CN107911366A - Auth method and device - Google Patents

Auth method and device Download PDF

Info

Publication number
CN107911366A
CN107911366A CN201711146394.1A CN201711146394A CN107911366A CN 107911366 A CN107911366 A CN 107911366A CN 201711146394 A CN201711146394 A CN 201711146394A CN 107911366 A CN107911366 A CN 107911366A
Authority
CN
China
Prior art keywords
sliding block
information
request
terminal device
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711146394.1A
Other languages
Chinese (zh)
Inventor
杨东伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TVM Beijing Technology Co Ltd
Original Assignee
TVM Beijing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TVM Beijing Technology Co Ltd filed Critical TVM Beijing Technology Co Ltd
Priority to CN201711146394.1A priority Critical patent/CN107911366A/en
Publication of CN107911366A publication Critical patent/CN107911366A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The disclosure is directed to a kind of auth method and device, wherein, method includes:When receiving service request, send checking information and obtain request to server, so that server obtains request according to checking information sends checking information to terminal device;Show checking information, receive the operation information input by user to checking information, and send operation information to server, so that server is verified according to operation information;Server is received after being verified, the feedback information of transmission;Send and examine request to server, wherein, examine in request and carry feedback information, so that server verifies feedback information, and business is performed after being verified.Pass through the technical solution, it is ensured that the operation of user is personal behavior, is not the automatism of machine, so as to ensure the security of business.And authentication module and business module separation are handled, and are independent of each other, are improved processing speed.

Description

Auth method and device
Technical field
This disclosure relates to identity validation technology field, more particularly to a kind of auth method and device.
Background technology
Authentication refers to the process of confirmation operation person's identity in computer and computer network system, so that it is determined that should Whether user has access and the access right to certain resource, and then enables the access strategy of cyber-net system can Lean on, efficiently perform, prevent attacker from palming off the access rights that validated user obtains resource, ensure the safety of system and data, And authorize the legitimate interests of visitor.
The content of the invention
The embodiment of the present disclosure provides a kind of auth method and device, including following technical solution:
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of auth method, for terminal device, including:
When receiving service request, send checking information and obtain request to server, so that the server is according to institute State checking information and obtain request transmission checking information to the terminal device;
Show the checking information, receive the operation information input by user to the checking information, and send the behaviour Make information to the server, so that the server is verified according to the operation information;
The server is received after being verified, the feedback information of transmission;
Send and examine request to server, wherein, described examine in request carries the feedback information, so that the service Device verifies the feedback information, and the business is performed after being verified.
In one embodiment, the checking information includes sliding block Background and sliding block, and the operation information is included to institute State the final placement position information of the moving operation information and the sliding block of sliding block in the sliding block Background.
In one embodiment, the feedback information includes:
Serial number, service identification, business sequence number and the token of the business.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of auth method, for server, including:
For receiving terminal apparatus when receiving service request, the checking information of transmission obtains request, and controls authentication module Request is obtained according to the checking information and sends checking information to the terminal device;
The operation information input by user to the checking information that receiving terminal apparatus is sent, and believed according to the operation Breath determines whether the terminal device passes through verification;
When the definite terminal device passes through verification, the first feedback information is sent to the terminal device;
Control business module receives the inspection for carrying the second feedback information request that the terminal device is sent, and by institute State verification request to send to the authentication module, control the authentication module to verify the inspection request, it is logical in verification Later the business module is controlled to perform the business.
In one embodiment, the checking information includes sliding block Background and sliding block, described according to the checking information Obtain request and send checking information to the terminal device, including:
The sliding block in sliding block Background and the sliding block Background is randomly selected from default background picture library;
The sliding block Background and sliding block chosen are sent to the terminal device.
In one embodiment, the operation information is included to the moving operation information of the sliding block and the sliding block in institute The final placement position information in sliding block Background is stated, it is described to determine whether the terminal device passes through according to the operation information Verification, including:
Determine final placement location of the sliding block in the sliding block Background whether with default sliding block placement location phase It coincide;
When final placement location of the sliding block in the sliding block Background matches with default sliding block placement location, The terminal device is determined by verification, otherwise, it determines the terminal device is not verified.
In one embodiment, it is described that the inspection request is verified, including:
Second feedback information is obtained from the verification request;
Determine whether second feedback information and first feedback information are consistent;
When second feedback information is consistent with first feedback information, determine to be verified, otherwise, it determines verification Do not pass through.
In one embodiment, the feedback information includes:The serial number of the business, service identification, business sequence number and Token.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of authentication means, for terminal device, including:
First sending module, request is obtained to server for when receiving service request, sending checking information, so that The server obtains request according to the checking information and sends checking information to the terminal device;
Interactive module, for showing the checking information, receives the operation information input by user to the checking information, And the operation information is sent to the server, so that the server is verified according to the operation information;
Receiving module, for receiving the server after being verified, the feedback information of transmission;
Second sending module, request is examined to server for sending, wherein, described examine in request carries the feedback Information, so that the server verifies the feedback information, and performs the business after being verified.
In one embodiment, the checking information includes sliding block Background and sliding block, and the operation information is included to institute State the final placement position information of the moving operation information and the sliding block of sliding block in the sliding block Background.
In one embodiment, the feedback information includes:
Serial number, service identification, business sequence number and the token of the business.
According to the fourth aspect of the embodiment of the present disclosure, there is provided a kind of authentication means, for server, including:
Authentication module, for receiving terminal apparatus when receiving service request, the checking information of transmission obtains request, and Request is obtained according to the checking information and sends checking information to the terminal device;User's input that receiving terminal apparatus is sent The operation information to the checking information, and determine whether the terminal device passes through verification according to the operation information; When determining that the terminal device passes through verification, the first feedback information is sent to the terminal device;
Business module, the inspection for carrying the second feedback information request sent for receiving the terminal device, and will The verification request is sent to the authentication module, so that the authentication module verifies the inspection request, is being verified The business is performed by the rear control business module.
In one embodiment, the checking information includes sliding block Background and sliding block, described according to the checking information Obtain request and send checking information to the terminal device, including:
The sliding block in sliding block Background and the sliding block Background is randomly selected from default background picture library;
The sliding block Background and sliding block chosen are sent to the terminal device.
In one embodiment, the operation information is included to the moving operation information of the sliding block and the sliding block in institute The final placement position information in sliding block Background is stated, it is described to determine whether the terminal device passes through according to the operation information Verification, including:
Determine final placement location of the sliding block in the sliding block Background whether with default sliding block placement location phase It coincide;
When final placement location of the sliding block in the sliding block Background matches with default sliding block placement location, The terminal device is determined by verification, otherwise, it determines the terminal device is not verified.
In one embodiment, it is described that the inspection request is verified, including:
Second feedback information is obtained from the verification request;
Determine whether second feedback information and first feedback information are consistent;
When second feedback information is consistent with first feedback information, determine to be verified, otherwise, it determines verification Do not pass through.
In one embodiment, the feedback information includes:The serial number of the business, service identification, business sequence number and Token.
The technical scheme provided by this disclosed embodiment can include the following benefits:
Above-mentioned technical proposal, after authentication module is to being verified of terminal device, just allows business module to start to perform Business, in this manner it is ensured that the operation of user is personal behavior, is not the automatism of machine, so as to ensure the safety of business Property.And authentication module and business module separation are handled, and are independent of each other, are improved processing speed.
It should be appreciated that the general description and following detailed description of the above are only exemplary and explanatory, not The disclosure can be limited.
Brief description of the drawings
Attached drawing herein is merged in specification and forms the part of this specification, shows the implementation for meeting the disclosure Example, and be used to together with specification to explain the principle of the disclosure.
Fig. 1 is a kind of flow chart of auth method according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of auth method according to an exemplary embodiment.
Fig. 3 is the flow chart of step S201 in a kind of auth method according to an exemplary embodiment.
Fig. 4 is the flow chart of step S202 in a kind of auth method according to an exemplary embodiment.
Fig. 5 is the flow chart of step S204 in a kind of auth method according to an exemplary embodiment.
Fig. 6 is a kind of block diagram of authentication means according to an exemplary embodiment.
Fig. 7 is a kind of block diagram of authentication means according to an exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During attached drawing, unless otherwise indicated, the same numbers in different attached drawings represent the same or similar key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects be described in detail in claims, the disclosure.
Fig. 1 is a kind of flow chart of auth method according to an exemplary embodiment.
The embodiment of the present disclosure provides a kind of auth method, and this method can be used in terminal device, as shown in Figure 1, The method comprising the steps of S101-S104:
In step S101, when receiving service request, send checking information and obtain request to server, so that described Server obtains request according to the checking information and sends checking information to the terminal device;
In one embodiment, the checking information includes sliding block Background and sliding block, and the operation information is included to institute State the final placement position information of the moving operation information and the sliding block of sliding block in the sliding block Background.
In step s 102, show the checking information, receive the operation information input by user to the checking information, And the operation information is sent to the server, so that the server is verified according to the operation information;
In step s 103, the server is received after being verified, the feedback information of transmission;
In step S104, send and examine request to server, wherein, described examine in request carries the feedback letter Breath, so that the server verifies the feedback information, and performs the business after being verified.
In this embodiment, terminal device randomly chooses sliding block background to server acquisition request checking information, server Figure and sliding block, terminal device are shown to user, and user's progress is slider-operated, and terminal device obtains the position that user lifts gesture, That is final placement location of the sliding block in sliding block Background, and server is reported to, server verifies the position.Verification By rear, feedback information is sent to terminal device.Business module of the terminal device into server sends secondary verification request, takes Band feedback information.Feedback is sent to authentication module by business module, and authentication module verifies feedback, notified after upchecking Business module, business module can carry out follow-up business.In this manner it is ensured that the operation of user is personal behavior, it is not machine Automatism, so as to ensure the security of business.And authentication module and business module separation are handled, and are independent of each other, are carried High processing rate.
In one embodiment, the feedback information includes:
Serial number, service identification, business sequence number and the token of the business.
In this embodiment, feedback information can be serial number, service identification, business sequence number and token of business etc., this Sample, when server is verified, can verify the serial number of business and token etc..
Fig. 2 is a kind of flow chart of auth method according to an exemplary embodiment.
The embodiment of the present disclosure provides a kind of auth method, and this method can be used in server, as shown in Fig. 2, should Method includes step S201-S204:
In step s 201, for receiving terminal apparatus when receiving service request, the checking information of transmission obtains request, and Control authentication module to obtain request according to the checking information and send checking information to the terminal device;
In step S202, the operation information input by user to the checking information of receiving terminal apparatus transmission, and Determine whether the terminal device passes through verification according to the operation information;
In step S203, when the definite terminal device passes through verification, the first feedback information is sent to the terminal Equipment;
In step S204, control business module receives the inspection for carrying the second feedback information that the terminal device is sent Request is tested, and the verification request is sent to the authentication module, controls the authentication module to examine request to carry out to described Verification, controls the business module to perform the business after being verified.
In this embodiment, authentication module in the server is to after being verified of terminal device, just allowing business mould BOB(beginning of block) performs business, in this manner it is ensured that the operation of user is personal behavior, is not the automatism of machine, so as to ensure The security of business.And authentication module and business module separation are handled, and are independent of each other, are improved processing speed.
Fig. 3 is the flow chart of step S201 in a kind of auth method according to an exemplary embodiment.
As shown in figure 3, in one embodiment, the checking information includes sliding block Background and sliding block, above-mentioned steps S201 includes step S301-S302:
In step S301, the cunning in sliding block Background and the sliding block Background is randomly selected from default background picture library Block;
In step s 302, the sliding block Background and sliding block of selection are sent to the terminal device.
In this embodiment it is possible to randomly select artwork in default background picture library, and sliding block is randomly selected from artwork Background and sliding block, wherein, user can promote sliding block to be moved in sliding block Background, when sliding block is put into the finger in sliding block Background When positioning is put, sliding block and sliding block Background can be spliced into artwork.
Fig. 4 is the flow chart of step S202 in a kind of auth method according to an exemplary embodiment.
As shown in figure 4, in one embodiment, the operation information includes the moving operation information and institute to the sliding block Final placement position information of the sliding block in the sliding block Background is stated, above-mentioned steps S202 includes step S401-S402:
In step S401, determine final placement location of the sliding block in the sliding block Background whether with default cunning Block placement location matches;
In step S402, when final placement location of the sliding block in the sliding block Background and default sliding block are placed When position matches, the terminal device is determined by verification, otherwise, it determines the terminal device is not verified.
Fig. 5 is the flow chart of step S204 in a kind of auth method according to an exemplary embodiment.
As shown in figure 5, in one embodiment, above-mentioned steps S204 includes step S501-S503:
In step S501, second feedback information is obtained from the verification request;
In step S502, determine whether second feedback information and first feedback information are consistent;
In step S503, when second feedback information is consistent with first feedback information, determine to be verified, Otherwise, it determines verification does not pass through.
In one embodiment, the feedback information includes:The serial number of the business, service identification, business sequence number and Token.
Following is embodiment of the present disclosure, can be used for performing embodiments of the present disclosure.
Fig. 6 is a kind of block diagram of authentication means according to an exemplary embodiment, which can be by soft Part, hardware or both are implemented in combination with as some or all of of terminal device.As shown in fig. 6, the authentication means Including:
First sending module 61, is asked to server for when receiving service request, sending checking information acquisition, with The server is obtained request according to the checking information and send checking information to the terminal device;
Interactive module 62, for showing the checking information, receives the operation letter input by user to the checking information Breath, and the operation information is sent to the server, so that the server is verified according to the operation information;
Receiving module 63, for receiving the server after being verified, the feedback information of transmission;
Second sending module 64, request is examined to server for sending, wherein, carried in the inspection request described anti- Feedforward information, so that the server verifies the feedback information, and performs the business after being verified.
In one embodiment, the checking information includes sliding block Background and sliding block, and the operation information is included to institute State the final placement position information of the moving operation information and the sliding block of sliding block in the sliding block Background.
In one embodiment, the feedback information includes:
Serial number, service identification, business sequence number and the token of the business.
Fig. 7 is a kind of block diagram of authentication means according to an exemplary embodiment, which can be by soft Part, hardware or both are implemented in combination with as some or all of of server.As shown in fig. 7, the authentication means bag Include:
Authentication module 71, for receiving terminal apparatus when receiving service request, the checking information of transmission obtains request, And request is obtained according to the checking information and sends checking information to the terminal device;The user that receiving terminal apparatus is sent is defeated The operation information to the checking information entered, and determine whether the terminal device passes through verification according to the operation information; When the definite terminal device passes through verification, the first feedback information is sent to the terminal device;
Business module 72, the inspection for carrying the second feedback information request sent for receiving the terminal device, and The verification request is sent to the authentication module, so that the authentication module verifies the inspection request, is being tested Card controls the business module to perform the business after passing through.
In one embodiment, the checking information includes sliding block Background and sliding block, described according to the checking information Obtain request and send checking information to the terminal device, including:
The sliding block in sliding block Background and the sliding block Background is randomly selected from default background picture library;
The sliding block Background and sliding block chosen are sent to the terminal device.
In one embodiment, the operation information is included to the moving operation information of the sliding block and the sliding block in institute The final placement position information in sliding block Background is stated, it is described to determine whether the terminal device passes through according to the operation information Verification, including:
Determine final placement location of the sliding block in the sliding block Background whether with default sliding block placement location phase It coincide;
When final placement location of the sliding block in the sliding block Background matches with default sliding block placement location, The terminal device is determined by verification, otherwise, it determines the terminal device is not verified.
In one embodiment, it is described that the inspection request is verified, including:
Second feedback information is obtained from the verification request;
Determine whether second feedback information and first feedback information are consistent;
When second feedback information is consistent with first feedback information, determine to be verified, otherwise, it determines verification Do not pass through.
In one embodiment, the feedback information includes:The serial number of the business, service identification, business sequence number and Token.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in related this method Embodiment in be described in detail, explanation will be not set forth in detail herein.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more The shape for the computer program product that usable storage medium is implemented on (including but not limited to magnetic disk storage and optical memory etc.) Formula.
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that it can be realized by computer program instructions every first-class in flowchart and/or the block diagram The combination of flow and/or square frame in journey and/or square frame and flowchart and/or the block diagram.These computer programs can be provided The processors of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that the instruction performed by computer or the processor of other programmable data processing devices, which produces, to be used in fact The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or The instruction performed on other programmable devices is provided and is used for realization in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a square frame or multiple square frames.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art God and scope.In this way, if these modifications and changes of the present invention belongs to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising including these modification and variations.

Claims (16)

  1. A kind of 1. auth method, for terminal device, it is characterised in that including:
    When receiving service request, send checking information and obtain request to server, so that the server is tested according to Demonstrate,prove information acquisition request and send checking information to the terminal device;
    Show the checking information, receive the operation information input by user to the checking information, and send the operation letter Breath is to the server, so that the server is verified according to the operation information;
    The server is received after being verified, the feedback information of transmission;
    Send and examine request to server, wherein, described examine in request carries the feedback information, so that the server pair The feedback information is verified, and the business is performed after being verified.
  2. 2. according to the method described in claim 1, it is characterized in that, the checking information includes sliding block Background and sliding block, institute Stating operation information includes finally the placing in the sliding block Background to the moving operation information of the sliding block and the sliding block Positional information.
  3. 3. according to the method described in claim 1, it is characterized in that, the feedback information includes:
    Serial number, service identification, business sequence number and the token of the business.
  4. A kind of 4. auth method, for server, it is characterised in that including:
    For receiving terminal apparatus when receiving service request, the checking information of transmission obtains request, and control authentication module according to The checking information obtains request and sends checking information to the terminal device;
    The operation information input by user to the checking information that receiving terminal apparatus is sent, and it is true according to the operation information Whether the fixed terminal device passes through verification;
    When the definite terminal device passes through verification, the first feedback information is sent to the terminal device;
    Control business module receives the inspection for carrying the second feedback information request that the terminal device is sent, and by the school Test request to send to the authentication module, control the authentication module to verify the inspection request, after being verified The business module is controlled to perform the business.
  5. 5. according to the method described in claim 4, it is characterized in that, the checking information includes sliding block Background and sliding block, institute State and request transmission checking information is obtained to the terminal device according to the checking information, including:
    The sliding block in sliding block Background and the sliding block Background is randomly selected from default background picture library;
    The sliding block Background and sliding block chosen are sent to the terminal device.
  6. 6. according to the method described in claim 4, it is characterized in that, the operation information includes the moving operation to the sliding block The final placement position information of information and the sliding block in the sliding block Background, it is described that institute is determined according to the operation information Terminal device is stated whether by verification, including:
    Determine whether final placement location of the sliding block in the sliding block Background matches with default sliding block placement location;
    When final placement location of the sliding block in the sliding block Background matches with default sliding block placement location, determine The terminal device is by verification, otherwise, it determines the terminal device is not verified.
  7. 7. according to the method described in claim 4, it is characterized in that, it is described to it is described inspection request verify, including:
    Second feedback information is obtained from the verification request;
    Determine whether second feedback information and first feedback information are consistent;
    When second feedback information is consistent with first feedback information, determine to be verified, otherwise, it determines verification is not led to Cross.
  8. 8. according to the method described in claim 4, it is characterized in that, the feedback information includes:The serial number of the business, industry Business mark, business sequence number and token.
  9. A kind of 9. authentication means, for terminal device, it is characterised in that including:
    First sending module, obtains request to server, so that described for when receiving service request, sending checking information Server obtains request according to the checking information and sends checking information to the terminal device;
    Interactive module, for showing the checking information, receives the operation information input by user to the checking information, concurrently The operation information is sent to the server, so that the server is verified according to the operation information;
    Receiving module, for receiving the server after being verified, the feedback information of transmission;
    Second sending module, request is examined to server for sending, wherein, described examine in request carries the feedback letter Breath, so that the server verifies the feedback information, and performs the business after being verified.
  10. 10. device according to claim 9, it is characterised in that the checking information includes sliding block Background and sliding block, institute Stating operation information includes finally the placing in the sliding block Background to the moving operation information of the sliding block and the sliding block Positional information.
  11. 11. device according to claim 9, it is characterised in that the feedback information includes:
    Serial number, service identification, business sequence number and the token of the business.
  12. A kind of 12. authentication means, for server, it is characterised in that including:
    Authentication module, for receiving terminal apparatus when receiving service request, the checking information of transmission, which obtains, asks, and according to The checking information obtains request and sends checking information to the terminal device;Receiving terminal apparatus is sent input by user right The operation information of the checking information, and determine whether the terminal device passes through verification according to the operation information;Determining When the terminal device passes through verification, the first feedback information is sent to the terminal device;
    Business module, the inspection for carrying the second feedback information request sent for receiving the terminal device, and by described in Verification request is sent to the authentication module, so that the authentication module verifies the inspection request, is being verified After control the business module to perform the business.
  13. 13. device according to claim 12, it is characterised in that the checking information includes sliding block Background and sliding block, It is described that request transmission checking information is obtained to the terminal device according to the checking information, including:
    The sliding block in sliding block Background and the sliding block Background is randomly selected from default background picture library;
    The sliding block Background and sliding block chosen are sent to the terminal device.
  14. 14. device according to claim 12, it is characterised in that the operation information includes the mobile behaviour to the sliding block Make the final placement position information of information and the sliding block in the sliding block Background, it is described to be determined according to the operation information The terminal device whether by verification, including:
    Determine whether final placement location of the sliding block in the sliding block Background matches with default sliding block placement location;
    When final placement location of the sliding block in the sliding block Background matches with default sliding block placement location, determine The terminal device is by verification, otherwise, it determines the terminal device is not verified.
  15. 15. device according to claim 12, it is characterised in that it is described that the inspection request is verified, including:
    Second feedback information is obtained from the verification request;
    Determine whether second feedback information and first feedback information are consistent;
    When second feedback information is consistent with first feedback information, determine to be verified, otherwise, it determines verification is not led to Cross.
  16. 16. device according to claim 12, it is characterised in that the feedback information includes:The serial number of the business, Service identification, business sequence number and token.
CN201711146394.1A 2017-11-17 2017-11-17 Auth method and device Pending CN107911366A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711146394.1A CN107911366A (en) 2017-11-17 2017-11-17 Auth method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711146394.1A CN107911366A (en) 2017-11-17 2017-11-17 Auth method and device

Publications (1)

Publication Number Publication Date
CN107911366A true CN107911366A (en) 2018-04-13

Family

ID=61846140

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711146394.1A Pending CN107911366A (en) 2017-11-17 2017-11-17 Auth method and device

Country Status (1)

Country Link
CN (1) CN107911366A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020024414A1 (en) * 2018-08-03 2020-02-06 平安科技(深圳)有限公司 User authentication method and device based on slider verification code

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217367A (en) * 2007-01-04 2008-07-09 中国移动通信集团公司 An operation right judgment system and method realized by introducing right judgment client end
CN101351027A (en) * 2007-07-19 2009-01-21 中国移动通信集团公司 Method and system for processing service authentication
CN102299928A (en) * 2011-09-13 2011-12-28 航天科工深圳(集团)有限公司 Network terminal service authentication method and device
CN104580104A (en) * 2013-10-24 2015-04-29 深圳市腾讯计算机系统有限公司 Method, device and system for identity verification
US20160028741A1 (en) * 2014-07-25 2016-01-28 Xiaomi Inc. Methods and devices for verification using verification code
CN105306208A (en) * 2014-07-21 2016-02-03 腾讯科技(深圳)有限公司 Identity verification method and identity verification device
CN106656944A (en) * 2015-11-03 2017-05-10 腾讯科技(深圳)有限公司 Slide verification method and apparatus for hand-held mobile device
CN106713367A (en) * 2017-03-02 2017-05-24 山东浪潮云服务信息科技有限公司 Authentication method, authentication platform, business system and authentication system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217367A (en) * 2007-01-04 2008-07-09 中国移动通信集团公司 An operation right judgment system and method realized by introducing right judgment client end
CN101351027A (en) * 2007-07-19 2009-01-21 中国移动通信集团公司 Method and system for processing service authentication
CN102299928A (en) * 2011-09-13 2011-12-28 航天科工深圳(集团)有限公司 Network terminal service authentication method and device
CN104580104A (en) * 2013-10-24 2015-04-29 深圳市腾讯计算机系统有限公司 Method, device and system for identity verification
CN105306208A (en) * 2014-07-21 2016-02-03 腾讯科技(深圳)有限公司 Identity verification method and identity verification device
US20160028741A1 (en) * 2014-07-25 2016-01-28 Xiaomi Inc. Methods and devices for verification using verification code
CN106656944A (en) * 2015-11-03 2017-05-10 腾讯科技(深圳)有限公司 Slide verification method and apparatus for hand-held mobile device
CN106713367A (en) * 2017-03-02 2017-05-24 山东浪潮云服务信息科技有限公司 Authentication method, authentication platform, business system and authentication system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020024414A1 (en) * 2018-08-03 2020-02-06 平安科技(深圳)有限公司 User authentication method and device based on slider verification code

Similar Documents

Publication Publication Date Title
US9098850B2 (en) System and method for transaction security responsive to a signed authentication
US11972428B2 (en) Information transmission method, apparatus and system
US20210234857A1 (en) Authentication system, authentication method, and application providing method
CN106464681B (en) Branch verifies token technology
US8683563B1 (en) Soft token posture assessment
CN103971039B (en) Access control system and method with GPS location verification
CN105245489B (en) Verification method and device
CN104268756B (en) Method of mobile payment and system
US20180018657A1 (en) Mobile terminals providing secure user interfaces
CN108121906A (en) A kind of verification method, device and computing device
CN105612731B (en) It may have access to application state across accredited and untrusted platform roaming internet
CN109214166A (en) Smart machine authentication control method and system
CN105721425A (en) Information processing method and electronic device
CN107679385A (en) A kind of fingerprint authentication method and device, terminal and readable storage medium storing program for executing
CN107864120A (en) Auth method, device and computer-readable recording medium
CN104426657B (en) A kind of service authentication method, system and server
CN107872435A (en) A kind of method and device of safety verification
CN107911366A (en) Auth method and device
CN107968779A (en) Auth method and device
CN110430213A (en) Service request processing method, apparatus and system
US20190197543A1 (en) Methods for authenticating a user, authentication devices, and computer readable media
CN106203998A (en) A kind of method and device of withdrawing deposit of net cast
CN107483208A (en) Generation, verification method and the device of identifying code picture
CN108241980A (en) Authorization and authentication method, system and the ebanking server of cross-terminal, Mobile Server
CN107920044A (en) A kind of safe verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180413

WD01 Invention patent application deemed withdrawn after publication