CN110677338A - Verification information timing method and device, electronic equipment and storage medium - Google Patents

Verification information timing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN110677338A
CN110677338A CN201910869691.1A CN201910869691A CN110677338A CN 110677338 A CN110677338 A CN 110677338A CN 201910869691 A CN201910869691 A CN 201910869691A CN 110677338 A CN110677338 A CN 110677338A
Authority
CN
China
Prior art keywords
time
preset
verification information
instruction
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910869691.1A
Other languages
Chinese (zh)
Other versions
CN110677338B (en
Inventor
朱佳慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dajia Internet Information Technology Co Ltd
Original Assignee
Beijing Dajia Internet Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dajia Internet Information Technology Co Ltd filed Critical Beijing Dajia Internet Information Technology Co Ltd
Priority to CN201910869691.1A priority Critical patent/CN110677338B/en
Publication of CN110677338A publication Critical patent/CN110677338A/en
Application granted granted Critical
Publication of CN110677338B publication Critical patent/CN110677338B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/56Unified messaging, e.g. interactions between e-mail, instant messaging or converged IP messaging [CPM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72469User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The present disclosure relates to a verification information timing method, apparatus, electronic device and storage medium, the method comprising: when an instruction for displaying an interface for inputting verification information is received, determining whether the waiting time from a first moment when the instruction is received last time to a second moment when the instruction is received this time is less than a first preset time; and if the waiting time is less than the first preset time, displaying time information at a preset position in the interface. According to the embodiment of the disclosure, when an instruction for displaying an interface for inputting verification information is received, whether a waiting time from a first time when the instruction is received last time to a second time when the instruction is received this time is less than a first preset time or not can be determined, and time information is displayed at a preset position in the interface without displaying a function key under the condition that the waiting time is less than the first preset time, so that resource waste caused by triggering and sending the verification information by clicking the function key by a user is avoided.

Description

Verification information timing method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of verification technologies, and in particular, to a verification information timing method, a verification information timing apparatus, an electronic device, and a storage medium.
Background
In order to determine whether the current user performing the operation is a legal user, an interface for inputting verification information can be displayed, a function key is displayed in the interface, the verification information can be triggered and sent after the current user clicks the function key, so that the legal user can receive the verification information, if the current user is the legal user, the verification information can be received, and then the verification can be completed by inputting the verification information in the interface.
In order to avoid that the current user frequently clicks the function key to trigger the sending of the verification information, in the related art, after the current user clicks the function key once, the verification information is sent, and then countdown time is displayed at the position of the function key, wherein the countdown time is used for indicating the time length for waiting for displaying the function key next time.
However, the related art has a problem in that, when the user reopens the interface, the function key is displayed regardless of whether the current time is as long as the time required for the last time of sending the verification information, and the countdown time is not displayed at the position of the function key.
Disclosure of Invention
The present disclosure provides a verification information timing method, a verification information timing apparatus, an electronic device, and a storage medium to solve at least the technical problems in the related art. The technical scheme of the disclosure is as follows:
according to a first aspect of the embodiments of the present disclosure, a method for timing verification information is provided, including:
when an instruction for displaying an interface for inputting verification information is received, determining whether the waiting time from a first moment when the instruction is received last time to a second moment when the instruction is received this time is less than a first preset time;
and if the waiting time length is less than a first preset time length, displaying time information at a preset position in the interface, wherein the time information is used for indicating the time length from the second moment to the display of the function key, and the function key is used for triggering and sending verification information.
Optionally, the method further comprises:
and if the waiting time length is greater than or equal to a first preset time length, displaying the function key at a preset position in the interface.
Optionally, the determining whether the waiting time from the first time when the instruction is received last time to the second time when the instruction is received this time is less than a first preset time includes:
determining whether the authentication information was transmitted before the second time;
if the verification information is sent, determining whether the waiting time length is greater than or equal to a first preset time length;
and if the waiting time length is greater than or equal to a first preset time length or no verification information is sent before the second moment, determining that the waiting time length is greater than or equal to the first preset time length.
Optionally, the displaying the time information at the preset position includes:
and displaying the difference value between the first preset time length and the waiting time length at the preset position.
Optionally, the method further comprises:
inquiring a first number of times of receiving the instruction from the second time to a third time before the second time;
if the first time is greater than or equal to a first preset time, inquiring a second time for receiving the instruction within a second preset time before the third time;
if the second time is less than a second preset time, displaying a function key at a preset position in the interface;
and if the first time is less than a first preset time, or the second time is greater than or equal to a second preset time, displaying time information at a preset position in the interface.
Optionally, the sending manner of the verification information includes at least one of:
short message, mail, instant messaging information.
Optionally, the target for receiving the verification information in the interface displayed by receiving the instruction last time is the same target or a different target from the target for receiving the verification information in the interface displayed by receiving the instruction this time.
According to a second aspect of the embodiments of the present disclosure, there is provided an authentication information timing apparatus including:
the time length determining module is configured to determine the waiting time length from the first time to the second time of the previous verification information sending when an instruction of displaying an interface for inputting the verification information is received;
and the first display module is configured to display time information at a preset position in the interface under the condition that the waiting time is less than a first preset time, wherein the time information is used for indicating the time from the second moment to the display of a function key, and the function key is used for triggering and sending verification information.
Optionally, the apparatus further comprises:
and the second display module is configured to display the function key at a preset position in the interface under the condition that the waiting time length is greater than or equal to a first preset time length.
Optionally, the duration determining module includes:
a first determination sub-module configured to perform a determination of whether the verification information has been transmitted before the second time;
the second determining submodule is configured to determine whether the waiting time length is greater than or equal to a first preset time length if the verification information is sent;
and if the waiting time length is greater than or equal to a first preset time length or no verification information is sent before the second moment, determining that the waiting time length is greater than or equal to the first preset time length.
Optionally, the second display module is configured to perform displaying, at the preset position, a difference value between the first preset time period and the waiting time period.
Optionally, the apparatus further comprises:
a first query module configured to perform a query for a first number of times the instruction was received from the second time to a third time prior to the second time;
a second query module configured to query a second number of times that the instruction is received within a second preset time period before the third time when the first number of times is greater than or equal to a first preset number of times;
the first display module is configured to display a function key at a preset position in the interface under the condition that the second time is less than a second preset time;
the second display module is configured to display time information at a preset position in the interface when the first number of times is less than a first preset number of times or when the second number of times is greater than or equal to a second preset number of times.
Optionally, the sending manner of the verification information includes at least one of:
short message, mail, instant messaging information.
Optionally, the target for receiving the verification information in the interface displayed by receiving the instruction last time is the same target or a different target from the target for receiving the verification information in the interface displayed by receiving the instruction this time.
According to a third aspect of the embodiments of the present disclosure, an electronic device is provided, including:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the verification information timing method according to any of the above embodiments.
According to a fourth aspect of the embodiments of the present disclosure, a storage medium is provided, where instructions, when executed by a processor of an electronic device, enable the electronic device to execute the verification information timing method according to any one of the embodiments.
According to a fifth aspect of embodiments of the present disclosure, there is provided a computer program product configured to execute the verification information timing method according to any one of the above embodiments.
The technical scheme provided by the embodiment of the disclosure at least brings the following beneficial effects:
according to the embodiment of the disclosure, when an instruction for displaying an interface for inputting verification information is received, whether a waiting time from a first time when the instruction is received last to a second time when the instruction is received this time is less than a first preset time or not can be determined, and time information is displayed at a preset position in the interface without displaying a function key under the condition that the waiting time is less than the first preset time, so that the function key is prevented from being displayed under the condition that the waiting time is less than the first preset time, and a user can frequently click the function key to trigger the sending of the verification information, thereby causing resource waste.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the disclosure and are not to be construed as limiting the disclosure.
Fig. 1 is a schematic flow chart diagram illustrating a verification information timing method according to an embodiment of the present disclosure.
Fig. 2 is a schematic diagram illustrating authentication information timing according to an embodiment of the present disclosure.
Fig. 3 is a schematic diagram illustrating another authentication information timing according to an embodiment of the present disclosure.
Fig. 4 is a schematic flow chart diagram illustrating another authentication information timing method in accordance with an embodiment of the present disclosure.
Fig. 5 is a schematic flow chart diagram illustrating yet another authentication information timing method according to an embodiment of the present disclosure.
Fig. 6 is a schematic flow chart diagram illustrating yet another authentication information timing method according to an embodiment of the present disclosure.
Fig. 7 is a schematic flow chart diagram illustrating yet another authentication information timing method according to an embodiment of the present disclosure.
Fig. 8 is a hardware configuration diagram of a device in which the authentication information timing apparatus according to the embodiment of the present disclosure is shown.
Fig. 9 is a schematic block diagram illustrating an authentication information timing apparatus according to an embodiment of the present disclosure.
Fig. 10 is a schematic block diagram illustrating another authentication information timing apparatus according to an embodiment of the present disclosure.
Fig. 11 is a schematic block diagram illustrating a duration determination module in accordance with an embodiment of the present disclosure.
Fig. 12 is a schematic block diagram illustrating yet another authentication information timing apparatus according to an embodiment of the present disclosure.
Detailed Description
In order to make the technical solutions of the present disclosure better understood by those of ordinary skill in the art, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the disclosure described herein are capable of operation in sequences other than those illustrated or otherwise described herein. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Fig. 1 is a schematic flow chart diagram illustrating a verification information timing method according to an embodiment of the present disclosure. The verification information timing method shown in the embodiment can be applied to electronic equipment such as mobile phones, tablet computers, wearable equipment and the like.
As shown in fig. 1, the verification information timing method may include the steps of:
in step S1, when an instruction to display an interface for inputting verification information is received, it is determined whether a waiting time from a first time when the instruction is received last time to a second time when the instruction is received this time is less than a first preset time;
in one embodiment, in an application program or a browser of the electronic device, a user may perform an operation, and when it is necessary to verify whether a current user is a valid user for the operation, an instruction to display an interface for inputting verification information may be generated.
In addition to the above-mentioned manner, the instruction for displaying the interface for inputting the verification information may be generated by refreshing the interface, or by operating to retreat the first-level interface and then advance the first-level interface.
When an instruction for displaying an interface for inputting verification information is received, that is, the second time when the instruction is received this time, a first time when the instruction is received last time may be queried in, for example, a Cookie (browser cache), a local storage, or a SessionStorage, and the waiting time from the first time to the second time is further calculated.
In addition, the target of sending the verification information includes, but is not limited to, a mobile phone number, a mailbox, an ID of instant messaging software (e.g., QQ, WeChat, etc.), and the like.
In step S2, if the waiting duration is less than a first preset duration, displaying time information at a preset position in the interface, where the time information is used to indicate a duration from the second time to displaying a function key, and the function key is used to trigger sending of verification information.
Fig. 2 is a schematic diagram illustrating authentication information timing according to an embodiment of the present disclosure. Fig. 3 is a schematic diagram illustrating another authentication information timing according to an embodiment of the present disclosure.
When the waiting time is shorter than the first preset time, it may be determined that the time that the user waits from the last time of triggering and sending the verification information to the second time is not long enough, and then the time information may be displayed at a preset position in the interface without displaying the function key.
For example, as shown in fig. 3, time information, for example, "50 s", may be displayed at a preset position in the interface for inputting the verification information, for indicating that 50 seconds are to be waited from the second time to the display of the function key.
According to the embodiment of the disclosure, when an instruction for displaying an interface for inputting verification information is received, whether a waiting time from a first time when the instruction is received last to a second time when the instruction is received this time is less than a first preset time or not can be determined, and time information is displayed at a preset position in the interface without displaying a function key under the condition that the waiting time is less than the first preset time, so that the function key is prevented from being displayed under the condition that the waiting time is less than the first preset time, and a user can frequently click the function key to trigger the sending of the verification information, thereby causing resource waste.
For example, for an Application program, sending authentication information requires a server corresponding to the Application program to call an API (Application Programming Interface) of a third party and send a request to the third party, so that the third party sends the authentication information.
And requesting the third party to send the verification information requires payment to the third party, according to the embodiment, since frequent sending of the verification information is avoided, the payment to the third party can be reduced.
Fig. 4 is a schematic flow chart diagram illustrating another authentication information timing method in accordance with an embodiment of the present disclosure. As shown in fig. 4, the method further comprises:
in step S3, if the waiting time is greater than or equal to a first preset time, the function key is displayed at a preset position in the interface.
In one embodiment, in the case that the waiting time duration is greater than or equal to the first preset time duration, it may be determined that the user has waited for a sufficient time duration from the last time the authentication information is triggered to be sent to the second time, or the user has never triggered the operation of sending the authentication information, and therefore, a function key may be displayed at a preset position in the interface for the user to operate and send the authentication information.
For example, as shown in fig. 2, a function key "send verification code" may be displayed at a preset position (except for the positions shown in fig. 2 and fig. 3, which may be set at other positions) in the interface for inputting verification information, and when the user clicks the enable key, the verification code may be sent to the mobile phone number 134XXXX 1234.
Fig. 5 is a schematic flow chart diagram illustrating yet another authentication information timing method according to an embodiment of the present disclosure. As shown in fig. 5, the determining whether the waiting time from the first time when the instruction is received last time to the second time when the instruction is received this time is less than a first preset time includes:
in step S11, it is determined whether the authentication information was transmitted before the second time;
in step S12, if the verification information is sent, determining whether the waiting time duration is greater than or equal to a first preset time duration;
and if the waiting time length is greater than or equal to a first preset time length or no verification information is sent before the second moment, determining that the waiting time length is greater than or equal to the first preset time length.
In one embodiment, the waiting time period being greater than or equal to the first preset time period may include two cases, where in one case, when the verification information is sent before the second time, the waiting time period from the first time to the second time is greater than or equal to the first preset time period; in another case, in a case where the verification information is not sent before the second time, the waiting time period from the first time to the second time is equivalent to infinity, so that it may be determined that the waiting time period is greater than or equal to the first preset time period.
Therefore, when the user does not trigger the operation of sending the verification information, the function key can be displayed at the preset position in the interface, so that the user can click the function key to trigger the sending of the verification information.
Fig. 6 is a schematic flow chart diagram illustrating yet another authentication information timing method according to an embodiment of the present disclosure. As shown in fig. 6, the displaying the time information at the preset position includes:
in step S21, the difference between the first preset time period and the waiting time period is displayed at the preset position.
In one embodiment, the displayed time information may be a difference between the first preset time period and the waiting time period, wherein the time information may be represented by a countdown time, and then:
the countdown time is equal to a first preset time length- (second time-first time);
if the second time and the first time are in units of milliseconds and the first preset time is in units of microseconds, the second time and the first time may be multiplied by 1000 after the waiting time so that the first preset time and the subtracted waiting time are equal in units for calculation.
For example, the first preset time period is 60 seconds (or may be set as another time period as required), the difference between the second time and the first time, that is, the waiting time period, is 10 seconds, the displayed time information may be 50 seconds, the countdown starts from 50 seconds, and when the countdown ends, the function key may be displayed again at the preset position.
Fig. 7 is a schematic flow chart diagram illustrating yet another authentication information timing method according to an embodiment of the present disclosure. As shown in fig. 7, the method further comprises:
in step S4, a first number of times the instruction is received from the second time to a third time before the second time is inquired;
in step S5, if the first number is greater than or equal to a first preset number, querying a second number of times that the instruction is received within a second preset time period before the first time;
in step S6, if the second number is smaller than a second preset number, displaying a function key at a preset position in the interface;
in step S7, if the first number is less than a first preset number of times, or the second number is greater than or equal to a second preset number of times, displaying time information at a preset position in the interface.
In an embodiment, on the basis of determining whether the waiting duration is greater than or equal to the first preset duration, a first number of times that the instruction is received from the second time to a third time before the second time may also be queried, where the duration from the third time to the second time may be set as needed, for example, may be set to be greater than or equal to the waiting duration.
In some cases, the user may be anxious to resend the verification information, for example, the user may input the verification information incorrectly, and the first preset time duration is longer, and the user may wait to acquire the verification code for operation urgently, and the user may input the instruction frequently within the time duration of the verification, for example, the instruction is generated by refreshing the interface.
In this case, the user may input the instruction a plurality of times at a third time from the second time to a time before the second time, and if the first number of times the user inputs the instruction is greater than or equal to the first preset number of times from the second time to the third time, it may be determined that the user may be anxious to resend the verification information, but it is also possible that the user performs a malicious operation and frequently inputs the instruction to send the verification information, and therefore, in the case that the first number of times is greater than or equal to the first preset number of times, the second number of times the instruction is received within a second preset duration before the third time may be further queried.
If the second number of times is greater than or equal to the second preset number of times, it is indicated that the user has frequently input an instruction to send the verification information before the third time, and then the user has a high probability of performing malicious operation, so that the time information can be displayed at the preset position in the interface under the condition that the second number of times is greater than or equal to the second preset number of times, so as to avoid frequently sending the verification information due to the malicious operation of the user.
And under the condition that the second time is less than the second preset time, the user does not frequently input an instruction to send the verification information before the third moment, and the user is more likely to be anxious to resend the verification information instead of performing malicious operation, so that the function key can be displayed at the preset position in the interface to meet the requirement that the user is anxious to resend the verification information.
And under the condition that the first time is less than the first preset time, the user can be determined not to be anxious to resend the verification information, and the time information can be displayed at the preset position in the interface without displaying the function key.
Optionally, the sending manner of the verification information includes at least one of:
short message, mail, instant messaging information.
In an embodiment, after the user clicks the function button, the manner of sending the verification information is not limited to a short message, for example, the sending target input by the user is a mailbox, the verification information may be sent by a mail, for example, the sending target input by the user is an ID of an instant messaging application, for example, a QQ, a micro signal, the verification information may be sent by the instant messaging information, and the verification information may be sent in a text manner or a voice manner, which may be specifically set as required.
Optionally, the target for receiving the verification information in the interface displayed by receiving the instruction last time is the same target or a different target from the target for receiving the verification information in the interface displayed by receiving the instruction this time.
In an embodiment, a target of receiving the verification information in the interface displayed by receiving the instruction last time may be the same target as a target of receiving the verification information in the interface displayed by receiving the instruction this time, for example, an interface triggered by receiving the instruction at the second time and displaying input verification information, where the target of receiving the verification information is the mobile phone number 134XXXX1234, and then the first time is determined, and specifically, a time at which the verification information is sent to the same mobile phone number, that is, the time at which the verification information is sent to 134XXXX1234 and the instruction is input at the previous time may be queried as the first time.
In an embodiment, the target of receiving the verification information in the interface displayed at the previous time when the instruction is received may be a different target from the target of receiving the verification information in the interface displayed at the present time when the instruction is received, for example, the interface triggered by the instruction received at the second time when the verification information is received displays the input verification information, where the target of receiving the verification information is the mobile phone number 134XXXX1234, then the first time is determined, and the time when the instruction (no matter which mobile phone number the verification information is sent to) is input at the previous time for sending the verification information is specifically queried as the first time.
The embodiment of the verification information timing device shown in the embodiment of the disclosure can be applied to electronic equipment such as a mobile phone and a tablet computer wearable device. The device embodiments may be implemented by software, or by hardware, or by a combination of hardware and software. The software implementation is taken as an example, and is formed by reading corresponding computer program instructions in the nonvolatile memory into the memory for operation through the processor of the device where the software implementation is located as a logical means. From a hardware level, as shown in fig. 8, a hardware structure diagram of a device where a verification information timing apparatus is located according to an embodiment of the present disclosure is shown, except for the processor, the network interface, the memory, and the nonvolatile memory shown in fig. 8, the device where the apparatus is located in the embodiment may generally include other hardware, such as a forwarding chip responsible for processing a packet, and the like; the device may also be a distributed device in terms of hardware structure, and may include multiple interface cards to facilitate expansion of message processing at the hardware level.
Corresponding to the embodiment of the verification information timing method, the disclosure also provides an embodiment of a verification information timing device.
Fig. 9 is a schematic block diagram illustrating an authentication information timing apparatus according to an embodiment of the present disclosure. The verification information timing method shown in the embodiment can be applied to electronic equipment such as mobile phones, tablet computers, wearable equipment and the like.
As shown in fig. 9, the authentication information timing apparatus includes:
the time length determining module 1 is configured to determine whether a waiting time length from a first time when an instruction for displaying an interface for inputting verification information is received to a second time when the instruction is received at this time is less than a first preset time length or not when the instruction is received at the first time;
and the first display module 2 is configured to display time information at a preset position in the interface when the waiting time is less than a first preset time, wherein the time information is used for indicating the time from the second moment to the display of a function key, and the function key is used for triggering and sending verification information.
Fig. 10 is a schematic block diagram illustrating another authentication information timing apparatus according to an embodiment of the present disclosure. As shown in fig. 10, the apparatus further includes:
and the second display module 3 is configured to display the function key at a preset position in the interface when the waiting time length is greater than or equal to a first preset time length.
Fig. 11 is a schematic block diagram illustrating a duration determination module in accordance with an embodiment of the present disclosure. As shown in fig. 11, the duration determination module 1 includes:
a first determination sub-module 11 configured to perform a determination of whether the authentication information has been transmitted before the second time;
the second determining submodule 12 is configured to determine whether the waiting time length is greater than or equal to a first preset time length if the verification information is sent;
and if the waiting time length is greater than or equal to a first preset time length or no verification information is sent before the second moment, determining that the waiting time length is greater than or equal to the first preset time length.
Optionally, the difference between the first preset time length and the waiting time length is displayed at the preset position.
Fig. 12 is a schematic block diagram illustrating yet another authentication information timing apparatus according to an embodiment of the present disclosure. As shown in fig. 12, the apparatus further includes:
a first query module 4 configured to perform a query for a first number of times the instruction is received from the second time to a third time before the second time;
a second query module 5 configured to query a second number of times that the instruction is received within a second preset time period before the third time when the first number of times is greater than or equal to a first preset number of times;
the first display module 2 is configured to display a function key at a preset position in the interface when the second number is smaller than a second preset number;
the second display module 3 is configured to perform displaying time information at a preset position in the interface when the first number of times is less than a first preset number of times or when the second number of times is greater than or equal to a second preset number of times.
Optionally, the sending manner of the verification information includes at least one of:
short message, mail, instant messaging information.
Optionally, the target for receiving the verification information in the interface displayed by receiving the instruction last time is the same target or a different target from the target for receiving the verification information in the interface displayed by receiving the instruction this time.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
An embodiment of the present disclosure also provides an electronic device, including:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the verification information timing method of any of the above embodiments.
Embodiments of the present disclosure also provide a storage medium, where instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to execute the verification information timing method according to any of the above embodiments.
Embodiments of the present disclosure further provide a computer program product configured to execute the verification information timing method according to any of the above embodiments.
Alternatively, the storage medium may be a non-transitory computer readable storage medium, which may be, for example, a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Embodiments of the present disclosure further provide a computer program product configured to execute the verification information timing method according to any of the above embodiments.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The method and apparatus provided by the embodiments of the present disclosure are described in detail above, and the principles and embodiments of the present disclosure are explained herein by applying specific examples, and the above description of the embodiments is only used to help understanding the method and core ideas of the present disclosure; meanwhile, for a person skilled in the art, based on the idea of the present disclosure, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present disclosure should not be construed as a limitation to the present disclosure.

Claims (10)

1. A method for validating information timing, comprising:
when an instruction for displaying an interface for inputting verification information is received, determining whether the waiting time from a first moment when the instruction is received last time to a second moment when the instruction is received this time is less than a first preset time;
and if the waiting time length is less than a first preset time length, displaying time information at a preset position in the interface, wherein the time information is used for indicating the time length from the second moment to the display of the function key, and the function key is used for triggering and sending verification information.
2. The method of claim 1, further comprising:
and if the waiting time length is greater than or equal to a first preset time length, displaying the function key at a preset position in the interface.
3. The method of claim 1, wherein the determining whether the waiting time from the first time when the instruction is received last time to the second time when the instruction is received this time is less than a first preset time comprises:
determining whether the authentication information was transmitted before the second time;
if the verification information is sent, determining whether the waiting time length is greater than or equal to a first preset time length;
and if the waiting time length is greater than or equal to a first preset time length or no verification information is sent before the second moment, determining that the waiting time length is greater than or equal to the first preset time length.
4. The method of claim 1, wherein the displaying time information at the preset location comprises:
and displaying the difference value between the first preset time length and the waiting time length at the preset position.
5. The method according to any one of claims 1 to 4, further comprising:
inquiring a first number of times of receiving the instruction from the second time to a third time before the second time;
if the first time is greater than or equal to a first preset time, inquiring a second time for receiving the instruction within a second preset time before the third time;
if the second time is less than a second preset time, displaying a function key at a preset position in the interface;
and if the first time is less than a first preset time, or the second time is greater than or equal to a second preset time, displaying time information at a preset position in the interface.
6. The method according to any one of claims 1 to 4, wherein the sending mode of the verification information comprises at least one of the following:
short message, mail, instant messaging information.
7. The method according to any one of claims 1 to 4, wherein the target of receiving the verification information in the interface displayed by receiving the instruction last time is the same target or different target from the target of receiving the verification information in the interface displayed by receiving the instruction this time.
8. An authentication information timing apparatus, comprising:
the time length determining module is configured to determine whether the waiting time length from a first time when the instruction is received last time to a second time when the instruction is received this time is less than a first preset time length or not when the instruction for displaying the interface for inputting the verification information is received;
and the first display module is configured to display time information at a preset position in the interface under the condition that the waiting time is less than a first preset time, wherein the time information is used for indicating the time from the second moment to the display of a function key, and the function key is used for triggering and sending verification information.
9. An electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the verification information timing method of any of claims 1 to 7.
10. A storage medium, wherein instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the verification information timing method of any one of claims 1 to 7.
CN201910869691.1A 2019-09-16 2019-09-16 Verification information timing method and device, electronic equipment and storage medium Active CN110677338B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910869691.1A CN110677338B (en) 2019-09-16 2019-09-16 Verification information timing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910869691.1A CN110677338B (en) 2019-09-16 2019-09-16 Verification information timing method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110677338A true CN110677338A (en) 2020-01-10
CN110677338B CN110677338B (en) 2021-10-15

Family

ID=69076947

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910869691.1A Active CN110677338B (en) 2019-09-16 2019-09-16 Verification information timing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110677338B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120264427A1 (en) * 2011-04-12 2012-10-18 Yahoo! Inc. Sms-initiated mobile registration
CN103546877A (en) * 2013-10-30 2014-01-29 上海斐讯数据通信技术有限公司 Method and system for obtaining and inputting content code and mobile terminal
CN103841199A (en) * 2014-03-10 2014-06-04 飞天诚信科技股份有限公司 Method for achieving counting down of browser
CN104093141A (en) * 2014-06-27 2014-10-08 北京奇虎科技有限公司 Terminal application log-in method, device, client and electronic device
CN104283884A (en) * 2014-10-13 2015-01-14 宁波公众信息产业有限公司 Verification code verification method
CN104518876A (en) * 2013-09-29 2015-04-15 腾讯科技(深圳)有限公司 Service login method and device
CN106886245A (en) * 2015-12-16 2017-06-23 天脉聚源(北京)科技有限公司 A kind of accurate countdown realization method and system
CN107241362A (en) * 2017-08-10 2017-10-10 青岛网信信息科技有限公司 Recognize the method and apparatus that identifying code inputs user identity
CN108183914A (en) * 2018-01-10 2018-06-19 浪潮通用软件有限公司 A kind of method for preventing malice swipe short message verification code from sending service
CN108366052A (en) * 2018-01-29 2018-08-03 深圳壹账通智能科技有限公司 Verify the processing method and system of short message

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120264427A1 (en) * 2011-04-12 2012-10-18 Yahoo! Inc. Sms-initiated mobile registration
CN104518876A (en) * 2013-09-29 2015-04-15 腾讯科技(深圳)有限公司 Service login method and device
CN103546877A (en) * 2013-10-30 2014-01-29 上海斐讯数据通信技术有限公司 Method and system for obtaining and inputting content code and mobile terminal
CN103841199A (en) * 2014-03-10 2014-06-04 飞天诚信科技股份有限公司 Method for achieving counting down of browser
CN104093141A (en) * 2014-06-27 2014-10-08 北京奇虎科技有限公司 Terminal application log-in method, device, client and electronic device
CN104283884A (en) * 2014-10-13 2015-01-14 宁波公众信息产业有限公司 Verification code verification method
CN106886245A (en) * 2015-12-16 2017-06-23 天脉聚源(北京)科技有限公司 A kind of accurate countdown realization method and system
CN107241362A (en) * 2017-08-10 2017-10-10 青岛网信信息科技有限公司 Recognize the method and apparatus that identifying code inputs user identity
CN108183914A (en) * 2018-01-10 2018-06-19 浪潮通用软件有限公司 A kind of method for preventing malice swipe short message verification code from sending service
CN108366052A (en) * 2018-01-29 2018-08-03 深圳壹账通智能科技有限公司 Verify the processing method and system of short message

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
DORON DRUSINSKY: "Rapid Runtime System Verification using Automatic Source Code Instrumentation", 《PROC. OF THE 2011 6TH INTERNATIONAL CONFERENCE ON SYSTEM OF SYSTEMS ENGINEERING, ALBUQUERQUE, NEW MEXICO, USA - JUNE 27-30, 2011》 *
牛宁: "基于Django的智慧园区平台系统设计与实现", 《CNKI博士论文全文数据库》 *
聆听1991: "js实现发送短信验证码后的倒计时功能(无视页面刷新)", 《CSDN博客》 *

Also Published As

Publication number Publication date
CN110677338B (en) 2021-10-15

Similar Documents

Publication Publication Date Title
CN109039990B (en) Behavior verification method and device based on verification code
US20160277381A1 (en) Security check method and system, terminal, verification server
US20170054814A1 (en) Communication Establishment Method, Device, and System
JP2019512113A (en) Notification message processing method and apparatus
CN108574721B (en) Login method, device, server, user terminal and readable storage medium
US8868050B2 (en) Information output method and device
CN108830562B (en) Attendance card punching method and related equipment
WO2016202075A1 (en) Method and apparatus for sharing goods information
US10158981B2 (en) Method and device for pushing information during call and storage medium
CN112036852A (en) Payment processing method and device, server and electronic equipment
CN109359252B (en) Browser selection method and device
WO2017166297A1 (en) Wifi hotpot portal authentication method and device
CN112800401A (en) Privacy processing method and device and terminal
CN111158631B (en) Information interaction method, device, terminal and storage medium
CN107220818B (en) Online payment method and device
CN110677338B (en) Verification information timing method and device, electronic equipment and storage medium
CN109525485B (en) Message leaving method and terminal equipment
CN111078437A (en) Remote calling method and device of verification code, electronic equipment and readable storage medium
CN108933868B (en) Call prompting method, device and system
CN107613496B (en) Queuing method, system and authentication server
CN106856535A (en) A kind of notification message processing method and device
CN109618307A (en) Weather information display method, device, system, terminal and readable storage medium
EP3138273B1 (en) Method and apparatus for providing communication interaction visibility
CN114971632A (en) Social platform binding system, method and device, electronic equipment and storage medium
CN113672460A (en) Service monitoring method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant