CN110445792A - Verification code generation method, verifying code verification method and identifying code login system - Google Patents
Verification code generation method, verifying code verification method and identifying code login system Download PDFInfo
- Publication number
- CN110445792A CN110445792A CN201910743750.0A CN201910743750A CN110445792A CN 110445792 A CN110445792 A CN 110445792A CN 201910743750 A CN201910743750 A CN 201910743750A CN 110445792 A CN110445792 A CN 110445792A
- Authority
- CN
- China
- Prior art keywords
- identifying code
- code
- picture
- client
- identifying
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
Abstract
It includes: the verifying logging request in response to client that the present invention, which provides a kind of verification code generation method, verifying code verification method and identifying code login system, the verification code generation method, generates the first identifying code, identifying code picture and corresponding identifying code mark;First identifying code and corresponding identifying code mark are sent to buffer and are associated storage;Coded treatment is carried out to the identifying code picture, generate corresponding picture code and generates identifying code message with corresponding identifying code identifier combination, sends the identifying code message to client.Verification code generation method of the invention, client will be sent to after identifying code mark and the picture code composition message of identifying code picture, identifying code mark can also be directly obtained while so that client is obtained identifying code picture, client is set not have to obtain identifying code mark from browser rs cache, the case where avoiding identifying code mark from obtaining failure, improves user experience.
Description
Technical field
The present invention relates to field of computer technology, in particular to a kind of verification code generation method, identifying code authentication
Method, identifying code login system, authentication server and computer storage medium.
Background technique
Verification code technology has a wide range of applications in login system, and many network applications require to use verifying when logging in
Code, malice uses program Brute Force mode to carry out continuous login attempt when login user can be effectively prevented.
Existing verification code technology, client obtain identifying code mark generally by browser rs cache, namely
Cookie is obtained.But in the domain name or port difference of client login page and back-end server, namely cross-domain
In the case of, identifying code mark can not be obtained by cookie, to be unable to complete the verifying of identifying code, influence user's body
It tests.
Summary of the invention
In view of the above problems, the present invention provides a kind of verification code generation method, verifying code verification method, identifying codes to log in
System, authentication server and computer storage medium, so that while client can obtain identifying code picture or direct
Identifying code mark is obtained, client is made not have to obtain identifying code mark from browser rs cache, avoids identifying code mark from obtaining and loses
The case where losing improves user experience.
To achieve the goals above, the present invention adopts the following technical scheme that:
A kind of verification code generation method, comprising:
In response to the verifying logging request of client, the first identifying code, identifying code picture and corresponding identifying code are generated
Mark;
First identifying code and corresponding identifying code mark are sent to buffer and are associated storage;
To the identifying code picture carry out coded treatment, generate corresponding picture code and with corresponding identifying code mark group
Symphysis sends the identifying code message to client at identifying code message.
Preferably, in the verification code generation method, further includes:
The second identifying code and identifying code mark that client is sent are received, by delaying described in the identifying code identifier lookup
Corresponding identifying code in storage;
Judge whether second identifying code and corresponding identifying code in the buffer are consistent;
When second identifying code is consistent with identifying code corresponding in the buffer, be proved to be successful and send verifying at
Function is prompted to corresponding client.
Preferably, in the verification code generation method, further includes:
When second identifying code and inconsistent identifying code corresponding in the buffer, send authentication failed prompt to
Corresponding client.
Preferably, in the verification code generation method, the coded treatment is base64 coded treatment.
Preferably, described " to generate the first identifying code, identifying code picture and corresponding in the verification code generation method
Identifying code mark " include:
Generate first identifying code, and corresponding identifying code mark;
Picture conversion is carried out to first identifying code and visual confusion processing is carried out to the picture of conversion, is tested described in generation
Demonstrate,prove code picture.
Preferably, in the verification code generation method, the identifying code message is the interface packets of json format.
The present invention also provides a kind of verifying code verification methods, comprising:
The identifying code message that authentication server is sent is received, the identifying code message includes picture code and tests accordingly
Demonstrate,prove code mark;
It extracts the picture code in the identifying code message and carries out decoding process, generate corresponding identifying code picture and go forward side by side
Row display;
Identifying code mark in the third identifying code and the identifying code message of user's input is back to the verifying
Server.
The present invention also provides a kind of identifying code login systems, including client and authentication server;
The client sends verifying logging request to the authentication server;
The authentication server in response to client verifying logging request, generate the first identifying code, identifying code picture with
And corresponding identifying code mark;First identifying code and identifying code mark are sent to buffer and are associated and deposited
Storage;Coded treatment is carried out to the identifying code picture, generate corresponding picture code and is given birth to corresponding identifying code identifier combination
At identifying code message, the identifying code message is sent to client;
The client receives the identifying code message that authentication server is sent, and extracts the picture generation in the identifying code message
Code simultaneously carries out decoding process, generate the identifying code picture and is shown;By the second identifying code and described of user's input
Identifying code mark is back to the authentication server;
The authentication server is judged by the first identifying code described in buffer described in the identifying code identifier lookup
Whether first identifying code and second identifying code are consistent, are logged in executing the verifying of client.
The present invention also provides a kind of authentication servers, including memory and processor, and the memory is based on storing
Calculation machine program, the processor runs the computer program so that the authentication server executes the identifying code generation side
Method.
The present invention also provides a kind of computer storage medium, it is stored with calculating used in the authentication server
Machine program.
The present invention provides a kind of verification code generation method, which includes: the verifying in response to client
Logging request generates the first identifying code, identifying code picture and corresponding identifying code mark;By first identifying code and phase
The identifying code mark answered is sent to buffer and is associated storage;Coded treatment is carried out to the identifying code picture, is generated corresponding
Picture code and with corresponding identifying code identifier combination generate identifying code message, send the identifying code message to client.
Verification code generation method of the invention will be sent to client after identifying code mark and the picture code composition message of identifying code picture
End can also directly obtain identifying code mark, not have to client from clear while so that client is obtained identifying code picture
The case where obtaining identifying code mark in device of looking at caching, identifying code mark is avoided to obtain failure, improves user experience.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate
Appended attached drawing, is described in detail below.
Detailed description of the invention
In order to illustrate more clearly of technical solution of the present invention, letter will be made to attached drawing needed in the embodiment below
It singly introduces, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as to the present invention
The restriction of protection scope.In various figures, part is similarly comprised using similar number.
Fig. 1 is a kind of flow chart for verification code generation method that the embodiment of the present invention 1 provides;
Fig. 2 is a kind of flow chart for verification code generation method that the embodiment of the present invention 2 provides;
Fig. 3 is a kind of flow chart for verifying code verification method that the embodiment of the present invention 3 provides;
Fig. 4 is a kind of structural schematic diagram for identifying code login system that the embodiment of the present invention 4 provides.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
The component of embodiments of the present invention, which are generally described and illustrated herein in the accompanying drawings can be come with a variety of different configurations
Arrangement and design.Therefore, requirement is not intended to limit to the detailed description of the embodiment of the present invention provided in the accompanying drawings below
The scope of the present invention of protection, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, this field skill
Art personnel every other embodiment obtained without making creative work belongs to the model that the present invention protects
It encloses.
Hereinafter, term " includes ", " having " and its cognate that can be used in various embodiments of the present invention are only
It is intended to mean that special characteristic, number, step, operation, the combination of element, component or aforementioned item, and is understood not to first
Exclude the combined presence or increase by one of one or more other features, number, step, operation, element, component or aforementioned item
A or more feature, number, step, operation, element, component or aforementioned item combination a possibility that.
In addition, term " first ", " second ", " third " etc. are only used for distinguishing description, it is not understood to indicate or imply
Relative importance.
Unless otherwise defined, otherwise all terms (including technical terms and scientific terms) used herein have and this
The identical meaning of the various normally understood meanings of embodiment one skilled in the art of invention.The term (such as exists
The term limited in the dictionary generally used) it is to be interpreted as that there is contain identical with situational meaning in the related technical field
Justice and Utopian meaning or meaning too formal will be interpreted as having, unless in various embodiments of the present invention
It is clearly defined.
Embodiment 1
Fig. 1 is a kind of flow chart for verification code generation method that the embodiment of the present invention 1 provides, and this method includes following step
It is rapid:
Step S11: in response to the verifying logging request of client, the first identifying code, identifying code picture and corresponding are generated
Identifying code mark.
In the embodiment of the present invention, which includes the electronic equipments such as mobile phone, tablet computer and computer computer, in electricity
It is generally had in sub- equipment and carries out the demand of login account in front end login page, when carrying out login account, in addition in front end
Login page inputs account and password, it is also necessary to input identifying code, the account logged in be shown to be true man, to prevent from disliking
The case where meaning is operated using the automated log on that machine or program carry out batch.
In the embodiment of the present invention, authentication server will generate this when receiving the verifying logging request of client transmission
The corresponding identifying code picture of identifying code, the identifying code and identifying code of secondary verifying logging request identify, and specifically, may include
Following steps: first identifying code, and corresponding identifying code mark are generated;Picture conversion is carried out to first identifying code
And visual confusion processing is carried out to the picture of conversion, generate the identifying code picture.Wherein, which can be generated
The character code of fixed quantity, such as 4 character codes and more character codes, here without limitation, the character code can be generated
Including upper and lower case letter, symbol and middle text etc..Carrying out visual confusion processing also can be single to the character code in picture
Amplify, reduce and different colours processing etc., to increase the safety of identifying code.Identifying code mark namely identifying code
ID number, will generate the ID number while generating identifying code, and the ID number be it is unique, for identifying the identifying code, so as to
The search of corresponding identifying code is carried out using the ID number in both the buffers, wherein identifying code mark can be generated according to identifying code
Time determine, here without limitation.
Step S12: the first identifying code and corresponding identifying code mark are sent to buffer and are associated storage.
In the embodiment of the present invention, after generating identifying code and corresponding identifying code mark, can by the identifying code and
Corresponding identifying code mark associated storage is in both the buffers.Wherein, which can store a large amount of differences within unified time
Identifying code and corresponding identifying code mark, to handle a large amount of identifying code verification operations in the same time, also, the buffer
In the holding time of identifying code namely the out-of-service time of identifying code can be set, such as can be set to 2 minutes or more,
Here without limitation.
Step S13: to identifying code picture carry out coded treatment, generate corresponding picture code and with corresponding identifying code mark
Know combination producing identifying code message, sends identifying code message to client.
In the embodiment of the present invention, which will compile identifying code picture after generating identifying code picture
Code processing, which can encode for base64, to obtain the picture code of identifying code picture, and by the picture code with
Identifying code identifier combination is at identifying code message.Wherein, in combined authentication code message, identifying code can be identified according to default rule
It then injects in picture code, to increase the safety of identifying code message, prevents from cracking after message is intercepted, such as can will verify
Code mark is multistage according to presetting digit capacity, and in the predeterminated position of insert pictures code, and increases marker and be marked.Its
In, identifying code message is the interface packets of json format.
The prior art obtains the method for identifying code mark using cookie (browser rs cache), takes in front end page and rear end
When the domain name or port difference of business device, namely in the case where cross-domain, identifying code mark can not be obtained, to be unable to complete
Verifying.And in the embodiment of the present invention, the addition of identifying code identifier combination is generated into identifying code message in picture code and is sent together
To client, cross-domain can not be obtained so as to overcome so that client does not need in addition to obtain identifying code mark from cookie
The problem of identifying code identifies improves user experience.
Embodiment 2
Fig. 2 is a kind of flow chart for verification code generation method that the embodiment of the present invention 2 provides, and this method includes following step
It is rapid:
Step S21: in response to the verifying logging request of client, the first identifying code, identifying code picture and corresponding are generated
Identifying code mark.
This step is consistent with above-mentioned steps S11, and details are not described herein.
Step S22: the first identifying code and corresponding identifying code mark are sent to buffer and are associated storage.
This step is consistent with above-mentioned steps S12, and details are not described herein.
Step S23: to identifying code picture carry out coded treatment, generate corresponding picture code and with corresponding identifying code mark
Know combination producing identifying code message, sends identifying code message to client.
This step is consistent with above-mentioned steps S13, and details are not described herein.
Step S24: receiving the second identifying code and identifying code mark that client is sent, slow by identifying code identifier lookup
Corresponding identifying code in storage.
In the embodiment of the present invention, authentication server can receive the identifying code that client is sent and the identifying code is corresponding
Identifying code mark.Authentication server will enter caching using identifying code mark after receiving the identifying code mark that client is sent
It is matched in device, to obtain corresponding identifying code in buffer.Wherein, this is entered in buffer using identifying code mark and is carried out
Matched process can use algorithm or application program to realize, such as application program can be provided in authentication server,
The application program obtain client send identifying code mark after, can use the identifying code mark enter buffer in search
Associated identifying code is identified with the identifying code.Wherein, when not finding associated identifying code in both the buffers, then illustrate the verifying
Code is expired, and authentication server can send the expired prompt of identifying code to client.
Step S25: judge whether the second identifying code and identifying code corresponding in buffer are consistent.
Step S26: when the second identifying code is consistent with identifying code corresponding in buffer, be proved to be successful and send verifying at
Function is prompted to corresponding client.
In the embodiment of the present invention, when the identifying code that client is sent is consistent with identifying code corresponding in authentication server,
It then represents and is proved to be successful, wherein the authentication server can also receive the account of client transmission while verifying identifying code
And password, and verified, in account number cipher and identifying code without mistaking, then allow client to log in.
It is above-mentioned to judge that the whether consistent process of identifying code can use algorithm or application program is come in fact in the embodiment of the present invention
It is existing, for example, the application program for judging identifying code can be provided in authentication server, in the identifying code for receiving client,
And after finding corresponding identifying code in both the buffers, which can be compared two identifying codes, and judgement is
It is no consistent.
Step S27: when the second identifying code and inconsistent identifying code corresponding in buffer, send authentication failed prompt to
Corresponding client.
It, should in the identifying code and inconsistent identifying code corresponding in buffer that client is sent in the embodiment of the present invention
It is to prompt client to re-enter to corresponding client, or prompt client that it is title that verifying, which can be generated, in authentication server
Refresh identifying code.Wherein, when client refreshes identifying code, authentication server will generate new identifying code and corresponding mark
And picture, and the identifying code for re-starting above-mentioned steps, and failing in buffer will be automatically deleted.
Embodiment 3
Fig. 3 is a kind of flow chart for verifying code verification method that the embodiment of the present invention 3 provides, and this method includes following step
It is rapid:
Step S31: receiving the identifying code message that authentication server is sent, and identifying code message includes picture code and corresponding
Identifying code mark.
Step S32: it extracts the picture code in identifying code message and carries out decoding process, generate corresponding identifying code picture
And it is shown.
In the embodiment of the present invention, client will be extracted in message after receiving the identifying code message that authentication server is sent
Picture code and corresponding identifying code mark.Wherein, available if the information in the identifying code message is encrypted
Prespecified decryption rule is extracted after being decrypted.After extracting picture code, client is converted to the picture code
Picture is simultaneously shown, wherein the picture code is encoded using base64 and generated, then is solved using corresponding decoder
Code, here without limitation.
Step S33: the identifying code mark in the third identifying code and identifying code message of user's input is back to verifying
Server.
In the embodiment of the present invention, after user inputs identifying code in the client, client by the identifying code of the input with test
Card code mark is back to identifying code server after being packaged, to be verified.
Embodiment 4
Fig. 4 is a kind of structural schematic diagram for identifying code login system that the embodiment of the present invention 4 provides.
The identifying code login system 400 includes client 410 and authentication server 420;
Client 410 sends verifying logging request to authentication server 420;
Authentication server 420 generates the first identifying code, identifying code picture in response to the verifying logging request of client 410
And corresponding identifying code mark;First identifying code and identifying code mark are sent to buffer and are associated storage;To testing
It demonstrate,proves code picture and carries out coded treatment, generate corresponding picture code and generate identifying code report with corresponding identifying code identifier combination
Text sends identifying code message to client 410;
Client 410 receives the identifying code message that authentication server 420 is sent, and extracts the picture code in identifying code message
And decoding process is carried out, identifying code picture is generated and is shown;By the second identifying code of user's input and identifying code mark
It is back to authentication server 420;
Authentication server 420 by the first identifying code in identifying code identifier lookup buffer, and judge the first identifying code and
Whether the second identifying code is consistent, is logged in executing the verifying of client 410.
In addition, the authentication server may include smart phone, plate electricity the present invention also provides a kind of authentication server
Brain, vehicle-mounted computer, intelligent wearable device etc..The authentication server includes memory and processor, and memory can be used for storing meter
Calculation machine program, processor is by running the computer program, so that authentication server be made to execute above-mentioned verification code generation method
In modules function.
Memory may include storing program area and storage data area, wherein storing program area can storage program area, at least
Application program needed for one function (such as sound-playing function, image player function etc.) etc.;Storage data area can store root
Created data (such as audio data, phone directory etc.) etc. are used according to authentication server.In addition, memory may include height
Fast random access memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device,
Or other volatile solid-state parts.
The present embodiment additionally provides a kind of computer storage medium, for storing calculating used in above-mentioned authentication server
Machine program.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through
Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and structure in attached drawing
Figure shows the system frame in the cards of the device of multiple embodiments according to the present invention, method and computer program product
Structure, function and operation.In this regard, each box in flowchart or block diagram can represent a module, section or code
A part, a part of the module, section or code includes one or more for implementing the specified logical function
Executable instruction.It should also be noted that function marked in the box can also be to be different from the implementation as replacement
The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes
It can execute in the opposite order, this depends on the function involved.It is also noted that in structure chart and/or flow chart
The combination of each box and the box in structure chart and/or flow chart, can function or movement as defined in executing it is dedicated
Hardware based system realize, or can realize using a combination of dedicated hardware and computer instructions.
In addition, each functional module or unit in each embodiment of the present invention can integrate one independence of formation together
Part, be also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be intelligence
Can mobile phone, personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or
Part steps.And storage medium above-mentioned include: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory),
Random access memory (RAM, Random Access Memory), magnetic or disk etc. be various to can store program code
Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. a kind of verification code generation method characterized by comprising
In response to the verifying logging request of client, the first identifying code, identifying code picture and corresponding identifying code mark are generated;
First identifying code and corresponding identifying code mark are sent to buffer and are associated storage;
Coded treatment is carried out to the identifying code picture, generate corresponding picture code and is given birth to corresponding identifying code identifier combination
At identifying code message, the identifying code message is sent to client.
2. verification code generation method according to claim 1, which is characterized in that further include:
The second identifying code and identifying code mark that client is sent are received, buffer described in the identifying code identifier lookup is passed through
In corresponding identifying code;
Judge whether second identifying code and corresponding identifying code in the buffer are consistent;
When second identifying code is consistent with identifying code corresponding in the buffer, it is proved to be successful and sends to be proved to be successful and mention
Show to corresponding client.
3. verification code generation method according to claim 2, which is characterized in that further include:
When second identifying code and inconsistent identifying code corresponding in the buffer, sends authentication failed and prompt to corresponding
Client.
4. verification code generation method according to claim 1, which is characterized in that the coded treatment is at base64 coding
Reason.
5. verification code generation method according to claim 1, which is characterized in that described " to generate the first identifying code, identifying code
Picture and corresponding identifying code identify " include:
Generate first identifying code, and corresponding identifying code mark;
Picture conversion is carried out to first identifying code and visual confusion processing is carried out to the picture of conversion, generates the identifying code
Picture.
6. verification code generation method according to claim 1, which is characterized in that the identifying code message is json format
Interface packets.
7. a kind of verifying code verification method characterized by comprising
The identifying code message that authentication server is sent is received, the identifying code message includes picture code and corresponding identifying code
Mark;
It extracts the picture code in the identifying code message and carries out decoding process, generate corresponding identifying code picture and shown
Show;
Identifying code mark in the third identifying code and the identifying code message of user's input is back to the service for checking credentials
Device.
8. a kind of identifying code login system, which is characterized in that including client and authentication server;
The client sends verifying logging request to the authentication server;
The authentication server generates the first identifying code, identifying code picture and phase in response to the verifying logging request of client
The identifying code mark answered;First identifying code and identifying code mark are sent to buffer and are associated storage;It is right
The identifying code picture carries out coded treatment, generates corresponding picture code and generates with corresponding identifying code identifier combination and verifies
Code message, sends the identifying code message to client;
The client receives the identifying code message that authentication server is sent, and extracts picture code in the identifying code message simultaneously
It is decoded processing, generate the identifying code picture and is shown;By the second identifying code of user's input and the verifying
Code mark is back to the authentication server;
The authentication server passes through the first identifying code described in buffer described in the identifying code identifier lookup, and described in judgement
Whether the first identifying code and second identifying code are consistent, are logged in executing the verifying of client.
9. a kind of authentication server, which is characterized in that including memory and processor, the memory is for storing computer
Program, the processor runs the computer program so that the authentication server executes according to claim 1 to any in 6
Verification code generation method described in.
10. a kind of computer storage medium, which is characterized in that it, which is stored in authentication server as claimed in claim 9, is made
Computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910743750.0A CN110445792B (en) | 2019-08-13 | 2019-08-13 | Verification code generation method and verification code login system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910743750.0A CN110445792B (en) | 2019-08-13 | 2019-08-13 | Verification code generation method and verification code login system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110445792A true CN110445792A (en) | 2019-11-12 |
CN110445792B CN110445792B (en) | 2021-11-09 |
Family
ID=68434918
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910743750.0A Active CN110445792B (en) | 2019-08-13 | 2019-08-13 | Verification code generation method and verification code login system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110445792B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112039890A (en) * | 2020-08-31 | 2020-12-04 | 重庆可兰达科技有限公司 | Verification code verification method, device, terminal and medium |
CN112364318A (en) * | 2020-11-24 | 2021-02-12 | 北京海联捷讯科技股份有限公司 | Operation and maintenance big data security management method, system, terminal and storage medium |
CN112948812A (en) * | 2021-03-29 | 2021-06-11 | 天津车之家数据信息技术有限公司 | Verification code distribution method, computing device and storage medium |
CN114978742A (en) * | 2022-06-08 | 2022-08-30 | 中国电信股份有限公司 | Verification information generation method, verification method and device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104125234A (en) * | 2014-08-06 | 2014-10-29 | 沈文策 | Method and system for dynamic image security verification |
CN108769083A (en) * | 2018-08-01 | 2018-11-06 | 北京奇虎科技有限公司 | Login method, apparatus and system based on distributed server |
-
2019
- 2019-08-13 CN CN201910743750.0A patent/CN110445792B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104125234A (en) * | 2014-08-06 | 2014-10-29 | 沈文策 | Method and system for dynamic image security verification |
CN108769083A (en) * | 2018-08-01 | 2018-11-06 | 北京奇虎科技有限公司 | Login method, apparatus and system based on distributed server |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112039890A (en) * | 2020-08-31 | 2020-12-04 | 重庆可兰达科技有限公司 | Verification code verification method, device, terminal and medium |
CN112364318A (en) * | 2020-11-24 | 2021-02-12 | 北京海联捷讯科技股份有限公司 | Operation and maintenance big data security management method, system, terminal and storage medium |
CN112364318B (en) * | 2020-11-24 | 2021-12-31 | 北京海联捷讯科技股份有限公司 | Operation and maintenance big data security management method, system, terminal and storage medium |
CN112948812A (en) * | 2021-03-29 | 2021-06-11 | 天津车之家数据信息技术有限公司 | Verification code distribution method, computing device and storage medium |
CN112948812B (en) * | 2021-03-29 | 2022-07-08 | 天津车之家数据信息技术有限公司 | Verification code distribution method, computing device and storage medium |
CN114978742A (en) * | 2022-06-08 | 2022-08-30 | 中国电信股份有限公司 | Verification information generation method, verification method and device |
CN114978742B (en) * | 2022-06-08 | 2024-04-23 | 中国电信股份有限公司 | Verification information generation method, verification method and device |
Also Published As
Publication number | Publication date |
---|---|
CN110445792B (en) | 2021-11-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110445792A (en) | Verification code generation method, verifying code verification method and identifying code login system | |
US10880306B2 (en) | Verification information update | |
CN104580264B (en) | Login method, entering device and login and Accreditation System | |
EP2874074B1 (en) | Method for implementing cross-domain jump, browser, and domain name server | |
CN109450649A (en) | Gateway verification method and device based on application program interface and electronic equipment | |
CN110287682A (en) | A kind of login method, apparatus and system | |
CN106302308B (en) | Trust login method and device | |
CN104796257A (en) | Flexible data authentication | |
CN102946384B (en) | User authentication method and equipment | |
CN106330838B (en) | A kind of dynamic signature method and the client and server using this method | |
CN103888255A (en) | Identity authentication method, device and system | |
CN102752115A (en) | Challenge code generation method and device, dynamic password authentication method and system | |
CN106685973A (en) | Method and device for remembering log in information, log in control method and device | |
CN109714365B (en) | The cipher management method and system calculated based on multiple hash | |
CN102158488A (en) | Dynamic countersign generation method and device and authentication method and system | |
CN105791246B (en) | Verification method, the apparatus and system of verification information | |
CN102186173A (en) | Identity authentication method and system | |
CN110213247A (en) | A kind of method and system improving pushed information safety | |
CN110311886A (en) | Server leak detection method, device, equipment and storage medium | |
CN107465649A (en) | Control method of electronic device, terminal and control system | |
CN104935548B (en) | Auth method, apparatus and system based on intelligent equipment of tatooing | |
CN102143131A (en) | User logout method and authentication server | |
CN102769629B (en) | Client-side password storage method and service system | |
CN110166471A (en) | A kind of portal authentication method and device | |
CN108418679B (en) | Method and device for processing secret key under multiple data centers and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |