CN109862562A - A kind of dynamic verification code choosing method and system - Google Patents

A kind of dynamic verification code choosing method and system Download PDF

Info

Publication number
CN109862562A
CN109862562A CN201910002274.7A CN201910002274A CN109862562A CN 109862562 A CN109862562 A CN 109862562A CN 201910002274 A CN201910002274 A CN 201910002274A CN 109862562 A CN109862562 A CN 109862562A
Authority
CN
China
Prior art keywords
terminal
information
user terminal
safety
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910002274.7A
Other languages
Chinese (zh)
Inventor
王文达
陈国庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Summit Network Technology Co Ltd
Original Assignee
Wuhan Summit Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Summit Network Technology Co Ltd filed Critical Wuhan Summit Network Technology Co Ltd
Priority to CN201910002274.7A priority Critical patent/CN109862562A/en
Publication of CN109862562A publication Critical patent/CN109862562A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the present invention provides a kind of dynamic verification code choosing method and system, provided method includes: the terminal's status information for obtaining user terminal and sending, according to terminal's status information, security performance assessing is carried out to the safety state information of user terminal, obtains the safety state information of user terminal;According to the safe condition of user terminal, identifying code corresponding with the safety state information is sent to user terminal;Wherein, terminal's status information includes but is not limited to: one of network-related data, terminal software environment information, terminal hardware information, terminal operation information or a variety of combinations.Method provided in an embodiment of the present invention, according to safety evaluation result, it chooses corresponding identifying code and is sent to user terminal, the degree of risk of user terminal has been estimated in advance, improve the safety of user terminal verification process, simultaneously because the identifying code difficulty for the higher user of authenticity can be reduced dynamically, therefore the user experience of ordinary user can be promoted.

Description

A kind of dynamic verification code choosing method and system
Technical field
The present embodiments relate to technical field of network security more particularly to a kind of dynamic verification code choosing method and it is System.
Background technique
Internet area, in order to ensure core resource Bu Bei Fan device obtains, needs to use current operation in many interaction scenarios The identity at family does the verification of Ji machine.Most common Ren Fan verification mode is identifying code, mode that there are many identifying codes, such as problem formula, Recognition type etc..Due to verifying the difference of form, identifying code is experienced have certain otherness for a user, and machine is known Certain difficulty is not had yet to distinguish.
At present generally, for the identifying code that machine is difficult to, true user is just experienced very poor, impaired The normal discharge of website increases;Preferable identifying code is experienced for real user, identifies also opposite meeting for machine It is easy.Therefore often business side is difficult to decision and what verifying form to be coped with current verification scene using on earth, and can not Accomplish that experience gets both with safe.
Summary of the invention
The embodiment of the present invention provides a kind of dynamic verification code choosing method and system, to solve business side in the prior art It is difficult to decision and what verifying form to cope with current verification scene using on earth, and can not accomplish that experience gets both with safe The problem of.
In a first aspect, the embodiment of the present invention provides a kind of dynamic verification code choosing method, comprising:
The terminal's status information that user terminal is sent is obtained, according to the terminal's status information, to the user terminal Safety state information carries out security performance assessing, obtains the safety state information of the user terminal;
According to the safe condition of the user terminal, Xiang Suoshu user terminal sends corresponding with the safety state information Identifying code;
Wherein, the terminal's status information includes but is not limited to: network-related data, terminal software environment information, terminal One of hardware information, terminal operation information or a variety of combinations.
Second aspect, the embodiment of the present invention provide a kind of dynamic verification code selecting system, comprising:
Evaluation module, for obtaining the terminal's status information of user terminal transmission, according to the terminal's status information, to institute The safety state information for stating user terminal carries out security performance assessing, obtains the safety state information of the user terminal;
Identifying code chooses module, and for the safe condition according to the user terminal, Xiang Suoshu user terminal is sent and institute State the corresponding identifying code of safety state information;
Wherein, the terminal's status information includes but is not limited to: network-related data, terminal software environment information, terminal One of hardware information, terminal operation information or a variety of combinations.
The third aspect, the embodiment of the present invention provides a kind of electronic equipment, including memory, processor and is stored in memory Computer program that is upper and can running on a processor, the processor are realized when executing described program such as above-mentioned first aspect institute The step of dynamic verification code choosing method of offer.
Fourth aspect, the embodiment of the present invention provide a kind of non-transient computer readable storage medium, are stored thereon with calculating Machine program realizes the dynamic verification code choosing method as provided by above-mentioned first aspect when the computer program is executed by processor The step of.
Dynamic verification code choosing method provided in an embodiment of the present invention and equipment, collect the status information of user terminal, root The safety of user terminal is assessed according to status information, is sent according to safety evaluation as a result, choosing corresponding identifying code To user terminal, the degree of risk of user terminal has been estimated in advance, improves the safety of user terminal verification process, while by In can dynamically reduce the identifying code difficulty for the higher user of authenticity, therefore the user's body of ordinary user can be promoted It tests.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow diagram for the dynamic verification code choosing method that one embodiment of the invention provides;
Fig. 2 is the structural schematic diagram for the dynamic verification code selecting system that one embodiment of the invention provides;
Fig. 3 is the structural schematic diagram for the electronic equipment that one embodiment of the invention provides.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
With reference to Fig. 1, Fig. 1 is the flow diagram for the dynamic verification code choosing method that one embodiment of the invention provides, and is mentioned The method of confession includes:
S1 obtains the terminal's status information that user terminal is sent, according to the terminal's status information, to the user terminal Safety state information carry out security performance assessing, obtain the safety state information of the user terminal.
S2, according to the safe condition of the user terminal, Xiang Suoshu user terminal is sent and the safety state information pair The identifying code answered.
Wherein, the terminal's status information includes but is not limited to: network-related data, terminal software environment information, terminal One of hardware information, terminal operation information or a variety of combinations.
Specifically, interaction scenarios pop up identifying code before, system can to the status information of user terminal collection terminal, In, terminal's status information includes but is not limited to: network-related data, terminal software environment information, terminal hardware information, terminal behaviour Make one of information or a variety of combinations.
After obtaining the status information of user terminal, the safety of user terminal can be commented by status information Estimate, such as the IP information in network-related data is differentiated, obtains the request frequency of the corresponding IP of the user terminal, simultaneously One planning is done to the normal range (NR) of the request frequency, when the request frequency of the corresponding IP of user terminal is in preset normal range (NR) When, then show that the safe condition of user equipment is higher, it is corresponding, if the request frequency of the corresponding IP of user terminal it is preset just Other than normal range, then show that the safe condition of user equipment is lower.
In the comprehensive assessment for carrying out safe condition to user terminal according to terminal's status information several different, work as user When terminal is in a safe condition, then preferable identifying code is experienced to user terminal push, user only needs shirtsleeve operation Complete verifying.On the other hand, when user terminal is in unsafe state, then to user terminal push, safety is higher tests Code is demonstrate,proved, user needs to complete more complicated movement just achievable verifying movement.
By the method, the status information of user terminal is collected, the safety of user terminal is carried out according to status information Assessment, according to safety evaluation as a result, choosing corresponding identifying code is sent to user terminal, has estimated the wind of user terminal in advance Dangerous degree improves the safety of user terminal verification process, simultaneously because can dynamically reduce for the higher use of authenticity The identifying code difficulty at family, therefore the user experience of ordinary user can be promoted.
On the basis of the above embodiments, the network-related data includes but is not limited to: IP, Intranet IP, http request One of header information and ssl protocol layer information or a variety of combinations.
Wherein, described according to the terminal's status information, safety is carried out to the safety state information of the user terminal The step of capable of assessing, obtain the safety state information of the user terminal, specifically includes:
Obtain the network-related data of the user terminal;According to the IP in the network-related data, the IP is inquired Visitation frequency;According to the terminal Intranet IP in the network-related data, the visitation frequency of the terminal Intranet IP is inquired;Root According to the http request header information in the network-related data, the legitimacy of the http request header information is obtained;According to Ssl protocol layer information in the network-related data obtains the legitimacy of the ssl protocol layer information;According to the IP's Visitation frequency, the visitation frequency of Intranet IP, the legitimacy of http request header information and ssl protocol layer information legitimacy, it is right The safety of the user terminal is scored.
According to the safe condition of the user terminal, Xiang Suoshu user terminal sends corresponding with the safety state information The step of identifying code specifically includes: the safety for obtaining the user terminal to the safe condition of the user terminal is scored;If The safety scoring is lower than preset threshold, then sends high security identifying code to the user terminal.If the safety is commented Divide and be higher than preset threshold, then sends high user experience identifying code to the user terminal.
Wherein, the network-related data includes but is not limited to: IP, terminal Intranet IP, http request header information and ssl It is one or more in protocol layer information.
Specifically, in one embodiment, network-related data includes but is not limited to: IP, Intranet IP, http request head One of information and ssl protocol layer information or a variety of combinations.Correspondingly, according to the terminal's status information, to the use The step of safety state information of family terminal carries out security performance assessing, obtains the safety state information of the user terminal is specific Include:
Obtain the network-related data of the user terminal;According to the IP in the network-related data, the IP is inquired Visitation frequency;According to the terminal Intranet IP in the network-related data, the visitation frequency of the terminal Intranet IP is inquired;Root According to the http request header information in the network-related data, the legitimacy of the http request header information is obtained;According to Ssl protocol layer information in the network-related data obtains the legitimacy of the ssl protocol layer information;According to the IP's Visitation frequency, the visitation frequency of Intranet IP, the legitimacy of http request header information and ssl protocol layer information legitimacy, it is right The safety of the user terminal is scored.
Correspondingly, being scored according to safety to the peace to user terminal after the safety scoring for obtaining user terminal Full property carries out comprehensive descision, when safety scoring is higher than preset threshold, then sends high user experience identifying code to user terminal, I.e. user only needs shirtsleeve operation that the identifying code of verification process can be completed.On the other hand, when safety scoring is lower than default threshold When value, then high security identifying code is sent to user terminal, which shows that user needs user by complicated verifying behaviour Work could complete user's checking.
By the method, by the evaluation of the above tactful dimension, to primary request marking, occur that abnormal dimension is more asks It asks, security rating is lower, and threat degree is higher.The request higher to threat degree simultaneously, safety is relatively high tests for push Demonstrate,prove code because threat degree it is higher represent its for machine access a possibility that it is bigger.To the lower request of threat degree, body is pushed Preferable identifying code is tested, because threat degree is low, a possibility that representing it as real user is very big.This method utilizes a variety of collections Information, using different tactful group, carrying out comprehensive system of giving a mark to primary request can be according to request risk, dynamically using not Same verifying form takes into account safety and experience.
On the basis of the above embodiments, the terminal software environment information includes but is not limited to: browser type, browsing Device language, browser plug-in, the support of software text, terminal system type, system version, system classification, list of application, file knot One or more combination in structure, baseband version and current reference information.
The terminal hardware information includes but is not limited to: hardware platform, screen resolution, CPU model, video card model, sound One of card-type number, mobile phone model, platform classification, CPU model, GPU model, information about power, wifi information and memory information Or a variety of combination.
Specifically, can be used in extraction terminal's status information for mobile terminal and fixed PC terminal and use different dimensions Spend information, such as mobile terminal, in software environment data, can using browser type, browser language, plug-in unit, The information such as text support, system type, system version.In hardware data, hardware platform, screen resolution, CPU can be used The information such as model, video card model, sound card model.
For mobile terminal, in software environment data, system version, system classification, list of application, file can be used The information such as structure, baseband version, current application information.In hardware data, mobile phone model, Platform Type, CPU type can be used Number, the information of the different dimensions such as GPU model, information about power, screen resolution, WIFI information, memory information.
Further, the operation behavior information of user terminal can also be extracted, wherein operation behavior information includes but unlimited In operation trace, gyroscope information and geographical location information.
Differentiated by doing different processing to the data of collection, the normal model that can be once requested by following policy definition It encloses, such as the frequency of IP request, the frequency of device request, the reasonability of facility information, the reasonability of operation information, whether network There are agency, the reasonability of hardware information.It by the evaluation of the above tactful dimension, gives a mark to primary request, abnormal dimension occurs More requests is spent, security rating is lower, and threat degree is higher.
In conclusion method provided in an embodiment of the present invention, possible degree of risk has been estimated in advance, therefore can be to having The request of risk improves safety using the very high identifying code of threshold, while can dynamically reduce higher for authenticity The identifying code difficulty of user, can promote the user experience of ordinary user.
With reference to Fig. 2, Fig. 2 is the structural schematic diagram for the dynamic verification code selecting system that one embodiment of the invention provides, and is mentioned The system of confession includes: that evaluation module 21 and identifying code choose module 22.
Wherein, evaluation module 21 is used to obtain the terminal's status information of user terminal transmission, is believed according to the SOT state of termination Breath carries out security performance assessing to the safety state information of the user terminal, obtains the safe condition letter of the user terminal Breath.
Identifying code chooses module 22 for the safe condition according to the user terminal, and Xiang Suoshu user terminal is sent and institute State the corresponding identifying code of safety state information.
Wherein, the terminal's status information includes but is not limited to: network-related data, terminal software environment information, terminal One of hardware information, terminal operation information or a variety of combinations.
Specifically, interaction scenarios pop up identifying code before, system can to the status information of user terminal collection terminal, In, terminal's status information includes but is not limited to: network-related data, terminal software environment information, terminal hardware information, terminal behaviour Make one of information or a variety of combinations.
After obtaining the status information of user terminal, the safety of user terminal can be commented by status information Estimate, such as the IP information in network-related data is differentiated, obtains the request frequency of the corresponding IP of the user terminal, simultaneously One planning is done to the normal range (NR) of the request frequency, when the request frequency of the corresponding IP of user terminal is in preset normal range (NR) When, then show that the safe condition of user equipment is higher, it is corresponding, if the request frequency of the corresponding IP of user terminal it is preset just Other than normal range, then show that the safe condition of user equipment is lower.
In the comprehensive assessment for carrying out safe condition to user terminal according to terminal's status information several different, work as user When terminal is in a safe condition, then preferable identifying code is experienced to user terminal push, user only needs shirtsleeve operation Complete verifying.On the other hand, when user terminal is in unsafe state, then to user terminal push, safety is higher tests Code is demonstrate,proved, user needs to complete more complicated movement just achievable verifying movement.
By this system, the status information of user terminal is collected, the safety of user terminal is carried out according to status information Assessment, according to safety evaluation as a result, choosing corresponding identifying code is sent to user terminal, has estimated the wind of user terminal in advance Dangerous degree improves the safety of user terminal verification process, simultaneously because can dynamically reduce for the higher use of authenticity The identifying code difficulty at family, therefore the user experience of ordinary user can be promoted.
Fig. 3 is the structural schematic diagram for the electronic equipment that one embodiment of the invention provides, as shown in figure 3, electronic equipment includes: Processor (processor) 301, communication interface (Communications Interface) 302, memory (memory) 303 With bus 304, wherein processor 301, communication interface 302, memory 303 complete mutual communication by bus 304.Place Reason device 301 can call the logical order in memory 303, to execute following method, for example, obtain user terminal and send Terminal's status information security performance is carried out to the safety state information of the user terminal according to the terminal's status information Assessment, obtains the safety state information of the user terminal;According to the safe condition of the user terminal, Xiang Suoshu user terminal Send identifying code corresponding with the safety state information.
The embodiment of the present invention discloses a kind of computer program product, and computer program product includes being stored in non-transient calculating Computer program on machine readable storage medium storing program for executing, computer program include program instruction, when program instruction is computer-executed, Computer is able to carry out method provided by above-mentioned each method embodiment, for example, obtains the terminal shape that user terminal is sent State information carries out security performance assessing to the safety state information of the user terminal, obtains according to the terminal's status information The safety state information of the user terminal;According to the safe condition of the user terminal, Xiang Suoshu user terminal is sent and institute State the corresponding identifying code of safety state information.
The present embodiment provides a kind of non-transient computer readable storage medium, non-transient computer readable storage medium storages Computer instruction, computer instruction make computer execute method provided by above-mentioned each method embodiment, for example, obtain and use The terminal's status information that family terminal is sent, according to the terminal's status information, to the safety state information of the user terminal into Row security performance assessing obtains the safety state information of the user terminal;According to the safe condition of the user terminal, to institute It states user terminal and sends identifying code corresponding with the safety state information
The apparatus embodiments described above are merely exemplary, wherein described, unit can as illustrated by the separation member It is physically separated with being or may not be, component shown as a unit may or may not be physics list Member, it can it is in one place, or may be distributed over multiple network units.It can be selected according to the actual needs In some or all of the modules achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creativeness Labour in the case where, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should Computer software product may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including several fingers It enables and using so that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation Method described in certain parts of example or embodiment.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features; And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (10)

1. a kind of dynamic verification code choosing method characterized by comprising
The terminal's status information that user terminal is sent is obtained, according to the terminal's status information, to the safety of the user terminal Status information carries out security performance assessing, obtains the safety state information of the user terminal;
According to the safe condition of the user terminal, Xiang Suoshu user terminal sends verifying corresponding with the safety state information Code;
Wherein, the terminal's status information includes but is not limited to: network-related data, terminal software environment information, terminal hardware One of information, terminal operation information or a variety of combinations.
2. the method according to claim 1, wherein the network-related data includes but is not limited to: IP, Intranet One of IP, http request header information and ss l protocol layer information or a variety of combinations.
3. according to the method described in claim 2, it is characterized in that, described according to the terminal's status information, to the user The step of safety state information of terminal carries out security performance assessing, obtains the safety state information of the user terminal is specifically wrapped It includes:
Obtain the network-related data of the user terminal;
According to the IP in the network-related data, the visitation frequency of the IP is inquired;
According to the terminal Intranet IP in the network-related data, the visitation frequency of the terminal Intranet IP is inquired;
According to the http request header information in the network-related data, the legal of the http request header information is obtained Property;
According to the ss l protocol layer information in the network-related data, the legitimacy of the ss l protocol layer information is obtained;
According to the visitation frequency of the IP, the visitation frequency of Intranet IP, the legitimacy of http request header information and ss l agreement The legitimacy of layer information, scores to the safety of the user terminal.
4. the method according to claim 1, wherein the terminal software environment information includes but is not limited to: clear Look at device type, browser language, browser plug-in, the support of software text, terminal system type, system version, system classification, answer With combination one or more in list, file structure, baseband version and current reference information.
5. the method according to claim 1, wherein the terminal hardware information includes but is not limited to: hardware is flat Platform, screen resolution, CPU model, video card model, sound card model, mobile phone model, platform classification, CPU model, GPU model, electricity Measure one of information, wifi information and memory information or a variety of combinations.
6. -5 any method according to claim 1, which is characterized in that the safe shape according to the user terminal The step of state, Xiang Suoshu user terminal sends identifying code corresponding with the safety state information, specifically includes:
The safety scoring of the user terminal is obtained to the safe condition of the user terminal;
If the safety scoring is lower than preset threshold, high security identifying code is sent to the user terminal.
7. according to the method described in claim 6, it is characterized in that, described in the safe condition acquisition to the user terminal The step of safety scoring of user terminal, further includes:
If the safety scoring is higher than preset threshold, high user experience identifying code is sent to the user terminal.
8. a kind of dynamic verification code selecting system characterized by comprising
Evaluation module, for obtaining the terminal's status information of user terminal transmission, according to the terminal's status information, to the use The safety state information of family terminal carries out security performance assessing, obtains the safety state information of the user terminal;
Identifying code chooses module, and for the safe condition according to the user terminal, Xiang Suoshu user terminal is sent and the peace The corresponding identifying code of full state information;
Wherein, the terminal's status information includes but is not limited to: network-related data, terminal software environment information, terminal hardware One of information, terminal operation information or a variety of combinations.
9. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor Machine program, which is characterized in that realize when the processor executes described program and dynamically tested as described in any one of claim 1 to 7 The step of demonstrate,proving code choosing method.
10. a kind of non-transient computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer It is realized when program is executed by processor as described in any one of claim 1 to 7 the step of dynamic verification code choosing method.
CN201910002274.7A 2019-01-02 2019-01-02 A kind of dynamic verification code choosing method and system Pending CN109862562A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910002274.7A CN109862562A (en) 2019-01-02 2019-01-02 A kind of dynamic verification code choosing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910002274.7A CN109862562A (en) 2019-01-02 2019-01-02 A kind of dynamic verification code choosing method and system

Publications (1)

Publication Number Publication Date
CN109862562A true CN109862562A (en) 2019-06-07

Family

ID=66893621

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910002274.7A Pending CN109862562A (en) 2019-01-02 2019-01-02 A kind of dynamic verification code choosing method and system

Country Status (1)

Country Link
CN (1) CN109862562A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110598392A (en) * 2019-09-12 2019-12-20 同盾控股有限公司 Man-machine verification method and device, storage medium and electronic equipment
CN111209566A (en) * 2019-12-26 2020-05-29 武汉极意网络科技有限公司 Intelligent anti-crawler system and method for multi-layer threat interception
CN112187702A (en) * 2019-07-02 2021-01-05 北京京东尚科信息技术有限公司 Method and device for verifying client
CN112583978A (en) * 2019-09-30 2021-03-30 奇安信科技集团股份有限公司 Method and device for evaluating operating environment of mobile terminal
CN112583979A (en) * 2019-09-30 2021-03-30 奇安信科技集团股份有限公司 Application environment sensing method and device of mobile terminal
CN115314229A (en) * 2021-04-20 2022-11-08 中国移动通信集团河北有限公司 Data access method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103488922A (en) * 2013-08-27 2014-01-01 百度在线网络技术(北京)有限公司 Method and equipment for providing verification code
CN106713241A (en) * 2015-11-16 2017-05-24 腾讯科技(深圳)有限公司 Identity verification method, device and system
US20180130056A1 (en) * 2015-04-17 2018-05-10 Forticode Limited Method and system for transaction security
CN108810831A (en) * 2018-04-17 2018-11-13 平安科技(深圳)有限公司 Method for pushing, electronic device and the readable storage medium storing program for executing of short message verification code
CN108900525A (en) * 2018-07-19 2018-11-27 中国联合网络通信集团有限公司 The processing method and device of identifying code request

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103488922A (en) * 2013-08-27 2014-01-01 百度在线网络技术(北京)有限公司 Method and equipment for providing verification code
US20180130056A1 (en) * 2015-04-17 2018-05-10 Forticode Limited Method and system for transaction security
CN106713241A (en) * 2015-11-16 2017-05-24 腾讯科技(深圳)有限公司 Identity verification method, device and system
CN108810831A (en) * 2018-04-17 2018-11-13 平安科技(深圳)有限公司 Method for pushing, electronic device and the readable storage medium storing program for executing of short message verification code
CN108900525A (en) * 2018-07-19 2018-11-27 中国联合网络通信集团有限公司 The processing method and device of identifying code request

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112187702A (en) * 2019-07-02 2021-01-05 北京京东尚科信息技术有限公司 Method and device for verifying client
CN110598392A (en) * 2019-09-12 2019-12-20 同盾控股有限公司 Man-machine verification method and device, storage medium and electronic equipment
CN112583978A (en) * 2019-09-30 2021-03-30 奇安信科技集团股份有限公司 Method and device for evaluating operating environment of mobile terminal
CN112583979A (en) * 2019-09-30 2021-03-30 奇安信科技集团股份有限公司 Application environment sensing method and device of mobile terminal
CN111209566A (en) * 2019-12-26 2020-05-29 武汉极意网络科技有限公司 Intelligent anti-crawler system and method for multi-layer threat interception
CN115314229A (en) * 2021-04-20 2022-11-08 中国移动通信集团河北有限公司 Data access method, device, equipment and storage medium
CN115314229B (en) * 2021-04-20 2024-03-19 中国移动通信集团河北有限公司 Data access method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109862562A (en) A kind of dynamic verification code choosing method and system
CN104519032B (en) A kind of security strategy and system of internet account number
CN111401416B (en) Abnormal website identification method and device and abnormal countermeasure identification method
CN109446071A (en) Interface test method, interface test device, electronic equipment and storage medium
CN104348822B (en) A kind of method, apparatus and server of internet account number authentication
CN109600336A (en) Store equipment, identifying code application method and device
CN104994060B (en) It is a kind of to provide the method and apparatus of verifying for logging in for user
CN110378749A (en) Appraisal procedure, device, terminal device and the storage medium of user data similitude
CN105871587A (en) Log uploading method and device
CN108011868A (en) One kind slides verification method and mobile terminal
CN104683124B (en) Terminal type recognition methods and device
CN107948199B (en) Method and device for rapidly detecting terminal shared access
CN107577622A (en) Back end interface analogy method, equipment and storage medium
JP2021502135A (en) Human detection methods, systems and computer programs based on neuronal responses
CN109284075A (en) A kind of measures and procedures for the examination and approval of print request, storage medium and server
CN107766224B (en) Test method and test device
CN105554136B (en) Backup Data restoring method, apparatus and system
CN104052630B (en) The method and system of verifying is executed to website
CN102664945B (en) For document down loading method, device and system that time-out connects
CN109284590A (en) Access method, equipment, storage medium and the device of behavior safety protection
CN111385272A (en) Weak password detection method and device
CN104184762B (en) A kind of server failure information feedback method and system
CN109344052B (en) Interface automation test method and device and electronic equipment
CN110213281A (en) Safety protecting method and device
CN114745280B (en) Asset information management method, device, equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190607