CN107786572A - A kind of verification method of user identity, device and terminal - Google Patents

A kind of verification method of user identity, device and terminal Download PDF

Info

Publication number
CN107786572A
CN107786572A CN201711083697.3A CN201711083697A CN107786572A CN 107786572 A CN107786572 A CN 107786572A CN 201711083697 A CN201711083697 A CN 201711083697A CN 107786572 A CN107786572 A CN 107786572A
Authority
CN
China
Prior art keywords
identifying code
target verification
code
identifying
verification code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711083697.3A
Other languages
Chinese (zh)
Inventor
董明华
刘正
商琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Industrial Park Institute of Services Outsourcing
Original Assignee
Suzhou Industrial Park Institute of Services Outsourcing
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Industrial Park Institute of Services Outsourcing filed Critical Suzhou Industrial Park Institute of Services Outsourcing
Priority to CN201711083697.3A priority Critical patent/CN107786572A/en
Publication of CN107786572A publication Critical patent/CN107786572A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of verification method of user identity, device and terminal.This method includes:The first identifying code set that the reception server is sent, wherein, a target verification code is comprised at least in the first identifying code set, second identifying code set is generated according to the first identifying code set, wherein, the first identifying code set is comprised at least in the second identifying code set, each target verification code is marked in the first identifying code set, the alternative identifying code that user selects according to the target verification code after mark is received, the identity of the user is verified according to each alternative identifying code and each target verification code.Technical scheme provided by the invention solves the problems, such as that identifying code judges that selection is more time-consuming, to realize the recognition time for shortening identifying code, improves the efficiency of identifying code selection.

Description

A kind of verification method of user identity, device and terminal
Technical field
The present embodiments relate to Internet technology, more particularly to a kind of verification method of user identity, device and terminal.
Background technology
It is more and more using the occasion of identifying code with the continuous development of Internet technology, such as:Account Registration, account Log in and obtain public wireless fidelity (Wireless Fidelity, WIFI) account number cipher etc..
At present, common checking flow is as follows:1st, user applies obtaining identifying code;2nd, server receives request, to visitor Family end sends identifying code;3rd, user receives identifying code, and the input validation code in input frame in client, then sends;4、 Server receives the identifying code that client is sent, and verifies to mistake, and is prompted to user.In whole flow process, the 3rd step consumes the most When, the inherently time-consuming operation of user inputs character, if along with the switching of input method, it is just more time-consuming.It is existing Solution, Alibaba《Verification method, the apparatus and system of checking information》, CN105791246A, using using boundary Display is currently needed for the code to be verified of checking on face, receives the identifying code that user selects in alternative identifying code set, will use The alternative identifying code that family selects in alternative identifying code set is matched with code to be verified, generates the result, wherein, The alternative identifying code and the matching degree of code to be verified that user selects in the identifying code set on standby side are more than or equal to matching threshold In the case of, it is proved to be successful, otherwise, authentication failed, having reached reduces the high purpose of checking information error rate for input, and then solves Due to the easy input error of content in checking information during being confirmed due to current authentication information, so as to cause verification efficiency low Technical problem.
However, needing user to select correct identifying code in numerous characters in existing technical scheme, judge to select The process for selecting correct characters is still time-consuming longer.
The content of the invention
The present invention provides a kind of verification method of user identity, device and terminal, judges selection more to solve identifying code The problem of time-consuming, to realize the recognition time for shortening identifying code, improve the efficiency of identifying code selection.
In a first aspect, the embodiments of the invention provide a kind of verification method of user identity, including:
The first identifying code set that the reception server is sent;Wherein, one is comprised at least in the first identifying code set Target verification code;
Second identifying code set is generated according to the first identifying code set;Wherein, in the second identifying code set extremely Include the first identifying code set less;
Each target verification code is marked in the first identifying code set;
The alternative identifying code that user selects according to the target verification code after mark is received, according to each alternative identifying code and respectively Individual target verification code is verified to the identity of the user.
Second aspect, the embodiment of the present invention additionally provide a kind of checking device of user identity, including:
First identifying code receiving module, the first identifying code set sent for the reception server;Wherein, described first test Card code collection comprises at least a target verification code in closing;
Second identifying code generation module, for generating the second identifying code set according to the first identifying code set;Wherein, The first identifying code set is comprised at least in the second identifying code set;
Target verification code labeling module, for each target verification code to be entered into rower in the first identifying code set Note;
Target verification code authentication module, the alternative checking selected for receiving user according to the target verification code after mark Code, the identity of the user is verified according to each alternative identifying code and each target verification code.
The third aspect, the embodiment of the present invention additionally provide a kind of terminal, and the terminal is integrated with as in above-mentioned second aspect The checking device of user identity described in any one.
The first identifying code set that the embodiment of the present invention is sent by the reception server, wherein, the first checking code collection A target verification code is comprised at least in conjunction, the second identifying code set is generated according to the first identifying code set, wherein, it is described The first identifying code set is comprised at least in second identifying code set, tests each target in the first identifying code set Card code is marked, and receives the alternative identifying code that user selects according to the target verification code after mark, according to each alternative checking Code and each target verification code are verified to the identity of the user.Technical scheme provided by the invention solves identifying code and sentenced The problem of disconnected selection more takes, to realize the recognition time for shortening identifying code, improve the efficiency of identifying code selection.
Brief description of the drawings
Fig. 1 is a kind of flow chart of the verification method for user identity that the embodiment of the present invention one provides.
Fig. 2 is a kind of flow chart of the verification method for user identity that the embodiment of the present invention two provides.
Fig. 3 is a kind of structural representation of the checking device for user identity that the embodiment of the present invention three provides.
Fig. 4 is a kind of structural representation for terminal that the embodiment of the present invention four provides.
Embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention, rather than limitation of the invention.It also should be noted that in order to just Part related to the present invention rather than entire infrastructure are illustrate only in description, accompanying drawing.
Embodiment one
Fig. 1 is a kind of flow chart of the verification method for user identity that the embodiment of the present invention one provides, and the present embodiment can fit For the situation of authentication, this method can be performed by the checking device of user identity, the device can have software and/or Hardware is realized, is specifically comprised the following steps:
The first identifying code set that S110, the reception server are sent;Wherein, one is comprised at least in the first identifying code set Target verification code.
The present embodiment is applicable to headend equipment, and the headend equipment can be that terminal can also be intelligent movable end End.
In a particular embodiment of the present invention, the first identifying code set refers to the identifying code set that server is sent, Refer to the identifying code set at least by a target verification code character including at least a target verification code in first identifying code set Into target verification code can be numeral, letter or Chinese character.Identifying code set can be any one in numeral, letter or Chinese character The combination of kind can also be two kinds or two or more combinations.The character quantity of identifying code set can also be carried out as needed Set.Exemplary, the identifying code set can be " 1234 ", " 12ab " and " 1a landscape ".The character types of target verification code More, the security of data message is higher.
S120, according to the first identifying code set generate the second identifying code set;Wherein, at least wrapped in the second identifying code set Include the first identifying code set.
In the present embodiment, the first identifying code set in above-mentioned steps 110, adds some non-targeted checkings at random The character of code generates a second identifying code set.Second identifying code set must include the first identifying code set.It is exemplary , when the first identifying code collection is combined into " 1234 ", the second identifying code set can be " 12345678 " or " 55123466 " etc. Deng;When the first identifying code collection is combined into " 12ab ", the second identifying code set can be " 12ab34cd " or " 3412abcd " etc. Deng.
Character in non-first identifying code set can be that client uses character after the first identifying code set is received Generate Software Create;An identifying code character repertoire can also be pre-set, various characters are store in identifying code character repertoire Set, after the first identifying code set is received, scans in identifying code character repertoire, excludes the word containing target verification code Symbol set, a character set is randomly choosed in the character combination for not containing target verification code, it is charge-coupled with the first identifying code collection Into the second identifying code set.
S130, each target verification code is marked in the first identifying code set.
In the present embodiment, each target verification code is marked in the first identifying code set and refers to verify to first Each target verification code during code collection is closed adds special marking, can be font-weight, colouring discrimination, different fonts or font Upset, inclination etc..Character in non-first identifying code set is without specially treated, normal display.Exemplary, the first checking When code collection is combined into " 12ab ", when the second identifying code set can be " 1cd3e25fgh6a98bh ", by the first identifying code set " 12ab " carries out special marking, as shown in table 1 below.
The target verification code of table 1 has the second identifying code set of special marking
1 c d 3
e 2 5 f
g h 6 a
9 8 b h
In the display interface display of client, all words in the second all identifying code set can be disposably shown Symbol.Target verification code can also be subjected to Special display after the second identifying code set is shown.
By target verification code progress special marking be in order to when the identifying code of second set include in client end interface when, visitor Family can be quickly identification and select correct identifying code, substantially increase identifying code identification and selection speed.
S140, the alternative identifying code that user selects according to the target verification code after mark is received, according to each alternative checking Code and each target verification code are verified to the identity of user.
In the present embodiment, when user clicks on the character in the second identifying code set shown on client display interface When, client terminal receives the alternative identifying code of user's selection, and the alternative identifying code refers to user in the second identifying code set The character selected, alternative identifying code are probably correct, it is also possible to mistake.
Judge whether each alternative identifying code and each target verification code are identical successively;When each alternative identifying code and each Simultaneously, the authentication to user passes through target verification code-phase.
Three kinds of proof schemes are provided in the present embodiment.The first proof scheme, client reception user select standby After selecting identifying code, client judges whether each alternative identifying code and each target verification code are identical;When each alternative checking Simultaneously, the authentication to user is by the way that the message being verified is sent to server, clothes for code and each target verification code-phase Business device allows user to carry out next step operation after receiving the message that authentication passes through.If checking is not by directly in visitor The interface display checking of family end is not by re-entering alternative identifying code, client is then verified, until being verified.
Second of proof scheme, after client receives the alternative identifying code that user selects, client is standby by what is received Select identifying code to send to server, make server to judge whether each alternative identifying code and each target verification code are identical, when Simultaneously, the authentication to user passes through for each alternative identifying code and each target verification code-phase.When authentication by when, permit Family allowable carries out next step operation.If checking by the message of " identifying code input error " by not sending to client and carrying out It has been shown that, meanwhile, client receives the alternative identifying code that user re-enters.Further, do not pass through in the checking of alternative identifying code When, server can resend the first new identifying code collection and be bonded to client, client executing step 110, until checking is logical Cross or user log off, abandon input validation code.
The third proof scheme, according to circumstances come select using the first proof scheme or use second of authentication Case.Exemplary, when client is established with server by way of mobile data cube computation and connected, use the first authentication Case;When client is established with server by way of non-moving data connect and connected, second of proof scheme is used.May be used also To be determined according to network data transmission rate, when network data transmission rate is fast, the first proof scheme is used;Work as network When message transmission rate is slow, second of proof scheme is used.
The first identifying code set that technical scheme provided in an embodiment of the present invention is sent by the reception server, wherein, the A target verification code is comprised at least in one identifying code set, the second identifying code set is generated according to the first identifying code set, its In, the first identifying code set is comprised at least in the second identifying code set, by each target verification code in the first identifying code set Be marked, receive the alternative identifying code that user selects according to the target verification code after mark, according to each alternative identifying code and Each target verification code is verified to the identity of user.Technical scheme provided by the invention solve identifying code judge selection compared with The problem of to take, to realize the checking duration for shortening identifying code, improve the efficiency of identifying code selection.
Embodiment two
Fig. 2 is a kind of flow chart of the verification method for user identity that the embodiment of the present invention two provides, and the present embodiment is upper On the basis of stating each embodiment, the verification method of user identity is optimized, is specifically comprised the following steps:
S210, the request message for obtaining the first identifying code set is sent to server.
In the present embodiment, the request message for sending the first identifying code set of acquisition refers to user in the interface of client The module of the solicited message of the first identifying code set is clicked on, or with the addition of in access request and obtain the first checking code collection The instruction of the request message of conjunction.
S220, perform the first identifying code set that the reception server is sent.
The first identifying code set that S230, the reception server are sent;Wherein, one is comprised at least in the first identifying code set Target verification code.
S240, according to the first identifying code set generate the second identifying code set;Wherein, at least wrapped in the second identifying code set Include the first identifying code set.
S250, each target verification code is marked in the first identifying code set.
S260, determine display order of each target verification code in the first identifying code set.
In the present embodiment, on the basis of each target verification code is marked in the first identifying code set, one is entered Step determines display order of each target verification code in the first identifying code set, that is, determines the sequencing of target verification code. Exemplary, it is " 12ab " or " 1a2b " to determine identifying code.
Step S270, the display order according to each target verification code in the first identifying code set, tested for each target Code division is demonstrate,proved with the corresponding display time.
In the present embodiment, on the basis of each target verification code is marked in the first identifying code set, according to The sequencing of target verification code is each target verification code division with the corresponding display time.
It is descending to be followed successively by each target according to display order of each target verification code in the first identifying code set The display time corresponding to identifying code distribution;Or the display order according to each target verification code in the first identifying code set, It is ascending to be followed successively by each target verification code division with the corresponding display time.
Further, different display actions can also be distributed according to different characters, is illustrated exemplified by following table.When When first identifying code collection is combined into " 12ab ", when the second identifying code set can be " 1cd3e25fgh6a98bh ", by the first checking Code collection closes " 12ab " and carries out special marking, and the time each distributed according to it is shown that as shown in table 2 below is the second checking Code collection is closed.
The target verification code of table 2 has the second identifying code set of display time
Exemplary, the display time of character " 1 " is arranged to display 2 seconds, the display time of character " 2 " is arranged to show 2 seconds, the display time of character " a " is arranged to display 2 seconds, the display time of character " b " is arranged to display 2 seconds.By character The display action of " 1 " is arranged to " flash ", the display action of character " 2 " is arranged into " spinning upside down ", by character " a " display Action is arranged to " left and right upset ", the display action of character " b " is arranged to " to rotate " etc..Shown in client display interface When, the second identifying code set integrally shows that target verification code is shown according to default time and action.Tested with protruding target Card code allows user to select correct identifying code within the most short time.
Further, the display order according to each target verification code in the first identifying code set, can also distribute each Start to show the moment corresponding to individual target verification code and stop showing the moment.Further, previous target verification code is opened Begin to show the moment and stop showing that the difference at moment starts to show that the moment tests with the latter target less than previous target verification code Card code starts to show the difference at moment.I.e. the latter target verification code can just enter after previous target verification code stops display Row display.
S280, show that the time is shown each target verification code according to corresponding to each target verification code.
In the present embodiment, can be with according to being to be shown the corresponding time that each target verification code division is matched somebody with somebody in step 270 Make the correct order of the identification target verification code of user quickly.
S290, the alternative identifying code that user selects according to the target verification code after mark is received, according to each alternative checking Code and each target verification code are verified to the identity of user.
Technical scheme provided in an embodiment of the present invention, by the first identifying code set by each target verification code On the basis of being marked, display order of each target verification code in the first identifying code set is further determined that, according to each Display order of the target verification code in the first identifying code set is each target verification code division with corresponding display time, root According to showing that the time is shown each target verification code corresponding to each target verification code.Technical scheme provided by the invention, The correct order of target verification code can be identified faster, improve the speed of identifying code selection.
Embodiment three
Fig. 3 show a kind of structural representation of the checking device of user identity of the offer of the embodiment of the present invention three, this Embodiment is applicable to the situation of authentication, and the concrete structure of the checking device of the user identity is as follows:
First identifying code receiving module 310, the first identifying code set sent for the reception server;Wherein, described A target verification code is comprised at least in one identifying code set.
Second identifying code generation module 320, for generating the second identifying code set according to the first identifying code set;Its In, the first identifying code set is comprised at least in the second identifying code set.
Target verification code labeling module 330, for carrying out each target verification code in the first identifying code set Mark.
Target verification code authentication module 340, alternatively tested according to what the target verification code after mark selected for receiving user Code is demonstrate,proved, the identity of the user is verified according to each alternative identifying code and each target verification code.
Wherein, the device this include:First identifying code request module, for the first identifying code sent in the reception server Before set, the request message for obtaining the first identifying code set is sent to the server.Execution module is received, for holding Row receives the first identifying code set that the server is sent.
Wherein, the device this include:Display order determining module, in the first identifying code set by each mesh After mark identifying code is marked, display order of each target verification code in the first identifying code set is determined.Display Time distribute module, it is each mesh for the display order according to each target verification code in the first identifying code set Mark the display time corresponding to identifying code distribution.Display module, for showing that the time will be each according to corresponding to each target verification code Individual target verification code is shown.
Further, display time distribute module is specifically used for:According to each target verification code in first identifying code Display order in set, it is descending to be followed successively by each target verification code division with the corresponding display time;Or according to each Display order of the target verification code in the first identifying code set, it is ascending to be followed successively by each target verification code division pairing The display time answered.
Further, target verification code authentication module is specifically used for:Each alternative identifying code and each target are judged successively Whether identifying code is identical;When each alternatively identifying code and each target verification code-phase, simultaneously, the authentication to the user is led to Cross.
The checking device of the user identity provided in the embodiment of the present invention three, solve identifying code and judge that selection is more time-consuming The problem of, to realize the checking duration for shortening identifying code, improve the efficiency of identifying code selection.
The said goods can perform the method that any embodiment of the present invention is provided, and possess the corresponding functional module of execution method And beneficial effect.
Example IV
Fig. 4 is a kind of structural representation for terminal that the embodiment of the present invention four provides.The terminal is integrated with of the invention any The checking device of the user identity described in any one provided in embodiment.
For example, the terminal includes the first identifying code receiving module, the second identifying code generation module, target verification code labeling mould Block and target verification code authentication module.
Wherein, the terminal can also determine mould including the first identifying code request module, reception execution module, display order Block, display time distribute module and display module.
The terminal provided in the embodiment of the present invention four, solve the problems, such as that identifying code judges that selection is more time-consuming, to realize Shorten the checking duration of identifying code.
Pay attention to, above are only presently preferred embodiments of the present invention and institute's application technology principle.It will be appreciated by those skilled in the art that The invention is not restricted to specific embodiment described here, can carry out for a person skilled in the art various obvious changes, Readjust and substitute without departing from protection scope of the present invention.Therefore, although being carried out by above example to the present invention It is described in further detail, but the present invention is not limited only to above example, without departing from the inventive concept, also Other more equivalent embodiments can be included, and the scope of the present invention is determined by scope of the appended claims.

Claims (11)

  1. A kind of 1. verification method of user identity, it is characterised in that including:
    The first identifying code set that the reception server is sent;Wherein, a target is comprised at least in the first identifying code set Identifying code;
    Second identifying code set is generated according to the first identifying code set;Wherein, at least wrapped in the second identifying code set Include the first identifying code set;
    Each target verification code is marked in the first identifying code set;
    The alternative identifying code that user selects according to the target verification code after mark is received, according to each alternative identifying code and each mesh Mark identifying code is verified to the identity of the user.
  2. 2. the verification method of user identity according to claim 1, it is characterised in that sent in the reception server Before first identifying code set, methods described also includes:
    The request message for obtaining the first identifying code set is sent to the server;
    Perform and receive the first identifying code set that the server is sent.
  3. 3. the verification method of user identity according to claim 1, it is characterised in that in the first identifying code set After each target verification code is marked, methods described also includes:
    Determine display order of each target verification code in the first identifying code set;
    According to display order of each target verification code in the first identifying code set, matched for each target verification code division The display time answered;
    Show that the time is shown each target verification code according to corresponding to each target verification code.
  4. 4. the verification method of user identity according to claim 3, it is characterised in that described is each target verification code division With the corresponding display time, including:
    It is descending to be followed successively by each target according to display order of each target verification code in the first identifying code set The display time corresponding to identifying code distribution;
    Or the display order according to each target verification code in the first identifying code set, it is ascending to be followed successively by respectively Individual target verification code division is with the corresponding display time.
  5. 5. the verification method of user identity according to claim 1, it is characterised in that described according to each alternative identifying code The identity of the user is verified with each target verification code, including:
    Judge whether each alternative identifying code and each target verification code are identical successively;
    When each alternatively identifying code and each target verification code-phase, simultaneously, the authentication to the user passes through.
  6. 6. the checking device of a kind of user identity, it is characterised in that described device includes:
    First identifying code receiving module, the first identifying code set sent for the reception server;Wherein, first identifying code A target verification code is comprised at least in set;
    Second identifying code generation module, for generating the second identifying code set according to the first identifying code set;Wherein, it is described The first identifying code set is comprised at least in second identifying code set;
    Target verification code labeling module, for each target verification code to be marked in the first identifying code set;
    Target verification code authentication module, the alternative identifying code selected for receiving user according to the target verification code after mark, root The identity of the user is verified according to each alternative identifying code and each target verification code.
  7. 7. the checking device of user identity according to claim 6, it is characterised in that described device also includes:
    First identifying code request module, for before the first identifying code set for being sent in the reception server, to the service Device sends the request message for obtaining the first identifying code set;
    Execution module is received, for performing the first identifying code set for receiving the server and sending.
  8. 8. the checking device of user identity according to claim 6, it is characterised in that described device also includes:
    Display order determining module, after each target verification code is marked in the first identifying code set, Determine display order of each target verification code in the first identifying code set;
    Time distribute module is shown, for the display order according to each target verification code in the first identifying code set, It is that each target verification code division shows the time with corresponding;
    Display module, for showing that the time is shown each target verification code according to corresponding to each target verification code.
  9. 9. the checking device of user identity according to claim 8, it is characterised in that display time distribute module, specifically It is descending to be followed successively by each target for the display order according to each target verification code in the first identifying code set The display time corresponding to identifying code distribution;Or the display according to each target verification code in the first identifying code set Sequentially, it is ascending to be followed successively by each target verification code division with the corresponding display time.
  10. 10. the checking device of described user identity according to claim 6, it is characterised in that the target verification code Authentication module, specifically for judging whether each alternative identifying code and each target verification code are identical successively;Alternatively tested when each Demonstrate,prove code and each target verification code-phase simultaneously, the authentication to the user passes through.
  11. 11. a kind of terminal, it is characterised in that the terminal is integrated with the user identity as described in claim any one of 6-10 Verify device.
CN201711083697.3A 2017-11-07 2017-11-07 A kind of verification method of user identity, device and terminal Pending CN107786572A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711083697.3A CN107786572A (en) 2017-11-07 2017-11-07 A kind of verification method of user identity, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711083697.3A CN107786572A (en) 2017-11-07 2017-11-07 A kind of verification method of user identity, device and terminal

Publications (1)

Publication Number Publication Date
CN107786572A true CN107786572A (en) 2018-03-09

Family

ID=61432860

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711083697.3A Pending CN107786572A (en) 2017-11-07 2017-11-07 A kind of verification method of user identity, device and terminal

Country Status (1)

Country Link
CN (1) CN107786572A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110022320A (en) * 2019-04-08 2019-07-16 北京深思数盾科技股份有限公司 A kind of communication partner method and communication device

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101976430A (en) * 2010-10-29 2011-02-16 赵俊平 Method for generating picture verification codes and system thereof
CN101977194A (en) * 2010-10-29 2011-02-16 赵俊平 Third-party verification code system and third-party verification code provision method
CN103036681A (en) * 2012-12-13 2013-04-10 中国工商银行股份有限公司 Password safety keyboard device and system
CN103455965A (en) * 2012-05-30 2013-12-18 北京小米科技有限责任公司 Verification image based verification method, device and server
CN103607400A (en) * 2013-11-26 2014-02-26 深圳市掌众信息技术有限公司 Improved mobile phone identity verification method and system
CN104243399A (en) * 2013-06-07 2014-12-24 腾讯科技(深圳)有限公司 User identifying method, client, server and system for realizing the method
CN104346557A (en) * 2013-08-06 2015-02-11 深圳市腾讯计算机系统有限公司 Verification code generation method and device and verification code display control method and device
CN105323073A (en) * 2015-11-16 2016-02-10 腾讯科技(深圳)有限公司 Identity authentication method, identity authentication device and identity authentication system
CN105471808A (en) * 2014-05-28 2016-04-06 北京搜狗科技发展有限公司 Identifying code generating method, safety identification method, safety identification device and safety identification system
CN105791246A (en) * 2014-12-25 2016-07-20 阿里巴巴集团控股有限公司 Information verification method, device and system
CN106209732A (en) * 2015-04-30 2016-12-07 阿里巴巴集团控股有限公司 A kind of offer method and device of identifying code
CN106250756A (en) * 2016-07-29 2016-12-21 智者四海(北京)技术有限公司 Generation method, verification method and the related device of identifying code
US20170093793A1 (en) * 2015-09-29 2017-03-30 Verisign, Inc. Domain name operation verification code generation and/or verification
CN107229857A (en) * 2016-03-25 2017-10-03 宇龙计算机通信科技(深圳)有限公司 The generation method and device of a kind of identifying code

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101977194A (en) * 2010-10-29 2011-02-16 赵俊平 Third-party verification code system and third-party verification code provision method
CN101976430A (en) * 2010-10-29 2011-02-16 赵俊平 Method for generating picture verification codes and system thereof
CN103455965A (en) * 2012-05-30 2013-12-18 北京小米科技有限责任公司 Verification image based verification method, device and server
CN103036681A (en) * 2012-12-13 2013-04-10 中国工商银行股份有限公司 Password safety keyboard device and system
CN104243399A (en) * 2013-06-07 2014-12-24 腾讯科技(深圳)有限公司 User identifying method, client, server and system for realizing the method
CN104346557A (en) * 2013-08-06 2015-02-11 深圳市腾讯计算机系统有限公司 Verification code generation method and device and verification code display control method and device
CN103607400A (en) * 2013-11-26 2014-02-26 深圳市掌众信息技术有限公司 Improved mobile phone identity verification method and system
CN105471808A (en) * 2014-05-28 2016-04-06 北京搜狗科技发展有限公司 Identifying code generating method, safety identification method, safety identification device and safety identification system
CN105791246A (en) * 2014-12-25 2016-07-20 阿里巴巴集团控股有限公司 Information verification method, device and system
CN106209732A (en) * 2015-04-30 2016-12-07 阿里巴巴集团控股有限公司 A kind of offer method and device of identifying code
US20170093793A1 (en) * 2015-09-29 2017-03-30 Verisign, Inc. Domain name operation verification code generation and/or verification
CN105323073A (en) * 2015-11-16 2016-02-10 腾讯科技(深圳)有限公司 Identity authentication method, identity authentication device and identity authentication system
CN107229857A (en) * 2016-03-25 2017-10-03 宇龙计算机通信科技(深圳)有限公司 The generation method and device of a kind of identifying code
CN106250756A (en) * 2016-07-29 2016-12-21 智者四海(北京)技术有限公司 Generation method, verification method and the related device of identifying code

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110022320A (en) * 2019-04-08 2019-07-16 北京深思数盾科技股份有限公司 A kind of communication partner method and communication device

Similar Documents

Publication Publication Date Title
CN104468531B (en) The authorization method of sensitive data, device and system
CN102546914A (en) Automatic login system based on smart phone and control method
CN106384143B (en) Dynamic electronic two-dimensional code generation method and identification method
CN101388078A (en) Text identification method and device based on verification
CN101976430A (en) Method for generating picture verification codes and system thereof
CN105323073A (en) Identity authentication method, identity authentication device and identity authentication system
CN104580264A (en) Login method, registration method and login device as well as login and refrigeration system
CN106713370B (en) A kind of identity identifying method, server and mobile terminal
CN108616360A (en) User identity verification, register method and device
CN106851602A (en) A kind of transaction system short-message verification method and system
CN106385403B (en) A kind of the user account register method and relevant device of self-help print equipment
CN105992204A (en) Access authentication method of applications of mobile intelligent terminal and device
CN109194689B (en) Abnormal behavior recognition method, device, server and storage medium
CN105791246B (en) Verification method, the apparatus and system of verification information
CN107104996A (en) Customer location method of calibration and device, controlled plant access method and device
CN108011868A (en) One kind slides verification method and mobile terminal
CN107920094A (en) Data capture method, device, server and the network equipment
CN106790166A (en) A kind of method of safety certification, apparatus and system
CN103152401B (en) Mobile terminal and carry out the method, system and the cloud server that log in by it
CN105025480B (en) The method and system of subscriber card digital signature authentication
CN105024814B (en) A kind of verification method, server and system
CN110445792A (en) Verification code generation method, verifying code verification method and identifying code login system
CN105469788A (en) Voice information verification method and apparatus
CN111353140B (en) Verification code generation and display method, device and system
CN107786572A (en) A kind of verification method of user identity, device and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180309

RJ01 Rejection of invention patent application after publication