CN110457888A - A kind of verifying code imput method, device, electronic equipment and storage medium - Google Patents

A kind of verifying code imput method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN110457888A
CN110457888A CN201910689821.3A CN201910689821A CN110457888A CN 110457888 A CN110457888 A CN 110457888A CN 201910689821 A CN201910689821 A CN 201910689821A CN 110457888 A CN110457888 A CN 110457888A
Authority
CN
China
Prior art keywords
identifying code
destination application
verifying
token
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910689821.3A
Other languages
Chinese (zh)
Other versions
CN110457888B (en
Inventor
陈纲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910689821.3A priority Critical patent/CN110457888B/en
Publication of CN110457888A publication Critical patent/CN110457888A/en
Application granted granted Critical
Publication of CN110457888B publication Critical patent/CN110457888B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Automation & Control Theory (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides a kind of verifying code imput method, device, electronic equipment and computer readable storage mediums, wherein the verifying code imput method includes: the first input for receiving user for destination application;In response to first input, the first information is sent to server by the destination application;Wherein, the first information includes verifying token;The target message that server is sent is received, the target message includes identifying code and the verifying token;The open destination application accesses the permission of the identifying code.In the above method, electronic equipment determines destination application according to the verifying token in target message, and identifying code access authority is opened to destination application, so that the destination application only with verifying token matched could access identifying code, it ensure that the personal secrets of user.

Description

A kind of verifying code imput method, device, electronic equipment and storage medium
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of verifying code imput methods, device, electronic equipment And computer readable storage medium.
Background technique
Short message verification code is applied to the user identification confirmation of the various scenes such as registration, login, payment, consumption, and use is short The mode of letter identifying code carries out authentication, and cost is relatively low and easy to accomplish.
Inventor has found in the research process to the prior art, current some schemes for automatically entering short message verification code, Need authorized applications by way of reading user's short message content to identify identifying code because application program to be The permission for reading all short messages can be monitored, once so safeguard procedures are improper or application developer is unique, it will Cause the leakage of privacy of user.
It can be seen that the existing solution security for automatically entering short message verification code is lower.
Summary of the invention
The present invention provides a kind of verifying code imput method, device and computer readable storage medium, existing to solve Automatically enter the lower problem of the solution security of short message verification code.
In order to solve the above-mentioned technical problem, the present invention is implemented as follows:
In a first aspect, being applied to electronic equipment, the method the embodiment of the invention provides a kind of verifying code imput method Include:
User is received for the first input of destination application;
In response to first input, the first information is sent to server by the destination application;Wherein, described The first information includes verifying token;
The target message that server is sent is received, the target message includes identifying code and the verifying token;
The open destination application accesses the permission of the identifying code.
Optionally, described in response to first input, the first letter is sent to server by the destination application Breath, specifically includes:
In response to first input, the verifying token is generated, and is sent out by the destination application to server Send the first information.
Optionally, after the opening destination application accesses the permission of the identifying code, the method is also wrapped It includes:
The identifying code is inputted into target widget corresponding with the verifying token in the destination application.
Optionally, the verifying token includes the first verifying token and the second verifying token, and the identifying code includes first Identifying code and the second identifying code;
It is described that the identifying code is inputted into target widget corresponding with the verifying token in the destination application, It specifically includes:
First identifying code is inputted in the destination application and verifies token corresponding first with described first Second identifying code is inputted in the destination application and verifies token corresponding second with described second by target widget Target widget.
Second aspect, the embodiment of the invention provides a kind of identifying code input unit, described device includes:
First input receiving module, for receiving user for the first input of destination application;
First information sending module, in response to first input, by the destination application to server Send the first information;Wherein, the first information includes verifying token;
Target message receiving module, for receiving the target message of server transmission, the target message includes identifying code With the verifying token;
Permission opens module, and the permission of the identifying code is accessed for opening the destination application.
Optionally, the first information sending module, specifically includes:
Sending submodule, for generating the verifying token, and pass through the target application in response to first input Program sends the first information to server.
Optionally, described device further include:
Input module, it is corresponding with the verifying token in the destination application for inputting the identifying code Target widget.
Optionally, the verifying token includes the first verifying token and the second verifying token, and the identifying code includes first Identifying code and the second identifying code;The input module specifically includes:
Input submodule is enabled for inputting first identifying code in the destination application with first verifying Second identifying code is inputted in the destination application and is enabled with second verifying by the corresponding first object control of board Corresponding second target widget of board.
The third aspect the embodiment of the invention provides a kind of electronic equipment, including processor, memory and is stored in described It is real when the computer program is executed by the processor on memory and the computer program that can run on the processor Now the step of verifying code imput method as described in relation to the first aspect.
Fourth aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storage Computer program is stored on medium, realizes that identifying code as described in relation to the first aspect is defeated when the computer program is executed by processor The step of entering method.
In embodiments of the present invention, user is received for the first input of destination application;It is defeated in response to described first Enter, the first information is sent to server by the destination application;Wherein, the first information includes verifying token;It connects The target message that server is sent is received, the target message includes identifying code and the verifying token;The open target application The permission of identifying code described in routine access.In the above method, electronic equipment determines target according to the verifying token in target message Application program, and identifying code access authority is opened to destination application, so that the target application only with verifying token matched Program could access identifying code, ensure that the personal secrets of user.
Detailed description of the invention
Fig. 1 is one of the flow chart of verifying code imput method provided in an embodiment of the present invention;
Fig. 2 is the two of the flow chart of verifying code imput method provided in an embodiment of the present invention;
Fig. 3 is the three of the flow chart of verifying code imput method provided in an embodiment of the present invention;
Fig. 4 is one of the structural block diagram of identifying code input unit provided in an embodiment of the present invention;
Fig. 5 is the two of the structural block diagram of identifying code input unit provided in an embodiment of the present invention;
Fig. 6 is the three of the structural block diagram of identifying code input unit provided in an embodiment of the present invention;
The hardware structural diagram of Fig. 7 a kind of electronic equipment of each embodiment to realize the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
Fig. 1 is one of the flow chart of verifying code imput method provided in an embodiment of the present invention.This method can be applied to electricity Sub- equipment, as shown in Figure 1, this method may comprise steps of:
Step 101 receives user for the first input of destination application.
In embodiments of the present invention, optionally, destination application is the software other than nonlinear editing system manufacturer The application program that company provides, is not the application program that electronic device system itself carries.Mesh of the user in electronic equipment When being registered in mark application program, log in, pay, consuming, need to carry out authentication by the way of short message verification code.
Specifically, user can be identifying code of the user in destination application for the first input of destination application The operation of identifying code send button is clicked on input interface.
Step 102, in response to first input, the first information is sent to server by the destination application; Wherein, the first information includes verifying token.
In embodiments of the present invention, after electronic equipment receives the first input, in response to first input, target application journey Sequence sends the first information to server, which is identifying code acquisition request information, which is for target application journey The server of sequence offer business support.Verifying token is carried in the first information, can also carry the electricity where destination application The identification information of sub- equipment, to facilitate server to generate target message according to verifying token, and it is corresponding to be sent to identification information Electronic equipment.
Wherein, verifying token can be the random string generated by non-reversible algorithm, without any user, mobile phone Hardware information, therefore the privacy of user can be protected.
Step 103, the target message that server is sent is received, the target message includes that identifying code and the verifying enable Board.
In embodiments of the present invention, it is short to receive the target that server corresponding with destination application is sent for electronic equipment It ceases, identifying code and verifying token is carried in the target message, in order to which electronic equipment determines requests verification code according to verifying token Destination application.
The predeterminated position that token can be located at target message is verified, for example, the predeterminated position can be short message text, short message The position of heading or short message message trailer, verifying token insertion can be preset before generating target message.
Step 104, the open destination application accesses the permission of the identifying code.
After electronic equipment receives target message, electronic equipment can voluntarily trigger short message matching operation, use respectively Short message text, short message heading and short message message trailer and the verifying token of application program on an electronic device registered in advance carry out Matching, if using the application program of successful match as destination application, and the target application can be opened with successful match The permission of routine access identifying code.The permission of access identifying code specifically can be the permission of access target short message.
Further, it is also possible to another scheme is taken, and after destination application and verifying token binding, target application journey Sequence is monitored to electronic equipment registration short message, then after electronic equipment receives short message, can request electronics by destination application Equipment triggers short message matching operation.
After open permission, the identifying code in destination application access target short message, and by identifying code write verification code mesh It marks in control.
In conclusion in embodiments of the present invention, receiving user for the first input of destination application;In response to institute The first input is stated, the first information is sent to server by the destination application;Wherein, the first information includes verifying Token;The target message that server is sent is received, the target message includes identifying code and the verifying token;The open mesh Mark application program accesses the permission of the identifying code.In the above method, electronic equipment is true according to the verifying token in target message Set the goal application program, and opens identifying code access authority to destination application, so that the mesh only with verifying token matched Mark application program could access identifying code, ensure that the personal secrets of user.
Fig. 2 is the two of the flow chart of verifying code imput method provided in an embodiment of the present invention, as shown in Fig. 2, this method can To be applied to electronic equipment, this method may include:
Step 201, user is received for the first input of destination application.
In embodiments of the present invention, step 201 is referred to step 101, and details are not described herein again.
Step 202, in response to first input, generate the verifying token, and by the destination application to Server sends the first information.
In embodiments of the present invention, user clicks identifying code transmission in the identifying code input interface of destination application and presses After button, destination application issues verifying token to electronic equipment and generates request.Electronic equipment is directed to the verifying token It generates request and generates verifying token, and verifying token and the destination application are bound.Wherein, verifying token can be logical The random string for crossing non-reversible algorithm generation without any user, mobile phone hardware information, therefore can protect that user's is hidden It is private.
After destination application and verifying token binding, destination application sends the first letter to its corresponding server Breath, the first information are identifying code acquisition request, which is that the server of business support is provided for destination application.The Verifying token is carried in one information, can also carry the identification information of the electronic equipment where destination application, to facilitate clothes Device be engaged according to verifying token generation target message, and is sent to the corresponding electronic equipment of identification information.
Step 203, the target message that server is sent is received, the target message includes that identifying code and the verifying enable Board.
In embodiments of the present invention, step 203 is referred to step 103, and details are not described herein again.
Step 204, the open destination application accesses the permission of the identifying code.
In embodiments of the present invention, step 204 is referred to step 104, and details are not described herein again.
In conclusion verifying code imput method provided in an embodiment of the present invention, except with the verifying code imput method in Fig. 1 Beneficial effect except, be additionally in response to first input, generate the verifying token, and by the destination application to Server sends the first information, and the verifying token of above-mentioned generation can be used for being bound with destination application, facilitates electricity Sub- equipment determines destination application corresponding with target message, further to protect the personal secrets of user.
Fig. 3 is the three of the flow chart of verifying code imput method provided in an embodiment of the present invention, as shown in figure 3, this method can To be applied to electronic equipment, this method may include:
Step 301, user is received for the first input of destination application.
In embodiments of the present invention, step 301 is referred to step 101, and details are not described herein again.
Step 302, in response to first input, the first information is sent to server by the destination application; Wherein, the first information includes verifying token.
In embodiments of the present invention, step 302 is referred to step 102, and details are not described herein again.
Step 303, the target message that server is sent is received, the target message includes that identifying code and the verifying enable Board.
In embodiments of the present invention, step 303 is referred to step 103, and details are not described herein again.
Step 304, the open destination application accesses the permission of the identifying code.
In embodiments of the present invention, step 304 is referred to step 104, and details are not described herein again.
Step 305, the identifying code is inputted into target corresponding with the verifying token in the destination application Control.
In embodiments of the present invention, optionally, target widget can click verifying for user on destination application interface When code send button, the corresponding target widget of the button, i.e. target widget are requested for receiving the identifying code transmission operation Identifying code.In addition, target widget be also possible to before generate verifying token when it is preset, the embodiment of the present invention does not make this to have Body limits.
After electronic equipment generates request generation verifying token for the verifying token, token, target control can will be verified Part and the destination application are bound.After the permission of open object application program access identifying code, destination application It will be from the target widget that the identifying code write-in that target message is read is bound with verifying token.
Optionally, if there are at least two target widgets for the destination application, from at least two targets control The corresponding target widget of the verifying token is determined in part.
In embodiments of the present invention, two and more than two target widgets if it exists on destination application interface, then It needs to select target widget corresponding with the verifying token according to the verifying token carried in target message.So electronic equipment It needs to extract identifying code and verifying token from target message, destination application is sent to, to facilitate destination application true The fixed corresponding target widget of the identifying code.
Destination application extracts its target widget letter bound according to the verifying token received from verifying token Breath, and the information is matched with multiple target widgets, select target widget corresponding with verifying token.Target is being determined After control, then identifying code is written in the target widget destination application.
Optionally, the verifying token includes the first verifying token and the second verifying token, and the identifying code includes first Identifying code and the second identifying code, above-mentioned steps 305 specifically include:
First identifying code is inputted in the destination application and verifies token corresponding first with described first Second identifying code is inputted in the destination application and verifies token corresponding second with described second by target widget Target widget.
In embodiments of the present invention, if there are two identifying code input areas on the interface of destination application, for example, depositing In the input area of username and password, destination application issues the verifying token generation for two identifying code input areas Request, then electronic equipment generates request according to the verifying token that destination application is sent, and generates two verifying tokens and two Target widget, the first verifying token correspond to first object control, the second corresponding second target widget of verifying token.Target application journey When sequence sends identifying code generation request to server, two verifying tokens are also carried, server is generated according to two verifying tokens Two identifying codes, respectively the first identifying code and the second identifying code.
Destination application reads two identifying codes of target message, and two identifying codes are respectively written into corresponding target In control.In this way, corresponding identifying code can be written in two target widgets simultaneously, avoids destination application and repeatedly ask Identifying code is sought, is repeatedly written, further improves the write efficiency of identifying code.
In conclusion verifying code imput method provided in an embodiment of the present invention, except with the verifying code imput method in Fig. 1 Beneficial effect except, the identifying code is also inputted into target corresponding with the verifying token in the destination application Control allows identifying code to automatically write the corresponding position on destination application interface, avoids user and is manually written, mentions High efficiency.In addition, there are two identifying code input areas, it can the write-in pair in two target widgets simultaneously The identifying code answered avoids the multiple requests verification code of destination application, is repeatedly written, further improves the write-in of identifying code Efficiency.
Fig. 4 is a kind of one of the structural block diagram of identifying code input unit provided in an embodiment of the present invention, as shown in figure 4, should Identifying code input unit 400 may include:
First input receiving module 401, for receiving user for the first input of destination application;
First information sending module 402, in response to first input, by the destination application to service Device sends the first information;Wherein, the first information includes verifying token;
Target message receiving module 403, for receiving the target message of server transmission, the target message includes verifying Code and the verifying token;
Permission opens module 404, and the permission of the identifying code is accessed for opening the destination application.
In conclusion in embodiments of the present invention, receiving user for the first input of destination application;In response to institute The first input is stated, the first information is sent to server by the destination application;Wherein, the first information includes verifying Token;The target message that server is sent is received, the target message includes identifying code and the verifying token;The open mesh Mark application program accesses the permission of the identifying code.In the above method, identifying code input unit is according to the verifying in target message Token determines destination application, and opens identifying code access authority to destination application so that only with verifying token The destination application matched could access identifying code, ensure that the personal secrets of user.
Optionally, the two of the structural block diagram of identifying code input unit are shown on the basis of above-mentioned Fig. 4 referring to Fig. 5. Wherein, the first information sending module 402, specifically includes:
Sending submodule 4021, for generating the verifying token, and pass through the target in response to first input Application program sends the first information to server.
In conclusion verifying code imput method provided in an embodiment of the present invention, except with the verifying code imput method in Fig. 1 Beneficial effect except, be additionally in response to first input, generate the verifying token, and by the destination application to Server sends the first information, and the verifying token of above-mentioned generation can be used for being bound with destination application, facilitate and test It demonstrate,proves code input unit and determines destination application corresponding with target message, further to protect the personal secrets of user.
Optionally, the three of the structural block diagram of identifying code input unit are shown on the basis of above-mentioned Fig. 4 referring to Fig. 6. Wherein, described device 400 further include:
Input module 405 is opposite with the verifying token in the destination application for inputting the identifying code The target widget answered.
Optionally, the verifying token includes the first verifying token and the second verifying token, and the identifying code includes first Identifying code and the second identifying code;The input module 400 specifically includes:
Input submodule is enabled for inputting first identifying code in the destination application with first verifying Second identifying code is inputted in the destination application and is enabled with second verifying by the corresponding first object control of board Corresponding second target widget of board.
In conclusion verifying code imput method provided in an embodiment of the present invention, except with the verifying code imput method in Fig. 1 Beneficial effect except, the identifying code is also inputted into target corresponding with the verifying token in the destination application Control allows identifying code to automatically write the corresponding position on destination application interface, avoids user and is manually written, mentions High efficiency.In addition, there are two identifying code input areas, it can the write-in pair in two target widgets simultaneously The identifying code answered avoids the multiple requests verification code of destination application, is repeatedly written, further improves the write-in of identifying code Efficiency.
The hardware structural diagram of Fig. 7 a kind of electronic equipment of each embodiment to realize the present invention,
The electronic equipment 500 includes but is not limited to: radio frequency unit 501, network module 502, audio output unit 503, defeated Enter unit 504, sensor 505, display unit 506, user input unit 507, interface unit 508, memory 509, processor The components such as 510 and power supply 511.It will be understood by those skilled in the art that electronic devices structure shown in Fig. 5 is not constituted pair The restriction of electronic equipment, electronic equipment may include perhaps combining certain components or not than illustrating more or fewer components Same component layout.In embodiments of the present invention, electronic equipment includes but is not limited to mobile phone, tablet computer, laptop, the palm Upper computer, car-mounted terminal, wearable device and pedometer etc..
Wherein, user input unit 507, for receiving user for the first input of destination application;Processor 510, for sending the first information to server by the destination application in response to first input;Wherein, described The first information includes verifying token;The target message that server is sent is received, the target message includes identifying code and described tests Demonstrate,prove token;The open destination application accesses the permission of the identifying code.
In conclusion in embodiments of the present invention, receiving user for the first input of destination application;In response to institute The first input is stated, the first information is sent to server by the destination application;Wherein, the first information includes verifying Token;The target message that server is sent is received, the target message includes identifying code and the verifying token;The open mesh Mark application program accesses the permission of the identifying code.In the above method, electronic equipment is true according to the verifying token in target message Set the goal application program, and opens identifying code access authority to destination application, so that the mesh only with verifying token matched Mark application program could access identifying code, ensure that the personal secrets of user.
It should be understood that the embodiment of the present invention in, radio frequency unit 501 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 510 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 501 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 501 can also by wireless communication system and network and other set Standby communication.
Electronic equipment provides wireless broadband internet by network module 502 for user and accesses, and such as user is helped to receive It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 503 can be received by radio frequency unit 501 or network module 502 or in memory 509 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 503 can also provide and electricity The relevant audio output of specific function that sub- equipment 500 executes is (for example, call signal receives sound, message sink sound etc. Deng).Audio output unit 503 includes loudspeaker, buzzer and receiver etc..
Input unit 504 is for receiving audio or video signal.Input unit 504 may include graphics processor (Graphics Processing Unit, GPU) 5041 and microphone 5042, graphics processor 5041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 506.Through graphics processor 5041, treated that picture frame can be deposited Storage is sent in memory 509 (or other storage mediums) or via radio frequency unit 501 or network module 502.Mike Wind 5042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output that mobile communication base station can be sent to via radio frequency unit 501 is converted in the case where telephone calling model.
Electronic equipment 500 further includes at least one sensor 505, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 5061, and proximity sensor can close when electronic equipment 500 is moved in one's ear Display panel 5061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify electronic equipment posture (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes Sensor 505 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 506 is for showing information input by user or being supplied to the information of user.Display unit 506 can wrap Display panel 5061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 5061.
User input unit 507 can be used for receiving the number or character information of input, and generate the use with electronic equipment Family setting and the related key signals input of function control.Specifically, user input unit 507 include touch panel 5071 and Other input equipments 5072.Touch panel 5071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 5071 or in touch panel 5071 Neighbouring operation).Touch panel 5071 may include both touch detecting apparatus and touch controller.Wherein, touch detection Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 510, receiving area It manages the order that device 510 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Seed type realizes touch panel 5071.In addition to touch panel 5071, user input unit 507 can also include other input equipments 5072.Specifically, other input equipments 5072 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 5071 can be covered on display panel 5061, when touch panel 5071 is detected at it On or near touch operation after, send processor 510 to determine the type of touch event, be followed by subsequent processing device 510 according to touching The type for touching event provides corresponding visual output on display panel 5061.Although in Fig. 5, touch panel 5071 and display Panel 5061 is the function that outputs and inputs of realizing electronic equipment as two independent components, but in some embodiments In, can be integrated by touch panel 5071 and display panel 5061 and realize the function that outputs and inputs of electronic equipment, it is specific this Place is without limitation.
Interface unit 508 is the interface that external device (ED) is connect with electronic equipment 500.For example, external device (ED) may include having Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 508 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and By one or more elements that the input received is transferred in electronic equipment 500 or can be used in 500 He of electronic equipment Data are transmitted between external device (ED).
Memory 509 can be used for storing software program and various data.Memory 509 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 509 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 510 is the control centre of electronic equipment, utilizes each of various interfaces and the entire electronic equipment of connection A part by running or execute the software program and/or module that are stored in memory 509, and calls and is stored in storage Data in device 509 execute the various functions and processing data of electronic equipment, to carry out integral monitoring to electronic equipment.Place Managing device 510 may include one or more processing units;Preferably, processor 510 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 510.
Electronic equipment 500 can also include the power supply 511 (such as battery) powered to all parts, it is preferred that power supply 511 Can be logically contiguous by power-supply management system and processor 510, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, electronic equipment 500 includes some unshowned functional modules, details are not described herein.
Optionally, the embodiment of the present invention also provides a kind of electronic equipment, including processor 510, and memory 509 is stored in On memory 509 and the computer program that can run on the processor 510, the computer program are executed by processor 510 Each process of the above-mentioned reminding method embodiment of Shi Shixian, and identical technical effect can be reached, to avoid repeating, here no longer It repeats.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realize each process of above-mentioned method for editing text embodiment, and energy when being executed by processor Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within protection of the invention.

Claims (10)

1. a kind of verifying code imput method is applied to electronic equipment, which is characterized in that the described method includes:
User is received for the first input of destination application;
In response to first input, the first information is sent to server by the destination application;Wherein, described first Information includes verifying token;
The target message that server is sent is received, the target message includes identifying code and the verifying token;
The open destination application accesses the permission of the identifying code.
2. passing through the target the method according to claim 1, wherein described input in response to described first Application program sends the first information to server, specifically includes:
In response to first input, the verifying token is generated, and send the to server by the destination application One information.
3. the method according to claim 1, wherein the opening destination application accesses the verifying After the permission of code, the method also includes:
The identifying code is inputted into target widget corresponding with the verifying token in the destination application.
4. according to the method described in claim 3, it is characterized in that, the verifying token includes that the first verifying token and second is tested Token is demonstrate,proved, the identifying code includes the first identifying code and the second identifying code;
It is described that the identifying code is inputted into target widget corresponding with the verifying token in the destination application, specifically Include:
First identifying code is inputted into first object corresponding with the first verifying token in the destination application Second identifying code is inputted the second target corresponding with the second verifying token in the destination application by control Control.
5. a kind of identifying code input unit, which is characterized in that described device includes:
First input receiving module, for receiving user for the first input of destination application;
First information sending module, for being sent to server by the destination application in response to first input The first information;Wherein, the first information includes verifying token;
Target message receiving module, for receiving the target message of server transmission, the target message includes identifying code and institute State verifying token;
Permission opens module, and the permission of the identifying code is accessed for opening the destination application.
6. device according to claim 5, which is characterized in that the first information sending module specifically includes:
Sending submodule, for generating the verifying token, and pass through the destination application in response to first input The first information is sent to server.
7. device according to claim 5, which is characterized in that described device further include:
Input module, for the identifying code to be inputted target corresponding with the verifying token in the destination application Control.
8. device according to claim 7, which is characterized in that the verifying token includes that the first verifying token and second is tested Token is demonstrate,proved, the identifying code includes the first identifying code and the second identifying code;The input module specifically includes:
Input submodule verifies token phase with described first for inputting first identifying code in the destination application Second identifying code is inputted in the destination application and verifies token phase with described second by corresponding first object control Corresponding second target widget.
9. a kind of electronic equipment, including processor, memory and it is stored on the memory and can transports on the processor Capable computer program realizes testing as described in Claims 1-4 is any when the computer program is executed by the processor Demonstrate,prove code imput method.
10. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium Sequence is realized when the computer program is executed by processor and verifies code imput method as described in Claims 1-4 is any.
CN201910689821.3A 2019-07-29 2019-07-29 Verification code input method and device, electronic equipment and storage medium Active CN110457888B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910689821.3A CN110457888B (en) 2019-07-29 2019-07-29 Verification code input method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910689821.3A CN110457888B (en) 2019-07-29 2019-07-29 Verification code input method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110457888A true CN110457888A (en) 2019-11-15
CN110457888B CN110457888B (en) 2021-10-22

Family

ID=68483851

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910689821.3A Active CN110457888B (en) 2019-07-29 2019-07-29 Verification code input method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110457888B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111596820A (en) * 2020-04-28 2020-08-28 维沃移动通信有限公司 Head portrait setting method and device
CN111898111A (en) * 2020-06-29 2020-11-06 南京博联智能科技有限公司 Device binding method, device, electronic device, storage medium and system
CN111931155A (en) * 2020-08-11 2020-11-13 深圳传音控股股份有限公司 Verification code input method, verification code input equipment and storage medium
CN112612770A (en) * 2020-12-28 2021-04-06 深圳市科创思科技有限公司 Distributed file uploading method and system
CN113434847A (en) * 2021-06-25 2021-09-24 平安国际智慧城市科技股份有限公司 Privacy module processing method and device of application program, electronic equipment and medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104796263A (en) * 2015-04-29 2015-07-22 百度在线网络技术(北京)有限公司 User identity authentication method and device
CN105376204A (en) * 2014-08-28 2016-03-02 宇龙计算机通信科技(深圳)有限公司 User terminal, authority granting method and system thereof
US20160277421A1 (en) * 2015-03-20 2016-09-22 Yahoo! Inc. Secure Service for Receiving Sensitive Information Through Nested iframes
CN106603815A (en) * 2016-11-15 2017-04-26 青岛海信移动通信技术股份有限公司 Message processing method and device
CN106682485A (en) * 2016-11-29 2017-05-17 维沃移动通信有限公司 Method for processing verification code and mobile terminal
CN107182043A (en) * 2017-06-27 2017-09-19 努比亚技术有限公司 The labeling method and mobile terminal of identifying code short message
CN107347117A (en) * 2017-08-07 2017-11-14 努比亚技术有限公司 A kind of message management method, mobile terminal and computer-readable recording medium
CN109040010A (en) * 2015-12-31 2018-12-18 华为技术有限公司 A kind of identifying code acquisition methods, device and terminal
CN109245902A (en) * 2018-09-21 2019-01-18 厦门美图移动科技有限公司 Protection method and device for instant messaging information verification code

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105376204A (en) * 2014-08-28 2016-03-02 宇龙计算机通信科技(深圳)有限公司 User terminal, authority granting method and system thereof
US20160277421A1 (en) * 2015-03-20 2016-09-22 Yahoo! Inc. Secure Service for Receiving Sensitive Information Through Nested iframes
CN104796263A (en) * 2015-04-29 2015-07-22 百度在线网络技术(北京)有限公司 User identity authentication method and device
CN109040010A (en) * 2015-12-31 2018-12-18 华为技术有限公司 A kind of identifying code acquisition methods, device and terminal
CN106603815A (en) * 2016-11-15 2017-04-26 青岛海信移动通信技术股份有限公司 Message processing method and device
CN106682485A (en) * 2016-11-29 2017-05-17 维沃移动通信有限公司 Method for processing verification code and mobile terminal
CN107182043A (en) * 2017-06-27 2017-09-19 努比亚技术有限公司 The labeling method and mobile terminal of identifying code short message
CN107347117A (en) * 2017-08-07 2017-11-14 努比亚技术有限公司 A kind of message management method, mobile terminal and computer-readable recording medium
CN109245902A (en) * 2018-09-21 2019-01-18 厦门美图移动科技有限公司 Protection method and device for instant messaging information verification code

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
VIRENDRA KUMAR YADAV等: "SRTS: A Novel Technique to Generate Random Text", 《网页在线公开:HTTPS://IEEEXPLORE.IEEE.ORG/DOCUMENT/7065487》 *
WENJUN ZHANG: "Zhang’s CAPTCHA Architecture Based on Intelligent Interaction via RIA", 《网页在线公开:HTTPS://IEEEXPLORE.IEEE.ORG/STAMP/STAMP.JSP?TP=&ARNUMBER=5486295》 *
胡建等: "验证码安全与验证码绕过技术", 《网络空间安全》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111596820A (en) * 2020-04-28 2020-08-28 维沃移动通信有限公司 Head portrait setting method and device
CN111898111A (en) * 2020-06-29 2020-11-06 南京博联智能科技有限公司 Device binding method, device, electronic device, storage medium and system
CN111931155A (en) * 2020-08-11 2020-11-13 深圳传音控股股份有限公司 Verification code input method, verification code input equipment and storage medium
CN112612770A (en) * 2020-12-28 2021-04-06 深圳市科创思科技有限公司 Distributed file uploading method and system
CN112612770B (en) * 2020-12-28 2024-05-14 深圳市科创思科技有限公司 Distributed file uploading method and system
CN113434847A (en) * 2021-06-25 2021-09-24 平安国际智慧城市科技股份有限公司 Privacy module processing method and device of application program, electronic equipment and medium
CN113434847B (en) * 2021-06-25 2023-10-27 深圳赛安特技术服务有限公司 Privacy module processing method and device of application program, electronic equipment and medium

Also Published As

Publication number Publication date
CN110457888B (en) 2021-10-22

Similar Documents

Publication Publication Date Title
CN110457888A (en) A kind of verifying code imput method, device, electronic equipment and storage medium
CN108304105A (en) A kind of application interface starts method, mobile terminal
CN108256853A (en) A kind of method of payment and mobile terminal
CN108376096A (en) A kind of message display method and mobile terminal
CN110287741A (en) A kind of screen content display method thereof and terminal
CN109145571A (en) A kind of account login method, terminal and server
CN107786569A (en) A kind of identifying code sending method, method of reseptance and relevant device
CN108629171A (en) A kind of unread message processing method and terminal
CN109981891A (en) A kind of terminal control method, device and terminal device
CN109446834A (en) A kind of right management method and mobile terminal of application program
CN110175449A (en) Cipher-code input method and mobile terminal
CN108156537A (en) The remote operation method and mobile terminal of a kind of mobile terminal
CN108011887A (en) A kind of account management method and equipment
CN109544172A (en) A kind of display methods and terminal device
CN108984231A (en) A kind of login method and mobile terminal of application program account
CN108629280A (en) Face identification method and mobile terminal
CN110225040A (en) A kind of information processing method, terminal device and server
CN110213438A (en) A kind of processing method and terminal device of application program
CN109446794A (en) A kind of cipher-code input method and its mobile terminal
CN110069407A (en) A kind of function test method and device of application program
CN108600492A (en) A kind of unlocking screen method and terminal
CN108319432A (en) A kind of application operation method and terminal
CN107895108A (en) A kind of operation management method and mobile terminal
CN110007836A (en) A kind of bill generation method and mobile terminal
CN109033898A (en) A kind of data inputting method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant