17 | BicDroid Inc. | Methods, systems and computer program product for providing verification code recovery and remote authentication |
CN105184567A (en) * | 2015-08-26 | 2015-12-23 | 宇龙计算机通信科技(深圳)有限公司 | Information processing method, processing device and mobile terminal |
CN105426712A (en) * | 2014-09-04 | 2016-03-23 | 中兴通讯股份有限公司 | Application encryption method and apparatus |
CN105554741A (en) * | 2015-06-30 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Communication information transmission method and system, and apparatus |
CN106101064A (en) * | 2016-05-27 | 2016-11-09 | 深圳市永兴元科技有限公司 | Account login method and device |
CN106331331A (en) * | 2016-08-18 | 2017-01-11 | 中国联合网络通信集团有限公司 | Display method, generation method and display device for terminal information and server |
-
2017
- 2017-05-10 CN CN201710325458.8A patent/CN107426163A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101056196A (en) * | 2006-04-12 | 2007-10-17 | 腾讯科技(深圳)有限公司 | Secure login method, client and its server |
CN102316120A (en) * | 2011-10-17 | 2012-01-11 | 北京信息科技大学 | Dynamic password lock based on network privacy protection |
CN102638447A (en) * | 2012-02-10 | 2012-08-15 | 宗祥后 | Method and device for system login based on autonomously generated password of user |
US20150365232A1 (en) * | 2014-06-13 | 2015-12-17 | BicDroid Inc. | Methods, systems and computer program product for providing verification code recovery and remote authentication |
CN105426712A (en) * | 2014-09-04 | 2016-03-23 | 中兴通讯股份有限公司 | Application encryption method and apparatus |
CN104320767A (en) * | 2014-11-10 | 2015-01-28 | 吴东辉 | Short message verification system and method |
CN105554741A (en) * | 2015-06-30 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Communication information transmission method and system, and apparatus |
CN105184567A (en) * | 2015-08-26 | 2015-12-23 | 宇龙计算机通信科技(深圳)有限公司 | Information processing method, processing device and mobile terminal |
CN106101064A (en) * | 2016-05-27 | 2016-11-09 | 深圳市永兴元科技有限公司 | Account login method and device |
CN106331331A (en) * | 2016-08-18 | 2017-01-11 | 中国联合网络通信集团有限公司 | Display method, generation method and display device for terminal information and server |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110830930A (en) * | 2019-11-19 | 2020-02-21 | 东北石油大学 | Verification code anti-sniffing processing method and device |
CN112364318A (en) * | 2020-11-24 | 2021-02-12 | 北京海联捷讯科技股份有限公司 | Operation and maintenance big data security management method, system, terminal and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9930040B2 (en) | System and method for provisioning a security token | |
US8438620B2 (en) | Portable device for clearing access | |
EP2992472B1 (en) | User authentication | |
CN107864115A (en) | A kind of method that user account login authentication is carried out using portable terminal | |
CN107113613B (en) | Server, mobile terminal, network real-name authentication system and method | |
TR201810890T4 (en) | A method and system that protects against identity theft or copy abuse. | |
JP2002215582A (en) | Method and device for authentication | |
CN106293816B (en) | A method of increasing the viscosity of the App of user and mobile intelligent terminal installation | |
JP6284088B2 (en) | Identity verification and anti-theft system and method using a one-time random key | |
CN103795724A (en) | Method for protecting account security based on asynchronous dynamic password technology | |
CN101335619A (en) | Authorized using method of disposal dynamic cipher telephone or short message | |
CN108965222A (en) | Identity identifying method, system and computer readable storage medium | |
CN101051905A (en) | Agent identity certificiation method | |
CN105635075A (en) | Method of registering cloud terminal, cloud terminal, cloud server and cloud system | |
CN107846406A (en) | A kind of account logon method and device | |
CN104853030B (en) | The method and mobile terminal of a kind of information processing | |
CN103401686B (en) | A kind of user's OTP WEB Authentication System and application process thereof | |
CN107835162B (en) | Software digital permit server gives the method and software digital permit server that permission is signed and issued in the license of software developer's software digital | |
CN107241362B (en) | Method and device for identifying identity of verification code input user | |
CN106685945B (en) | Service request processing method, service handling number verification method and terminal thereof | |
CN109587683B (en) | Method and system for preventing short message from being monitored, application program and terminal information database | |
CN106529232A (en) | Startup method and device | |
CN106851613A (en) | Service request method, the verification method of business handling number and its terminal | |
CN107426163A (en) | A kind of method and device of encryption | |
CN105590044A (en) | Information authentication method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171201 |
|
RJ01 | Rejection of invention patent application after publication |