CN109788126A - Verify code imput method and equipment - Google Patents
Verify code imput method and equipment Download PDFInfo
- Publication number
- CN109788126A CN109788126A CN201811583544.XA CN201811583544A CN109788126A CN 109788126 A CN109788126 A CN 109788126A CN 201811583544 A CN201811583544 A CN 201811583544A CN 109788126 A CN109788126 A CN 109788126A
- Authority
- CN
- China
- Prior art keywords
- input
- character
- identifying code
- user
- dummy keyboard
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
This application provides a kind of verifying code imput method and equipment, one can be provided a user for inputting the dummy keyboard of preset characters, then the input operation that user presses the first character in the dummy keyboard is obtained, and corresponding first character is operated based on the input and inserts identifying code in form page, the preset characters that can be only inputted due to user by the dummy keyboard of the offer, forbidden character will not inadvertently be inputted by ensuring that, identifying code mistake caused by avoiding because of input forbidden character, it is the input operation for pressing the first character in the dummy keyboard based on user in input simultaneously, compared to the input operation pressed and lifted, response speed is faster, it can be improved the efficiency of identifying code input.
Description
Technical field
This application involves information technology field more particularly to a kind of verifying code imput method and equipment.
Background technique
Increasingly developed with smart phone, user can be realized various by the application program being mounted on smart phone
The function of various kinds, such as shopping online, game, social activity and Domestic News.User often may require that when using application program
User identity is verified, current verification mode is mainly to obtain verifying transmitted by the corresponding server of application program
Then code inputs correct identifying code in the form page that application program provides.But in the operation for actually entering identifying code
Cheng Zhong is easy due to being dummy keyboard directly included using the operating system of smart phone because accidentally having input
Forbidden character in the identifying codes such as space, point number, and lead to the identifying code error of input.
Apply for content
The first purpose of the application is to provide a kind of verifying code imput method and equipment.
To achieve the above object, some embodiments of the present application provide a kind of verifying code imput method, this method comprises:
One is provided for inputting the dummy keyboard of preset characters;
Obtain the input operation that user presses the first character in the dummy keyboard;
Corresponding first character is operated based on the input, and identifying code is inserted in form page.
Another aspect based on the application, additionally provides a kind of identifying code input equipment, which includes based on storing
The memory of calculation machine program instruction and processor for executing computer program instructions, wherein when the computer program instructions
When being executed by the processor, triggers the equipment and execute the verifying code imput method.
In addition, computer program instructions are stored thereon with the embodiment of the present application also provides a kind of computer-readable medium,
The computer-readable instruction can be executed by processor to realize the verifying code imput method.
In the scheme that some embodiments of the present application provide, equipment can provide a user one for inputting preset characters
Then dummy keyboard is obtained user and presses the input operation of the first character in the dummy keyboard, and grasped based on the input
Make corresponding first character and insert identifying code in form page, can only be inputted due to user by the dummy keyboard of the offer
Preset characters, forbidden character will not inadvertently be inputted by ensuring that, be tested caused by avoiding because of input forbidden character
Code mistake is demonstrate,proved, while being the input operation for pressing the first character in the dummy keyboard based on user in input, compared to
The input operation pressed and lifted, response speed faster, can be improved the efficiency of identifying code input.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 is a kind of process flow diagram for verifying code imput method provided by the embodiments of the present application;
Fig. 2 is the schematic diagram of the corresponding equipment processing of operation of the user in dummy keyboard in the embodiment of the present application;
Fig. 3 is the respective treated process signal of execution of user's operation and mobile phone in verification process in the embodiment of the present application
Figure;
Fig. 4 is a kind of structural schematic diagram of calculating equipment for realizing identifying code input provided by the embodiments of the present application;
The same or similar appended drawing reference represents the same or similar component in attached drawing.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall in the protection scope of this application.
In a typical configuration of this application, terminal, the equipment of service network include one or more processors
(CPU), input/output interface, network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media, can be by any side
Method or technology realize that information stores.Information can be computer readable instructions, data structure, the module of program or other numbers
According to.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory
(SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory
(ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM (CD-
ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storages
Equipment or any other non-transmission medium, can be used for storage can be accessed by a computing device information.
The embodiment of the present application provides a kind of verifying code imput method, and this method is capable of providing one for inputting preset characters
Dummy keyboard so that user passes through the preset characters that only input of the dummy keyboard, ensuring that will not be inadvertently defeated
Enter forbidden character, identifying code mistake caused by avoiding because of input forbidden character, while being based on user in institute in input
State pressed in dummy keyboard the first character input operation, compared to press and lift input operation, response speed faster, energy
Enough improve the efficiency of identifying code input.In actual scene, the equipment for executing this method can be all types of user equipment, including but
It is not limited to the terminal that computer, mobile phone, tablet computer, smartwatch etc. have touch screen.
Fig. 1 show it is provided by the embodiments of the present application it is a kind of verify code imput method process flow, this method include with
Lower processing step:
Step S101 provides one for inputting the dummy keyboard of preset characters.The particular content of the preset characters can be with
It is determined according to the concrete form of identifying code to be entered in practical application scene, such as identifying code to be entered only includes number,
Then the preset characters can also only include number, to ensure that user will not input other forbidden characters in addition to number.If
Identifying code to be entered includes number and English alphabet, and correspondingly, the preset characters also may include number and English alphabet.
To guarantee that user can only input preset characters by dummy keyboard, the void for only showing preset characters can be provided
Quasi- keyboard, alternatively, the dummy keyboard that can also be carried to device operating system is modified, it is included providing device operating system
Dummy keyboard when, shield other characters in addition to preset characters, it is ensured that forbidden character will not be inputted.
Step S102 obtains the input operation that user presses the first character in the dummy keyboard.Due in routine
In input mode, equipment can generally obtain the input operation that user presses some character and lifted in dummy keyboard, and will
The character recognition is a character of this input, and in scheme provided by the embodiments of the present application, it is based on user described
Pressed in dummy keyboard the first character input operation, come identify this input a character, response speed faster, therefore
What is inputted is more efficient.
In a kind of embodiment of the application, the dummy keyboard can be based on touchstart event detection input behaviour
Make, touchstart event is a kind of common HTML5 touch event, for triggering when the finger of user touches screen.By
This can pass through touchstart event when acquisition user presses the input operation of the first character in the dummy keyboard
Obtain the input operation that user presses the first character in the dummy keyboard.
Step S103 operates corresponding first character based on the input and inserts identifying code in form page.Wherein, described
Form page is the page for inputting identifying code, and the character of user's input can be received in the input frame in form page, finally mention
Supply authentication server is verified.In actual scene, due to identifying code often have multiple characters composition (such as 4 or
6 characters of person), therefore need to obtain the first character of respective numbers in step s 102, to form identifying code to be entered.
For example, needing to obtain the input behaviour that user presses 4 characters in the dummy keyboard if identifying code is made of 4 bit digitals
Make, to obtain in identifying code filling form page to be verified, completes the input of identifying code.
In some embodiments of the present application, is inserted and tested in form page based on corresponding first character of input operation
When demonstrate,proving code, corresponding first character first can be operated based on the input, determine this identifying code for needing to input.For example, if
The code of corresponding function is based on Vue.js frame, then can be based on the data-driven principle of Vue Data, according to each input behaviour
Make, successively determine this first character for needing to include in the identifying code inputted, is combined into this identifying code for needing to input, so
The identifying code is inserted in form page again afterwards.
In actual scene, after successively determining the first character that this needs to include in the identifying code inputted, Ke Yi
The display area of dummy keyboard is shown, and enables a user to check the character inputted, to the character actually entered
Confirmed.The display area can be some region in dummy keyboard, such as the top area of dummy keyboard, when with
Family inputs after a character, can show this character inputted in the display area, actually enter word convenient for user's judgement
Whether what is accorded with is wrong.
In some embodiments of the present application, the scaling to the dummy keyboard of dummy keyboard shielding user's input
Operation.For example, dummy keyboard can be scaled in the IOS operating system of a certain version, in order to there is the user of particular demands
It uses, but user not may require that generally when using the character of dummy keyboard input identifying code and use scaling dummy keyboard
Function, if accidentally triggering scaling, the input of identifying code may be influenced instead.Therefore, provided by the embodiments of the present application virtual
Keyboard can shield the zoom operations to the dummy keyboard of user's input, to avoid dummy keyboard zoom function to identifying code
The influence of input.
In order to enable user can clearly know that its input operates the character in currently selected, can detect
When user presses the input operation of the first character in the dummy keyboard, for first character addition response pattern.It is described
Response pattern can be all kinds of display effects for being different from other not selected characters on dummy keyboard, such as change the first word
All kinds of effects such as font color, background color, the overstriking font of symbol, thus when user presses some character on dummy keyboard
Afterwards, it can be seen that significant change occurs in the display effect of the character, judges whether to have selected correct character convenient for user.This
Outside, when detecting that the input operation for pressing the first character is cancelled, cancel the response pattern, so that user presses in release
Under finger after, can allow display effect change character restore to the original state.
In some embodiments of the present application, the input behaviour of the first character is pressed in the dummy keyboard in acquisition user
Before work, the verifying that can be inputted according to user triggers information, triggering identifying code input.Wherein, the verifying triggering information can
To be information of user's triggering authentication server to the terminal device of user transmission identifying code, such as can be to be filled in when user's checking
Cell-phone number etc., after user's input handset in level of application, authentication server will receive the cell-phone number, and to the hand
Machine number sends this identifying code for needing to input, to trigger the process flow of aforementioned authentication code input.
Wherein, when obtaining the verifying of user's input and triggering information, equally can use offer for inputting preset characters
Dummy keyboard, that is, obtain the input operation that the user presses the second character in the dummy keyboard, be then based on described
Input operates corresponding second character, and the verifying for obtaining user's input triggers information.For example, when verifying triggering information is user
When cell-phone number, the input of cell-phone number can be completed by the multiple numbers pressed in successively dummy keyboard, when cell-phone number has inputted
At later, which is sent to authentication server on backstage by equipment, and requests verification server sends to the cell-phone number and verifies
Code, while the input of identifying code can be triggered in equipment, so that user presses in the dummy keyboard about identifying code
First character.
When receiving the message of the identifying code inputted comprising this needs, in order to avoid user can not find identifying code or not
Know that identifying code is, equipment can be prompted to user after receiving the message.For example, mobile phone receive about
After the short message of identifying code, the user can be prompted, and specific prompting mode can be specific by specific sound or display
Text, pattern etc..
In addition, the correctness in order to guarantee the identifying code inserted in form page, is inserted in form page by the identifying code
Before, the identifying code can be verified, determines the verifying triggering information matches of the identifying code and user's input.Specifically
Verification mode can be after identifying code has been determined according to the input of user operation, and identifying code is committed to verifying clothes on backstage
Business device, compared with identifying code is triggered information with corresponding verifying by authentication server, it is determined whether matching.Equipment can be with as a result,
Only after confirmation matching, just the identifying code is inserted in form page, guarantees that the identifying code of filling is correct.
Fig. 2 shows in the implementation of the application, operation corresponding equipment processing of the user in dummy keyboard is shown
It is intended to, takes the mobile phone as an example, when user presses the button of character on mobile telephone virtual keyboard, mobile phone can adds response sample in the character
Formula (active pattern), while the character pressed is determined based on the data-driven principle of Vue Data, then in dummy keyboard
Display area shows cell-phone number, the corresponding character of identifying code;And when user unclamps the button of character on mobile telephone virtual keyboard, hand
Chance removes the response pattern (active pattern) added in the character.
Fig. 3 shows user when verifying using mobile phone, and the operation of user and the execution of mobile phone are respective treated
Process, mobile phone uses verifying code input scheme provided by the embodiments of the present application in this process, comprising the following steps:
Step S301, in needing the scene verified, mobile phone provides a form page for being verified, in the form page
Comprising input frame, it to be used for input handset number and corresponding identifying code.
Step S302, when the user clicks after input frame, mobile phone open is used to input the dummy keyboard of preset characters, for user
Input handset number.In this scenario, which can be not only used for input handset number, it can also be used to input identifying code.And another
In some embodiments, for input preset characters dummy keyboard can the only unlatching when needing to input identifying code, that is, be only used for
Identifying code is inputted, and the included dummy keyboard of mobile phone operating system then can be used in the dummy keyboard of input handset number.
Step S303, user pass through dummy keyboard input handset number.In this process, mobile phone can be based on Vue Data's
Data-driven principle determines the character pressed, and is then shown in the display area of dummy keyboard, so that user judges reality
Whether the cell-phone number of input is correct.
Step S304, mobile phone verify the cell-phone number of input, judge whether to meet preset format, such as specifically can be with
Judge whether digit is correct, whether include forbidden character etc..If unverified, user is prompted to re-enter cell-phone number;If
By verifying, then continue next step.
Step S305, user click confirmation.
Step S306, handset requests authentication server sends identifying code to the cell-phone number, if corresponding cell-phone number does not receive
Identifying code, then can requests verification server transmission again after 60 seconds.
Step S307, after identifying code is sent successfully, user's input sequentially inputs testing of receiving in dummy keyboard
Demonstrate,prove each character in code.In this process, mobile phone can equally be pressed based on the determination of the data-driven principle of Vue Data
Then character is shown in the display area of dummy keyboard, so that user judges whether the identifying code actually entered is correct.This
Outside, if the corresponding equipment of cell-phone number of input is the mobile phone, the mobile phone after determining and receiving about the short message of identifying code,
User can be prompted to check the identifying code in short message, can not find identifying code to avoid generation certain customers or do not know verifying
What the case where code is.
Step S308, mobile phone verify the identifying code of input, judge whether to match with cell-phone number.Concrete mode can be with
That identifying code is committed to authentication server, by authentication server by identifying code compared with corresponding cell-phone number, determine both be
No matching.If mismatching, user is allowed to input identifying code again, if matching, continues next step.
Step S309, after identifying code is verified, mobile phone can close dummy keyboard, while will obtain correct mobile phone
Number and identifying code filling form page in, to complete entire verification process.
Based on the same inventive concept, a kind of identifying code input equipment, the equipment pair are additionally provided in the embodiment of the present application
The method answered is the verifying code imput method in previous embodiment, and its principle solved the problems, such as is similar to this method.This sets
Standby includes the memory for storing computer program instructions and the processor for executing computer program instructions, wherein when
When the computer program instructions are executed by the processor, triggers the equipment and execute verifying code imput method above-mentioned.It is specific
It realizes and can include but is not limited to the terminal that computer, mobile phone, tablet computer, smartwatch etc. have touch screen.
Fig. 4 shows a kind of calculating equipment for the method and/or technology scheme being adapted to carry out in the embodiment of the present application
Structure, the calculating equipment 400 include central processing unit (CPU, Central Processing Unit) 401, can basis
The program that is stored in read-only memory (ROM, Read Only Memory) 402 is loaded at random from storage section 408
It accesses the program in memory (RAM, Random Access Memory) 403 and executes various movements appropriate and processing.?
In RAM 403, it is also stored with various programs and data needed for system operatio.CPU 401, ROM402 and RAM 403 pass through
Bus 404 is connected with each other.Input/output (I/O, Input/Output) interface 405 is also connected to bus 404.
I/O interface 405 is connected to lower component: the importation 406 including keyboard, mouse, touch screen etc.;Including such as
Cathode-ray tube (CRT, Cathode Ray Tube), liquid crystal display (LCD, Liquid Crystal Display), LED are aobvious
Show the output par, c 407 of device, OLED display etc. and loudspeaker etc.;Including hard disk, CD, disk, semiconductor memory etc.
The storage section 408 of one or more computer-readable mediums;And including such as LAN (local area network, Local Area
Network) the communications portion 409 of the network interface card of card, modem etc..Communications portion 409 is via such as internet
Network executes communication process.
Particularly, the method in the embodiment of the present application and/or embodiment may be implemented as computer software programs.Example
Such as, embodiment of the disclosure includes a kind of computer program product comprising carries computer on a computer-readable medium
Program, the computer program include the program code for method shown in execution flow chart.It is central in the computer program
When processing unit (CPU) 401 executes, the above-mentioned function of limiting in the present processes is executed.
It should be noted that computer-readable medium described herein can be computer-readable signal media or meter
Calculation machine readable storage medium storing program for executing either the two any combination.Computer-readable medium for example can be --- but it is unlimited
In system, device or the device of --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or any above combination.It calculates
The more specific example of machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, portable of one or more conducting wires
Formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable programmable read only memory
(EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device or
The above-mentioned any appropriate combination of person.In this application, computer-readable medium, which can be, any includes or storage program has
Shape medium, the program can be commanded execution system, device or device use or in connection.
And in this application, computer-readable signal media may include passing in a base band or as carrier wave a part
The data-signal broadcast, wherein carrying computer-readable program code.The data-signal of this propagation can use a variety of shapes
Formula, including but not limited to electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media may be used also
To be any computer-readable medium other than computer readable storage medium, which can send, propagate
Either transmission is for by the use of instruction execution system, device or device or program in connection.It is computer-readable
The program code for including on medium can transmit with any suitable medium, including but not limited to: wireless, electric wire, optical cable, RF etc.
Deng or above-mentioned any appropriate combination.
The calculating of the operation for executing the application can be write with one or more programming languages or combinations thereof
Machine program code, described program design language include object oriented program language-such as Java, Smalltalk, C+
+, it further include conventional procedural programming language-such as " C " language or similar programming language.Program code can
Fully to execute, partly execute on the user computer on the user computer, be executed as an independent software package,
Part executes on the remote computer or executes on a remote computer or server completely on the user computer for part.
In situations involving remote computers, remote computer can pass through the network of any kind --- including local area network (LAN)
Or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as utilize Internet service
Provider is connected by internet).
Flowchart or block diagram in attached drawing shows the equipment according to the various embodiments of the application, method and computer program
The architecture, function and operation in the cards of product.In this regard, each box in flowchart or block diagram can represent
A part of a part of one module, program segment or code, the module, program segment or code is used for comprising one or more
The executable instruction of logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box
Function can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated actually may be used
To be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that
, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with executing
The dedicated systems for hardware of defined functions or operations realizes, or can use specialized hardware and computer instruction
Combination is to realize.
As on the other hand, present invention also provides a kind of computer-readable medium, which be can be
Included in equipment described in above-described embodiment;It is also possible to individualism, and without in the supplying equipment.Above-mentioned calculating
Machine readable medium carries one or more computer-readable instruction, the computer-readable instruction can be executed by processor with
Realize the method and/or technology scheme of multiple embodiments of aforementioned the application.
In conclusion equipment can provide a user one for inputting in the scheme that some embodiments of the present application provide
Then the dummy keyboard of preset characters obtains user and presses the input operation of the first character in the dummy keyboard, and is based on
The input operates corresponding first character and inserts identifying code in form page, due to user by the dummy keyboard of the offer only
The preset characters that can be inputted, forbidden character will not inadvertently be inputted by ensuring that, be avoided because inputting forbidden character
Caused by identifying code mistake, while input when be pressed in the dummy keyboard based on user the first character input behaviour
Make, compared to the input operation pressed and lifted, response speed faster, can be improved the efficiency of identifying code input.
It should be noted that the application can be carried out in the assembly of software and/or software and hardware, for example, can adopt
With specific integrated circuit (ASIC), general purpose computer or any other realized similar to hardware device.In some embodiments
In, the software program of the application can be executed by processor to realize above step or function.Similarly, the software of the application
Program (including relevant data structure) can be stored in computer readable recording medium, for example, RAM memory, magnetic or
CD-ROM driver or floppy disc and similar devices.In addition, hardware can be used to realize in some steps or function of the application, for example,
As the circuit cooperated with processor thereby executing each step or function.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned exemplary embodiment, Er Qie
In the case where without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter
From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and scope of the present application is by appended power
Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims
Variation is included in the application.Any reference signs in the claims should not be construed as limiting the involved claims.This
Outside, it is clear that one word of " comprising " does not exclude other units or steps, and odd number is not excluded for plural number.That states in device claim is multiple
Unit or device can also be implemented through software or hardware by a unit or device.The first, the second equal words are used to table
Show title, and does not indicate any particular order.
Claims (11)
1. a kind of verifying code imput method, wherein this method comprises:
One is provided for inputting the dummy keyboard of preset characters;
Obtain the input operation that user presses the first character in the dummy keyboard;
Corresponding first character is operated based on the input, and identifying code is inserted in form page.
2. according to the method described in claim 1, wherein, the dummy keyboard is based on touchstart event detection input behaviour
Make;
Obtain the input operation that user presses the first character in the dummy keyboard, comprising:
The input operation that user presses the first character in the dummy keyboard is obtained by touchstart event.
3. according to the method described in claim 1, wherein, dummy keyboard shielding user's input to the dummy keyboard
Zoom operations.
4. according to the method described in claim 1, wherein, this method further include:
When detecting user in the dummy keyboard and pressing the input operation of the first character, rung for first character addition
Answer pattern;And
When detecting that the input operation for pressing the first character is cancelled, cancel the response pattern.
5. according to the method described in claim 1, wherein, operating corresponding first character based on the input and being filled out in form page
Enter identifying code, comprising:
Corresponding first character is operated based on the input, determines this identifying code for needing to input;
The identifying code is inserted in form page.
6. determining that this is needed according to the method described in claim 5, wherein, operating corresponding first character based on the input
The identifying code to be inputted, comprising:
According to each input operation, this first character for needing to include in the identifying code inputted is successively determined, and in the void
The display area of quasi- keyboard is shown.
7. method according to claim 5 or 6, wherein press the first character in the dummy keyboard obtaining user
Input operation before, further includes:
Information, triggering identifying code input are triggered according to the verifying of user's input;
Before the identifying code is inserted in form page, further includes:
The identifying code is verified, determines the verifying triggering information matches of the identifying code and user's input.
8. according to the method described in claim 7, wherein, triggering information in the verifying inputted according to user, triggering identifying code is defeated
Before entering, further includes:
Obtain the input operation that the user presses the second character in the dummy keyboard;
Corresponding second character is operated based on the input, the verifying for obtaining user's input triggers information.
9. according to the method described in claim 1, wherein, this method further include:
The message of the identifying code inputted comprising this needs is received, and is prompted receiving the message rear line.
10. a kind of identifying code input equipment, wherein the equipment includes memory for storing computer program instructions and is used for
Execute the processor of computer program instructions, wherein when the computer program instructions are executed by the processor, set described in triggering
Method described in any one of standby perform claim requirement 1 to 9.
11. a kind of computer-readable medium, is stored thereon with computer program instructions, the computer-readable instruction can be processed
Device is executed to realize method as claimed in any one of claims 1-9 wherein.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811583544.XA CN109788126A (en) | 2018-12-24 | 2018-12-24 | Verify code imput method and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811583544.XA CN109788126A (en) | 2018-12-24 | 2018-12-24 | Verify code imput method and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109788126A true CN109788126A (en) | 2019-05-21 |
Family
ID=66498333
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811583544.XA Pending CN109788126A (en) | 2018-12-24 | 2018-12-24 | Verify code imput method and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109788126A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111061386A (en) * | 2019-11-30 | 2020-04-24 | Tcl 移动通信科技(宁波)有限公司 | SSID input method and device, authentication method and readable storage medium |
CN113343189A (en) * | 2021-07-01 | 2021-09-03 | 百融云创科技股份有限公司 | Method and device for preventing malicious swiping of short message verification code |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3938091A (en) * | 1972-03-17 | 1976-02-10 | Atalla Technovations Company | Personal verification system |
CN102508558A (en) * | 2011-11-25 | 2012-06-20 | 宇龙计算机通信科技(深圳)有限公司 | Input system, terminal and input method |
CN103197893A (en) * | 2012-12-07 | 2013-07-10 | 杭州斯凯网络科技有限公司 | Method for reminding user whether current input information is wrong or not in Android system |
CN103996011A (en) * | 2014-06-05 | 2014-08-20 | 福建天晴数码有限公司 | Method and device for protecting codes to be input safely |
WO2014169668A1 (en) * | 2013-04-18 | 2014-10-23 | Tencent Technology (Shenzhen) Company Limited | Method, device and system for verifying based on verification diagram, and storage medium |
CN105243315A (en) * | 2014-06-26 | 2016-01-13 | 优视科技有限公司 | Single picture verification code input method, apparatus and system |
CN106293124A (en) * | 2016-08-05 | 2017-01-04 | 努比亚技术有限公司 | Input method switching device, terminal and method |
CN106878248A (en) * | 2016-08-12 | 2017-06-20 | 阿里巴巴集团控股有限公司 | A kind of verification method and equipment |
CN107483733A (en) * | 2017-08-18 | 2017-12-15 | 广东欧珀移动通信有限公司 | volume adjusting method, device, terminal and storage medium |
-
2018
- 2018-12-24 CN CN201811583544.XA patent/CN109788126A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3938091A (en) * | 1972-03-17 | 1976-02-10 | Atalla Technovations Company | Personal verification system |
CN102508558A (en) * | 2011-11-25 | 2012-06-20 | 宇龙计算机通信科技(深圳)有限公司 | Input system, terminal and input method |
CN103197893A (en) * | 2012-12-07 | 2013-07-10 | 杭州斯凯网络科技有限公司 | Method for reminding user whether current input information is wrong or not in Android system |
WO2014169668A1 (en) * | 2013-04-18 | 2014-10-23 | Tencent Technology (Shenzhen) Company Limited | Method, device and system for verifying based on verification diagram, and storage medium |
CN103996011A (en) * | 2014-06-05 | 2014-08-20 | 福建天晴数码有限公司 | Method and device for protecting codes to be input safely |
CN105243315A (en) * | 2014-06-26 | 2016-01-13 | 优视科技有限公司 | Single picture verification code input method, apparatus and system |
CN106293124A (en) * | 2016-08-05 | 2017-01-04 | 努比亚技术有限公司 | Input method switching device, terminal and method |
CN106878248A (en) * | 2016-08-12 | 2017-06-20 | 阿里巴巴集团控股有限公司 | A kind of verification method and equipment |
CN107483733A (en) * | 2017-08-18 | 2017-12-15 | 广东欧珀移动通信有限公司 | volume adjusting method, device, terminal and storage medium |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111061386A (en) * | 2019-11-30 | 2020-04-24 | Tcl 移动通信科技(宁波)有限公司 | SSID input method and device, authentication method and readable storage medium |
CN111061386B (en) * | 2019-11-30 | 2023-11-03 | 西藏霖栋科技有限公司 | SSID input method and device, SSID verification method and readable storage medium |
CN113343189A (en) * | 2021-07-01 | 2021-09-03 | 百融云创科技股份有限公司 | Method and device for preventing malicious swiping of short message verification code |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6609047B2 (en) | Method and device for application information risk management | |
CN109739478A (en) | Front end project automated construction method, device, storage medium and electronic equipment | |
CN106850503B (en) | Login-free identity authentication method and device | |
CN106656944B (en) | Method and device for sliding verification of handheld mobile equipment | |
CN106503996A (en) | Payment transaction based on web provides equipment, method and system | |
CN108960839B (en) | Payment method and device | |
CN104348617A (en) | Verification code processing method and device, and terminal and server | |
CN110377289A (en) | A kind of data analysis method, device, medium and electronic equipment | |
CN110336781A (en) | A kind of method and apparatus based on browser identification terminal uniqueness | |
CN111787154A (en) | Information processing method and electronic equipment | |
CN109408754A (en) | Processing method, device, electronic equipment and the storage medium of web page operation data | |
CN107395670A (en) | Information push method, device, equipment and computer-readable recording medium | |
CN109947408A (en) | Information push method and device, storage medium and electronic equipment | |
US20180357404A1 (en) | Information processing method and apparatus, and electronic device | |
CN109788126A (en) | Verify code imput method and equipment | |
CN110351672B (en) | Information pushing method and device and electronic equipment | |
CN111242462A (en) | Data processing method and device, computer storage medium and electronic equipment | |
CN109815423A (en) | Two-dimensional code identification method, system, equipment and storage medium based on terminal classification | |
CN107046547B (en) | Abnormal operation identification method and device | |
CN112131092A (en) | Page debugging method and device | |
CN111488180B (en) | Service information processing method and device, electronic equipment and storage medium | |
CN110209572A (en) | Ui testing method, ui testing system and terminal | |
CN106610966A (en) | Information providing method and device | |
CN108882006A (en) | A kind of conversion method of message format, device, storage medium and android terminal | |
CN109005469A (en) | A kind of conversion method of message format, device, storage medium and android terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190521 |
|
RJ01 | Rejection of invention patent application after publication |