CN107426163A - A kind of method and device of encryption - Google Patents

A kind of method and device of encryption Download PDF

Info

Publication number
CN107426163A
CN107426163A CN201710325458.8A CN201710325458A CN107426163A CN 107426163 A CN107426163 A CN 107426163A CN 201710325458 A CN201710325458 A CN 201710325458A CN 107426163 A CN107426163 A CN 107426163A
Authority
CN
China
Prior art keywords
user
rule
short message
specified
login password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710325458.8A
Other languages
Chinese (zh)
Inventor
王晶晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tinno Wireless Technology Co Ltd
Original Assignee
Shenzhen Tinno Wireless Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tinno Wireless Technology Co Ltd filed Critical Shenzhen Tinno Wireless Technology Co Ltd
Priority to CN201710325458.8A priority Critical patent/CN107426163A/en
Publication of CN107426163A publication Critical patent/CN107426163A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiments of the invention provide a kind of method and device of encryption, it is related to communication technical field, the short message verification code that server is sent can be modified by using specified encryption rule, and then improve the confidentiality of identifying code, ensure the person of user and the safety of property.This method includes:First, the initial short message verification code for specifying the server of application to send is obtained;Then, the initial short message verification code is encrypted according to specified rule;Again, the short message verification code after display encryption.Technical scheme provided in an embodiment of the present invention is applied to during being authenticated, paid with short message verification code etc..

Description

A kind of method and device of encryption
【Technical field】
The present invention relates to communication technical field, more particularly to a kind of method and device of encryption.
【Background technology】
With the development of the communication technology, application market releases increasingly application software, provides the user more abundant answer With service.In order to facilitate use, user uses the SIM of oneself mostly when registering the login account of each application (Subscriber Identity Module, client identification module) number is registered, by by these application and the SIM of oneself Number binding, when forgetting login password or changes some information, or during for e-payment, using oneself No. SIM, The identifying code that each application server is sent is obtained, by inputting the identifying code, application is logged in, completes modification or the electricity of information Son is paid.
During the present invention is realized, inventor has found that prior art at least has problems with:
After the communication equipment of user is lost or be stolen, other users need to only use No. SIM work of the communication equipment For login account, the various login passwords using account are changed using the short message verification code can of reception, obtain the user's Information, the wealth of user is usurped, the personal safety and property for making user are on the hazard.
【The content of the invention】
In view of this, the embodiments of the invention provide a kind of method and device of encryption, checking is improved to a certain extent The confidentiality of code, ensure the person of user and the safety of property.
On the one hand, the embodiments of the invention provide a kind of method of encryption, suitable for mobile terminal, methods described bag Include:
Obtain the initial short message verification code for specifying the server of application to send;
The initial short message verification code is encrypted according to specified rule;
Short message verification code after display encryption.
Aspect as described above and any implementation, it is further provided a kind of implementation, the acquisition is specified should Before the initial short message verification code that server is sent, in addition to:
Obtain the rule specified that user is set;
The rule specified is stored in designated area.
Aspect as described above and any implementation, it is further provided a kind of implementation, the rule specified Including all numerical value in initial short message verification code are added into the 1, order of the initial short message verification code of change or test initial short message The second and the 3rd corresponding numerical value for demonstrate,proving code add at least one of 1 rule.
Aspect as described above and any implementation, it is further provided a kind of implementation, the acquisition user set Before the rule specified put, in addition to:
When user access set encryption rule function, with set it is described specify rule when, obtain user input step on Record password;
Judge whether the login password of user's input matches with default login password;
When the login password for judging user's input matches with default login password, the work(that encryption rule is set is accessed Can, so that user sets the rule specified.
Aspect as described above and any implementation, it is further provided a kind of implementation, the default login Password storage is in hidden state in specified location, the specified location, when the login password for judging user's input and presets Login password matching after, methods described also includes:
Obtain the display authority of the specified location and show the specified location, so that user changes login password.
On the other hand, the embodiment of the present invention additionally provides a kind of device of encryption, suitable for mobile terminal, described device Including:
First acquisition unit, the initial short message verification code for specifying the server of application to send for obtaining;
Ciphering unit, for the initial short message verification code to be encrypted according to specified rule;
Display unit, for showing the short message verification code after encrypting.
Aspect as described above and any implementation, it is further provided a kind of implementation, described device also include:
Second acquisition unit, for obtaining the rule specified of user's setting;
Memory cell, for the rule specified to be stored in into designated area.
Aspect as described above and any implementation, it is further provided a kind of implementation, the rule specified Including all numerical value in initial short message verification code are added into the 1, order of the initial short message verification code of change or test initial short message The second and the 3rd corresponding numerical value for demonstrate,proving code add at least one of 1 rule.
Aspect as described above and any implementation, it is further provided a kind of implementation, described device also include:
3rd acquiring unit, for when user access set encryption rule function, with set it is described specify rule when, Obtain the login password of user's input;
Judging unit, for judging whether the login password of user's input matches with default login password;
Access unit, for when the login password for judging user's input matches with default login password, access to be set The function of encryption rule is put, so that user sets the rule specified.
Aspect as described above and any implementation, it is further provided a kind of implementation, the default login Password storage is in hidden state in specified location, the specified location, when the login password for judging user's input and presets Login password matching after, described device also includes:
4th acquiring unit, for obtaining the display authority of the specified location and showing the specified location, to use Change login password in family.
The method and device of encryption provided in an embodiment of the present invention, by the clothes for each application for arriving acquisition for mobile terminal The initial short message verification code that device is sent of being engaged in is encrypted according to specified rule, then initial short-message verification is revised as to the short message of mistake Identifying code, the wrong short message verification code is shown to user, if the user knows the encryption rule specified, can be got Correct initial short message verification code;And if the user does not know the encryption rule specified, will be unable to obtain correctly initial short Identifying code is believed, so that each application or progress electronics branch can just be logged in by only knowing the user for the encryption rule specified Pay, and then improve the confidentiality of identifying code, ensure the person of user and the safety of property.
【Brief description of the drawings】
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by embodiment it is required use it is attached Figure is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this area For those of ordinary skill, without having to pay creative labor, it can also be obtained according to these accompanying drawings other attached Figure.
Fig. 1 is a kind of method flow diagram of encryption provided in an embodiment of the present invention;
Fig. 2 is the method flow diagram of another encryption provided in an embodiment of the present invention;
Fig. 3 is the method flow diagram of another encryption provided in an embodiment of the present invention;
Fig. 4 is the method flow diagram of another encryption provided in an embodiment of the present invention;
Fig. 5 is a kind of composition frame chart of encryption device provided in an embodiment of the present invention;
Fig. 6 is the composition frame chart of another encryption device provided in an embodiment of the present invention;
Fig. 7 is the composition frame chart of another encryption device provided in an embodiment of the present invention;
Fig. 8 is the composition frame chart of another encryption device provided in an embodiment of the present invention.
【Embodiment】
In order to be better understood from technical scheme, the embodiment of the present invention is retouched in detail below in conjunction with the accompanying drawings State.
It will be appreciated that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Base Embodiment in the present invention, those of ordinary skill in the art obtained under the premise of creative work is not paid it is all its Its embodiment, belongs to the scope of protection of the invention.
The term used in embodiments of the present invention is only merely for the purpose of description specific embodiment, and is not intended to be limiting The present invention." one kind ", " described " and "the" of singulative used in the embodiment of the present invention and appended claims It is also intended to including most forms, unless context clearly shows that other implications.
It will be appreciated that though acquiring unit, but this may be described using term first, second in embodiments of the present invention A little acquiring units should not necessarily be limited by these terms.These terms are only used for acquiring unit being distinguished from each other out.For example, this is not being departed from In the case of inventive embodiments scope, first acquisition unit can also be referred to as second acquisition unit, and similarly, second obtains list Member can also be referred to as first acquisition unit.
Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determining " or " in response to detection ".Similarly, depending on linguistic context, phrase " if it is determined that " or " if detection (condition or event of statement) " can be construed to " when it is determined that when " or " in response to determine " or " when the detection (condition of statement Or event) when " or " in response to detecting (condition or event of statement) ".
The embodiments of the invention provide a kind of method of encryption, during mobile terminal, as shown in figure 1, described Method includes:
Wherein, the mobile terminal in the embodiment of the present invention can include but is not limited to personal computer (Personal Computer, PC), personal digital assistant (Personal Digital Assistant, PDA), radio hand-held equipment, flat board electricity Brain (Tablet Computer), mobile phone etc..
101st, the initial short message verification code for specifying the server of application to send is obtained.
In this kind of short message for being used to verify that the server of application is sent, " check code ", " checking are had in its short message The keyword such as code " or " dynamic code ".After mobile terminal receives short message, first judge whether there is above-mentioned key in the short message Word, after it is determined that above-mentioned keyword be present, extract the initial short message verification code in the short message.
102nd, the initial short message verification code is encrypted according to specified rule.
Mobile terminal passes through certain algorithm process according to the encryption rule specified, by the initial short message verification code It is converted into ill-formalness corresponding with the rule that this is specified.
Specifically, the rule for example specified is by the order of reverse initial short message verification code, got in mobile initial Short message verification code is " 4369 ", then mobile terminal tests initial short message according to specified rule after certain algorithm process Card code is changed into the form of " 9634 ";Or the rule specified is that all numerical value of initial short message verification code are added into 1, then mobile terminal According to specified rule after certain algorithm process, initial short message verification code is changed into the form of " 5470 ".It is worth explanation , above-mentioned is only two kinds of concrete application citings according to specified rule encryption to initial short message verification code, and the present invention is to this tool Body implementation does not limit.
103rd, the short message verification code after display encryption.
Because the short message verification code that mobile terminal is shown to user is not the initial short message for the server transmission for specifying application Identifying code, knowing how the user of the short message verification code shown to the mobile terminal knows the encryption rule of initial short message verification code Then, the user can be easily obtained initial short message verification code;And knowing how the short-message verification shown to the mobile terminal The user of code does not know the encryption rule of initial short message verification code, and the user can not learn initial short message verification code.
The method of encryption provided in an embodiment of the present invention, sent out by the server for each application for arriving acquisition for mobile terminal The initial short message verification code sent is encrypted according to specified rule, then initial short-message verification is revised as to the short-message verification of mistake Code, user is shown to by the wrong short message verification code, if the user knows the encryption rule specified, can be got correct Initial short message verification code;And if the user does not know the encryption rule specified, it will be unable to obtain correctly initial short message and test Code is demonstrate,proved, so that each application or progress e-payment can just be logged in by only knowing the user for the encryption rule specified, And then the confidentiality of identifying code is improved, ensure the person of user and the safety of property.
Further, in order to ensure the encryption rule of short message verification code uniqueness, while the user using the method is also allowed Initial short message verification code can be easier to learn, encryption rule can be set by user according to the custom of itself, based on this, The embodiments of the invention provide another implementation method, as shown in Fig. 2 obtaining the specified server applied performing step 101 Before the initial short message verification code sent, it is also necessary to perform step 104,105, step 104,105 specifically include:
104th, the rule specified that user is set is obtained.
Wherein, the regular form specified have it is a variety of, specifically, include but is not limited to will be initial short for the rule specified All numerical value in letter identifying code add 1, change the order of initial short message verification code or the second by initial short message verification code Add at least one of 1 rule with the 3rd corresponding numerical value.The embodiment of the present invention is not limited specified regular form.
105th, the rule specified is stored in designated area.
Wherein, after the rule specified user set preserves, the storage zone is hidden.Therefore, in acquiescence feelings The regular designated area specified is stored under condition and is in hidden state, user can not know the information stored in the designated area, User the short message correlation function in removing mobile terminal it is data cached when, it is impossible to remove the rule specified.User passes through When factory reset or refitting system are carried out to mobile terminal, the data in the designated area can not be eliminated.
Further, with reference to foregoing schemes, in order to ensure the confidentiality and security of the encryption rule of user's setting, acquiescence In the case of user set the rule specified be hidden, when user want change oneself set the rule specified when, this Inventive embodiments provide another implementation method, as shown in figure 3, obtaining the rule specified of user's setting in step 104 Before then, it is also necessary to perform following steps, specifically include:
106th, when user access set encryption rule function, with set it is described specify rule when, obtain user input Login password.
107th, judge whether the login password of user's input matches with default login password.
108th, when the login password for judging user's input matches with default login password, access and encryption rule is set Function so that user sets the rule specified.
The function of mobile terminal accessing encryption rule, the setting interface of encryption rule is recalled, encryption rule is shown to user Setting interface so that user set encryption rule.The concrete form at setting interface of the embodiment of the present invention to encryption rule is not Limit, every any human-computer interaction interface that can allow user that rule setting is encrypted can be setting for the encryption rule Put interface.
Supplementary notes, it is mobile whole when the login password and default login password not timing of judging user's input End can not access the function of setting encryption rule, and mobile terminal does not show the setting interface of encryption rule, and user also will be unable to pair The rule of encryption carries out any modification.
In embodiments of the present invention, user only correctly inputs login password, so that mobile terminal judges that user is defeated The login password entered matches with default login password, and after then accessing the function of setting encryption rule, user can just change Encryption rule;And when the password bad of user's input, user can not change encryption rule, so as to ensure that user is set Encryption rule security, the encryption rule for avoiding mobile terminal user from setting arbitrarily changed by other people, and destroys short message Verify the effect of code encryption.
Further, it is described default in order to ensure the security of the function of the setting encryption rule with reference to foregoing schemes Login password be stored in specified location, the specified location is in hidden state.Therefore, be directed to how to change log in it is close Code, the embodiments of the invention provide a kind of implementation, as shown in figure 4, when the login password for judging user's input and presetting Login password matching after, methods described also includes:
109th, obtain the display authority of the specified location and show the specified location, so that user's modification login is close Code.
For mobile terminal to after storing the position display for presetting login password to user, user can edit the specified location In data, by the specified location data delete, change, so as to reset login password.
Supplementary notes, if the login password of user's input mismatches with default login password, the specified location Still in hiding state, user also will be unable to change login password.
Based on the encryption method in above-described embodiment, the embodiment of the present invention additionally provides a kind of device of encryption, is applied to In mobile terminal, as shown in figure 4, described device includes:
First acquisition unit 21, the initial short message verification code for specifying the server of application to send for obtaining.
Ciphering unit 22, for the initial short message verification code to be encrypted according to specified rule.
Display unit 23, for showing the short message verification code after encrypting.
Optionally, as shown in figure 5, described device also includes:
Second acquisition unit 24, for obtaining the rule specified of user's setting.
Memory cell 25, for the rule specified to be stored in into designated area.
Optionally, the rule specified includes adding 1, change initial short all numerical value in initial short message verification code Believe the order of identifying code or the second of initial short message verification code and the 3rd corresponding numerical value are added at least one of 1 rule Then.
Optionally, as shown in fig. 6, described device also includes:
3rd acquiring unit 26, for accessing the function of setting encryption rule as user, to set the rule specified When, obtain the login password that user inputs.
Judging unit 27, for judging whether the login password of user's input matches with default login password.
Access unit 28, for when the login password for judging user's input matches with default login password, accessing The function of encryption rule is set, so that user sets the rule specified.
Optionally, as shown in figure 8, the default login password is stored in specified location, the specified location is in Hidden state, after the login password for judging user's input matches with default login password, described device also includes:
4th acquiring unit 29, for obtaining the display authority of the specified location and showing the specified location, so that User changes login password.
The device of encryption provided in an embodiment of the present invention, sent out by the server for each application for arriving acquisition for mobile terminal The initial short message verification code sent is encrypted according to specified rule, then initial short-message verification is revised as to the short-message verification of mistake Code, user is shown to by the wrong short message verification code, if the user knows the encryption rule specified, can be got correct Initial short message verification code;And if the user does not know the encryption rule specified, it will be unable to obtain correctly initial short message and test Code is demonstrate,proved, so that each application or progress e-payment can just be logged in by only knowing the user for the encryption rule specified, And then the confidentiality of identifying code is improved, ensure the person of user and the safety of property.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
In several embodiments provided by the present invention, it should be understood that disclosed system, apparatus and method can be with Realize by another way.For example, device embodiment described above is only schematical, for example, the unit Division, only a kind of division of logic function, can there is other dividing mode, for example, multiple units or group when actually realizing Part can combine or be desirably integrated into another system, or some features can be ignored, or not perform.It is another, it is shown Or the mutual coupling discussed or direct-coupling or communication connection can be by some interfaces, device or unit it is indirect Coupling or communication connection, can be electrical, mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, can also be realized in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in one and computer-readable deposit In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are causing a computer It is each that device (can be personal computer, server, or network equipment etc.) or processor (Processor) perform the present invention The part steps of embodiment methods described.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various Can be with the medium of store program codes.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention God any modification, equivalent substitution and improvements done etc., should be included within the scope of protection of the invention with principle.

Claims (10)

  1. A kind of 1. method of encryption, it is characterised in that suitable for mobile terminal, methods described includes:
    Obtain the initial short message verification code for specifying the server of application to send;
    The initial short message verification code is encrypted according to specified rule;
    Short message verification code after display encryption.
  2. 2. according to the method for claim 1, it is characterised in that the server for obtaining specified application sends initial short Before believing identifying code, in addition to:
    Obtain the rule specified that user is set;
    The rule specified is stored in designated area.
  3. 3. according to the method for claim 2, it is characterised in that the rule specified is included in initial short message verification code All numerical value add 1, change the order or second of initial short message verification code and the 3rd is right of initial short message verification code The numerical value answered adds at least one of 1 rule.
  4. 4. according to the method for claim 3, it is characterised in that the rule specified for obtaining user and setting Before, in addition to:
    When user access set encryption rule function, with set it is described specify rule when, obtain user input login it is close Code;
    Judge whether the login password of user's input matches with default login password;
    When the login password for judging user's input matches with default login password, the function that encryption rule is set is accessed, So that user sets the rule specified.
  5. 5. according to the method for claim 4, it is characterised in that the default login password is stored in specified location, institute State specified location and be in hidden state, it is described after the login password for judging user's input matches with default login password Method also includes:
    Obtain the display authority of the specified location and show the specified location, so that user changes login password.
  6. 6. a kind of device of encryption, it is characterised in that suitable for mobile terminal, described device includes:
    First acquisition unit, the initial short message verification code for specifying the server of application to send for obtaining;
    Ciphering unit, for the initial short message verification code to be encrypted according to specified rule;
    Display unit, for showing the short message verification code after encrypting.
  7. 7. device according to claim 6, it is characterised in that described device also includes:
    Second acquisition unit, for obtaining the rule specified of user's setting;
    Memory cell, for the rule specified to be stored in into designated area.
  8. 8. device according to claim 7, it is characterised in that the rule specified is included in initial short message verification code All numerical value add 1, change the order or second of initial short message verification code and the 3rd is right of initial short message verification code The numerical value answered adds at least one of 1 rule.
  9. 9. device according to claim 8, it is characterised in that described device also includes:
    3rd acquiring unit, for when user access set encryption rule function, with set it is described specify rule when, obtain The login password of user's input;
    Judging unit, for judging whether the login password of user's input matches with default login password;
    Access unit, add for when the login password for judging user's input matches with default login password, accessing to set Close regular function, so that user sets the rule specified.
  10. 10. device according to claim 9, it is characterised in that the default login password is stored in specified location, institute State specified location and be in hidden state, it is described after the login password for judging user's input matches with default login password Device also includes:
    4th acquiring unit, for obtaining the display authority of the specified location and showing the specified location, so that user repaiies Change login password.
CN201710325458.8A 2017-05-10 2017-05-10 A kind of method and device of encryption Pending CN107426163A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710325458.8A CN107426163A (en) 2017-05-10 2017-05-10 A kind of method and device of encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710325458.8A CN107426163A (en) 2017-05-10 2017-05-10 A kind of method and device of encryption

Publications (1)

Publication Number Publication Date
CN107426163A true CN107426163A (en) 2017-12-01

Family

ID=60425699

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710325458.8A Pending CN107426163A (en) 2017-05-10 2017-05-10 A kind of method and device of encryption

Country Status (1)

Country Link
CN (1) CN107426163A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110830930A (en) * 2019-11-19 2020-02-21 东北石油大学 Verification code anti-sniffing processing method and device
CN112364318A (en) * 2020-11-24 2021-02-12 北京海联捷讯科技股份有限公司 Operation and maintenance big data security management method, system, terminal and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101056196A (en) * 2006-04-12 2007-10-17 腾讯科技(深圳)有限公司 Secure login method, client and its server
CN102316120A (en) * 2011-10-17 2012-01-11 北京信息科技大学 Dynamic password lock based on network privacy protection
CN102638447A (en) * 2012-02-10 2012-08-15 宗祥后 Method and device for system login based on autonomously generated password of user
CN104320767A (en) * 2014-11-10 2015-01-28 吴东辉 Short message verification system and method
US20150365232A1 (en) * 2014-06-13 2015-12-17 BicDroid Inc. Methods, systems and computer program product for providing verification code recovery and remote authentication
CN105184567A (en) * 2015-08-26 2015-12-23 宇龙计算机通信科技(深圳)有限公司 Information processing method, processing device and mobile terminal
CN105426712A (en) * 2014-09-04 2016-03-23 中兴通讯股份有限公司 Application encryption method and apparatus
CN105554741A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Communication information transmission method and system, and apparatus
CN106101064A (en) * 2016-05-27 2016-11-09 深圳市永兴元科技有限公司 Account login method and device
CN106331331A (en) * 2016-08-18 2017-01-11 中国联合网络通信集团有限公司 Display method, generation method and display device for terminal information and server

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101056196A (en) * 2006-04-12 2007-10-17 腾讯科技(深圳)有限公司 Secure login method, client and its server
CN102316120A (en) * 2011-10-17 2012-01-11 北京信息科技大学 Dynamic password lock based on network privacy protection
CN102638447A (en) * 2012-02-10 2012-08-15 宗祥后 Method and device for system login based on autonomously generated password of user
US20150365232A1 (en) * 2014-06-13 2015-12-17 BicDroid Inc. Methods, systems and computer program product for providing verification code recovery and remote authentication
CN105426712A (en) * 2014-09-04 2016-03-23 中兴通讯股份有限公司 Application encryption method and apparatus
CN104320767A (en) * 2014-11-10 2015-01-28 吴东辉 Short message verification system and method
CN105554741A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Communication information transmission method and system, and apparatus
CN105184567A (en) * 2015-08-26 2015-12-23 宇龙计算机通信科技(深圳)有限公司 Information processing method, processing device and mobile terminal
CN106101064A (en) * 2016-05-27 2016-11-09 深圳市永兴元科技有限公司 Account login method and device
CN106331331A (en) * 2016-08-18 2017-01-11 中国联合网络通信集团有限公司 Display method, generation method and display device for terminal information and server

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110830930A (en) * 2019-11-19 2020-02-21 东北石油大学 Verification code anti-sniffing processing method and device
CN112364318A (en) * 2020-11-24 2021-02-12 北京海联捷讯科技股份有限公司 Operation and maintenance big data security management method, system, terminal and storage medium

Similar Documents

Publication Publication Date Title
US9930040B2 (en) System and method for provisioning a security token
US8438620B2 (en) Portable device for clearing access
EP2992472B1 (en) User authentication
CN107864115A (en) A kind of method that user account login authentication is carried out using portable terminal
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
TR201810890T4 (en) A method and system that protects against identity theft or copy abuse.
JP2002215582A (en) Method and device for authentication
CN106293816B (en) A method of increasing the viscosity of the App of user and mobile intelligent terminal installation
JP6284088B2 (en) Identity verification and anti-theft system and method using a one-time random key
CN103795724A (en) Method for protecting account security based on asynchronous dynamic password technology
CN101335619A (en) Authorized using method of disposal dynamic cipher telephone or short message
CN108965222A (en) Identity identifying method, system and computer readable storage medium
CN101051905A (en) Agent identity certificiation method
CN105635075A (en) Method of registering cloud terminal, cloud terminal, cloud server and cloud system
CN107846406A (en) A kind of account logon method and device
CN104853030B (en) The method and mobile terminal of a kind of information processing
CN103401686B (en) A kind of user's OTP WEB Authentication System and application process thereof
CN107835162B (en) Software digital permit server gives the method and software digital permit server that permission is signed and issued in the license of software developer's software digital
CN107241362B (en) Method and device for identifying identity of verification code input user
CN106685945B (en) Service request processing method, service handling number verification method and terminal thereof
CN109587683B (en) Method and system for preventing short message from being monitored, application program and terminal information database
CN106529232A (en) Startup method and device
CN106851613A (en) Service request method, the verification method of business handling number and its terminal
CN107426163A (en) A kind of method and device of encryption
CN105590044A (en) Information authentication method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171201

RJ01 Rejection of invention patent application after publication