CN110457888A - A kind of verifying code imput method, device, electronic equipment and storage medium - Google Patents
A kind of verifying code imput method, device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN110457888A CN110457888A CN201910689821.3A CN201910689821A CN110457888A CN 110457888 A CN110457888 A CN 110457888A CN 201910689821 A CN201910689821 A CN 201910689821A CN 110457888 A CN110457888 A CN 110457888A
- Authority
- CN
- China
- Prior art keywords
- identifying code
- destination application
- verifying
- token
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Automation & Control Theory (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
The present invention provides a kind of verifying code imput method, device, electronic equipment and computer readable storage mediums, wherein the verifying code imput method includes: the first input for receiving user for destination application;In response to first input, the first information is sent to server by the destination application;Wherein, the first information includes verifying token;The target message that server is sent is received, the target message includes identifying code and the verifying token;The open destination application accesses the permission of the identifying code.In the above method, electronic equipment determines destination application according to the verifying token in target message, and identifying code access authority is opened to destination application, so that the destination application only with verifying token matched could access identifying code, it ensure that the personal secrets of user.
Description
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of verifying code imput methods, device, electronic equipment
And computer readable storage medium.
Background technique
Short message verification code is applied to the user identification confirmation of the various scenes such as registration, login, payment, consumption, and use is short
The mode of letter identifying code carries out authentication, and cost is relatively low and easy to accomplish.
Inventor has found in the research process to the prior art, current some schemes for automatically entering short message verification code,
Need authorized applications by way of reading user's short message content to identify identifying code because application program to be
The permission for reading all short messages can be monitored, once so safeguard procedures are improper or application developer is unique, it will
Cause the leakage of privacy of user.
It can be seen that the existing solution security for automatically entering short message verification code is lower.
Summary of the invention
The present invention provides a kind of verifying code imput method, device and computer readable storage medium, existing to solve
Automatically enter the lower problem of the solution security of short message verification code.
In order to solve the above-mentioned technical problem, the present invention is implemented as follows:
In a first aspect, being applied to electronic equipment, the method the embodiment of the invention provides a kind of verifying code imput method
Include:
User is received for the first input of destination application;
In response to first input, the first information is sent to server by the destination application;Wherein, described
The first information includes verifying token;
The target message that server is sent is received, the target message includes identifying code and the verifying token;
The open destination application accesses the permission of the identifying code.
Optionally, described in response to first input, the first letter is sent to server by the destination application
Breath, specifically includes:
In response to first input, the verifying token is generated, and is sent out by the destination application to server
Send the first information.
Optionally, after the opening destination application accesses the permission of the identifying code, the method is also wrapped
It includes:
The identifying code is inputted into target widget corresponding with the verifying token in the destination application.
Optionally, the verifying token includes the first verifying token and the second verifying token, and the identifying code includes first
Identifying code and the second identifying code;
It is described that the identifying code is inputted into target widget corresponding with the verifying token in the destination application,
It specifically includes:
First identifying code is inputted in the destination application and verifies token corresponding first with described first
Second identifying code is inputted in the destination application and verifies token corresponding second with described second by target widget
Target widget.
Second aspect, the embodiment of the invention provides a kind of identifying code input unit, described device includes:
First input receiving module, for receiving user for the first input of destination application;
First information sending module, in response to first input, by the destination application to server
Send the first information;Wherein, the first information includes verifying token;
Target message receiving module, for receiving the target message of server transmission, the target message includes identifying code
With the verifying token;
Permission opens module, and the permission of the identifying code is accessed for opening the destination application.
Optionally, the first information sending module, specifically includes:
Sending submodule, for generating the verifying token, and pass through the target application in response to first input
Program sends the first information to server.
Optionally, described device further include:
Input module, it is corresponding with the verifying token in the destination application for inputting the identifying code
Target widget.
Optionally, the verifying token includes the first verifying token and the second verifying token, and the identifying code includes first
Identifying code and the second identifying code;The input module specifically includes:
Input submodule is enabled for inputting first identifying code in the destination application with first verifying
Second identifying code is inputted in the destination application and is enabled with second verifying by the corresponding first object control of board
Corresponding second target widget of board.
The third aspect the embodiment of the invention provides a kind of electronic equipment, including processor, memory and is stored in described
It is real when the computer program is executed by the processor on memory and the computer program that can run on the processor
Now the step of verifying code imput method as described in relation to the first aspect.
Fourth aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storage
Computer program is stored on medium, realizes that identifying code as described in relation to the first aspect is defeated when the computer program is executed by processor
The step of entering method.
In embodiments of the present invention, user is received for the first input of destination application;It is defeated in response to described first
Enter, the first information is sent to server by the destination application;Wherein, the first information includes verifying token;It connects
The target message that server is sent is received, the target message includes identifying code and the verifying token;The open target application
The permission of identifying code described in routine access.In the above method, electronic equipment determines target according to the verifying token in target message
Application program, and identifying code access authority is opened to destination application, so that the target application only with verifying token matched
Program could access identifying code, ensure that the personal secrets of user.
Detailed description of the invention
Fig. 1 is one of the flow chart of verifying code imput method provided in an embodiment of the present invention;
Fig. 2 is the two of the flow chart of verifying code imput method provided in an embodiment of the present invention;
Fig. 3 is the three of the flow chart of verifying code imput method provided in an embodiment of the present invention;
Fig. 4 is one of the structural block diagram of identifying code input unit provided in an embodiment of the present invention;
Fig. 5 is the two of the structural block diagram of identifying code input unit provided in an embodiment of the present invention;
Fig. 6 is the three of the structural block diagram of identifying code input unit provided in an embodiment of the present invention;
The hardware structural diagram of Fig. 7 a kind of electronic equipment of each embodiment to realize the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
Fig. 1 is one of the flow chart of verifying code imput method provided in an embodiment of the present invention.This method can be applied to electricity
Sub- equipment, as shown in Figure 1, this method may comprise steps of:
Step 101 receives user for the first input of destination application.
In embodiments of the present invention, optionally, destination application is the software other than nonlinear editing system manufacturer
The application program that company provides, is not the application program that electronic device system itself carries.Mesh of the user in electronic equipment
When being registered in mark application program, log in, pay, consuming, need to carry out authentication by the way of short message verification code.
Specifically, user can be identifying code of the user in destination application for the first input of destination application
The operation of identifying code send button is clicked on input interface.
Step 102, in response to first input, the first information is sent to server by the destination application;
Wherein, the first information includes verifying token.
In embodiments of the present invention, after electronic equipment receives the first input, in response to first input, target application journey
Sequence sends the first information to server, which is identifying code acquisition request information, which is for target application journey
The server of sequence offer business support.Verifying token is carried in the first information, can also carry the electricity where destination application
The identification information of sub- equipment, to facilitate server to generate target message according to verifying token, and it is corresponding to be sent to identification information
Electronic equipment.
Wherein, verifying token can be the random string generated by non-reversible algorithm, without any user, mobile phone
Hardware information, therefore the privacy of user can be protected.
Step 103, the target message that server is sent is received, the target message includes that identifying code and the verifying enable
Board.
In embodiments of the present invention, it is short to receive the target that server corresponding with destination application is sent for electronic equipment
It ceases, identifying code and verifying token is carried in the target message, in order to which electronic equipment determines requests verification code according to verifying token
Destination application.
The predeterminated position that token can be located at target message is verified, for example, the predeterminated position can be short message text, short message
The position of heading or short message message trailer, verifying token insertion can be preset before generating target message.
Step 104, the open destination application accesses the permission of the identifying code.
After electronic equipment receives target message, electronic equipment can voluntarily trigger short message matching operation, use respectively
Short message text, short message heading and short message message trailer and the verifying token of application program on an electronic device registered in advance carry out
Matching, if using the application program of successful match as destination application, and the target application can be opened with successful match
The permission of routine access identifying code.The permission of access identifying code specifically can be the permission of access target short message.
Further, it is also possible to another scheme is taken, and after destination application and verifying token binding, target application journey
Sequence is monitored to electronic equipment registration short message, then after electronic equipment receives short message, can request electronics by destination application
Equipment triggers short message matching operation.
After open permission, the identifying code in destination application access target short message, and by identifying code write verification code mesh
It marks in control.
In conclusion in embodiments of the present invention, receiving user for the first input of destination application;In response to institute
The first input is stated, the first information is sent to server by the destination application;Wherein, the first information includes verifying
Token;The target message that server is sent is received, the target message includes identifying code and the verifying token;The open mesh
Mark application program accesses the permission of the identifying code.In the above method, electronic equipment is true according to the verifying token in target message
Set the goal application program, and opens identifying code access authority to destination application, so that the mesh only with verifying token matched
Mark application program could access identifying code, ensure that the personal secrets of user.
Fig. 2 is the two of the flow chart of verifying code imput method provided in an embodiment of the present invention, as shown in Fig. 2, this method can
To be applied to electronic equipment, this method may include:
Step 201, user is received for the first input of destination application.
In embodiments of the present invention, step 201 is referred to step 101, and details are not described herein again.
Step 202, in response to first input, generate the verifying token, and by the destination application to
Server sends the first information.
In embodiments of the present invention, user clicks identifying code transmission in the identifying code input interface of destination application and presses
After button, destination application issues verifying token to electronic equipment and generates request.Electronic equipment is directed to the verifying token
It generates request and generates verifying token, and verifying token and the destination application are bound.Wherein, verifying token can be logical
The random string for crossing non-reversible algorithm generation without any user, mobile phone hardware information, therefore can protect that user's is hidden
It is private.
After destination application and verifying token binding, destination application sends the first letter to its corresponding server
Breath, the first information are identifying code acquisition request, which is that the server of business support is provided for destination application.The
Verifying token is carried in one information, can also carry the identification information of the electronic equipment where destination application, to facilitate clothes
Device be engaged according to verifying token generation target message, and is sent to the corresponding electronic equipment of identification information.
Step 203, the target message that server is sent is received, the target message includes that identifying code and the verifying enable
Board.
In embodiments of the present invention, step 203 is referred to step 103, and details are not described herein again.
Step 204, the open destination application accesses the permission of the identifying code.
In embodiments of the present invention, step 204 is referred to step 104, and details are not described herein again.
In conclusion verifying code imput method provided in an embodiment of the present invention, except with the verifying code imput method in Fig. 1
Beneficial effect except, be additionally in response to first input, generate the verifying token, and by the destination application to
Server sends the first information, and the verifying token of above-mentioned generation can be used for being bound with destination application, facilitates electricity
Sub- equipment determines destination application corresponding with target message, further to protect the personal secrets of user.
Fig. 3 is the three of the flow chart of verifying code imput method provided in an embodiment of the present invention, as shown in figure 3, this method can
To be applied to electronic equipment, this method may include:
Step 301, user is received for the first input of destination application.
In embodiments of the present invention, step 301 is referred to step 101, and details are not described herein again.
Step 302, in response to first input, the first information is sent to server by the destination application;
Wherein, the first information includes verifying token.
In embodiments of the present invention, step 302 is referred to step 102, and details are not described herein again.
Step 303, the target message that server is sent is received, the target message includes that identifying code and the verifying enable
Board.
In embodiments of the present invention, step 303 is referred to step 103, and details are not described herein again.
Step 304, the open destination application accesses the permission of the identifying code.
In embodiments of the present invention, step 304 is referred to step 104, and details are not described herein again.
Step 305, the identifying code is inputted into target corresponding with the verifying token in the destination application
Control.
In embodiments of the present invention, optionally, target widget can click verifying for user on destination application interface
When code send button, the corresponding target widget of the button, i.e. target widget are requested for receiving the identifying code transmission operation
Identifying code.In addition, target widget be also possible to before generate verifying token when it is preset, the embodiment of the present invention does not make this to have
Body limits.
After electronic equipment generates request generation verifying token for the verifying token, token, target control can will be verified
Part and the destination application are bound.After the permission of open object application program access identifying code, destination application
It will be from the target widget that the identifying code write-in that target message is read is bound with verifying token.
Optionally, if there are at least two target widgets for the destination application, from at least two targets control
The corresponding target widget of the verifying token is determined in part.
In embodiments of the present invention, two and more than two target widgets if it exists on destination application interface, then
It needs to select target widget corresponding with the verifying token according to the verifying token carried in target message.So electronic equipment
It needs to extract identifying code and verifying token from target message, destination application is sent to, to facilitate destination application true
The fixed corresponding target widget of the identifying code.
Destination application extracts its target widget letter bound according to the verifying token received from verifying token
Breath, and the information is matched with multiple target widgets, select target widget corresponding with verifying token.Target is being determined
After control, then identifying code is written in the target widget destination application.
Optionally, the verifying token includes the first verifying token and the second verifying token, and the identifying code includes first
Identifying code and the second identifying code, above-mentioned steps 305 specifically include:
First identifying code is inputted in the destination application and verifies token corresponding first with described first
Second identifying code is inputted in the destination application and verifies token corresponding second with described second by target widget
Target widget.
In embodiments of the present invention, if there are two identifying code input areas on the interface of destination application, for example, depositing
In the input area of username and password, destination application issues the verifying token generation for two identifying code input areas
Request, then electronic equipment generates request according to the verifying token that destination application is sent, and generates two verifying tokens and two
Target widget, the first verifying token correspond to first object control, the second corresponding second target widget of verifying token.Target application journey
When sequence sends identifying code generation request to server, two verifying tokens are also carried, server is generated according to two verifying tokens
Two identifying codes, respectively the first identifying code and the second identifying code.
Destination application reads two identifying codes of target message, and two identifying codes are respectively written into corresponding target
In control.In this way, corresponding identifying code can be written in two target widgets simultaneously, avoids destination application and repeatedly ask
Identifying code is sought, is repeatedly written, further improves the write efficiency of identifying code.
In conclusion verifying code imput method provided in an embodiment of the present invention, except with the verifying code imput method in Fig. 1
Beneficial effect except, the identifying code is also inputted into target corresponding with the verifying token in the destination application
Control allows identifying code to automatically write the corresponding position on destination application interface, avoids user and is manually written, mentions
High efficiency.In addition, there are two identifying code input areas, it can the write-in pair in two target widgets simultaneously
The identifying code answered avoids the multiple requests verification code of destination application, is repeatedly written, further improves the write-in of identifying code
Efficiency.
Fig. 4 is a kind of one of the structural block diagram of identifying code input unit provided in an embodiment of the present invention, as shown in figure 4, should
Identifying code input unit 400 may include:
First input receiving module 401, for receiving user for the first input of destination application;
First information sending module 402, in response to first input, by the destination application to service
Device sends the first information;Wherein, the first information includes verifying token;
Target message receiving module 403, for receiving the target message of server transmission, the target message includes verifying
Code and the verifying token;
Permission opens module 404, and the permission of the identifying code is accessed for opening the destination application.
In conclusion in embodiments of the present invention, receiving user for the first input of destination application;In response to institute
The first input is stated, the first information is sent to server by the destination application;Wherein, the first information includes verifying
Token;The target message that server is sent is received, the target message includes identifying code and the verifying token;The open mesh
Mark application program accesses the permission of the identifying code.In the above method, identifying code input unit is according to the verifying in target message
Token determines destination application, and opens identifying code access authority to destination application so that only with verifying token
The destination application matched could access identifying code, ensure that the personal secrets of user.
Optionally, the two of the structural block diagram of identifying code input unit are shown on the basis of above-mentioned Fig. 4 referring to Fig. 5.
Wherein, the first information sending module 402, specifically includes:
Sending submodule 4021, for generating the verifying token, and pass through the target in response to first input
Application program sends the first information to server.
In conclusion verifying code imput method provided in an embodiment of the present invention, except with the verifying code imput method in Fig. 1
Beneficial effect except, be additionally in response to first input, generate the verifying token, and by the destination application to
Server sends the first information, and the verifying token of above-mentioned generation can be used for being bound with destination application, facilitate and test
It demonstrate,proves code input unit and determines destination application corresponding with target message, further to protect the personal secrets of user.
Optionally, the three of the structural block diagram of identifying code input unit are shown on the basis of above-mentioned Fig. 4 referring to Fig. 6.
Wherein, described device 400 further include:
Input module 405 is opposite with the verifying token in the destination application for inputting the identifying code
The target widget answered.
Optionally, the verifying token includes the first verifying token and the second verifying token, and the identifying code includes first
Identifying code and the second identifying code;The input module 400 specifically includes:
Input submodule is enabled for inputting first identifying code in the destination application with first verifying
Second identifying code is inputted in the destination application and is enabled with second verifying by the corresponding first object control of board
Corresponding second target widget of board.
In conclusion verifying code imput method provided in an embodiment of the present invention, except with the verifying code imput method in Fig. 1
Beneficial effect except, the identifying code is also inputted into target corresponding with the verifying token in the destination application
Control allows identifying code to automatically write the corresponding position on destination application interface, avoids user and is manually written, mentions
High efficiency.In addition, there are two identifying code input areas, it can the write-in pair in two target widgets simultaneously
The identifying code answered avoids the multiple requests verification code of destination application, is repeatedly written, further improves the write-in of identifying code
Efficiency.
The hardware structural diagram of Fig. 7 a kind of electronic equipment of each embodiment to realize the present invention,
The electronic equipment 500 includes but is not limited to: radio frequency unit 501, network module 502, audio output unit 503, defeated
Enter unit 504, sensor 505, display unit 506, user input unit 507, interface unit 508, memory 509, processor
The components such as 510 and power supply 511.It will be understood by those skilled in the art that electronic devices structure shown in Fig. 5 is not constituted pair
The restriction of electronic equipment, electronic equipment may include perhaps combining certain components or not than illustrating more or fewer components
Same component layout.In embodiments of the present invention, electronic equipment includes but is not limited to mobile phone, tablet computer, laptop, the palm
Upper computer, car-mounted terminal, wearable device and pedometer etc..
Wherein, user input unit 507, for receiving user for the first input of destination application;Processor
510, for sending the first information to server by the destination application in response to first input;Wherein, described
The first information includes verifying token;The target message that server is sent is received, the target message includes identifying code and described tests
Demonstrate,prove token;The open destination application accesses the permission of the identifying code.
In conclusion in embodiments of the present invention, receiving user for the first input of destination application;In response to institute
The first input is stated, the first information is sent to server by the destination application;Wherein, the first information includes verifying
Token;The target message that server is sent is received, the target message includes identifying code and the verifying token;The open mesh
Mark application program accesses the permission of the identifying code.In the above method, electronic equipment is true according to the verifying token in target message
Set the goal application program, and opens identifying code access authority to destination application, so that the mesh only with verifying token matched
Mark application program could access identifying code, ensure that the personal secrets of user.
It should be understood that the embodiment of the present invention in, radio frequency unit 501 can be used for receiving and sending messages or communication process in, signal
Send and receive, specifically, by from base station downlink data receive after, to processor 510 handle;In addition, by uplink
Data are sent to base station.In general, radio frequency unit 501 includes but is not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 501 can also by wireless communication system and network and other set
Standby communication.
Electronic equipment provides wireless broadband internet by network module 502 for user and accesses, and such as user is helped to receive
It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 503 can be received by radio frequency unit 501 or network module 502 or in memory 509
The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 503 can also provide and electricity
The relevant audio output of specific function that sub- equipment 500 executes is (for example, call signal receives sound, message sink sound etc.
Deng).Audio output unit 503 includes loudspeaker, buzzer and receiver etc..
Input unit 504 is for receiving audio or video signal.Input unit 504 may include graphics processor
(Graphics Processing Unit, GPU) 5041 and microphone 5042, graphics processor 5041 is in video acquisition mode
Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out
Reason.Treated, and picture frame may be displayed on display unit 506.Through graphics processor 5041, treated that picture frame can be deposited
Storage is sent in memory 509 (or other storage mediums) or via radio frequency unit 501 or network module 502.Mike
Wind 5042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be
The format output that mobile communication base station can be sent to via radio frequency unit 501 is converted in the case where telephone calling model.
Electronic equipment 500 further includes at least one sensor 505, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 5061, and proximity sensor can close when electronic equipment 500 is moved in one's ear
Display panel 5061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify electronic equipment posture (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes
Sensor 505 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet
Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 506 is for showing information input by user or being supplied to the information of user.Display unit 506 can wrap
Display panel 5061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 5061.
User input unit 507 can be used for receiving the number or character information of input, and generate the use with electronic equipment
Family setting and the related key signals input of function control.Specifically, user input unit 507 include touch panel 5071 and
Other input equipments 5072.Touch panel 5071, also referred to as touch screen collect the touch operation of user on it or nearby
(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 5071 or in touch panel 5071
Neighbouring operation).Touch panel 5071 may include both touch detecting apparatus and touch controller.Wherein, touch detection
Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control
Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 510, receiving area
It manages the order that device 510 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc.
Seed type realizes touch panel 5071.In addition to touch panel 5071, user input unit 507 can also include other input equipments
5072.Specifically, other input equipments 5072 can include but is not limited to physical keyboard, function key (such as volume control button,
Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 5071 can be covered on display panel 5061, when touch panel 5071 is detected at it
On or near touch operation after, send processor 510 to determine the type of touch event, be followed by subsequent processing device 510 according to touching
The type for touching event provides corresponding visual output on display panel 5061.Although in Fig. 5, touch panel 5071 and display
Panel 5061 is the function that outputs and inputs of realizing electronic equipment as two independent components, but in some embodiments
In, can be integrated by touch panel 5071 and display panel 5061 and realize the function that outputs and inputs of electronic equipment, it is specific this
Place is without limitation.
Interface unit 508 is the interface that external device (ED) is connect with electronic equipment 500.For example, external device (ED) may include having
Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end
Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module
Mouthful etc..Interface unit 508 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and
By one or more elements that the input received is transferred in electronic equipment 500 or can be used in 500 He of electronic equipment
Data are transmitted between external device (ED).
Memory 509 can be used for storing software program and various data.Memory 509 can mainly include storing program area
The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function
Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 509 may include high-speed random access memory, it can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 510 is the control centre of electronic equipment, utilizes each of various interfaces and the entire electronic equipment of connection
A part by running or execute the software program and/or module that are stored in memory 509, and calls and is stored in storage
Data in device 509 execute the various functions and processing data of electronic equipment, to carry out integral monitoring to electronic equipment.Place
Managing device 510 may include one or more processing units;Preferably, processor 510 can integrate application processor and modulatedemodulate is mediated
Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main
Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 510.
Electronic equipment 500 can also include the power supply 511 (such as battery) powered to all parts, it is preferred that power supply 511
Can be logically contiguous by power-supply management system and processor 510, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
In addition, electronic equipment 500 includes some unshowned functional modules, details are not described herein.
Optionally, the embodiment of the present invention also provides a kind of electronic equipment, including processor 510, and memory 509 is stored in
On memory 509 and the computer program that can run on the processor 510, the computer program are executed by processor 510
Each process of the above-mentioned reminding method embodiment of Shi Shixian, and identical technical effect can be reached, to avoid repeating, here no longer
It repeats.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program, the computer program realize each process of above-mentioned method for editing text embodiment, and energy when being executed by processor
Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only
Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation
RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form belongs within protection of the invention.
Claims (10)
1. a kind of verifying code imput method is applied to electronic equipment, which is characterized in that the described method includes:
User is received for the first input of destination application;
In response to first input, the first information is sent to server by the destination application;Wherein, described first
Information includes verifying token;
The target message that server is sent is received, the target message includes identifying code and the verifying token;
The open destination application accesses the permission of the identifying code.
2. passing through the target the method according to claim 1, wherein described input in response to described first
Application program sends the first information to server, specifically includes:
In response to first input, the verifying token is generated, and send the to server by the destination application
One information.
3. the method according to claim 1, wherein the opening destination application accesses the verifying
After the permission of code, the method also includes:
The identifying code is inputted into target widget corresponding with the verifying token in the destination application.
4. according to the method described in claim 3, it is characterized in that, the verifying token includes that the first verifying token and second is tested
Token is demonstrate,proved, the identifying code includes the first identifying code and the second identifying code;
It is described that the identifying code is inputted into target widget corresponding with the verifying token in the destination application, specifically
Include:
First identifying code is inputted into first object corresponding with the first verifying token in the destination application
Second identifying code is inputted the second target corresponding with the second verifying token in the destination application by control
Control.
5. a kind of identifying code input unit, which is characterized in that described device includes:
First input receiving module, for receiving user for the first input of destination application;
First information sending module, for being sent to server by the destination application in response to first input
The first information;Wherein, the first information includes verifying token;
Target message receiving module, for receiving the target message of server transmission, the target message includes identifying code and institute
State verifying token;
Permission opens module, and the permission of the identifying code is accessed for opening the destination application.
6. device according to claim 5, which is characterized in that the first information sending module specifically includes:
Sending submodule, for generating the verifying token, and pass through the destination application in response to first input
The first information is sent to server.
7. device according to claim 5, which is characterized in that described device further include:
Input module, for the identifying code to be inputted target corresponding with the verifying token in the destination application
Control.
8. device according to claim 7, which is characterized in that the verifying token includes that the first verifying token and second is tested
Token is demonstrate,proved, the identifying code includes the first identifying code and the second identifying code;The input module specifically includes:
Input submodule verifies token phase with described first for inputting first identifying code in the destination application
Second identifying code is inputted in the destination application and verifies token phase with described second by corresponding first object control
Corresponding second target widget.
9. a kind of electronic equipment, including processor, memory and it is stored on the memory and can transports on the processor
Capable computer program realizes testing as described in Claims 1-4 is any when the computer program is executed by the processor
Demonstrate,prove code imput method.
10. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium
Sequence is realized when the computer program is executed by processor and verifies code imput method as described in Claims 1-4 is any.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910689821.3A CN110457888B (en) | 2019-07-29 | 2019-07-29 | Verification code input method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910689821.3A CN110457888B (en) | 2019-07-29 | 2019-07-29 | Verification code input method and device, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110457888A true CN110457888A (en) | 2019-11-15 |
CN110457888B CN110457888B (en) | 2021-10-22 |
Family
ID=68483851
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910689821.3A Active CN110457888B (en) | 2019-07-29 | 2019-07-29 | Verification code input method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110457888B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111596820A (en) * | 2020-04-28 | 2020-08-28 | 维沃移动通信有限公司 | Head portrait setting method and device |
CN111898111A (en) * | 2020-06-29 | 2020-11-06 | 南京博联智能科技有限公司 | Device binding method, device, electronic device, storage medium and system |
CN111931155A (en) * | 2020-08-11 | 2020-11-13 | 深圳传音控股股份有限公司 | Verification code input method, verification code input equipment and storage medium |
CN112612770A (en) * | 2020-12-28 | 2021-04-06 | 深圳市科创思科技有限公司 | Distributed file uploading method and system |
CN113434847A (en) * | 2021-06-25 | 2021-09-24 | 平安国际智慧城市科技股份有限公司 | Privacy module processing method and device of application program, electronic equipment and medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104796263A (en) * | 2015-04-29 | 2015-07-22 | 百度在线网络技术(北京)有限公司 | User identity authentication method and device |
CN105376204A (en) * | 2014-08-28 | 2016-03-02 | 宇龙计算机通信科技(深圳)有限公司 | User terminal, authority granting method and system thereof |
US20160277421A1 (en) * | 2015-03-20 | 2016-09-22 | Yahoo! Inc. | Secure Service for Receiving Sensitive Information Through Nested iframes |
CN106603815A (en) * | 2016-11-15 | 2017-04-26 | 青岛海信移动通信技术股份有限公司 | Message processing method and device |
CN106682485A (en) * | 2016-11-29 | 2017-05-17 | 维沃移动通信有限公司 | Method for processing verification code and mobile terminal |
CN107182043A (en) * | 2017-06-27 | 2017-09-19 | 努比亚技术有限公司 | The labeling method and mobile terminal of identifying code short message |
CN107347117A (en) * | 2017-08-07 | 2017-11-14 | 努比亚技术有限公司 | A kind of message management method, mobile terminal and computer-readable recording medium |
CN109040010A (en) * | 2015-12-31 | 2018-12-18 | 华为技术有限公司 | A kind of identifying code acquisition methods, device and terminal |
CN109245902A (en) * | 2018-09-21 | 2019-01-18 | 厦门美图移动科技有限公司 | Protection method and device for instant messaging information verification code |
-
2019
- 2019-07-29 CN CN201910689821.3A patent/CN110457888B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105376204A (en) * | 2014-08-28 | 2016-03-02 | 宇龙计算机通信科技(深圳)有限公司 | User terminal, authority granting method and system thereof |
US20160277421A1 (en) * | 2015-03-20 | 2016-09-22 | Yahoo! Inc. | Secure Service for Receiving Sensitive Information Through Nested iframes |
CN104796263A (en) * | 2015-04-29 | 2015-07-22 | 百度在线网络技术(北京)有限公司 | User identity authentication method and device |
CN109040010A (en) * | 2015-12-31 | 2018-12-18 | 华为技术有限公司 | A kind of identifying code acquisition methods, device and terminal |
CN106603815A (en) * | 2016-11-15 | 2017-04-26 | 青岛海信移动通信技术股份有限公司 | Message processing method and device |
CN106682485A (en) * | 2016-11-29 | 2017-05-17 | 维沃移动通信有限公司 | Method for processing verification code and mobile terminal |
CN107182043A (en) * | 2017-06-27 | 2017-09-19 | 努比亚技术有限公司 | The labeling method and mobile terminal of identifying code short message |
CN107347117A (en) * | 2017-08-07 | 2017-11-14 | 努比亚技术有限公司 | A kind of message management method, mobile terminal and computer-readable recording medium |
CN109245902A (en) * | 2018-09-21 | 2019-01-18 | 厦门美图移动科技有限公司 | Protection method and device for instant messaging information verification code |
Non-Patent Citations (3)
Title |
---|
VIRENDRA KUMAR YADAV等: "SRTS: A Novel Technique to Generate Random Text", 《网页在线公开:HTTPS://IEEEXPLORE.IEEE.ORG/DOCUMENT/7065487》 * |
WENJUN ZHANG: "Zhang’s CAPTCHA Architecture Based on Intelligent Interaction via RIA", 《网页在线公开:HTTPS://IEEEXPLORE.IEEE.ORG/STAMP/STAMP.JSP?TP=&ARNUMBER=5486295》 * |
胡建等: "验证码安全与验证码绕过技术", 《网络空间安全》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111596820A (en) * | 2020-04-28 | 2020-08-28 | 维沃移动通信有限公司 | Head portrait setting method and device |
CN111898111A (en) * | 2020-06-29 | 2020-11-06 | 南京博联智能科技有限公司 | Device binding method, device, electronic device, storage medium and system |
CN111931155A (en) * | 2020-08-11 | 2020-11-13 | 深圳传音控股股份有限公司 | Verification code input method, verification code input equipment and storage medium |
CN112612770A (en) * | 2020-12-28 | 2021-04-06 | 深圳市科创思科技有限公司 | Distributed file uploading method and system |
CN112612770B (en) * | 2020-12-28 | 2024-05-14 | 深圳市科创思科技有限公司 | Distributed file uploading method and system |
CN113434847A (en) * | 2021-06-25 | 2021-09-24 | 平安国际智慧城市科技股份有限公司 | Privacy module processing method and device of application program, electronic equipment and medium |
CN113434847B (en) * | 2021-06-25 | 2023-10-27 | 深圳赛安特技术服务有限公司 | Privacy module processing method and device of application program, electronic equipment and medium |
Also Published As
Publication number | Publication date |
---|---|
CN110457888B (en) | 2021-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110457888A (en) | A kind of verifying code imput method, device, electronic equipment and storage medium | |
CN108304105A (en) | A kind of application interface starts method, mobile terminal | |
CN108256853A (en) | A kind of method of payment and mobile terminal | |
CN108376096A (en) | A kind of message display method and mobile terminal | |
CN110287741A (en) | A kind of screen content display method thereof and terminal | |
CN109145571A (en) | A kind of account login method, terminal and server | |
CN107786569A (en) | A kind of identifying code sending method, method of reseptance and relevant device | |
CN108629171A (en) | A kind of unread message processing method and terminal | |
CN109981891A (en) | A kind of terminal control method, device and terminal device | |
CN109446834A (en) | A kind of right management method and mobile terminal of application program | |
CN110175449A (en) | Cipher-code input method and mobile terminal | |
CN108156537A (en) | The remote operation method and mobile terminal of a kind of mobile terminal | |
CN108011887A (en) | A kind of account management method and equipment | |
CN109544172A (en) | A kind of display methods and terminal device | |
CN108984231A (en) | A kind of login method and mobile terminal of application program account | |
CN108629280A (en) | Face identification method and mobile terminal | |
CN110225040A (en) | A kind of information processing method, terminal device and server | |
CN110213438A (en) | A kind of processing method and terminal device of application program | |
CN109446794A (en) | A kind of cipher-code input method and its mobile terminal | |
CN110069407A (en) | A kind of function test method and device of application program | |
CN108600492A (en) | A kind of unlocking screen method and terminal | |
CN108319432A (en) | A kind of application operation method and terminal | |
CN107895108A (en) | A kind of operation management method and mobile terminal | |
CN110007836A (en) | A kind of bill generation method and mobile terminal | |
CN109033898A (en) | A kind of data inputting method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |