CN107786572A - A kind of verification method of user identity, device and terminal - Google Patents
A kind of verification method of user identity, device and terminal Download PDFInfo
- Publication number
- CN107786572A CN107786572A CN201711083697.3A CN201711083697A CN107786572A CN 107786572 A CN107786572 A CN 107786572A CN 201711083697 A CN201711083697 A CN 201711083697A CN 107786572 A CN107786572 A CN 107786572A
- Authority
- CN
- China
- Prior art keywords
- identifying code
- target verification
- code
- identifying
- verification code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a kind of verification method of user identity, device and terminal.This method includes:The first identifying code set that the reception server is sent, wherein, a target verification code is comprised at least in the first identifying code set, second identifying code set is generated according to the first identifying code set, wherein, the first identifying code set is comprised at least in the second identifying code set, each target verification code is marked in the first identifying code set, the alternative identifying code that user selects according to the target verification code after mark is received, the identity of the user is verified according to each alternative identifying code and each target verification code.Technical scheme provided by the invention solves the problems, such as that identifying code judges that selection is more time-consuming, to realize the recognition time for shortening identifying code, improves the efficiency of identifying code selection.
Description
Technical field
The present embodiments relate to Internet technology, more particularly to a kind of verification method of user identity, device and terminal.
Background technology
It is more and more using the occasion of identifying code with the continuous development of Internet technology, such as:Account Registration, account
Log in and obtain public wireless fidelity (Wireless Fidelity, WIFI) account number cipher etc..
At present, common checking flow is as follows:1st, user applies obtaining identifying code;2nd, server receives request, to visitor
Family end sends identifying code;3rd, user receives identifying code, and the input validation code in input frame in client, then sends;4、
Server receives the identifying code that client is sent, and verifies to mistake, and is prompted to user.In whole flow process, the 3rd step consumes the most
When, the inherently time-consuming operation of user inputs character, if along with the switching of input method, it is just more time-consuming.It is existing
Solution, Alibaba《Verification method, the apparatus and system of checking information》, CN105791246A, using using boundary
Display is currently needed for the code to be verified of checking on face, receives the identifying code that user selects in alternative identifying code set, will use
The alternative identifying code that family selects in alternative identifying code set is matched with code to be verified, generates the result, wherein,
The alternative identifying code and the matching degree of code to be verified that user selects in the identifying code set on standby side are more than or equal to matching threshold
In the case of, it is proved to be successful, otherwise, authentication failed, having reached reduces the high purpose of checking information error rate for input, and then solves
Due to the easy input error of content in checking information during being confirmed due to current authentication information, so as to cause verification efficiency low
Technical problem.
However, needing user to select correct identifying code in numerous characters in existing technical scheme, judge to select
The process for selecting correct characters is still time-consuming longer.
The content of the invention
The present invention provides a kind of verification method of user identity, device and terminal, judges selection more to solve identifying code
The problem of time-consuming, to realize the recognition time for shortening identifying code, improve the efficiency of identifying code selection.
In a first aspect, the embodiments of the invention provide a kind of verification method of user identity, including:
The first identifying code set that the reception server is sent;Wherein, one is comprised at least in the first identifying code set
Target verification code;
Second identifying code set is generated according to the first identifying code set;Wherein, in the second identifying code set extremely
Include the first identifying code set less;
Each target verification code is marked in the first identifying code set;
The alternative identifying code that user selects according to the target verification code after mark is received, according to each alternative identifying code and respectively
Individual target verification code is verified to the identity of the user.
Second aspect, the embodiment of the present invention additionally provide a kind of checking device of user identity, including:
First identifying code receiving module, the first identifying code set sent for the reception server;Wherein, described first test
Card code collection comprises at least a target verification code in closing;
Second identifying code generation module, for generating the second identifying code set according to the first identifying code set;Wherein,
The first identifying code set is comprised at least in the second identifying code set;
Target verification code labeling module, for each target verification code to be entered into rower in the first identifying code set
Note;
Target verification code authentication module, the alternative checking selected for receiving user according to the target verification code after mark
Code, the identity of the user is verified according to each alternative identifying code and each target verification code.
The third aspect, the embodiment of the present invention additionally provide a kind of terminal, and the terminal is integrated with as in above-mentioned second aspect
The checking device of user identity described in any one.
The first identifying code set that the embodiment of the present invention is sent by the reception server, wherein, the first checking code collection
A target verification code is comprised at least in conjunction, the second identifying code set is generated according to the first identifying code set, wherein, it is described
The first identifying code set is comprised at least in second identifying code set, tests each target in the first identifying code set
Card code is marked, and receives the alternative identifying code that user selects according to the target verification code after mark, according to each alternative checking
Code and each target verification code are verified to the identity of the user.Technical scheme provided by the invention solves identifying code and sentenced
The problem of disconnected selection more takes, to realize the recognition time for shortening identifying code, improve the efficiency of identifying code selection.
Brief description of the drawings
Fig. 1 is a kind of flow chart of the verification method for user identity that the embodiment of the present invention one provides.
Fig. 2 is a kind of flow chart of the verification method for user identity that the embodiment of the present invention two provides.
Fig. 3 is a kind of structural representation of the checking device for user identity that the embodiment of the present invention three provides.
Fig. 4 is a kind of structural representation for terminal that the embodiment of the present invention four provides.
Embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining the present invention, rather than limitation of the invention.It also should be noted that in order to just
Part related to the present invention rather than entire infrastructure are illustrate only in description, accompanying drawing.
Embodiment one
Fig. 1 is a kind of flow chart of the verification method for user identity that the embodiment of the present invention one provides, and the present embodiment can fit
For the situation of authentication, this method can be performed by the checking device of user identity, the device can have software and/or
Hardware is realized, is specifically comprised the following steps:
The first identifying code set that S110, the reception server are sent;Wherein, one is comprised at least in the first identifying code set
Target verification code.
The present embodiment is applicable to headend equipment, and the headend equipment can be that terminal can also be intelligent movable end
End.
In a particular embodiment of the present invention, the first identifying code set refers to the identifying code set that server is sent,
Refer to the identifying code set at least by a target verification code character including at least a target verification code in first identifying code set
Into target verification code can be numeral, letter or Chinese character.Identifying code set can be any one in numeral, letter or Chinese character
The combination of kind can also be two kinds or two or more combinations.The character quantity of identifying code set can also be carried out as needed
Set.Exemplary, the identifying code set can be " 1234 ", " 12ab " and " 1a landscape ".The character types of target verification code
More, the security of data message is higher.
S120, according to the first identifying code set generate the second identifying code set;Wherein, at least wrapped in the second identifying code set
Include the first identifying code set.
In the present embodiment, the first identifying code set in above-mentioned steps 110, adds some non-targeted checkings at random
The character of code generates a second identifying code set.Second identifying code set must include the first identifying code set.It is exemplary
, when the first identifying code collection is combined into " 1234 ", the second identifying code set can be " 12345678 " or " 55123466 " etc.
Deng;When the first identifying code collection is combined into " 12ab ", the second identifying code set can be " 12ab34cd " or " 3412abcd " etc.
Deng.
Character in non-first identifying code set can be that client uses character after the first identifying code set is received
Generate Software Create;An identifying code character repertoire can also be pre-set, various characters are store in identifying code character repertoire
Set, after the first identifying code set is received, scans in identifying code character repertoire, excludes the word containing target verification code
Symbol set, a character set is randomly choosed in the character combination for not containing target verification code, it is charge-coupled with the first identifying code collection
Into the second identifying code set.
S130, each target verification code is marked in the first identifying code set.
In the present embodiment, each target verification code is marked in the first identifying code set and refers to verify to first
Each target verification code during code collection is closed adds special marking, can be font-weight, colouring discrimination, different fonts or font
Upset, inclination etc..Character in non-first identifying code set is without specially treated, normal display.Exemplary, the first checking
When code collection is combined into " 12ab ", when the second identifying code set can be " 1cd3e25fgh6a98bh ", by the first identifying code set
" 12ab " carries out special marking, as shown in table 1 below.
The target verification code of table 1 has the second identifying code set of special marking
1 | c | d | 3 |
e | 2 | 5 | f |
g | h | 6 | a |
9 | 8 | b | h |
In the display interface display of client, all words in the second all identifying code set can be disposably shown
Symbol.Target verification code can also be subjected to Special display after the second identifying code set is shown.
By target verification code progress special marking be in order to when the identifying code of second set include in client end interface when, visitor
Family can be quickly identification and select correct identifying code, substantially increase identifying code identification and selection speed.
S140, the alternative identifying code that user selects according to the target verification code after mark is received, according to each alternative checking
Code and each target verification code are verified to the identity of user.
In the present embodiment, when user clicks on the character in the second identifying code set shown on client display interface
When, client terminal receives the alternative identifying code of user's selection, and the alternative identifying code refers to user in the second identifying code set
The character selected, alternative identifying code are probably correct, it is also possible to mistake.
Judge whether each alternative identifying code and each target verification code are identical successively;When each alternative identifying code and each
Simultaneously, the authentication to user passes through target verification code-phase.
Three kinds of proof schemes are provided in the present embodiment.The first proof scheme, client reception user select standby
After selecting identifying code, client judges whether each alternative identifying code and each target verification code are identical;When each alternative checking
Simultaneously, the authentication to user is by the way that the message being verified is sent to server, clothes for code and each target verification code-phase
Business device allows user to carry out next step operation after receiving the message that authentication passes through.If checking is not by directly in visitor
The interface display checking of family end is not by re-entering alternative identifying code, client is then verified, until being verified.
Second of proof scheme, after client receives the alternative identifying code that user selects, client is standby by what is received
Select identifying code to send to server, make server to judge whether each alternative identifying code and each target verification code are identical, when
Simultaneously, the authentication to user passes through for each alternative identifying code and each target verification code-phase.When authentication by when, permit
Family allowable carries out next step operation.If checking by the message of " identifying code input error " by not sending to client and carrying out
It has been shown that, meanwhile, client receives the alternative identifying code that user re-enters.Further, do not pass through in the checking of alternative identifying code
When, server can resend the first new identifying code collection and be bonded to client, client executing step 110, until checking is logical
Cross or user log off, abandon input validation code.
The third proof scheme, according to circumstances come select using the first proof scheme or use second of authentication
Case.Exemplary, when client is established with server by way of mobile data cube computation and connected, use the first authentication
Case;When client is established with server by way of non-moving data connect and connected, second of proof scheme is used.May be used also
To be determined according to network data transmission rate, when network data transmission rate is fast, the first proof scheme is used;Work as network
When message transmission rate is slow, second of proof scheme is used.
The first identifying code set that technical scheme provided in an embodiment of the present invention is sent by the reception server, wherein, the
A target verification code is comprised at least in one identifying code set, the second identifying code set is generated according to the first identifying code set, its
In, the first identifying code set is comprised at least in the second identifying code set, by each target verification code in the first identifying code set
Be marked, receive the alternative identifying code that user selects according to the target verification code after mark, according to each alternative identifying code and
Each target verification code is verified to the identity of user.Technical scheme provided by the invention solve identifying code judge selection compared with
The problem of to take, to realize the checking duration for shortening identifying code, improve the efficiency of identifying code selection.
Embodiment two
Fig. 2 is a kind of flow chart of the verification method for user identity that the embodiment of the present invention two provides, and the present embodiment is upper
On the basis of stating each embodiment, the verification method of user identity is optimized, is specifically comprised the following steps:
S210, the request message for obtaining the first identifying code set is sent to server.
In the present embodiment, the request message for sending the first identifying code set of acquisition refers to user in the interface of client
The module of the solicited message of the first identifying code set is clicked on, or with the addition of in access request and obtain the first checking code collection
The instruction of the request message of conjunction.
S220, perform the first identifying code set that the reception server is sent.
The first identifying code set that S230, the reception server are sent;Wherein, one is comprised at least in the first identifying code set
Target verification code.
S240, according to the first identifying code set generate the second identifying code set;Wherein, at least wrapped in the second identifying code set
Include the first identifying code set.
S250, each target verification code is marked in the first identifying code set.
S260, determine display order of each target verification code in the first identifying code set.
In the present embodiment, on the basis of each target verification code is marked in the first identifying code set, one is entered
Step determines display order of each target verification code in the first identifying code set, that is, determines the sequencing of target verification code.
Exemplary, it is " 12ab " or " 1a2b " to determine identifying code.
Step S270, the display order according to each target verification code in the first identifying code set, tested for each target
Code division is demonstrate,proved with the corresponding display time.
In the present embodiment, on the basis of each target verification code is marked in the first identifying code set, according to
The sequencing of target verification code is each target verification code division with the corresponding display time.
It is descending to be followed successively by each target according to display order of each target verification code in the first identifying code set
The display time corresponding to identifying code distribution;Or the display order according to each target verification code in the first identifying code set,
It is ascending to be followed successively by each target verification code division with the corresponding display time.
Further, different display actions can also be distributed according to different characters, is illustrated exemplified by following table.When
When first identifying code collection is combined into " 12ab ", when the second identifying code set can be " 1cd3e25fgh6a98bh ", by the first checking
Code collection closes " 12ab " and carries out special marking, and the time each distributed according to it is shown that as shown in table 2 below is the second checking
Code collection is closed.
The target verification code of table 2 has the second identifying code set of display time
Exemplary, the display time of character " 1 " is arranged to display 2 seconds, the display time of character " 2 " is arranged to show
2 seconds, the display time of character " a " is arranged to display 2 seconds, the display time of character " b " is arranged to display 2 seconds.By character
The display action of " 1 " is arranged to " flash ", the display action of character " 2 " is arranged into " spinning upside down ", by character " a " display
Action is arranged to " left and right upset ", the display action of character " b " is arranged to " to rotate " etc..Shown in client display interface
When, the second identifying code set integrally shows that target verification code is shown according to default time and action.Tested with protruding target
Card code allows user to select correct identifying code within the most short time.
Further, the display order according to each target verification code in the first identifying code set, can also distribute each
Start to show the moment corresponding to individual target verification code and stop showing the moment.Further, previous target verification code is opened
Begin to show the moment and stop showing that the difference at moment starts to show that the moment tests with the latter target less than previous target verification code
Card code starts to show the difference at moment.I.e. the latter target verification code can just enter after previous target verification code stops display
Row display.
S280, show that the time is shown each target verification code according to corresponding to each target verification code.
In the present embodiment, can be with according to being to be shown the corresponding time that each target verification code division is matched somebody with somebody in step 270
Make the correct order of the identification target verification code of user quickly.
S290, the alternative identifying code that user selects according to the target verification code after mark is received, according to each alternative checking
Code and each target verification code are verified to the identity of user.
Technical scheme provided in an embodiment of the present invention, by the first identifying code set by each target verification code
On the basis of being marked, display order of each target verification code in the first identifying code set is further determined that, according to each
Display order of the target verification code in the first identifying code set is each target verification code division with corresponding display time, root
According to showing that the time is shown each target verification code corresponding to each target verification code.Technical scheme provided by the invention,
The correct order of target verification code can be identified faster, improve the speed of identifying code selection.
Embodiment three
Fig. 3 show a kind of structural representation of the checking device of user identity of the offer of the embodiment of the present invention three, this
Embodiment is applicable to the situation of authentication, and the concrete structure of the checking device of the user identity is as follows:
First identifying code receiving module 310, the first identifying code set sent for the reception server;Wherein, described
A target verification code is comprised at least in one identifying code set.
Second identifying code generation module 320, for generating the second identifying code set according to the first identifying code set;Its
In, the first identifying code set is comprised at least in the second identifying code set.
Target verification code labeling module 330, for carrying out each target verification code in the first identifying code set
Mark.
Target verification code authentication module 340, alternatively tested according to what the target verification code after mark selected for receiving user
Code is demonstrate,proved, the identity of the user is verified according to each alternative identifying code and each target verification code.
Wherein, the device this include:First identifying code request module, for the first identifying code sent in the reception server
Before set, the request message for obtaining the first identifying code set is sent to the server.Execution module is received, for holding
Row receives the first identifying code set that the server is sent.
Wherein, the device this include:Display order determining module, in the first identifying code set by each mesh
After mark identifying code is marked, display order of each target verification code in the first identifying code set is determined.Display
Time distribute module, it is each mesh for the display order according to each target verification code in the first identifying code set
Mark the display time corresponding to identifying code distribution.Display module, for showing that the time will be each according to corresponding to each target verification code
Individual target verification code is shown.
Further, display time distribute module is specifically used for:According to each target verification code in first identifying code
Display order in set, it is descending to be followed successively by each target verification code division with the corresponding display time;Or according to each
Display order of the target verification code in the first identifying code set, it is ascending to be followed successively by each target verification code division pairing
The display time answered.
Further, target verification code authentication module is specifically used for:Each alternative identifying code and each target are judged successively
Whether identifying code is identical;When each alternatively identifying code and each target verification code-phase, simultaneously, the authentication to the user is led to
Cross.
The checking device of the user identity provided in the embodiment of the present invention three, solve identifying code and judge that selection is more time-consuming
The problem of, to realize the checking duration for shortening identifying code, improve the efficiency of identifying code selection.
The said goods can perform the method that any embodiment of the present invention is provided, and possess the corresponding functional module of execution method
And beneficial effect.
Example IV
Fig. 4 is a kind of structural representation for terminal that the embodiment of the present invention four provides.The terminal is integrated with of the invention any
The checking device of the user identity described in any one provided in embodiment.
For example, the terminal includes the first identifying code receiving module, the second identifying code generation module, target verification code labeling mould
Block and target verification code authentication module.
Wherein, the terminal can also determine mould including the first identifying code request module, reception execution module, display order
Block, display time distribute module and display module.
The terminal provided in the embodiment of the present invention four, solve the problems, such as that identifying code judges that selection is more time-consuming, to realize
Shorten the checking duration of identifying code.
Pay attention to, above are only presently preferred embodiments of the present invention and institute's application technology principle.It will be appreciated by those skilled in the art that
The invention is not restricted to specific embodiment described here, can carry out for a person skilled in the art various obvious changes,
Readjust and substitute without departing from protection scope of the present invention.Therefore, although being carried out by above example to the present invention
It is described in further detail, but the present invention is not limited only to above example, without departing from the inventive concept, also
Other more equivalent embodiments can be included, and the scope of the present invention is determined by scope of the appended claims.
Claims (11)
- A kind of 1. verification method of user identity, it is characterised in that including:The first identifying code set that the reception server is sent;Wherein, a target is comprised at least in the first identifying code set Identifying code;Second identifying code set is generated according to the first identifying code set;Wherein, at least wrapped in the second identifying code set Include the first identifying code set;Each target verification code is marked in the first identifying code set;The alternative identifying code that user selects according to the target verification code after mark is received, according to each alternative identifying code and each mesh Mark identifying code is verified to the identity of the user.
- 2. the verification method of user identity according to claim 1, it is characterised in that sent in the reception server Before first identifying code set, methods described also includes:The request message for obtaining the first identifying code set is sent to the server;Perform and receive the first identifying code set that the server is sent.
- 3. the verification method of user identity according to claim 1, it is characterised in that in the first identifying code set After each target verification code is marked, methods described also includes:Determine display order of each target verification code in the first identifying code set;According to display order of each target verification code in the first identifying code set, matched for each target verification code division The display time answered;Show that the time is shown each target verification code according to corresponding to each target verification code.
- 4. the verification method of user identity according to claim 3, it is characterised in that described is each target verification code division With the corresponding display time, including:It is descending to be followed successively by each target according to display order of each target verification code in the first identifying code set The display time corresponding to identifying code distribution;Or the display order according to each target verification code in the first identifying code set, it is ascending to be followed successively by respectively Individual target verification code division is with the corresponding display time.
- 5. the verification method of user identity according to claim 1, it is characterised in that described according to each alternative identifying code The identity of the user is verified with each target verification code, including:Judge whether each alternative identifying code and each target verification code are identical successively;When each alternatively identifying code and each target verification code-phase, simultaneously, the authentication to the user passes through.
- 6. the checking device of a kind of user identity, it is characterised in that described device includes:First identifying code receiving module, the first identifying code set sent for the reception server;Wherein, first identifying code A target verification code is comprised at least in set;Second identifying code generation module, for generating the second identifying code set according to the first identifying code set;Wherein, it is described The first identifying code set is comprised at least in second identifying code set;Target verification code labeling module, for each target verification code to be marked in the first identifying code set;Target verification code authentication module, the alternative identifying code selected for receiving user according to the target verification code after mark, root The identity of the user is verified according to each alternative identifying code and each target verification code.
- 7. the checking device of user identity according to claim 6, it is characterised in that described device also includes:First identifying code request module, for before the first identifying code set for being sent in the reception server, to the service Device sends the request message for obtaining the first identifying code set;Execution module is received, for performing the first identifying code set for receiving the server and sending.
- 8. the checking device of user identity according to claim 6, it is characterised in that described device also includes:Display order determining module, after each target verification code is marked in the first identifying code set, Determine display order of each target verification code in the first identifying code set;Time distribute module is shown, for the display order according to each target verification code in the first identifying code set, It is that each target verification code division shows the time with corresponding;Display module, for showing that the time is shown each target verification code according to corresponding to each target verification code.
- 9. the checking device of user identity according to claim 8, it is characterised in that display time distribute module, specifically It is descending to be followed successively by each target for the display order according to each target verification code in the first identifying code set The display time corresponding to identifying code distribution;Or the display according to each target verification code in the first identifying code set Sequentially, it is ascending to be followed successively by each target verification code division with the corresponding display time.
- 10. the checking device of described user identity according to claim 6, it is characterised in that the target verification code Authentication module, specifically for judging whether each alternative identifying code and each target verification code are identical successively;Alternatively tested when each Demonstrate,prove code and each target verification code-phase simultaneously, the authentication to the user passes through.
- 11. a kind of terminal, it is characterised in that the terminal is integrated with the user identity as described in claim any one of 6-10 Verify device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711083697.3A CN107786572A (en) | 2017-11-07 | 2017-11-07 | A kind of verification method of user identity, device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711083697.3A CN107786572A (en) | 2017-11-07 | 2017-11-07 | A kind of verification method of user identity, device and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107786572A true CN107786572A (en) | 2018-03-09 |
Family
ID=61432860
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711083697.3A Pending CN107786572A (en) | 2017-11-07 | 2017-11-07 | A kind of verification method of user identity, device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107786572A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110022320A (en) * | 2019-04-08 | 2019-07-16 | 北京深思数盾科技股份有限公司 | A kind of communication partner method and communication device |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101976430A (en) * | 2010-10-29 | 2011-02-16 | 赵俊平 | Method for generating picture verification codes and system thereof |
CN101977194A (en) * | 2010-10-29 | 2011-02-16 | 赵俊平 | Third-party verification code system and third-party verification code provision method |
CN103036681A (en) * | 2012-12-13 | 2013-04-10 | 中国工商银行股份有限公司 | Password safety keyboard device and system |
CN103455965A (en) * | 2012-05-30 | 2013-12-18 | 北京小米科技有限责任公司 | Verification image based verification method, device and server |
CN103607400A (en) * | 2013-11-26 | 2014-02-26 | 深圳市掌众信息技术有限公司 | Improved mobile phone identity verification method and system |
CN104243399A (en) * | 2013-06-07 | 2014-12-24 | 腾讯科技(深圳)有限公司 | User identifying method, client, server and system for realizing the method |
CN104346557A (en) * | 2013-08-06 | 2015-02-11 | 深圳市腾讯计算机系统有限公司 | Verification code generation method and device and verification code display control method and device |
CN105323073A (en) * | 2015-11-16 | 2016-02-10 | 腾讯科技(深圳)有限公司 | Identity authentication method, identity authentication device and identity authentication system |
CN105471808A (en) * | 2014-05-28 | 2016-04-06 | 北京搜狗科技发展有限公司 | Identifying code generating method, safety identification method, safety identification device and safety identification system |
CN105791246A (en) * | 2014-12-25 | 2016-07-20 | 阿里巴巴集团控股有限公司 | Information verification method, device and system |
CN106209732A (en) * | 2015-04-30 | 2016-12-07 | 阿里巴巴集团控股有限公司 | A kind of offer method and device of identifying code |
CN106250756A (en) * | 2016-07-29 | 2016-12-21 | 智者四海(北京)技术有限公司 | Generation method, verification method and the related device of identifying code |
US20170093793A1 (en) * | 2015-09-29 | 2017-03-30 | Verisign, Inc. | Domain name operation verification code generation and/or verification |
CN107229857A (en) * | 2016-03-25 | 2017-10-03 | 宇龙计算机通信科技(深圳)有限公司 | The generation method and device of a kind of identifying code |
-
2017
- 2017-11-07 CN CN201711083697.3A patent/CN107786572A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101977194A (en) * | 2010-10-29 | 2011-02-16 | 赵俊平 | Third-party verification code system and third-party verification code provision method |
CN101976430A (en) * | 2010-10-29 | 2011-02-16 | 赵俊平 | Method for generating picture verification codes and system thereof |
CN103455965A (en) * | 2012-05-30 | 2013-12-18 | 北京小米科技有限责任公司 | Verification image based verification method, device and server |
CN103036681A (en) * | 2012-12-13 | 2013-04-10 | 中国工商银行股份有限公司 | Password safety keyboard device and system |
CN104243399A (en) * | 2013-06-07 | 2014-12-24 | 腾讯科技(深圳)有限公司 | User identifying method, client, server and system for realizing the method |
CN104346557A (en) * | 2013-08-06 | 2015-02-11 | 深圳市腾讯计算机系统有限公司 | Verification code generation method and device and verification code display control method and device |
CN103607400A (en) * | 2013-11-26 | 2014-02-26 | 深圳市掌众信息技术有限公司 | Improved mobile phone identity verification method and system |
CN105471808A (en) * | 2014-05-28 | 2016-04-06 | 北京搜狗科技发展有限公司 | Identifying code generating method, safety identification method, safety identification device and safety identification system |
CN105791246A (en) * | 2014-12-25 | 2016-07-20 | 阿里巴巴集团控股有限公司 | Information verification method, device and system |
CN106209732A (en) * | 2015-04-30 | 2016-12-07 | 阿里巴巴集团控股有限公司 | A kind of offer method and device of identifying code |
US20170093793A1 (en) * | 2015-09-29 | 2017-03-30 | Verisign, Inc. | Domain name operation verification code generation and/or verification |
CN105323073A (en) * | 2015-11-16 | 2016-02-10 | 腾讯科技(深圳)有限公司 | Identity authentication method, identity authentication device and identity authentication system |
CN107229857A (en) * | 2016-03-25 | 2017-10-03 | 宇龙计算机通信科技(深圳)有限公司 | The generation method and device of a kind of identifying code |
CN106250756A (en) * | 2016-07-29 | 2016-12-21 | 智者四海(北京)技术有限公司 | Generation method, verification method and the related device of identifying code |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110022320A (en) * | 2019-04-08 | 2019-07-16 | 北京深思数盾科技股份有限公司 | A kind of communication partner method and communication device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104468531B (en) | The authorization method of sensitive data, device and system | |
CN102546914A (en) | Automatic login system based on smart phone and control method | |
CN106384143B (en) | Dynamic electronic two-dimensional code generation method and identification method | |
CN101388078A (en) | Text identification method and device based on verification | |
CN101976430A (en) | Method for generating picture verification codes and system thereof | |
CN105323073A (en) | Identity authentication method, identity authentication device and identity authentication system | |
CN104580264A (en) | Login method, registration method and login device as well as login and refrigeration system | |
CN106713370B (en) | A kind of identity identifying method, server and mobile terminal | |
CN108616360A (en) | User identity verification, register method and device | |
CN106851602A (en) | A kind of transaction system short-message verification method and system | |
CN106385403B (en) | A kind of the user account register method and relevant device of self-help print equipment | |
CN105992204A (en) | Access authentication method of applications of mobile intelligent terminal and device | |
CN109194689B (en) | Abnormal behavior recognition method, device, server and storage medium | |
CN105791246B (en) | Verification method, the apparatus and system of verification information | |
CN107104996A (en) | Customer location method of calibration and device, controlled plant access method and device | |
CN108011868A (en) | One kind slides verification method and mobile terminal | |
CN107920094A (en) | Data capture method, device, server and the network equipment | |
CN106790166A (en) | A kind of method of safety certification, apparatus and system | |
CN103152401B (en) | Mobile terminal and carry out the method, system and the cloud server that log in by it | |
CN105025480B (en) | The method and system of subscriber card digital signature authentication | |
CN105024814B (en) | A kind of verification method, server and system | |
CN110445792A (en) | Verification code generation method, verifying code verification method and identifying code login system | |
CN105469788A (en) | Voice information verification method and apparatus | |
CN111353140B (en) | Verification code generation and display method, device and system | |
CN107786572A (en) | A kind of verification method of user identity, device and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180309 |
|
RJ01 | Rejection of invention patent application after publication |