CN111597542A - Verification information sharing method and device, electronic equipment and storage medium - Google Patents

Verification information sharing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN111597542A
CN111597542A CN202010328592.5A CN202010328592A CN111597542A CN 111597542 A CN111597542 A CN 111597542A CN 202010328592 A CN202010328592 A CN 202010328592A CN 111597542 A CN111597542 A CN 111597542A
Authority
CN
China
Prior art keywords
information
electronic device
verification
target
electronic equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010328592.5A
Other languages
Chinese (zh)
Other versions
CN111597542B (en
Inventor
张勤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Hangzhou Co Ltd
Original Assignee
Vivo Mobile Communication Hangzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Hangzhou Co Ltd filed Critical Vivo Mobile Communication Hangzhou Co Ltd
Priority to CN202010328592.5A priority Critical patent/CN111597542B/en
Publication of CN111597542A publication Critical patent/CN111597542A/en
Application granted granted Critical
Publication of CN111597542B publication Critical patent/CN111597542B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention provides a verification information sharing method, a verification information sharing device and electronic equipment, which are applied to the technical field of communication and are used for solving the problem that the steps are complicated when a user performs information verification operation. The method comprises the following steps: under the condition that the first electronic equipment receives the target information, the first electronic equipment sends an inquiry request to second electronic equipment associated with the first electronic equipment, wherein the inquiry request is used for inquiring whether the second electronic equipment is in an information verification operation executing state or not; the target information includes target verification information; receiving a query response sent by the second electronic equipment in response to the query request; and if the query response indicates that the second electronic equipment is in the information verification operation state, sending first information to the second electronic equipment, wherein the first information comprises target verification information. The embodiment of the invention is applied to the operation scene of executing information verification by the user.

Description

Verification information sharing method and device, electronic equipment and storage medium
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a verification information sharing method and device, electronic equipment and a storage medium.
Background
With the development of electronic device technology, the frequency of logging in a website (such as a social networking website or a video website) by a user by using a mobile phone number is higher and higher.
Taking the example that a user logs in a website on a computer by using a mobile phone number and receives a verification code required by logging in the website by using the mobile phone, in the related art, when the user acquires the verification code from the mobile phone, the screen of the mobile phone needs to be unlocked to check the verification code, and then the verification code is input into a verification code input box on the computer for verification.
However, the steps of the user obtaining the information verification code from the mobile phone and inputting the verification code into the computer are complicated, and the verification code is easy to be wrongly recorded, so that the verification error is caused, the user time is wasted, and the man-machine interaction performance is poor.
Disclosure of Invention
The embodiment of the invention provides a verification information sharing method and device and electronic equipment, and aims to solve the problem that steps are complex when a user executes information verification operation.
In order to solve the technical problem, the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides a verification information sharing method, which is applied to a first electronic device, and the method includes: under the condition that the first electronic equipment receives target information, the first electronic equipment sends a query request to second electronic equipment associated with the first electronic equipment, wherein the target information comprises target verification information; the query request is used for querying whether the second electronic equipment is in an information verification operation executing state; receiving a query response sent by the second electronic equipment in response to the query request; and under the condition that the inquiry response indicates that the second electronic equipment is in the information verification operation state, sending first information to the second electronic equipment, wherein the first information comprises target verification information.
In a second aspect, an embodiment of the present invention provides a verification information sharing method, which is applied to a second electronic device, and the method includes: receiving a query request sent by first electronic equipment; in response to the query request, when the second electronic device performs the information verification operation, sending a query response to the first electronic device, wherein the query response indicates that the second electronic device is in a state of performing the information verification operation; receiving first information sent by first electronic equipment, wherein the first information carries target verification information; and according to the first information, performing information verification by adopting the target verification information.
In a third aspect, an embodiment of the present invention further provides an authentication information sharing apparatus, where the apparatus includes a sending module and a first receiving module; the system comprises a sending module, a receiving module and a processing module, wherein the sending module is used for sending a query request to second electronic equipment associated with first electronic equipment under the condition that the first electronic equipment receives target information, and the target information comprises target verification information; the query request is used for querying whether the second electronic equipment is in an information verification operation executing state; the first receiving module is used for receiving a query response sent by the second electronic equipment in response to the query request sent by the sending module; and the sending module is further used for sending first information to the second electronic equipment under the condition that the inquiry response indicates that the second electronic equipment is in the information verification operation executing state, wherein the first information comprises target verification information.
In a fourth aspect, an embodiment of the present invention further provides an authentication information sharing apparatus, where the apparatus includes a receiving module, a sending module, and an authentication module; the receiving module is used for receiving a query request sent by first electronic equipment; the sending module is used for responding to the inquiry request, sending an inquiry response to the first electronic equipment when the second electronic equipment executes the information verification operation, wherein the inquiry response indicates that the second electronic equipment is in an information verification operation executing state; the receiving module is further used for receiving first information sent by the first electronic device, wherein the first information comprises target verification information; and the verification module is used for performing information verification by adopting the target verification information according to the first information received by the receiving module.
In a fifth aspect, an embodiment of the present invention provides an electronic device, including a processor, a memory, and a computer program stored on the memory and executable on the processor, where the computer program, when executed by the processor, implements the steps of the authentication information sharing method according to the first aspect or the second aspect.
In a sixth aspect, the present invention provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the authentication information sharing method according to the first aspect or the second aspect.
In the embodiment of the invention, after receiving the target information, the first electronic device can avoid sending the verification information in the target information to wrong equipment by sending an inquiry request to the second electronic device. After receiving an inquiry response sent by the second electronic device in response to the inquiry request, the first electronic device sends target verification information in the target information to the second electronic device in a mode of sending the first information to the second electronic device, so that the second electronic device can execute information verification operation by using the target verification information. The process does not need any operation of the user, simplifies the steps of the user to execute the information verification operation, and improves the success rate of information verification and further improves the man-machine interaction performance because the verification information is input after being memorized by the user.
Drawings
Fig. 1 is a schematic diagram of an architecture of a possible android operating system according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a verification information sharing method according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an interface applied by a verification information sharing method according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an authentication information sharing apparatus according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of another authentication information sharing apparatus according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that "/" in this context means "or", for example, A/B may mean A or B; "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone.
It should be noted that "a plurality" herein means two or more than two.
It should be noted that, in the embodiments of the present invention, words such as "exemplary" or "for example" are used to indicate examples, illustrations or explanations. Any embodiment or design described as "exemplary" or "e.g.," an embodiment of the present invention is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
It should be noted that, for the convenience of clearly describing the technical solutions of the embodiments of the present invention, in the embodiments of the present invention, words such as "first" and "second" are used to distinguish the same items or similar items with substantially the same functions or actions, and those skilled in the art can understand that the words such as "first" and "second" do not limit the quantity and execution order. For example, the first information and the second information are for distinguishing different information, not for describing a specific order of information.
In the embodiments of the present invention, words such as "exemplary" or "for example" are used to mean serving as examples, illustrations or descriptions. Any embodiment or design described as "exemplary" or "e.g.," an embodiment of the present invention is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
The electronic device in the embodiment of the invention can be a mobile terminal device and can also be a non-mobile terminal device. The mobile terminal device may be a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), etc.; the non-mobile terminal device may be a Personal Computer (PC), a Television (TV), a teller machine, a self-service machine, or the like; the embodiments of the present invention are not particularly limited.
An execution subject of the verification information sharing method provided in the embodiment of the present invention may be a verification information sharing device, where the verification information sharing device may be the electronic device (including a mobile terminal device and a non-mobile terminal device), or may also be a functional module and/or a functional entity capable of implementing the verification information sharing method in the electronic device, and may be determined specifically according to actual use requirements, which is not limited in the embodiment of the present invention. The following takes an electronic device as an example to exemplarily describe the authentication information sharing method provided by the embodiment of the present invention.
The electronic device in the embodiment of the present invention may be a terminal device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present invention are not limited in particular.
The following describes a software environment to which the verification information sharing method provided by the embodiment of the present invention is applied, by taking an android operating system as an example.
Fig. 1 is a schematic diagram of an architecture of a possible android operating system according to an embodiment of the present invention. In fig. 1, the architecture of the android operating system includes 4 layers, which are respectively: an application layer, an application framework layer, a system runtime layer, and a kernel layer (specifically, a Linux kernel layer).
The application program layer comprises various application programs (including system application programs and third-party application programs) in an android operating system.
The application framework layer is a framework of the application, and a developer can develop some applications based on the application framework layer under the condition of complying with the development principle of the framework of the application.
Generally, the application program may include two parts, one part refers to content displayed on a screen of the electronic device, for example, after the first electronic device receives the target information, at least one identifier is displayed, and one identifier indicates a candidate electronic device connected to the first electronic device; the other part is a service (service) running in the background of the electronic device, and is configured to execute a corresponding action after detecting a specific trigger condition, for example, send a query request to a second electronic device associated with the first electronic device after detecting that the first electronic device receives the target information.
The system runtime layer includes libraries (also called system libraries) and android operating system runtime environments. The library mainly provides various resources required by the android operating system. The android operating system running environment is used for providing a software environment for the android operating system.
The kernel layer is an operating system layer of an android operating system and belongs to the bottommost layer of an android operating system software layer. The kernel layer provides kernel system services and hardware-related drivers for the android operating system based on the Linux kernel.
Taking an android operating system as an example, in the embodiment of the present invention, a developer may develop a software program for implementing the verification information sharing method provided in the embodiment of the present invention based on the system architecture of the android operating system shown in fig. 1, so that the verification information sharing method may operate based on the android operating system shown in fig. 1. That is, the processor or the electronic device may implement the verification information sharing method provided by the embodiment of the present invention by running the software program in the android operating system.
The verification information sharing method provided by the embodiment of the invention can be applied to the scene of information verification.
For example, in a scenario where the user uses the authentication information verification code received by the electronic device 1, information verification is required to be performed on the electronic device 2 to log in to the website. In the related art, when a user logs in a website on the electronic device 2 by using a mobile phone number of the electronic device 1 as an account, the website sends a short message verification code to the electronic device 1, and then the user takes up and unlocks the electronic device 1, checks the verification code sent by the website and inputs the verification code into a verification code input box of the electronic device 2 for verification. However, for the above scenario, the overall process steps are complicated, the time consumption is long, the electronic device 1 needs to be located near the user, and when the user is far away from the electronic device 1, the user cannot even log in the website on the electronic device 2 because the user cannot obtain the verification code. Meanwhile, the user checks the verification code from the first electronic device and inputs the verification code on the electronic device 2 by means of memory, so that the possibility of error recording exists, and inconvenience is brought to the user.
To solve the problem, in the technical solution provided in the embodiment of the present invention, when the electronic device 2 performs short message authentication, after receiving the target information, the electronic device 1 sends the authentication information in the target information to the electronic device 2, and in order to prevent a sending error, the electronic device 1 sends an inquiry request to the electronic device 2 associated with the electronic device 1 before sending, inquires whether the electronic device 2 is performing short message authentication operation, and after obtaining an inquiry response sent by the electronic device 2, sends the authentication information to the electronic device 2, thereby ensuring the security of the user information. Moreover, the whole process does not need any operation of the user, and for the user, after the button of obtaining the verification code is clicked on the electronic equipment 2, the short message verification code can be received on the electronic equipment 2 in a short time, so that the verification efficiency is improved, and the verification process is simplified.
The following describes an authentication information sharing method according to an embodiment of the present invention with reference to the accompanying drawings, taking an authentication information sharing apparatus as an example.
As shown in fig. 2, a method for sharing authentication information according to an embodiment of the present invention may include the following steps 201 to 207:
step 201, in the case that the first electronic device receives the target information, the first electronic device sends an inquiry request to a second electronic device associated with the first electronic device.
The target information includes target verification information, and the target verification information is target verification information required by the second electronic device. The query request is used for querying whether the second electronic equipment is in a short message verification operation executing state.
Illustratively, the target information is information including a verification code required by the second electronic device. When the first electronic device receives a piece of information, the first electronic device judges that the information contains verification information (for example, a verification code). The first electronic device may determine whether the information includes the verification information by a method such as keyword recognition or Natural Language Processing (NLP), and may further recognize the verification information included in the information. Alternatively, the target information may be a short message, a message, or the like.
Illustratively, the association between the first electronic device and the second electronic device may include at least one of the following: the first electronic device and the second electronic device establish a peer-to-peer (P2P) connection through a wired (e.g., data line) or wireless (e.g., WIFI, bluetooth, fourth generation mobile communication technology, 4G)) connection; the first electronic equipment and the second electronic equipment log in the same equipment account; the first electronic device and the second electronic device are located in the same local area network.
For example, the query request is used to query the current state of the second electronic device, i.e. to query whether the second electronic device is performing an information verification operation. It can be understood that, the user uses the mobile phone number to perform information verification on the website on the second electronic device, after the user clicks the "acquire verification code" button control displayed on the interface of the second electronic device, the second electronic device is in the information verification operation state, and after the user inputs the verification code in the verification code input box displayed on the interface of the second electronic device and the verification is successful, the second electronic device ends executing the information verification operation state.
Step 202, the second electronic device receives the query request sent by the first electronic device.
Step 203, responding to the query request, and when the second electronic device executes the information verification operation, the second electronic device sends a query response to the first electronic device.
Wherein the query response indicates that the second electronic device is in a state to perform an information verification operation.
For example, after receiving the query request sent by the first electronic device, the second electronic device may determine whether the second electronic device is currently in the information verification operation state, and determine whether to send a query response to the first electronic device according to the current state.
For example, the second electronic device may determine whether the second electronic device is in a state of performing an information verification operation by determining whether the second electronic device receives a predetermined operation (e.g., a user performs a click operation on a button control for triggering the server to send the verification code flow in a verification interface displayed on a screen of the second electronic device). Alternatively, the verification input area may be identified as being present in the display interface on the screen of the second electronic device. Further, when the second electronic device determines that the second electronic device is in the information verification operation executing state, the state flag may be set, so that after receiving the query request sent by the first electronic device, the second electronic device may determine the current state of the second electronic device according to the state of the state flag. For example, the value of the status flag may be 0 or 1, and when the value of the status flag is 0, it indicates that the second electronic device is not in the information verification operation executing state, and when the status flag is 1, it indicates that the second electronic device is in the information verification operation executing state.
For example, after the second electronic device receives the query request sent by the first electronic device, the second electronic device queries the status flag in the second electronic device, and if the value of the status flag is 1, it indicates that the second electronic device is in the information verification operation state, and at this time, the second electronic device sends the located state of the second electronic device to the first electronic device.
And step 204, the first electronic device receives a query response sent by the second electronic device in response to the query request.
In step 205, the first electronic device sends the first information to the second electronic device when the query response indicates that the second electronic device is in the information verification operation state.
The first information comprises target verification information required by the second electronic equipment.
For example, in step 201, when the first electronic device receives the target information, after the first electronic device recognizes that the information includes the verification information, it may first determine whether the verification information is the verification information required by the first electronic device, that is, the first electronic device may determine whether the first electronic device is in an information verification operation state. At this time, the judgment result includes at least any one of the following three types:
results 1:
in result 1, the user is performing an information authentication operation at the first electronic device, and the second electronic device is not performing any information authentication operation. At the moment, the first electronic equipment acquires the verification code in the received target information and displays the verification code on the virtual keyboard of the first electronic equipment, so that a user can conveniently and directly input the verification code into the verification code input box by clicking the displayed verification code, and verification is quickly completed.
Results 2:
in result 2, the user does not perform the information verification operation using the first electronic device. At this time, the first electronic device sends an inquiry request to the second electronic device associated with the first electronic device, and sends a verification code to the second electronic device after obtaining a reply that the second electronic device is executing the information verification operation.
Results 3:
in result 3, the first electronic device and the second electronic device perform the information operation at the same time. At this time, the first electronic device receives the two pieces of information, and according to the process, the first electronic device preferentially determines whether the first electronic device is in the state of performing the information verification operation, because the first electronic device is performing the information verification operation, the first electronic device provides the verification information included in the first piece of information of the two pieces of received information to the user according to the time sequence, and if the verification information is the verification information required by the first electronic device, the first electronic device provides the verification information to the user for verification. And if the verification information is not the verification information required by the first electronic equipment, sending the verification information to the second electronic equipment. Meanwhile, for the second piece of information received by the first electronic device, the first electronic device executes the same operation steps as the first piece of information.
Optionally, the sending, by the first electronic device, the query request to the second electronic device associated with the first electronic device includes: under the condition that N pieces of third information are received, if the first electronic equipment is in an information verification execution operation state, traversing the N pieces of third information, and sequentially executing information verification on each piece of third information;
if the currently traversed third information fails to be verified, sending a query request to second electronic equipment associated with the first electronic equipment;
and the target information is the currently traversed third information, and N is an integer greater than 1.
Optionally, the first electronic device obtains whether the first electronic device is in an information verification execution operation state under the condition that N pieces of third information are received, if the first electronic device is in the information verification execution operation state, traverses the N pieces of third information, sequentially executes information verification on each piece of third information, and sends an inquiry request to the second electronic device associated with the first electronic device under the condition that information verification executed by one piece of third information fails. Reference may be made to result 3 above.
Step 206, the second electronic device receives the first information sent by the first electronic device.
Wherein the first information comprises target authentication information.
For example, since the electronic device receives various operation instructions during the operation process, for different operation instructions, the second electronic device may determine, according to the tag information carried in the received operation instruction or the interface program called by the instruction, the operation to be specifically executed by the instruction or the function to be implemented by the instruction.
For example, the process of sending the first information by the first electronic device may be a process of calling a corresponding interface in the second electronic device for the first electronic device, and using the target verification information as an input parameter of the interface. Furthermore, the second electronic device executes an operation corresponding to the interface after the first electronic device calls the interface.
Illustratively, the first electronic device may further send other information to the second electronic device, and the second electronic device may execute an operation corresponding to the information after receiving the information.
And step 207, the second electronic device performs information verification by using the target verification information carried in the first information according to the first information.
Illustratively, the second electronic device provides the target verification information carried in the received first information to the user, and the user performs information verification on the website by using the verification information. For example, the second electronic device may automatically fill the received verification information into a verification information input box of the verification interface, and then the user may click a confirmation button control on the verification interface to complete information verification.
Optionally, in this embodiment of the present invention, after the first electronic device receives the target information, there may be a plurality of electronic devices associated with the first electronic device, and the first electronic device needs to identify a second electronic device from the plurality of electronic devices associated with the first electronic device, and send target verification information in the received target information to the second electronic device.
For example, the first electronic device may determine that the second electronic device is determined from a plurality of electronic devices associated with the first electronic device by at least two ways:
in one implementation, the first electronic device may display all candidate electronic devices on a screen to provide to the user a second electronic device to share the authentication information.
For example, before the step 201, the verification information sharing method provided in the embodiment of the present invention may further include the following steps 201a1 to 201a 3:
step 201a1, after the first electronic device receives the target information, the first electronic device displays at least one identifier, wherein one identifier indicates a candidate electronic device connected with the first electronic device.
Step 201a2, the first electronic device receives a first input of a user to a target identification of the at least one identification.
Step 201a3, responding to the first input, the first electronic device takes the candidate electronic device indicated by the target identification as the second electronic device.
For example, the first input may be: specifically, the user may set the target identifier by clicking the target identifier, or the voice information input by the user, or the specific gesture input by the user according to actual requirements.
The specific gesture may be any one of a single-click gesture, a sliding gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture, and a double-click gesture.
For example, as shown in fig. 3, taking the electronic device 30 as the first electronic device as an example, after the electronic device 30 receives the verification information 31 (i.e., the target information), the electronic device 30 displays the identifications of all candidate electronic devices connected to the electronic device 30 in the device list 32. Since there are always 3 electronic devices connected to the electronic device 30 (cell phone of XXX, computer of PAD and XXX of XXX), the device identifiers of the three devices are displayed in the device list 32. Since the user is currently performing an information verification operation on the computer of XXX, the electronic device 30, upon receiving an operation of the user clicking on the computer of XXX in the device list 32, transmits verification information included in the received information 31 to the computer of XXX.
In another implementation, after the first electronic device receives the target information, it automatically sends a query request to a plurality of candidate electronic devices that establish a connection with the first electronic device, and determines a second electronic device from the plurality of candidate electronic devices according to the sending of the candidate electronic devices.
Illustratively, the second electronic device is at least one electronic device connected with the first electronic device.
For example, after the first electronic device receives the target information, an inquiry request is sent to all candidate electronic devices connected to the first electronic device, and if the first electronic device receives an inquiry response sent by the candidate electronic devices in response to the inquiry request, the candidate electronic devices are determined as the second electronic devices, and the first information is sent to the second electronic devices.
In this way, when a plurality of electronic devices establish connection with the first electronic device, the first electronic device can determine the second electronic device from the plurality of electronic devices in the two manners and send the verification information to the second electronic device.
Optionally, in the embodiment of the present invention, if the first electronic device does not detect that the other electronic device is connected to the first electronic device after receiving the target information, the first electronic device may search for the connectable device in multiple ways.
For example, the first electronic device may search for a connectable electronic device that can establish a connection with the first electronic device through bluetooth, a hotspot, WIFI, or a wired connection, and at the same time, the first electronic device may also search for other electronic devices that log in to the same device account as the first electronic device through the third-party server, and display a list of the searched connectable electronic devices on a screen of the first electronic device for selection by the user.
For example, after the first electronic device establishes connection with the connectable electronic device, the first electronic device may further detect whether the first electronic device starts the authentication information sharing permission, and if the first electronic device does not start the information authentication sharing permission, prompt the user to start the authentication information sharing permission of the first electronic device, so that the first electronic device can send the received authentication information to the second electronic device. Similarly, the second electronic device needs to open the authentication information sharing permission to receive the authentication information sent by the first electronic device.
Therefore, after the first electronic device receives the target information, if it is not detected that the other electronic devices are connected with the first electronic device, all connectable electronic devices can be searched. And after the user selects at least one connectable electronic device, establishing connection with the electronic device and sending the received verification information to the electronic device.
Optionally, in this embodiment of the present invention, in order to facilitate the user to perform verification after the second electronic device receives the target verification information, the second electronic device may automatically fill the verification code input box with the received verification information.
After step 207, the authentication information sharing method provided in this embodiment further includes the following step 208 a:
and 208a, under the condition that the second electronic equipment displays the verification interface, displaying target verification information in the target input area.
Optionally, in step 208a, the second electronic device may display the target verification information in the target input area when the operation focus of the second electronic device is located in the target input area of the verification interface.
For example, after the user clicks the "acquire verification code" control button on the verification interface displayed on the second electronic device, the user will generally move the operation focus to the target input area where the verification code needs to be input, and wait for the first electronic device to receive and send the verification code to the second electronic device. After the second electronic device receives the verification code sent by the first electronic device, if the operation focus of the second electronic device is located in the target input area at the moment, the second electronic device automatically fills the acquired verification code into the target input area.
For example, in the case where the target input box is displayed in the first interface of the first electronic device, the first electronic device may determine whether the target input box currently has the operation focus by determining whether an input cursor exists in the target input box. If the operation focus exists, the target input frame is determined to contain the operation focus, and if the operation focus does not exist, the target input frame is determined to contain the operation focus.
For example, if the operation focus is in the target input box, the target input box is in a state to be input.
Illustratively, the input cursor is used for indicating an input area of the target input box. The input cursor is an input starting position of the target input box, and the first electronic device can automatically recognize a receiving position of the target content according to the input cursor.
Therefore, after clicking the button control for acquiring the verification code on the verification interface, the user can directly verify the verification code only by waiting for a short time (the waiting time is determined by the time when the first electronic device receives the verification information sent by the operator), and other redundant operations are not needed.
Optionally, in the embodiment of the present invention, after the second electronic device receives the verification information sent by the first electronic device, the second electronic device may further display the verification information on a screen in a form of a card, so that a user can perform other operations on the card conveniently.
Illustratively, after the second electronic device receives the verification information sent by the first electronic device, the second electronic device displays the verification information on a screen. Wherein the verification information may be displayed on a screen of the second electronic device in the form of a card.
The card includes a service provider (i.e., a company to which a website where the user logs in information on the second electronic device belongs) that transmits the authentication information, and a validity period of the authentication information.
Illustratively, the second electronic device fills the verification information in the target card into the target input area of the verification interface after receiving the second input of the user to the card.
For example, the second input may be an input in which the user copies the authentication information from the target card and then pastes the authentication information into the target input area.
In this way, after receiving the verification information sent by the first electronic device, the second electronic device can display the verification information on the screen in the form of a card, remind the user that the verification information is received, and wait for further operation of the user.
Optionally, in the embodiment of the present invention, after receiving the target verification information sent by the first electronic device, if the second electronic device fails to verify the target verification information, all information including the verification information received within a period of time may be displayed for the user to select.
For example, when the first electronic device receives a plurality of pieces of information including the authentication information in a short time, it may transmit wrong authentication information to the second electronic device.
For example, after the step 207, the method for sharing information along the information according to the embodiment of the present invention may further include the following steps 208b1 to 208b 4:
step 208b1, when the second electronic device fails to verify, sending fourth information to the first electronic device.
The fourth information indicates that the verification information sent by the first electronic device is not the verification information required by the second electronic device.
Step 208b2, after the first electronic device receives the fourth message, displaying at least one candidate message containing the verification message received within a preset period of time on the screen of the first electronic device.
For example, the second preset time may be a time period from a time node when the second electronic device starts to perform the information verification operation to a time node when the second electronic device receives the first information transmitted by the first electronic device. The fourth information includes the second preset time.
And step 208b3, the first electronic device receives a third input of the at least one candidate information from the user, and determines the target information. The target information is one of at least one candidate information.
Step 208b4, the first electronic device sends the first information to the second electronic device.
For example, when receiving the fourth information, the first electronic device may further send fifth information to the second electronic device, where the fifth information is used to instruct the second electronic device to delete the target verification information received by the second electronic device.
Therefore, after the second electronic device fails to verify, the first electronic device can provide candidate information which possibly contains verification information required by the second electronic device for the user, so that the user can conveniently select correct information from the candidate information and send the correct information to the second electronic device.
Optionally, in the embodiment of the present invention, in order to prevent the electronic device from storing too much verification information, occupying a storage space of the electronic device, and affecting the user to query the required information, the first electronic device may delete the target information after the second electronic device succeeds in verification using the target verification information in the target information, or after the verification information in the target information is invalid.
For example, the verification information sharing method provided in this embodiment after the step 207 further includes the following steps 208c1 to 208c 3:
step 208c1, the second electronic device sends the second information to the first electronic device if the predetermined condition is met.
And step 208c2, the first electronic device receives the second information sent by the second electronic device.
Wherein the second information indicates at least one of: and the second electronic equipment adopts the target verification information to complete information verification, the target verification information is invalid, and the second electronic equipment is in an information verification execution operation state for more than a first preset time.
In step 208c3, the first electronic device deletes the target information according to the second information.
For example, the first electronic device may determine whether the target information is expired according to an expiration date carried in the target information, and actively delete the target information after the expiration date, in addition to deleting the target information after receiving the second information.
For example, the target information generally includes a valid period of the verification information in addition to the verification information, and if the first electronic device does not receive the second information sent by the second electronic device within the limited period of the verification information, and at this time, the verification information is invalid, the first electronic device may automatically delete the target information after the verification information is invalid. The above situation often occurs because the user repeatedly clicks the "acquire verification code" button control on the verification interface after not receiving the verification information within a period of time.
Therefore, the first electronic device can automatically delete the target information after the target verification information in the target information is used or invalid, so that the situation that the operation of inquiring other information contents by a user is influenced by excessive useless information stored in the electronic device is prevented, and the man-machine interaction performance is improved.
According to the verification information sharing method provided by the embodiment of the invention, after the first electronic device receives the target information, the verification information in the target information can be prevented from being sent to wrong equipment by sending the inquiry request to the second electronic device. After receiving an inquiry response sent by the second electronic device in response to the inquiry request, the first electronic device sends target verification information in the target information to the second electronic device in a mode of sending the first information to the second electronic device, so that the second electronic device can execute information verification operation by using the target verification information. The process does not need any operation of the user, simplifies the steps of the user to execute the information verification operation, and improves the success rate of information verification and further improves the man-machine interaction performance because the verification information is input after being memorized by the user.
Fig. 4 is a schematic diagram of a possible structure of an authentication information sharing apparatus according to an embodiment of the present invention, and as shown in fig. 4, the authentication information sharing apparatus 600 includes: a sending module 601 and a first receiving module 602, wherein:
the sending module 601 is configured to send, when a first electronic device receives target information, an inquiry request to a second electronic device associated with the first electronic device, where the target information includes target verification information, and the inquiry request is used to inquire whether the second electronic device is in an information verification operation state.
A first receiving module 602, configured to receive a query response sent by the second electronic device in response to the query request sent by the sending module 601;
the sending module 601 is further configured to send first information to the second electronic device when the query response indicates that the second electronic device is in the information verification operation state, where the first information includes the target verification information.
Optionally, the authentication information sharing apparatus 600 further includes: a display module 603, a second receiving module 604 and a response module 605; a display module 603, configured to display at least one identifier after the first electronic device receives the target information, where the identifier indicates a candidate electronic device connected to the first electronic device; a second receiving module 604, configured to receive a first input of a target identifier from the at least one identifier displayed by the display module from a user; a response module 605, configured to, in response to the first input received by the second receiving module 604, take the candidate electronic device indicated by the target identifier as the second electronic device.
Optionally, the second electronic device is at least one electronic device connected to the first electronic device.
Optionally, the authentication information sharing apparatus further includes: a deletion module 606; the receiving module 601 is further configured to receive second information sent by the second electronic device, where the second information indicates at least one of the following: the second electronic equipment adopts the target verification information to complete information verification, the target verification information is invalid, and the second electronic equipment is in an information verification execution operation state for more than first preset time; a deleting module 606, configured to delete the target information according to the second information received by the receiving module 601.
Optionally, the authentication information sharing apparatus further includes: a verification module 607; the verification module 607 is configured to, in a case that the N pieces of third information are received, traverse the N pieces of third information and sequentially perform information verification on each piece of third information if the first electronic device is in an information verification operation state; a sending module 601, configured to send, if the verification module 607 fails to verify the currently traversed third information, a query request to a second electronic device associated with the first electronic device; the target information is currently traversed third information, and N is an integer greater than 1.
As shown in fig. 4, the authentication information sharing apparatus 600 includes a sending module 601 and a first receiving module 602; the authentication information sharing apparatus 600 may include modules such as a display module, a second receiving module, a response module, a deletion module, and an authentication module.
Fig. 5 is a schematic diagram of a possible structure of another authentication information sharing apparatus according to an embodiment of the present invention, and as shown in fig. 5, an authentication information sharing apparatus 700 includes: a receiving module 701, a sending module 702 and a verification module 703, wherein:
the receiving module 701 is configured to receive an inquiry request sent by a first electronic device.
A sending module 702, configured to send, in response to the query request, a query response to the first electronic device when the second electronic device is in the information verification operation state, where the query response indicates that the second electronic device is in the information verification operation state.
The receiving module 701 is further configured to receive first information sent by the first electronic device, where the first information includes target verification information.
The verifying module 703 is configured to perform information verification by using the target verification information according to the first information received by the receiving module 701.
Optionally, the sending module 702 is further configured to send the second information to the first electronic device when a predetermined condition is met. Wherein the predetermined condition comprises at least one of: and the second electronic equipment adopts the target verification information to complete information verification, the target verification information is invalid, and the second electronic equipment is in an information verification execution operation state for more than a first preset time.
Optionally, the authentication information sharing apparatus further includes: a display module 704; a display module 704, configured to display the target verification information in the target input area if the second electronic device displays the verification interface.
As shown in fig. 5, the authentication information sharing apparatus 700 includes a receiving module 701, a sending module 702, and an authentication module 703; a module such as the display module 704 may be included in the authentication information sharing apparatus 700.
According to the verification information sharing device provided by the embodiment of the invention, after the first electronic device receives the target information, the verification information in the target information can be prevented from being sent to wrong equipment by sending the inquiry request to the second electronic device. After receiving an inquiry response sent by the second electronic device in response to the inquiry request, the first electronic device sends target verification information in the target information to the second electronic device in a mode of sending the first information to the second electronic device, so that the second electronic device can execute information verification operation by using the target verification information. The process does not need any operation of the user, simplifies the steps of the user to execute the information verification operation, and improves the success rate of information verification and further improves the man-machine interaction performance because the verification information is input after being memorized by the user.
The verification information sharing apparatus provided in the embodiment of the present invention can implement each process implemented by the electronic device in the above method embodiments, and is not described here again to avoid repetition.
Fig. 6 is a schematic diagram of a hardware structure of an electronic device 100 for implementing various embodiments of the present invention, where the electronic device 100 includes, but is not limited to: radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the configuration of electronic device 100 shown in fig. 6 does not constitute a limitation of the electronic device, and that electronic device 100 may include more or fewer components than shown, or combine certain components, or a different arrangement of components. In the embodiment of the present invention, the electronic device 100 includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal device, a wearable device, a pedometer, and the like.
When the electronic device 100 is a first electronic device, the radio frequency unit 101 is configured to send an inquiry request to a second electronic device associated with the first electronic device after the first electronic device receives the target information. The radio frequency unit 101 is further configured to receive an inquiry response sent by the second electronic device in response to the inquiry request. The processor 110 is configured to determine whether the query response indicates that the second electronic device is in the information verification operation state, and if the query response indicates that the second electronic device is in the information verification operation state, the radio frequency unit 101 is further configured to send the first information to the second electronic device.
When the electronic device 100 is a second electronic device, the radio frequency unit 101 is configured to receive an inquiry request sent by the first electronic device. The radio frequency unit 101 is further configured to send an inquiry response to the first electronic device when the second electronic device is performing the information verification operation. The radio frequency unit 101 is further configured to receive first information sent by the first electronic device. And the processor 110 is configured to perform information verification by using target verification information included in the first information according to the first information received by the radio frequency unit 101.
According to the electronic device provided by the embodiment of the invention, after receiving the target information, the first electronic device sends the query request to the second electronic device, so that the verification information in the target information can be prevented from being sent to wrong devices. After receiving an inquiry response sent by the second electronic device in response to the inquiry request, the first electronic device sends target verification information in the target information to the second electronic device in a mode of sending the first information to the second electronic device, so that the second electronic device can execute information verification operation by using the target verification information. The process does not need any operation of the user, simplifies the steps of the user to execute the information verification operation, and improves the success rate of information verification and further improves the man-machine interaction performance because the verification information is input after being memorized by the user.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 101 may be used for receiving and sending signals during a message transmission or call process, and specifically, after receiving downlink data from a base station, the downlink data is processed by the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through a wireless communication system.
The electronic device 100 provides wireless broadband internet access to the user via the network module 102, such as assisting the user in sending and receiving e-mails, browsing web pages, and accessing streaming media.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the network module 102 or stored in the memory 109 into an audio signal and output as sound. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the electronic apparatus 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 includes a speaker, a buzzer, a receiver, and the like.
The input unit 104 is used to receive an audio or video signal. The input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, and the Graphics processor 1041 processes image data of a still picture or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the network module 102. The microphone 1042 may receive sound and may be capable of processing such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode.
The electronic device 100 also includes at least one sensor 105, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or the backlight when the electronic device 100 is moved to the ear. As one type of motion sensor, an accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of an electronic device (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), and vibration identification related functions (such as pedometer, tapping); the sensors 105 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the electronic apparatus 100. Specifically, the user input unit 107 includes a touch panel 1071 and other input devices 1072. Touch panel 1071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 1071 (e.g., operations by a user on or near touch panel 1071 using a finger, stylus, or any suitable object or attachment). The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and receives and executes commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. Specifically, other input devices 1072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
Further, the touch panel 1071 may be overlaid on the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although in fig. 6, the touch panel 1071 and the display panel 1061 are two independent components to implement the input and output functions of the electronic device 100, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the electronic device 100, and is not limited herein.
The interface unit 108 is an interface for connecting an external device to the electronic apparatus 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the electronic apparatus 100 or may be used to transmit data between the electronic apparatus 100 and the external device.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the electronic device 100, connects various parts of the entire electronic device 100 using various interfaces and lines, and performs various functions of the electronic device 100 and processes data by running or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the electronic device 100. Processor 110 may include one or more processing units; alternatively, the processor 110 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The electronic device 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and optionally, the power supply 111 may be logically connected to the processor 110 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system.
In addition, the electronic device 100 includes some functional modules that are not shown, and are not described in detail herein.
Optionally, an embodiment of the present invention further provides an electronic device, which includes a processor, a memory, and a computer program stored in the memory and capable of running on the processor 110, where the computer program, when executed by the processor, implements each process of the above-mentioned verification information sharing method embodiment, and can achieve the same technical effect, and is not described herein again to avoid repetition.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the above-mentioned verification information sharing method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes several pieces of information for enabling an electronic device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (14)

1. A verification information sharing method is applied to first electronic equipment, and is characterized by comprising the following steps:
under the condition that the first electronic equipment receives target information, the first electronic equipment sends a query request to second electronic equipment associated with the first electronic equipment, wherein the target information comprises target verification information; the query request is used for querying whether the second electronic equipment is in an information verification operation executing state;
receiving a query response sent by the second electronic device in response to the query request;
and sending first information to the second electronic equipment under the condition that the inquiry response indicates that the second electronic equipment is in an information verification operation state, wherein the first information comprises the target verification information.
2. The method of claim 1, wherein prior to sending the query request to the second electronic device associated with the first electronic device, the method further comprises:
after the first electronic device receives the target information, displaying at least one identifier, wherein one identifier indicates a candidate electronic device connected with the first electronic device;
receiving a first input of a user to a target identifier in the at least one identifier;
in response to the first input, the candidate electronic device indicated by the target identification is taken as the second electronic device.
3. The method of claim 1, wherein after sending the target verification information to the second electronic device, the method further comprises:
receiving second information sent by the second electronic equipment, wherein the second information indicates at least one of the following items: the second electronic equipment completes the information verification by adopting the target verification information, the target verification information is invalid, and the second electronic equipment is in an information verification execution operation state for more than first preset time;
and deleting the target information according to the second information.
4. The method of claim 1, wherein sending, by the first electronic device, a query request to a second electronic device associated with the first electronic device comprises:
under the condition that N pieces of third information are received, if the first electronic equipment is in an information verification execution operation state, traversing the N pieces of third information, and sequentially executing information verification on each piece of third information;
if the currently traversed third information fails to be verified, sending a query request to second electronic equipment associated with the first electronic equipment;
and the target information is the currently traversed third information, and N is an integer greater than 1.
5. A verification information sharing method is applied to a second electronic device, and is characterized by comprising the following steps:
receiving a query request sent by first electronic equipment;
in response to the query request, when the second electronic device performs an information verification operation, sending a query response to the first electronic device, wherein the query response indicates that the second electronic device is in a state of performing the information verification operation;
receiving first information sent by the first electronic equipment, wherein the first information comprises target verification information;
and according to the first information, performing information verification by adopting target verification information.
6. The method of claim 5, wherein after performing information authentication using the target authentication information according to the first information, the method further comprises:
sending second information to the first electronic equipment under the condition that a preset condition is met;
wherein the predetermined condition comprises at least one of: and the second electronic equipment completes the information verification by adopting the target verification information, the target verification information is invalid, and the second electronic equipment is in an information verification execution operation state for more than first preset time.
7. The method of claim 5, wherein after receiving the first information sent by the first electronic device, the method further comprises:
and under the condition that the second electronic equipment displays a verification interface, displaying the target verification information in a target input area.
8. An authentication information sharing apparatus, characterized in that the apparatus comprises a sending module and a first receiving module;
the sending module is used for sending an inquiry request to second electronic equipment associated with first electronic equipment under the condition that the first electronic equipment receives target information, wherein the target information comprises target verification information; the query request is used for querying whether the second electronic equipment is in an information verification operation executing state;
the first receiving module is configured to receive a query response sent by the second electronic device in response to the query request sent by the sending module;
the sending module is further configured to send first information to the second electronic device under a condition that the query response indicates that the second electronic device is in an information verification operation state, where the first information includes the target verification information.
9. The apparatus of claim 8, further comprising: the display module, the second receiving module and the response module;
the display module is used for displaying at least one identifier after the first electronic device receives the target information, wherein one identifier indicates a candidate electronic device connected with the first electronic device;
the second receiving module is used for receiving a first input of a target identifier in the at least one identifier displayed by the display module by a user;
the response module is configured to, in response to the first input received by the second receiving module, take the candidate electronic device indicated by the target identifier as the second electronic device.
10. The apparatus of claim 8, further comprising: a deletion module;
the first receiving module is further configured to receive second information sent by the second electronic device, where the second information indicates at least one of the following: the second electronic equipment completes the information verification by adopting the target verification information, the target verification information is invalid, and the second electronic equipment is in an information verification execution operation state for more than first preset time;
and the deleting module is used for deleting the target information according to the second information received by the first receiving module.
11. The apparatus of claim 8, further comprising: a verification module;
the verification module is used for traversing the N pieces of third information and sequentially performing information verification on each piece of third information if the first electronic equipment is in an information verification execution operation state under the condition that the N pieces of third information are received;
the sending module is specifically configured to send a query request to a second electronic device associated with the first electronic device if the third information currently traversed by the verification module fails to be verified;
and the target information is the currently traversed third information, and N is an integer greater than 1.
12. The authentication information sharing device is characterized by comprising a receiving module, a sending module and an authentication module;
the receiving module is used for receiving a query request sent by first electronic equipment;
the sending module is configured to send, in response to the query request, a query response to the first electronic device when a second electronic device is in an information verification operation state, where the query response indicates that the second electronic device is in the information verification operation state;
the receiving module is further configured to receive first information sent by the first electronic device, where the first information includes target verification information;
and the verification module is used for performing information verification by adopting the target verification information according to the first information received by the receiving module.
13. The apparatus of claim 12,
the sending module is further configured to send second information to the first electronic device when a predetermined condition is met;
wherein the predetermined condition comprises at least one of: and the second electronic equipment completes the information verification by adopting the target verification information, the target verification information is invalid, and the second electronic equipment is in an information verification execution operation state for more than first preset time.
14. The apparatus of claim 12, further comprising: a display module;
the display module is used for displaying the target verification information in a target input area under the condition that the second electronic equipment displays a verification interface.
CN202010328592.5A 2020-04-23 2020-04-23 Verification information sharing method and device, electronic equipment and storage medium Active CN111597542B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010328592.5A CN111597542B (en) 2020-04-23 2020-04-23 Verification information sharing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010328592.5A CN111597542B (en) 2020-04-23 2020-04-23 Verification information sharing method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111597542A true CN111597542A (en) 2020-08-28
CN111597542B CN111597542B (en) 2024-03-05

Family

ID=72187663

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010328592.5A Active CN111597542B (en) 2020-04-23 2020-04-23 Verification information sharing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111597542B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112785312A (en) * 2021-01-21 2021-05-11 维沃移动通信有限公司 Information sharing method and device, electronic equipment and readable storage medium
CN113283264A (en) * 2021-04-16 2021-08-20 维沃移动通信有限公司 Identification code sharing method and device
CN113726943A (en) * 2021-08-31 2021-11-30 维沃移动通信有限公司 Control method and electronic device
CN113849790A (en) * 2021-10-13 2021-12-28 深圳美云集网络科技有限责任公司 Verification code automatic input method and device, storage medium and electronic equipment
CN113869074A (en) * 2021-09-09 2021-12-31 维沃移动通信(杭州)有限公司 Service code-based service processing method and device and electronic equipment
CN114143063A (en) * 2021-11-25 2022-03-04 阿波罗智联(北京)科技有限公司 Information processing method, information processing apparatus, electronic device, and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150040203A1 (en) * 2013-08-01 2015-02-05 Huawei Technologies Co., Ltd. Authentication method of wearable device and wearable device
CN105528536A (en) * 2014-09-30 2016-04-27 联想(北京)有限公司 An electronic apparatus and an information processing method
CN106130998A (en) * 2016-06-30 2016-11-16 珠海市魅族科技有限公司 A kind of identifying code transmission method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150040203A1 (en) * 2013-08-01 2015-02-05 Huawei Technologies Co., Ltd. Authentication method of wearable device and wearable device
CN105528536A (en) * 2014-09-30 2016-04-27 联想(北京)有限公司 An electronic apparatus and an information processing method
CN106130998A (en) * 2016-06-30 2016-11-16 珠海市魅族科技有限公司 A kind of identifying code transmission method and device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112785312A (en) * 2021-01-21 2021-05-11 维沃移动通信有限公司 Information sharing method and device, electronic equipment and readable storage medium
CN113283264A (en) * 2021-04-16 2021-08-20 维沃移动通信有限公司 Identification code sharing method and device
CN113726943A (en) * 2021-08-31 2021-11-30 维沃移动通信有限公司 Control method and electronic device
WO2023030265A1 (en) * 2021-08-31 2023-03-09 维沃移动通信有限公司 Control method and electronic device
CN113869074A (en) * 2021-09-09 2021-12-31 维沃移动通信(杭州)有限公司 Service code-based service processing method and device and electronic equipment
CN113849790A (en) * 2021-10-13 2021-12-28 深圳美云集网络科技有限责任公司 Verification code automatic input method and device, storage medium and electronic equipment
CN114143063A (en) * 2021-11-25 2022-03-04 阿波罗智联(北京)科技有限公司 Information processing method, information processing apparatus, electronic device, and storage medium

Also Published As

Publication number Publication date
CN111597542B (en) 2024-03-05

Similar Documents

Publication Publication Date Title
CN111597542B (en) Verification information sharing method and device, electronic equipment and storage medium
US11798107B2 (en) Scenario-based application recommendation method and apparatus
WO2019233212A1 (en) Text identification method and device, mobile terminal, and storage medium
WO2019174611A1 (en) Application configuration method and mobile terminal
CN109194818B (en) Information processing method and terminal
KR20200132942A (en) Method for quickly opening an application or application function, and a terminal
CN108446058B (en) Mobile terminal operation method and mobile terminal
WO2014206143A1 (en) Method, apparatus and device for displaying number of unread messages
CN109284144B (en) Fast application processing method and mobile terminal
CN110752981B (en) Information control method and electronic equipment
CN108536509B (en) Application body-splitting method and mobile terminal
CN111459358B (en) Application program control method and electronic equipment
KR102441850B1 (en) Service processing method and mobile communication terminal
CN108681427B (en) Access right control method and terminal equipment
CN111600931A (en) Information sharing method and electronic equipment
CN111163224B (en) Voice message playing method and electronic equipment
CN111124223A (en) Application interface switching method and electronic equipment
JP7324949B2 (en) Application sharing method, first electronic device and computer readable storage medium
CN111124706A (en) Application program sharing method and electronic equipment
CN110879680A (en) Icon management method and electronic equipment
CN110225040B (en) Information processing method and terminal equipment
CN110069407B (en) Function test method and device for application program
CN109992192B (en) Interface display method and terminal equipment
CN111061446A (en) Display method and electronic equipment
CN111090529A (en) Method for sharing information and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant