CN110445792A - Verification code generation method, verifying code verification method and identifying code login system - Google Patents

Verification code generation method, verifying code verification method and identifying code login system Download PDF

Info

Publication number
CN110445792A
CN110445792A CN201910743750.0A CN201910743750A CN110445792A CN 110445792 A CN110445792 A CN 110445792A CN 201910743750 A CN201910743750 A CN 201910743750A CN 110445792 A CN110445792 A CN 110445792A
Authority
CN
China
Prior art keywords
identifying code
code
picture
client
identifying
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910743750.0A
Other languages
Chinese (zh)
Other versions
CN110445792B (en
Inventor
雷阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baiyou Technology Co Ltd
Original Assignee
Beijing Baiyou Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baiyou Technology Co Ltd filed Critical Beijing Baiyou Technology Co Ltd
Priority to CN201910743750.0A priority Critical patent/CN110445792B/en
Publication of CN110445792A publication Critical patent/CN110445792A/en
Application granted granted Critical
Publication of CN110445792B publication Critical patent/CN110445792B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords

Abstract

It includes: the verifying logging request in response to client that the present invention, which provides a kind of verification code generation method, verifying code verification method and identifying code login system, the verification code generation method, generates the first identifying code, identifying code picture and corresponding identifying code mark;First identifying code and corresponding identifying code mark are sent to buffer and are associated storage;Coded treatment is carried out to the identifying code picture, generate corresponding picture code and generates identifying code message with corresponding identifying code identifier combination, sends the identifying code message to client.Verification code generation method of the invention, client will be sent to after identifying code mark and the picture code composition message of identifying code picture, identifying code mark can also be directly obtained while so that client is obtained identifying code picture, client is set not have to obtain identifying code mark from browser rs cache, the case where avoiding identifying code mark from obtaining failure, improves user experience.

Description

Verification code generation method, verifying code verification method and identifying code login system
Technical field
The present invention relates to field of computer technology, in particular to a kind of verification code generation method, identifying code authentication Method, identifying code login system, authentication server and computer storage medium.
Background technique
Verification code technology has a wide range of applications in login system, and many network applications require to use verifying when logging in Code, malice uses program Brute Force mode to carry out continuous login attempt when login user can be effectively prevented.
Existing verification code technology, client obtain identifying code mark generally by browser rs cache, namely Cookie is obtained.But in the domain name or port difference of client login page and back-end server, namely cross-domain In the case of, identifying code mark can not be obtained by cookie, to be unable to complete the verifying of identifying code, influence user's body It tests.
Summary of the invention
In view of the above problems, the present invention provides a kind of verification code generation method, verifying code verification method, identifying codes to log in System, authentication server and computer storage medium, so that while client can obtain identifying code picture or direct Identifying code mark is obtained, client is made not have to obtain identifying code mark from browser rs cache, avoids identifying code mark from obtaining and loses The case where losing improves user experience.
To achieve the goals above, the present invention adopts the following technical scheme that:
A kind of verification code generation method, comprising:
In response to the verifying logging request of client, the first identifying code, identifying code picture and corresponding identifying code are generated Mark;
First identifying code and corresponding identifying code mark are sent to buffer and are associated storage;
To the identifying code picture carry out coded treatment, generate corresponding picture code and with corresponding identifying code mark group Symphysis sends the identifying code message to client at identifying code message.
Preferably, in the verification code generation method, further includes:
The second identifying code and identifying code mark that client is sent are received, by delaying described in the identifying code identifier lookup Corresponding identifying code in storage;
Judge whether second identifying code and corresponding identifying code in the buffer are consistent;
When second identifying code is consistent with identifying code corresponding in the buffer, be proved to be successful and send verifying at Function is prompted to corresponding client.
Preferably, in the verification code generation method, further includes:
When second identifying code and inconsistent identifying code corresponding in the buffer, send authentication failed prompt to Corresponding client.
Preferably, in the verification code generation method, the coded treatment is base64 coded treatment.
Preferably, described " to generate the first identifying code, identifying code picture and corresponding in the verification code generation method Identifying code mark " include:
Generate first identifying code, and corresponding identifying code mark;
Picture conversion is carried out to first identifying code and visual confusion processing is carried out to the picture of conversion, is tested described in generation Demonstrate,prove code picture.
Preferably, in the verification code generation method, the identifying code message is the interface packets of json format.
The present invention also provides a kind of verifying code verification methods, comprising:
The identifying code message that authentication server is sent is received, the identifying code message includes picture code and tests accordingly Demonstrate,prove code mark;
It extracts the picture code in the identifying code message and carries out decoding process, generate corresponding identifying code picture and go forward side by side Row display;
Identifying code mark in the third identifying code and the identifying code message of user's input is back to the verifying Server.
The present invention also provides a kind of identifying code login systems, including client and authentication server;
The client sends verifying logging request to the authentication server;
The authentication server in response to client verifying logging request, generate the first identifying code, identifying code picture with And corresponding identifying code mark;First identifying code and identifying code mark are sent to buffer and are associated and deposited Storage;Coded treatment is carried out to the identifying code picture, generate corresponding picture code and is given birth to corresponding identifying code identifier combination At identifying code message, the identifying code message is sent to client;
The client receives the identifying code message that authentication server is sent, and extracts the picture generation in the identifying code message Code simultaneously carries out decoding process, generate the identifying code picture and is shown;By the second identifying code and described of user's input Identifying code mark is back to the authentication server;
The authentication server is judged by the first identifying code described in buffer described in the identifying code identifier lookup Whether first identifying code and second identifying code are consistent, are logged in executing the verifying of client.
The present invention also provides a kind of authentication servers, including memory and processor, and the memory is based on storing Calculation machine program, the processor runs the computer program so that the authentication server executes the identifying code generation side Method.
The present invention also provides a kind of computer storage medium, it is stored with calculating used in the authentication server Machine program.
The present invention provides a kind of verification code generation method, which includes: the verifying in response to client Logging request generates the first identifying code, identifying code picture and corresponding identifying code mark;By first identifying code and phase The identifying code mark answered is sent to buffer and is associated storage;Coded treatment is carried out to the identifying code picture, is generated corresponding Picture code and with corresponding identifying code identifier combination generate identifying code message, send the identifying code message to client. Verification code generation method of the invention will be sent to client after identifying code mark and the picture code composition message of identifying code picture End can also directly obtain identifying code mark, not have to client from clear while so that client is obtained identifying code picture The case where obtaining identifying code mark in device of looking at caching, identifying code mark is avoided to obtain failure, improves user experience.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
In order to illustrate more clearly of technical solution of the present invention, letter will be made to attached drawing needed in the embodiment below It singly introduces, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as to the present invention The restriction of protection scope.In various figures, part is similarly comprised using similar number.
Fig. 1 is a kind of flow chart for verification code generation method that the embodiment of the present invention 1 provides;
Fig. 2 is a kind of flow chart for verification code generation method that the embodiment of the present invention 2 provides;
Fig. 3 is a kind of flow chart for verifying code verification method that the embodiment of the present invention 3 provides;
Fig. 4 is a kind of structural schematic diagram for identifying code login system that the embodiment of the present invention 4 provides.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
The component of embodiments of the present invention, which are generally described and illustrated herein in the accompanying drawings can be come with a variety of different configurations Arrangement and design.Therefore, requirement is not intended to limit to the detailed description of the embodiment of the present invention provided in the accompanying drawings below The scope of the present invention of protection, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, this field skill Art personnel every other embodiment obtained without making creative work belongs to the model that the present invention protects It encloses.
Hereinafter, term " includes ", " having " and its cognate that can be used in various embodiments of the present invention are only It is intended to mean that special characteristic, number, step, operation, the combination of element, component or aforementioned item, and is understood not to first Exclude the combined presence or increase by one of one or more other features, number, step, operation, element, component or aforementioned item A or more feature, number, step, operation, element, component or aforementioned item combination a possibility that.
In addition, term " first ", " second ", " third " etc. are only used for distinguishing description, it is not understood to indicate or imply Relative importance.
Unless otherwise defined, otherwise all terms (including technical terms and scientific terms) used herein have and this The identical meaning of the various normally understood meanings of embodiment one skilled in the art of invention.The term (such as exists The term limited in the dictionary generally used) it is to be interpreted as that there is contain identical with situational meaning in the related technical field Justice and Utopian meaning or meaning too formal will be interpreted as having, unless in various embodiments of the present invention It is clearly defined.
Embodiment 1
Fig. 1 is a kind of flow chart for verification code generation method that the embodiment of the present invention 1 provides, and this method includes following step It is rapid:
Step S11: in response to the verifying logging request of client, the first identifying code, identifying code picture and corresponding are generated Identifying code mark.
In the embodiment of the present invention, which includes the electronic equipments such as mobile phone, tablet computer and computer computer, in electricity It is generally had in sub- equipment and carries out the demand of login account in front end login page, when carrying out login account, in addition in front end Login page inputs account and password, it is also necessary to input identifying code, the account logged in be shown to be true man, to prevent from disliking The case where meaning is operated using the automated log on that machine or program carry out batch.
In the embodiment of the present invention, authentication server will generate this when receiving the verifying logging request of client transmission The corresponding identifying code picture of identifying code, the identifying code and identifying code of secondary verifying logging request identify, and specifically, may include Following steps: first identifying code, and corresponding identifying code mark are generated;Picture conversion is carried out to first identifying code And visual confusion processing is carried out to the picture of conversion, generate the identifying code picture.Wherein, which can be generated The character code of fixed quantity, such as 4 character codes and more character codes, here without limitation, the character code can be generated Including upper and lower case letter, symbol and middle text etc..Carrying out visual confusion processing also can be single to the character code in picture Amplify, reduce and different colours processing etc., to increase the safety of identifying code.Identifying code mark namely identifying code ID number, will generate the ID number while generating identifying code, and the ID number be it is unique, for identifying the identifying code, so as to The search of corresponding identifying code is carried out using the ID number in both the buffers, wherein identifying code mark can be generated according to identifying code Time determine, here without limitation.
Step S12: the first identifying code and corresponding identifying code mark are sent to buffer and are associated storage.
In the embodiment of the present invention, after generating identifying code and corresponding identifying code mark, can by the identifying code and Corresponding identifying code mark associated storage is in both the buffers.Wherein, which can store a large amount of differences within unified time Identifying code and corresponding identifying code mark, to handle a large amount of identifying code verification operations in the same time, also, the buffer In the holding time of identifying code namely the out-of-service time of identifying code can be set, such as can be set to 2 minutes or more, Here without limitation.
Step S13: to identifying code picture carry out coded treatment, generate corresponding picture code and with corresponding identifying code mark Know combination producing identifying code message, sends identifying code message to client.
In the embodiment of the present invention, which will compile identifying code picture after generating identifying code picture Code processing, which can encode for base64, to obtain the picture code of identifying code picture, and by the picture code with Identifying code identifier combination is at identifying code message.Wherein, in combined authentication code message, identifying code can be identified according to default rule It then injects in picture code, to increase the safety of identifying code message, prevents from cracking after message is intercepted, such as can will verify Code mark is multistage according to presetting digit capacity, and in the predeterminated position of insert pictures code, and increases marker and be marked.Its In, identifying code message is the interface packets of json format.
The prior art obtains the method for identifying code mark using cookie (browser rs cache), takes in front end page and rear end When the domain name or port difference of business device, namely in the case where cross-domain, identifying code mark can not be obtained, to be unable to complete Verifying.And in the embodiment of the present invention, the addition of identifying code identifier combination is generated into identifying code message in picture code and is sent together To client, cross-domain can not be obtained so as to overcome so that client does not need in addition to obtain identifying code mark from cookie The problem of identifying code identifies improves user experience.
Embodiment 2
Fig. 2 is a kind of flow chart for verification code generation method that the embodiment of the present invention 2 provides, and this method includes following step It is rapid:
Step S21: in response to the verifying logging request of client, the first identifying code, identifying code picture and corresponding are generated Identifying code mark.
This step is consistent with above-mentioned steps S11, and details are not described herein.
Step S22: the first identifying code and corresponding identifying code mark are sent to buffer and are associated storage.
This step is consistent with above-mentioned steps S12, and details are not described herein.
Step S23: to identifying code picture carry out coded treatment, generate corresponding picture code and with corresponding identifying code mark Know combination producing identifying code message, sends identifying code message to client.
This step is consistent with above-mentioned steps S13, and details are not described herein.
Step S24: receiving the second identifying code and identifying code mark that client is sent, slow by identifying code identifier lookup Corresponding identifying code in storage.
In the embodiment of the present invention, authentication server can receive the identifying code that client is sent and the identifying code is corresponding Identifying code mark.Authentication server will enter caching using identifying code mark after receiving the identifying code mark that client is sent It is matched in device, to obtain corresponding identifying code in buffer.Wherein, this is entered in buffer using identifying code mark and is carried out Matched process can use algorithm or application program to realize, such as application program can be provided in authentication server, The application program obtain client send identifying code mark after, can use the identifying code mark enter buffer in search Associated identifying code is identified with the identifying code.Wherein, when not finding associated identifying code in both the buffers, then illustrate the verifying Code is expired, and authentication server can send the expired prompt of identifying code to client.
Step S25: judge whether the second identifying code and identifying code corresponding in buffer are consistent.
Step S26: when the second identifying code is consistent with identifying code corresponding in buffer, be proved to be successful and send verifying at Function is prompted to corresponding client.
In the embodiment of the present invention, when the identifying code that client is sent is consistent with identifying code corresponding in authentication server, It then represents and is proved to be successful, wherein the authentication server can also receive the account of client transmission while verifying identifying code And password, and verified, in account number cipher and identifying code without mistaking, then allow client to log in.
It is above-mentioned to judge that the whether consistent process of identifying code can use algorithm or application program is come in fact in the embodiment of the present invention It is existing, for example, the application program for judging identifying code can be provided in authentication server, in the identifying code for receiving client, And after finding corresponding identifying code in both the buffers, which can be compared two identifying codes, and judgement is It is no consistent.
Step S27: when the second identifying code and inconsistent identifying code corresponding in buffer, send authentication failed prompt to Corresponding client.
It, should in the identifying code and inconsistent identifying code corresponding in buffer that client is sent in the embodiment of the present invention It is to prompt client to re-enter to corresponding client, or prompt client that it is title that verifying, which can be generated, in authentication server Refresh identifying code.Wherein, when client refreshes identifying code, authentication server will generate new identifying code and corresponding mark And picture, and the identifying code for re-starting above-mentioned steps, and failing in buffer will be automatically deleted.
Embodiment 3
Fig. 3 is a kind of flow chart for verifying code verification method that the embodiment of the present invention 3 provides, and this method includes following step It is rapid:
Step S31: receiving the identifying code message that authentication server is sent, and identifying code message includes picture code and corresponding Identifying code mark.
Step S32: it extracts the picture code in identifying code message and carries out decoding process, generate corresponding identifying code picture And it is shown.
In the embodiment of the present invention, client will be extracted in message after receiving the identifying code message that authentication server is sent Picture code and corresponding identifying code mark.Wherein, available if the information in the identifying code message is encrypted Prespecified decryption rule is extracted after being decrypted.After extracting picture code, client is converted to the picture code Picture is simultaneously shown, wherein the picture code is encoded using base64 and generated, then is solved using corresponding decoder Code, here without limitation.
Step S33: the identifying code mark in the third identifying code and identifying code message of user's input is back to verifying Server.
In the embodiment of the present invention, after user inputs identifying code in the client, client by the identifying code of the input with test Card code mark is back to identifying code server after being packaged, to be verified.
Embodiment 4
Fig. 4 is a kind of structural schematic diagram for identifying code login system that the embodiment of the present invention 4 provides.
The identifying code login system 400 includes client 410 and authentication server 420;
Client 410 sends verifying logging request to authentication server 420;
Authentication server 420 generates the first identifying code, identifying code picture in response to the verifying logging request of client 410 And corresponding identifying code mark;First identifying code and identifying code mark are sent to buffer and are associated storage;To testing It demonstrate,proves code picture and carries out coded treatment, generate corresponding picture code and generate identifying code report with corresponding identifying code identifier combination Text sends identifying code message to client 410;
Client 410 receives the identifying code message that authentication server 420 is sent, and extracts the picture code in identifying code message And decoding process is carried out, identifying code picture is generated and is shown;By the second identifying code of user's input and identifying code mark It is back to authentication server 420;
Authentication server 420 by the first identifying code in identifying code identifier lookup buffer, and judge the first identifying code and Whether the second identifying code is consistent, is logged in executing the verifying of client 410.
In addition, the authentication server may include smart phone, plate electricity the present invention also provides a kind of authentication server Brain, vehicle-mounted computer, intelligent wearable device etc..The authentication server includes memory and processor, and memory can be used for storing meter Calculation machine program, processor is by running the computer program, so that authentication server be made to execute above-mentioned verification code generation method In modules function.
Memory may include storing program area and storage data area, wherein storing program area can storage program area, at least Application program needed for one function (such as sound-playing function, image player function etc.) etc.;Storage data area can store root Created data (such as audio data, phone directory etc.) etc. are used according to authentication server.In addition, memory may include height Fast random access memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device, Or other volatile solid-state parts.
The present embodiment additionally provides a kind of computer storage medium, for storing calculating used in above-mentioned authentication server Machine program.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and structure in attached drawing Figure shows the system frame in the cards of the device of multiple embodiments according to the present invention, method and computer program product Structure, function and operation.In this regard, each box in flowchart or block diagram can represent a module, section or code A part, a part of the module, section or code includes one or more for implementing the specified logical function Executable instruction.It should also be noted that function marked in the box can also be to be different from the implementation as replacement The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes It can execute in the opposite order, this depends on the function involved.It is also noted that in structure chart and/or flow chart The combination of each box and the box in structure chart and/or flow chart, can function or movement as defined in executing it is dedicated Hardware based system realize, or can realize using a combination of dedicated hardware and computer instructions.
In addition, each functional module or unit in each embodiment of the present invention can integrate one independence of formation together Part, be also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be intelligence Can mobile phone, personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or Part steps.And storage medium above-mentioned include: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), Random access memory (RAM, Random Access Memory), magnetic or disk etc. be various to can store program code Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. a kind of verification code generation method characterized by comprising
In response to the verifying logging request of client, the first identifying code, identifying code picture and corresponding identifying code mark are generated;
First identifying code and corresponding identifying code mark are sent to buffer and are associated storage;
Coded treatment is carried out to the identifying code picture, generate corresponding picture code and is given birth to corresponding identifying code identifier combination At identifying code message, the identifying code message is sent to client.
2. verification code generation method according to claim 1, which is characterized in that further include:
The second identifying code and identifying code mark that client is sent are received, buffer described in the identifying code identifier lookup is passed through In corresponding identifying code;
Judge whether second identifying code and corresponding identifying code in the buffer are consistent;
When second identifying code is consistent with identifying code corresponding in the buffer, it is proved to be successful and sends to be proved to be successful and mention Show to corresponding client.
3. verification code generation method according to claim 2, which is characterized in that further include:
When second identifying code and inconsistent identifying code corresponding in the buffer, sends authentication failed and prompt to corresponding Client.
4. verification code generation method according to claim 1, which is characterized in that the coded treatment is at base64 coding Reason.
5. verification code generation method according to claim 1, which is characterized in that described " to generate the first identifying code, identifying code Picture and corresponding identifying code identify " include:
Generate first identifying code, and corresponding identifying code mark;
Picture conversion is carried out to first identifying code and visual confusion processing is carried out to the picture of conversion, generates the identifying code Picture.
6. verification code generation method according to claim 1, which is characterized in that the identifying code message is json format Interface packets.
7. a kind of verifying code verification method characterized by comprising
The identifying code message that authentication server is sent is received, the identifying code message includes picture code and corresponding identifying code Mark;
It extracts the picture code in the identifying code message and carries out decoding process, generate corresponding identifying code picture and shown Show;
Identifying code mark in the third identifying code and the identifying code message of user's input is back to the service for checking credentials Device.
8. a kind of identifying code login system, which is characterized in that including client and authentication server;
The client sends verifying logging request to the authentication server;
The authentication server generates the first identifying code, identifying code picture and phase in response to the verifying logging request of client The identifying code mark answered;First identifying code and identifying code mark are sent to buffer and are associated storage;It is right The identifying code picture carries out coded treatment, generates corresponding picture code and generates with corresponding identifying code identifier combination and verifies Code message, sends the identifying code message to client;
The client receives the identifying code message that authentication server is sent, and extracts picture code in the identifying code message simultaneously It is decoded processing, generate the identifying code picture and is shown;By the second identifying code of user's input and the verifying Code mark is back to the authentication server;
The authentication server passes through the first identifying code described in buffer described in the identifying code identifier lookup, and described in judgement Whether the first identifying code and second identifying code are consistent, are logged in executing the verifying of client.
9. a kind of authentication server, which is characterized in that including memory and processor, the memory is for storing computer Program, the processor runs the computer program so that the authentication server executes according to claim 1 to any in 6 Verification code generation method described in.
10. a kind of computer storage medium, which is characterized in that it, which is stored in authentication server as claimed in claim 9, is made Computer program.
CN201910743750.0A 2019-08-13 2019-08-13 Verification code generation method and verification code login system Active CN110445792B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910743750.0A CN110445792B (en) 2019-08-13 2019-08-13 Verification code generation method and verification code login system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910743750.0A CN110445792B (en) 2019-08-13 2019-08-13 Verification code generation method and verification code login system

Publications (2)

Publication Number Publication Date
CN110445792A true CN110445792A (en) 2019-11-12
CN110445792B CN110445792B (en) 2021-11-09

Family

ID=68434918

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910743750.0A Active CN110445792B (en) 2019-08-13 2019-08-13 Verification code generation method and verification code login system

Country Status (1)

Country Link
CN (1) CN110445792B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112039890A (en) * 2020-08-31 2020-12-04 重庆可兰达科技有限公司 Verification code verification method, device, terminal and medium
CN112364318A (en) * 2020-11-24 2021-02-12 北京海联捷讯科技股份有限公司 Operation and maintenance big data security management method, system, terminal and storage medium
CN112948812A (en) * 2021-03-29 2021-06-11 天津车之家数据信息技术有限公司 Verification code distribution method, computing device and storage medium
CN114978742A (en) * 2022-06-08 2022-08-30 中国电信股份有限公司 Verification information generation method, verification method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125234A (en) * 2014-08-06 2014-10-29 沈文策 Method and system for dynamic image security verification
CN108769083A (en) * 2018-08-01 2018-11-06 北京奇虎科技有限公司 Login method, apparatus and system based on distributed server

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125234A (en) * 2014-08-06 2014-10-29 沈文策 Method and system for dynamic image security verification
CN108769083A (en) * 2018-08-01 2018-11-06 北京奇虎科技有限公司 Login method, apparatus and system based on distributed server

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112039890A (en) * 2020-08-31 2020-12-04 重庆可兰达科技有限公司 Verification code verification method, device, terminal and medium
CN112364318A (en) * 2020-11-24 2021-02-12 北京海联捷讯科技股份有限公司 Operation and maintenance big data security management method, system, terminal and storage medium
CN112364318B (en) * 2020-11-24 2021-12-31 北京海联捷讯科技股份有限公司 Operation and maintenance big data security management method, system, terminal and storage medium
CN112948812A (en) * 2021-03-29 2021-06-11 天津车之家数据信息技术有限公司 Verification code distribution method, computing device and storage medium
CN112948812B (en) * 2021-03-29 2022-07-08 天津车之家数据信息技术有限公司 Verification code distribution method, computing device and storage medium
CN114978742A (en) * 2022-06-08 2022-08-30 中国电信股份有限公司 Verification information generation method, verification method and device
CN114978742B (en) * 2022-06-08 2024-04-23 中国电信股份有限公司 Verification information generation method, verification method and device

Also Published As

Publication number Publication date
CN110445792B (en) 2021-11-09

Similar Documents

Publication Publication Date Title
CN110445792A (en) Verification code generation method, verifying code verification method and identifying code login system
US10880306B2 (en) Verification information update
CN104580264B (en) Login method, entering device and login and Accreditation System
EP2874074B1 (en) Method for implementing cross-domain jump, browser, and domain name server
CN109450649A (en) Gateway verification method and device based on application program interface and electronic equipment
CN110287682A (en) A kind of login method, apparatus and system
CN106302308B (en) Trust login method and device
CN104796257A (en) Flexible data authentication
CN102946384B (en) User authentication method and equipment
CN106330838B (en) A kind of dynamic signature method and the client and server using this method
CN103888255A (en) Identity authentication method, device and system
CN102752115A (en) Challenge code generation method and device, dynamic password authentication method and system
CN106685973A (en) Method and device for remembering log in information, log in control method and device
CN109714365B (en) The cipher management method and system calculated based on multiple hash
CN102158488A (en) Dynamic countersign generation method and device and authentication method and system
CN105791246B (en) Verification method, the apparatus and system of verification information
CN102186173A (en) Identity authentication method and system
CN110213247A (en) A kind of method and system improving pushed information safety
CN110311886A (en) Server leak detection method, device, equipment and storage medium
CN107465649A (en) Control method of electronic device, terminal and control system
CN104935548B (en) Auth method, apparatus and system based on intelligent equipment of tatooing
CN102143131A (en) User logout method and authentication server
CN102769629B (en) Client-side password storage method and service system
CN110166471A (en) A kind of portal authentication method and device
CN108418679B (en) Method and device for processing secret key under multiple data centers and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant