WO2016011744A1 - 使用验证码进行验证的方法及装置 - Google Patents
使用验证码进行验证的方法及装置 Download PDFInfo
- Publication number
- WO2016011744A1 WO2016011744A1 PCT/CN2014/091620 CN2014091620W WO2016011744A1 WO 2016011744 A1 WO2016011744 A1 WO 2016011744A1 CN 2014091620 W CN2014091620 W CN 2014091620W WO 2016011744 A1 WO2016011744 A1 WO 2016011744A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- verification
- verification code
- request
- information
- operation object
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
- G06F3/0486—Drag-and-drop
Definitions
- the present disclosure relates to the field of Internet technologies, and in particular, to a method and apparatus for verifying using a verification code.
- the network application can be used.
- the verification code is implemented mainly by user input, including inputting numbers or inputting Chinese characters.
- the implementation of such a verification code is very inconvenient for the user.
- the user inputting the verification code is cumbersome, wastes the user's time, and easily affects the user's experience with the network application.
- the verification code is input on the mobile terminal (such as a mobile phone), the user is more inconvenient to operate;
- some verification codes are too complicated, for example, it is necessary to input Chinese characters, or to perform processing such as blurring, distortion or character sticking on the generated verification code, so that the difficulty of inputting the verification code by the user is much increased. It is easy to input errors, resulting in the failure to use the web application properly and reducing the user experience.
- the present disclosure provides a method and apparatus for verifying using a verification code.
- a method of verifying using a verification code comprising:
- the verification code acquisition information of the verification is generated, where the verification code acquisition information includes the verification identifier, and the operation object and the operation mode prompt information for acquiring the verification code;
- the verification request includes the verification identifier and a first verification code obtained by operating the operation object according to the operation mode prompt information
- the technical solution provided by the embodiment of the present disclosure may include the following beneficial effects: the operation object is operated according to the operation mode prompting information of the verification code, and the result of the operation is verified, so that the user does not need to manually input the verification code, thereby simplifying the verification mode. Moreover, the verification failure caused by the user's manual input error is avoided, the verification efficiency of the verification code is improved, and the user experience is improved.
- the method before the sending the verification identifier to the terminal, the method further includes:
- the server first performs correct operation on the operation object according to the operation mode prompt information, thereby verifying the verification code obtained by the user operation.
- the verifying the first verification code in the verification request includes:
- the second verification code corresponding to the verification identifier is compared with the first verification code obtained by the user operation, so as to verify whether the operation of the verification code operation object by the user is correct.
- the operation object of the verification code includes at least two characters, wherein each character corresponds to a separate movable picture.
- each character in the operational object corresponds to a separate movable picture, such that the user can perform a separate operation on each character according to the operational mode prompt information.
- the operation mode prompt information includes prompt information for dragging a specified character in the operation object to a specified location;
- the first verification code includes location information of the character obtained by dragging and dropping characters in the operation object.
- the user drags and drops the characters in the operation object according to the operation prompt information, so that the user does not need to manually input the verification code, which simplifies the verification mode, and avoids the verification failure caused by the user's manual input error, thereby improving the verification.
- the verification efficiency of the code improves the user experience.
- the location information is determined according to an arrangement order after the characters are dragged.
- a verification code comprising:
- the verification code acquisition information includes a verification identifier, and an operation object and operation mode prompt information for acquiring the verification code;
- the technical solution provided by the embodiment of the present disclosure may include the following benefits: the user operates the operation object according to the operation mode of the verification code, and sends the result of the operation to the network side, and the network side performs verification, so that the user does not need to Manually input the verification code to simplify the verification method, and avoid the verification failure caused by the user's manual input error, improve the verification efficiency of the verification code, and improve the user experience.
- the operation object of the verification code includes at least two characters, wherein each character corresponds to a separate movable picture;
- the operation mode prompt information includes a prompt letter for dragging a specified character in the operation object to a specified location interest
- the obtaining the first verification code according to the operation action includes:
- the operation mode prompt information is to drag and drop individual characters in the operation object to the specified position, and the user drags and drops the characters in the operation object according to the operation mode prompt information, so that the user does not need to manually input the verification code, simplifying
- the verification method avoids the verification failure caused by the user's manual input error, improves the verification efficiency of the verification code, and improves the user experience.
- a verification code comprising:
- the terminal side sends a request for obtaining a verification code to the network side
- the network side When the network side receives the acquisition request, the network side generates verification code acquisition information of the current verification, where the verification code acquisition information includes a verification identifier, and an operation object and an operation mode prompt for acquiring the verification code. information;
- the terminal side acquires the verification code acquisition information
- the terminal side performs operation on the operation object according to the operation mode prompt information
- the terminal side obtains a first verification code according to the operation action
- the network side performs verification on the first verification code in the verification request.
- the technical solution provided by the embodiment of the present disclosure may include the following beneficial effects: the operation object is operated according to the operation mode prompting information of the verification code, and the result of the operation is verified, so that the user does not need to manually input the verification code, thereby simplifying the verification mode. Moreover, the verification failure caused by the user's manual input error is avoided, the verification efficiency of the verification code is improved, and the user experience is improved.
- an apparatus for verifying using a verification code comprising:
- a generating module configured to generate verification code obtaining information of the current verification when receiving the obtaining request of the verification code by the terminal, where the verification code obtaining information includes a verification identifier, and an operation object and an operation mode prompt for acquiring the verification code information;
- a first sending module configured to send the verification code acquisition information to the terminal
- a first receiving module configured to receive an authentication request from the terminal, where the verification request includes the verification identifier and a first verification code obtained by operating the operation object according to the operation mode prompt information;
- a verification module configured to perform verification on the first verification code in the verification request.
- the device further includes:
- the operation module is configured to operate the operation object according to the operation mode prompt information to obtain a second verification code.
- the verification module includes:
- An extracting unit configured to extract the second verification code according to the verification identifier
- a comparing unit configured to compare the first verification code and the second verification code
- the determining unit is configured to determine whether the first verification code and the second verification code are the same.
- an apparatus for verifying using a verification code comprising:
- a second sending module configured to send a request for obtaining a verification code to the network side
- a first obtaining module configured to obtain the verification code acquisition information of the verification, where the verification code acquisition information includes a verification identifier, and an operation object and operation mode prompt information for acquiring the verification code;
- a second receiving module configured to receive an operation action of the operation object according to the operation mode prompt information
- a second obtaining module configured to obtain a first verification code according to the operation action
- the third sending module is configured to send an authentication request to the network side, where the verification request includes the verification identifier and the first verification code.
- the second receiving module includes:
- a receiving unit configured to receive a drag action on a specified character in the operation object
- the second obtaining module includes:
- an obtaining unit configured to obtain location information of the dragged character according to the dragging action.
- an apparatus for verifying using a verification code comprising:
- a memory for storing processor executable instructions
- processor is configured to:
- the verification code acquisition information of the verification is generated, where the verification code acquisition information includes the verification identifier, and the operation object and the operation mode prompt information for acquiring the verification code;
- the verification request includes the verification identifier and a first verification code obtained by operating the operation object according to the operation mode prompt information
- an apparatus for verifying using a verification code comprising:
- a memory for storing processor executable instructions
- processor is configured to:
- the verification code acquisition information includes a verification identifier, and an operation object and operation mode prompt information for acquiring the verification code;
- FIG. 1 is a flowchart of a method for verifying using a verification code, according to an exemplary embodiment
- FIG. 2 is a flowchart of a method for verifying using a verification code, according to an exemplary embodiment
- FIG. 3 is a flowchart of a method for verifying using a verification code, according to an exemplary embodiment
- FIG. 4 is a flow chart showing a method of verifying using a verification code, according to an embodiment
- FIG. 5 is a schematic diagram of an interface of an operation object of a verification code according to an embodiment
- FIG. 6 is a schematic diagram of an interface of operation mode prompt information of a verification code according to an embodiment
- FIG. 7 is a flow chart showing a method of verifying using a verification code, according to another embodiment.
- FIG. 8 is a block diagram of an apparatus for verifying using a verification code, according to an exemplary embodiment
- FIG. 9 is a block diagram of a verification module in an apparatus for verifying using a verification code, according to an exemplary embodiment
- FIG. 10 is a block diagram of an apparatus for verifying using a verification code, according to an exemplary embodiment
- FIG. 11 is a block diagram of a second receiving module in an apparatus for verifying using a verification code, according to an exemplary embodiment
- FIG. 12 is a block diagram of a second obtaining module in an apparatus for verifying using a verification code, according to an exemplary embodiment
- FIG. 13 is a block diagram of an apparatus for verifying using a verification code, according to an exemplary embodiment.
- FIG. 14 is a block diagram of an apparatus for verifying using a verification code, according to an exemplary embodiment.
- FIG. 1 is a flowchart of a method for performing verification using a verification code according to an exemplary embodiment. As shown in FIG. 1 , a method for verifying using a verification code is used in a terminal, and includes the following steps:
- Step S11 when receiving the request for obtaining the verification code by the terminal, generating the verification code acquisition information of the current verification,
- the verification code acquisition information includes a verification identifier, and an operation object and an operation mode prompt information for obtaining the verification code;
- Step S12 sending the verification code acquisition information to the terminal
- Step S13 receiving an authentication request from the terminal, where the verification request includes a verification identifier and a first verification code obtained by operating the operation object according to the operation mode prompt information;
- Step S14 verifying the first verification code in the verification request.
- the technical solution provided by the embodiment may include the following beneficial effects: the operation object is operated according to the operation mode of the verification code, and the result of the operation is verified, so that the user does not need to manually input the verification code, thereby simplifying the verification mode, and It avoids the user's verification failure caused by manual input error, improves the verification efficiency of the verification code, and improves the user experience.
- the terminal may be a computer using a mouse or a mobile phone using a touch screen, an ipad or the like.
- the verification identifier may be an encryption token.
- the method further includes: operating the operation object according to the operation mode prompt information, to obtain a second verification code.
- the server sends the verification code acquisition information to the terminal, the operation object is correctly operated according to the operation mode prompt information, and the second verification code is obtained and stored.
- step S14 can be implemented as the following steps:
- Step S141 extracting a second verification code according to the verification identifier
- Step S142 comparing the first verification code and the second verification code
- Step S143 determining whether the first verification code and the second verification code are the same.
- the server verifies the first verification code in the verification request, it can verify whether the first verification code is correct by comparing with the second verification code stored in advance.
- the verification passes; when the first verification code is different from the second verification code, the verification fails.
- the server feeds back the verification result to the terminal, including: A11, when the verification passes, the verification pass information is sent to the terminal; A12, when the verification fails, the re-verification verification code acquisition information is generated, And sent to the terminal.
- the operation object of the verification code includes at least two characters, wherein each character corresponds to a separate movable picture.
- the characters in the operation object are displayed in the form of pictures and displayed on the terminal in a certain order.
- the operation mode prompt information includes prompt information for dragging a specified character in the operation object to the specified position; the first verification code includes dragging and dropping the characters in the operation object.
- the position information of the obtained character For example, the operation object includes four characters: “A”, “B”, “C” and “D”.
- the operation mode prompt message is: Please drag and drop the position of the character “A” and the character “C”.
- the user drags and drops the character "A” and the character "C” to obtain the position information of the dragged character.
- the location information is determined according to the order in which the characters are dragged.
- FIG. 2 is a flow chart showing a method of verifying using a verification code, according to an exemplary embodiment. Referring to Figure 2, the following steps are included:
- Step S21 sending an acquisition request for the verification code to the network side
- Step S22 obtaining verification code acquisition information of the verification, the verification code acquisition information includes a verification identifier, and an operation object and operation mode prompt information for obtaining the verification code;
- Step S23 receiving an operation action on the operation object according to the operation mode prompt information
- Step S24 obtaining a first verification code according to the operation action
- Step S25 Send an authentication request to the network side, where the verification request includes a verification identifier and a first verification code.
- the technical solution provided in this embodiment may include the following beneficial effects: the user operates the operation object according to the operation mode of the verification code, and sends the result of the operation to the network side, and the network side performs verification, so that the user does not need to manually
- the verification code is input to simplify the verification method, and the verification failure caused by the manual input error is avoided, the verification code verification efficiency is improved, and the user experience is improved.
- the operation object and the operation mode prompt information of the verification code of the current verification acquired from the network side are displayed on the terminal, so that the user operates the operation object of the verification code.
- the operation object of the verification code includes at least two characters, wherein each character corresponds to a separate movable picture.
- the operation mode prompt information includes prompt information for dragging a specified character in the operation object to the specified position.
- step S23 may be implemented to: receive a drag action on the specified character in the operation object;
- step S24 may be implemented to: obtain the position information of the dragged character according to the drag action.
- the location information is determined according to the order in which the characters are dragged.
- the operation object includes four characters: “A”, “B”, “C” and “D”.
- the operation mode prompt message is: Please drag and drop the position of the character “A” and the character “C”. Before the dragging, the position information of the four characters in the operation object corresponds to 0x001, 0x002, 0x003, 0x004, and after dragging, the position information of the four characters in the operation object corresponds to 0x003, 0x002, 0x001, 0x004.
- FIG. 3 is a flowchart of a method for verifying using a verification code, according to an exemplary embodiment. Referring to Figure 3, the following steps are included:
- Step S31 The terminal side sends a request for obtaining a verification code to the network side.
- Step S32 when the network side receives the acquisition request, the network side generates the verification code acquisition information of the current verification, the verification code acquisition information includes the verification identifier, and the operation object and the operation mode prompt information for obtaining the verification code;
- Step S33 The network side sends the verification code acquisition information to the terminal side.
- Step S34 the terminal side acquires verification code acquisition information
- Step S35 The terminal side performs operation on the operation object according to the operation mode prompt information.
- Step S36 the terminal side obtains a first verification code according to the operation action
- Step S37 the terminal side sends the verification request to the network side, where the verification request includes the verification identifier and the first verification code;
- Step S38 the network side receives the verification request.
- step S39 the network side checks the first verification code in the verification request.
- the technical solution provided in this embodiment may include the following beneficial effects: the operation object is operated according to the operation mode prompting information of the verification code, and the result after the operation is verified, so that the user does not need to manually input the verification code, simplifying
- the verification method avoids the verification failure caused by the user's manual input error, improves the verification efficiency of the verification code, and improves the user experience.
- a method for verifying using a verification code provided by the present disclosure will be described below by way of a specific embodiment.
- the terminal is a computer using a mouse. As shown in Figure 4, the following steps are included:
- Step S401 the user sends a request for obtaining the verification code to the server by clicking the operation;
- Step S402 The server receives the acquisition request sent by the user, and generates the verification code acquisition information of the verification, including the verification identifier, the operation object of the verification code, and the operation mode prompt information; for example, the operation object is “A” arranged in the form of a picture. “B”, “C”, “D”, “E” and “F” are six characters. The corresponding position information is 0x001, 0x002, 0x003, 0x004, 0x005, 0x006.
- the operation mode prompt message is: Please drag and exchange the character “C” And the location of the "D";
- Step S403 the server operates the operation object according to the operation mode prompt information, and obtains the second verification code "A", "B", “D”, “C”, “E”, “F”, and the corresponding position information is 0x001, 0x002, 0x004. , 0x003, 0x005, 0x006;
- Step S404 the server sends the generated verification code acquisition information to the terminal
- Step S405 after receiving the verification code acquisition information, the terminal displays the operation object and the operation mode prompt information on the terminal interface; as shown in FIG. 5 and FIG. 6, the operation object and the operation mode prompt information are respectively displayed on the terminal in the form of pictures. ;
- Step S406 the user promptly uses the mouse to drag the position of the picture "C” to the picture “D” on the operation object according to the operation mode prompt information, and the positions of the characters "C” and “D” can be exchanged to obtain the first verification code.
- A”"B", “D", “C”, “E”, “F” the corresponding position information is 0x001, 0x002, 0x004, 0x003, 0x005, 0x006;
- Step S407 the terminal sends a verification request including the first verification code and the verification identifier to the server;
- Step S408 the server extracts a second verification code corresponding to the verification identifier according to the verification identifier.
- Step S409 comparing the second verification code with the first verification code, that is, comparing the location information 0x001, 0x002, 0x004, 0x003, 0x005, 0x006 of the second verification code and the location information 0x001, 0x002, 0x004, 0x003 of the first verification code, 0x005, 0x006;
- Step S410 the verification pass information is sent to the terminal.
- the operation object is dragged and dropped by means of a mouse click, and the result after the dragging is verified, so that the user does not need to manually input the verification code, simplifying the verification.
- the method avoids the verification failure caused by the user's manual input error, improves the verification efficiency of the verification code, and improves the user experience.
- the terminal is a tablet using a touch screen, as shown in FIG. 7, and includes the following steps:
- Step S701 the user sends an acquisition request for the verification code to the server by touching the screen;
- Step S702 the server receives the acquisition request sent by the user, and generates verification code acquisition information, including the verification identifier,
- the operation object and the operation mode prompt information of the verification code for example, the operation object is six characters of "A”, “B”, “C”, “D”, “E” and “F” arranged in the form of pictures, and the operation mode prompt information is: Please drag and drop the positions of the characters "C” and "D";
- Step S703 the server sends the generated verification code acquisition information to the terminal;
- Step S704 after receiving the verification code acquisition information, the terminal displays the operation object and the operation mode prompt information on the terminal interface.
- Step S705 the user prompts the information according to the operation mode, and drags the position of the picture “C” to the picture “D” on the operation object with the finger, so that the positions of the characters “C” and “D” can be exchanged to obtain the first position.
- Verification code "A”, "B”, “D", “C”, "E”, "F”;
- Step S706 the terminal sends a verification request including the first verification code and the verification identifier to the server;
- Step S707 The server extracts, according to the verification identifier, a second verification code corresponding to the verification identifier.
- Step S708 comparing the second verification code with the first verification code
- Step S709 determining whether the second verification code and the first verification code are the same; if the second verification code is the same as the first verification code, performing step S710; if the second verification code and the first verification code are not the same, returning to step S702 , generating a revalidated verification code to obtain information.
- the user drags and drops the operation object by means of a finger touch, and verifies the result after the dragging, so that the user does not need to manually input the verification code, simplifying Verification method, and avoiding the user's verification failure caused by manual input error, improving the verification efficiency of the verification code, and at the same time, for the operation of dragging and dropping on the terminal which is inconvenient to operate such as a mobile phone or a tablet computer.
- the method is simpler and improves the user experience.
- FIG. 8 is a block diagram of an apparatus for verifying using a verification code, according to an exemplary embodiment.
- the apparatus includes:
- the generating module 81 is configured to: when receiving the request for obtaining the verification code by the terminal, generate the verification code acquisition information of the verification, the verification code acquisition information includes the verification identifier, and the operation object and the operation mode prompt information of the verification code;
- the first sending module 82 is configured to send the verification code acquisition information to the terminal;
- the first receiving module 83 is configured to receive an authentication request from the terminal, where the verification request includes a verification identifier and a first verification code obtained by operating the operation object according to the operation mode prompt information;
- a verification module 84 configured to verify the first verification code in the verification request
- the operation module 85 is configured to operate the operation object according to the operation mode prompt information to obtain a second verification code.
- the verification module 84 includes the following units, as shown in FIG. 9:
- the extracting unit 841 is configured to extract a second verification code according to the verification identifier
- the comparing unit 842 is configured to compare the first verification code and the second verification code
- the determining unit 843 is configured to determine whether the first verification code and the second verification code are the same.
- the technical solution provided in this embodiment may include the following beneficial effects: the operation object is operated according to the operation mode prompting information of the verification code, and the result after the operation is verified, so that the user does not need to manually input the verification code, simplifying
- the verification method avoids the verification failure caused by the user's manual input error, improves the verification efficiency of the verification code, and improves the user experience.
- FIG. 10 is a block diagram of an apparatus for verifying using a verification code, according to an exemplary embodiment.
- the apparatus includes:
- the second sending module 101 is configured to send an acquisition request for the verification code to the network side;
- the first obtaining module 102 is configured to obtain the verification code acquisition information of the verification, where the verification code acquisition information includes the verification identifier, and the operation object and the operation mode prompt information of the verification code.
- the second receiving module 103 is configured to receive an operation action on the operation object according to the operation mode prompt information
- the second obtaining module 104 is configured to obtain a first verification code according to the operation action
- the third sending module 105 is configured to send an authentication request to the network side, where the verification request includes a verification identifier and a first verification code.
- the second receiving module 103 includes the following units, as shown in FIG.
- the receiving unit 1031 is configured to receive a dragging action on a specified character in the operation object.
- the second obtaining module 104 includes the following units, as shown in FIG.
- the obtaining unit 1041 is configured to obtain position information of the dragged character according to the dragging action.
- the technical solution provided in this embodiment may include the following beneficial effects: the user operates the operation object according to the operation mode of the verification code, and sends the result of the operation to the network side, and the network side performs verification, so that the user does not need to manually
- the verification code is input to simplify the verification method, and the verification failure caused by the manual input error is avoided, the verification code verification efficiency is improved, and the user experience is improved.
- the present disclosure also provides an apparatus for verifying using a verification code, including:
- a memory for storing processor executable instructions
- processor is configured to:
- the verification code acquisition information of the verification is generated, where the verification code acquisition information includes the verification identifier, and the operation object and the operation mode prompt information for acquiring the verification code;
- the verification request includes the verification identifier and a first verification code obtained by operating the operation object according to the operation mode prompt information
- the present disclosure also provides an apparatus for verifying using a verification code, including:
- a memory for storing processor executable instructions
- processor is configured to:
- the verification code acquisition information includes a verification identifier, and acquiring the The operation object and operation mode prompt information of the verification code;
- FIG. 13 is a block diagram of an apparatus 800 for verifying using a verification code, according to an exemplary embodiment.
- device 800 can be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a gaming console, a tablet device, a medical device, a fitness device, a personal digital assistant, and the like.
- device 800 can include one or more of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, And a communication component 816.
- Processing component 802 typically controls the overall operation of device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
- Processing component 802 can include one or more processors 820 to execute instructions to perform all or part of the steps of the above described methods.
- processing component 802 can include one or more modules to facilitate interaction between component 802 and other components.
- processing component 802 can include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802.
- Memory 804 is configured to store various types of data to support operation at device 800. Examples of such data include instructions for any application or method operating on device 800, contact data, phone book data, messages, pictures, videos, and the like.
- the memory 804 can be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable.
- SRAM static random access memory
- EEPROM electrically erasable programmable read only memory
- EPROM Electrically erasable programmable read only memory
- PROM Programmable Read Only Memory
- ROM Read Only Memory
- Magnetic Memory Flash Memory
- Disk Disk or Optical Disk.
- Power component 806 provides power to various components of device 800.
- Power component 806 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 800.
- the multimedia component 808 includes a screen between the device 800 and the user that provides an output interface.
- the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
- the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
- the multimedia component 808 includes a front camera and/or a rear camera. When the device 800 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front and rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
- the audio component 810 is configured to output and/or input an audio signal.
- audio component 810 includes a microphone (MIC) that is used when device 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
- the wind is configured to receive an external audio signal.
- the received audio signal may be further stored in memory 804 or transmitted via communication component 816.
- the audio component 810 also includes a speaker for outputting an audio signal.
- the I/O interface 812 provides an interface between the processing component 802 and the peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to, a home button, a volume button, a start button, and a lock button.
- Sensor assembly 814 includes one or more sensors for providing device 800 with a status assessment of various aspects.
- sensor assembly 814 can detect an open/closed state of device 800, a relative positioning of components, such as the display and keypad of device 800, and sensor component 814 can also detect a change in position of one component of device 800 or device 800. The presence or absence of user contact with device 800, device 800 orientation or acceleration/deceleration, and temperature variation of device 800.
- Sensor assembly 814 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
- Sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
- the sensor assembly 814 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
- Communication component 816 is configured to facilitate wired or wireless communication between device 800 and other devices.
- the device 800 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
- the communication component 816 receives broadcast signals or broadcast associated information from an external broadcast management system via a broadcast channel.
- the communication component 816 also includes a near field communication (NFC) module to facilitate short range communication.
- NFC near field communication
- the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
- RFID radio frequency identification
- IrDA infrared data association
- UWB ultra-wideband
- Bluetooth Bluetooth
- device 800 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
- ASICs application specific integrated circuits
- DSPs digital signal processors
- DSPDs digital signal processing devices
- PLDs programmable logic devices
- FPGA field programmable A gate array
- controller microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
- non-transitory computer readable storage medium comprising instructions, such as a memory 804 comprising instructions executable by processor 820 of apparatus 800 to perform the above method.
- the non-transitory computer readable storage medium may be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.
- a non-transitory computer readable storage medium when instructions in the storage medium are executed by a processor of a mobile terminal, enabling the mobile terminal to perform a method of verifying using a verification code, the method comprising:
- the verification code acquisition information of the verification is generated, where the verification code acquisition information includes the verification identifier, and the operation object and the operation mode prompt information for acquiring the verification code;
- the verification request includes the verification identifier and a first verification code obtained by operating the operation object according to the operation mode prompt information
- the method further includes:
- the verifying the first verification code in the verification request includes:
- the operation object of the verification code contains at least two characters, wherein each character corresponds to a separate movable picture.
- the operation mode prompt information includes prompt information for dragging a specified character in the operation object to a specified position
- the first verification code includes location information of the character obtained by dragging and dropping characters in the operation object.
- the location information is determined according to an arrangement order after the characters are dragged.
- a non-transitory computer readable storage medium when instructions in the storage medium are executed by a processor of a mobile terminal, enabling the mobile terminal to perform a method of verifying using a verification code, the method comprising:
- the verification code acquisition information includes a verification identifier, and an operation object and operation mode prompt information for acquiring the verification code;
- the operation object of the verification code includes at least two characters, wherein each character corresponds to a separate movable picture;
- the operation mode prompt information includes prompt information for dragging a specified character in the operation object to a specified position
- the obtaining the first verification code according to the operation action includes:
- the location information is determined according to an arrangement order after the characters are dragged.
- a non-transitory computer readable storage medium when instructions in the storage medium are executed by a processor of a mobile terminal, enabling the mobile terminal to perform a method of verifying using a verification code, the method comprising:
- the terminal side sends a request for obtaining a verification code to the network side
- the network side When the network side receives the acquisition request, the network side generates verification code acquisition information of the current verification, The verification code acquisition information includes a verification identifier, and an operation object and operation mode prompt information for acquiring the verification code;
- the terminal side acquires the verification code acquisition information
- the terminal side performs operation on the operation object according to the operation mode prompt information
- the terminal side obtains a first verification code according to the operation action
- the network side performs verification on the first verification code in the verification request.
- FIG. 14 is a block diagram of an apparatus 1900 for verifying using a verification code, according to an exemplary embodiment.
- device 1900 can be provided as a server.
- apparatus 1900 includes a processing component 1922 that further includes one or more processors, and memory resources represented by memory 1932 for storing instructions executable by processing component 1922, such as an application.
- An application stored in memory 1932 can include one or more modules each corresponding to a set of instructions.
- processing component 1922 is configured to execute instructions to perform the methods described above.
- Apparatus 1900 can also include a power supply component 1926 configured to perform power management of apparatus 1900, a wired or wireless network interface 1950 configured to connect apparatus 1900 to the network, and an input/output (I/O) interface 1958.
- Device 1900 can operate based on an operating system stored in memory 1932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Human Computer Interaction (AREA)
- User Interface Of Digital Computer (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
- Monitoring And Testing Of Transmission In General (AREA)
Abstract
Description
Claims (17)
- 一种使用验证码进行验证的方法,其特征在于,包括:当接收到终端对验证码的获取请求时,生成本次验证的验证码获取信息,所述验证码获取信息包括验证标识,以及获取所述验证码的操作对象和操作方式提示信息;将所述验证码获取信息发送给所述终端;接收来自所述终端的验证请求,所述验证请求中包括所述验证标识和根据所述操作方式提示信息对所述操作对象进行操作后得到的第一验证码;对所述验证请求中的所述第一验证码进行校验。
- 根据权利要求1所述的方法,其特征在于,所述将所述验证标识发送给所述终端之前,所述方法还包括:根据所述操作方式提示信息对所述操作对象进行操作,得到第二验证码。
- 根据权利要求2所述的方法,其特征在于,所述对所述验证请求中的所述第一验证码进行校验,包括:根据所述验证标识,提取所述第二验证码;对比所述第一验证码和所述第二验证码;判断所述第一验证码和所述第二验证码是否相同。
- 根据权利要求1所述的方法,其特征在于,所述验证码的操作对象包含至少两个字符,其中,每个字符对应于单独的可移动的图片。
- 根据权利要求4所述的方法,其特征在于,所述操作方式提示信息包括将所述操作对象中的指定字符拖拽至指定位置的提示信息;所述第一验证码中包括对所述操作对象中的字符进行拖拽后得到的所述字符的位置信息。
- 根据权利要求5所述的方法,其特征在于,所述位置信息为根据所述字符拖拽后的排列顺序确定的。
- 一种使用验证码进行验证的方法,其特征在于,包括:向网络侧发送对验证码的获取请求;获取本次验证的验证码获取信息,所述验证码获取信息包括验证标识,以及获取所述验证码的操作对象和操作方式提示信息;接收根据所述操作方式提示信息对所述操作对象的操作动作;根据所述操作动作得到第一验证码;向网络侧发送验证请求,所述验证请求中包括所述验证标识和所述第一验证码。
- 根据权利要求7所述的方法,其特征在于,所述验证码的操作对象包含至少两个字符,其中,每个字符对应于单独的可移动的图片;所述操作方式提示信息包括将所述操作对象中的指定字符拖拽至指定位置的提示信 息;所述接收根据所述操作方式提示信息对所述操作对象的操作动作,包括:接收对所述操作对象中的指定字符的拖拽动作;所述根据所述操作动作得到第一验证码,包括:根据所述拖拽动作,获取拖拽后的所述字符的位置信息。
- 根据权利要求8所述的方法,其特征在于,所述位置信息为根据所述字符拖拽后的排列顺序确定的。
- 一种使用验证码进行验证的方法,其特征在于,包括:终端侧向网络侧发送对验证码的获取请求;当所述网络侧接收到所述获取请求时,所述网络侧生成本次验证的验证码获取信息,所述验证码获取信息包括验证标识,以及获取所述验证码的操作对象和操作方式提示信息;所述网络侧将所述验证码获取信息发送给所述终端侧;所述终端侧获取所述验证码获取信息;所述终端侧根据所述操作方式提示信息对所述操作对象进行操作;所述终端侧根据所述操作动作得到第一验证码;所述终端侧将验证请求发送到所述网络侧,所述验证请求中包括所述验证标识和所述第一验证码;所述网络侧接收所述验证请求;所述网络侧对所述验证请求中的所述第一验证码进行校验。
- 一种使用验证码进行验证的装置,其特征在于,包括:生成模块,用于当接收到终端对验证码的获取请求时,生成本次验证的验证码获取信息,所述验证码获取信息包括验证标识,以及获取所述验证码的操作对象和操作方式提示信息;第一发送模块,用于将所述验证码获取信息发送给所述终端;第一接收模块,用于接收来自所述终端的验证请求,所述验证请求中包括所述验证标识和根据所述操作方式提示信息对所述操作对象进行操作后得到的第一验证码;校验模块,用于对所述验证请求中的所述第一验证码进行校验。
- 根据权利要求11所述的装置,其特征在于,所述装置还包括:操作模块,用于根据所述操作方式提示信息对所述操作对象进行操作,得到第二验证码。
- 根据权利要求12所述的装置,其特征在于,所述校验模块包括:提取单元,用于根据所述验证标识,提取所述第二验证码;对比单元,用于对比所述第一验证码和所述第二验证码;判断单元,用于判断所述第一验证码和所述第二验证码是否相同。
- 一种使用验证码进行验证的装置,其特征在于,包括:第二发送模块,用于向网络侧发送对验证码的获取请求;第一获取模块,用于获取本次验证的验证码获取信息,所述验证码获取信息包括验证标识,以及获取所述验证码的操作对象和操作方式提示信息;第二接收模块,用于接收根据所述操作方式提示信息对所述操作对象的操作动作;第二获取模块,用于根据所述操作动作得到第一验证码;第三发送模块,用于向网络侧发送验证请求,所述验证请求中包括所述验证标识和所述第一验证码。
- 根据权利要求14所述的装置,其特征在于,所述第二接收模块包括:接收单元,用于接收对所述操作对象中的指定字符的拖拽动作;所述第二获取模块包括:获取单元,用于根据所述拖拽动作,获取拖拽后的字符的位置信息。
- 一种使用验证码进行验证的装置,其特征在于,包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为:当接收到终端对验证码的获取请求时,生成本次验证的验证码获取信息,所述验证码获取信息包括验证标识,以及获取所述验证码的操作对象和操作方式提示信息;将所述验证码获取信息发送给所述终端;接收来自所述终端的验证请求,所述验证请求中包括所述验证标识和根据所述操作方式提示信息对所述操作对象进行操作后得到的第一验证码;对所述验证请求中的所述第一验证码进行校验。
- 一种使用验证码进行验证的装置,其特征在于,包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为:向网络侧发送对验证码的获取请求;获取本次验证的验证码获取信息,所述验证码获取信息包括验证标识,以及获取所述验证码的操作对象和操作方式提示信息;接收根据所述操作方式提示信息对所述操作对象的操作动作;根据所述操作动作得到第一验证码;向网络侧发送验证请求,所述验证请求中包括所述验证标识和所述第一验证码。
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020157001366A KR20160023628A (ko) | 2014-07-25 | 2014-11-19 | 인증 코드를 이용하는 인증방법, 장치, 프로그램 및 기록매체 |
BR112015001468A BR112015001468A2 (pt) | 2014-07-25 | 2014-11-19 | método e dispositivo para verificação que utiliza um código de verificação |
MX2015001121A MX2015001121A (es) | 2014-07-25 | 2014-11-19 | Metodo y dispositivo para verificacion utilizando codigo de verificacion. |
JP2016535335A JP2016534451A (ja) | 2014-07-25 | 2014-11-19 | 検証コードを用いる検証方法、装置、プログラム、及び記録媒体 |
RU2015102155A RU2015102155A (ru) | 2014-07-25 | 2014-11-19 | Способ и устройство для проверки с использованием кода проверки |
US14/598,239 US20160028741A1 (en) | 2014-07-25 | 2015-01-16 | Methods and devices for verification using verification code |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410360887.5 | 2014-07-25 | ||
CN201410360887.5A CN104104514A (zh) | 2014-07-25 | 2014-07-25 | 使用验证码进行验证的方法及装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/598,239 Continuation US20160028741A1 (en) | 2014-07-25 | 2015-01-16 | Methods and devices for verification using verification code |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016011744A1 true WO2016011744A1 (zh) | 2016-01-28 |
Family
ID=51672341
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/091620 WO2016011744A1 (zh) | 2014-07-25 | 2014-11-19 | 使用验证码进行验证的方法及装置 |
Country Status (9)
Country | Link |
---|---|
US (1) | US20160028741A1 (zh) |
EP (1) | EP2977926A1 (zh) |
JP (1) | JP2016534451A (zh) |
KR (1) | KR20160023628A (zh) |
CN (1) | CN104104514A (zh) |
BR (1) | BR112015001468A2 (zh) |
MX (1) | MX2015001121A (zh) |
RU (1) | RU2015102155A (zh) |
WO (1) | WO2016011744A1 (zh) |
Families Citing this family (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104104514A (zh) * | 2014-07-25 | 2014-10-15 | 小米科技有限责任公司 | 使用验证码进行验证的方法及装置 |
JP6472513B2 (ja) | 2014-10-22 | 2019-02-20 | ホアウェイ・テクノロジーズ・カンパニー・リミテッド | 検証情報を送信するための方法および端末 |
CN104796428A (zh) * | 2015-04-30 | 2015-07-22 | 中国联合网络通信集团有限公司 | 一种动态验证方法、客户端、服务器和系统 |
CN105100096B (zh) * | 2015-07-17 | 2018-07-31 | 小米科技有限责任公司 | 验证方法和装置 |
CN105208014B (zh) * | 2015-08-31 | 2018-09-25 | 腾讯科技(深圳)有限公司 | 一种语音通信处理方法、电子设备及系统 |
CN105162784B (zh) * | 2015-08-31 | 2018-07-27 | 小米科技有限责任公司 | 验证信息输入的处理方法和装置 |
CN106656913A (zh) * | 2015-10-28 | 2017-05-10 | 珠海金山办公软件有限公司 | 一种数字验证码的生成方法及装置 |
CN105553663A (zh) * | 2015-12-09 | 2016-05-04 | 小米科技有限责任公司 | 验证码输入方法及装置 |
CN105530129B (zh) * | 2015-12-11 | 2020-07-10 | 小米科技有限责任公司 | 路由器重置方法及装置 |
CN105847288B (zh) * | 2016-05-16 | 2019-09-27 | 珠海市魅族科技有限公司 | 一种验证码处理方法和装置 |
CN106131001B (zh) * | 2016-06-30 | 2019-06-14 | 珠海市魅族科技有限公司 | 一种验证方法及验证装置 |
CN105978905A (zh) * | 2016-07-03 | 2016-09-28 | 韦建峰 | 一种关键词验证方法和生成装置 |
CN106612277B (zh) * | 2016-12-09 | 2020-05-12 | 武汉斗鱼网络科技有限公司 | 一种利用密码盘实现验证码验证的方法及系统 |
CN107231236B (zh) * | 2017-04-17 | 2021-08-31 | 韩凤龙 | 一种基于继承验证的数据处理方法、装置及电子设备 |
JP6962008B2 (ja) * | 2017-06-05 | 2021-11-05 | カシオ計算機株式会社 | 認証装置、認証方法及びプログラム |
CN107317805A (zh) * | 2017-06-21 | 2017-11-03 | 北京洋浦伟业科技发展有限公司 | 一种验证码验证方法及装置 |
CN107968779A (zh) * | 2017-11-17 | 2018-04-27 | 天脉聚源(北京)科技有限公司 | 身份验证方法及装置 |
CN107911366A (zh) * | 2017-11-17 | 2018-04-13 | 天脉聚源(北京)科技有限公司 | 身份验证方法及装置 |
CN107957840B (zh) * | 2017-11-30 | 2021-05-04 | 北京小米移动软件有限公司 | 二维码发送及接收处理方法、装置及终端 |
CN110768925B (zh) * | 2018-07-25 | 2022-04-22 | 中兴通讯股份有限公司 | 一种验证码短信的验证方法及装置 |
CN109409469A (zh) * | 2018-12-19 | 2019-03-01 | 四川虹美智能科技有限公司 | 一种绑定家电的方法及系统 |
CN110768995B (zh) * | 2019-10-30 | 2022-04-01 | 北京达佳互联信息技术有限公司 | 安全验证方法、装置、系统及存储介质 |
CN111447207B (zh) * | 2020-03-24 | 2022-11-01 | 咪咕文化科技有限公司 | 验证码验证方法、电子设备及存储介质 |
CN112287324B (zh) * | 2020-11-18 | 2024-02-09 | 深圳源中瑞科技有限公司 | 图片验证方法、服务器、终端设备及存储介质 |
CN112418932B (zh) * | 2020-11-24 | 2023-08-22 | 广州易尊网络科技股份有限公司 | 一种基于用户标签的营销信息推送方法及装置 |
CN112948799B (zh) * | 2021-01-28 | 2024-02-27 | 深圳市迅雷网文化有限公司 | 一种图形验证码的校验方法及其相关装置 |
CN115842634B (zh) * | 2023-02-20 | 2023-07-28 | 卓望数码技术(深圳)有限公司 | 验证方法、装置、设备及存储介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102841996A (zh) * | 2012-06-29 | 2012-12-26 | 宋超 | 一种点击式验证图片和点击式验证方法 |
CN103078745A (zh) * | 2013-02-04 | 2013-05-01 | 马骏 | 基于图片的登陆验证码 |
CN103139204A (zh) * | 2012-12-19 | 2013-06-05 | 姚爱军 | 一种网络验证码的方法及系统 |
CN103927465A (zh) * | 2014-01-05 | 2014-07-16 | 艾文卫 | 一种基于图形的验证码生成和验证方法 |
CN104104514A (zh) * | 2014-07-25 | 2014-10-15 | 小米科技有限责任公司 | 使用验证码进行验证的方法及装置 |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020184500A1 (en) * | 2001-05-29 | 2002-12-05 | Michael Maritzen | System and method for secure entry and authentication of consumer-centric information |
US8214891B2 (en) * | 2008-03-26 | 2012-07-03 | International Business Machines Corporation | Using multi-touch gestures to protect sensitive content using a completely automated public turing test to tell computers and humans apart (CAPTCHA) |
ES2537878T3 (es) * | 2010-03-29 | 2015-06-15 | Rakuten, Inc. | Servidor, procedimiento y programa de autenticación |
CN102739620A (zh) * | 2011-04-14 | 2012-10-17 | 鸿富锦精密工业(深圳)有限公司 | 验证系统及方法 |
US8713703B2 (en) * | 2011-07-31 | 2014-04-29 | International Business Machines Corporation | Advanced CAPTCHA using images in sequence |
CN103975325A (zh) * | 2011-11-30 | 2014-08-06 | 帕特里克·韦尔施 | 安全授权 |
CN102638447B (zh) * | 2012-02-10 | 2014-08-06 | 宗祥后 | 基于用户自主产生的动态口令对系统登录的方法和装置 |
CN103188263A (zh) * | 2013-03-22 | 2013-07-03 | 百度在线网络技术(北京)有限公司 | 一种验证方法、系统及装置 |
CN103685231B (zh) * | 2013-11-06 | 2018-05-01 | 百度在线网络技术(北京)有限公司 | 基于位置的操作验证方法及服务器、客户端 |
-
2014
- 2014-07-25 CN CN201410360887.5A patent/CN104104514A/zh active Pending
- 2014-11-19 JP JP2016535335A patent/JP2016534451A/ja active Pending
- 2014-11-19 KR KR1020157001366A patent/KR20160023628A/ko active Search and Examination
- 2014-11-19 WO PCT/CN2014/091620 patent/WO2016011744A1/zh active Application Filing
- 2014-11-19 RU RU2015102155A patent/RU2015102155A/ru unknown
- 2014-11-19 MX MX2015001121A patent/MX2015001121A/es unknown
- 2014-11-19 BR BR112015001468A patent/BR112015001468A2/pt not_active IP Right Cessation
-
2015
- 2015-01-16 US US14/598,239 patent/US20160028741A1/en not_active Abandoned
- 2015-07-09 EP EP15176130.1A patent/EP2977926A1/en not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102841996A (zh) * | 2012-06-29 | 2012-12-26 | 宋超 | 一种点击式验证图片和点击式验证方法 |
CN103139204A (zh) * | 2012-12-19 | 2013-06-05 | 姚爱军 | 一种网络验证码的方法及系统 |
CN103078745A (zh) * | 2013-02-04 | 2013-05-01 | 马骏 | 基于图片的登陆验证码 |
CN103927465A (zh) * | 2014-01-05 | 2014-07-16 | 艾文卫 | 一种基于图形的验证码生成和验证方法 |
CN104104514A (zh) * | 2014-07-25 | 2014-10-15 | 小米科技有限责任公司 | 使用验证码进行验证的方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
JP2016534451A (ja) | 2016-11-04 |
EP2977926A1 (en) | 2016-01-27 |
KR20160023628A (ko) | 2016-03-03 |
US20160028741A1 (en) | 2016-01-28 |
RU2015102155A (ru) | 2016-08-10 |
MX2015001121A (es) | 2016-03-15 |
BR112015001468A2 (pt) | 2017-07-04 |
CN104104514A (zh) | 2014-10-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016011744A1 (zh) | 使用验证码进行验证的方法及装置 | |
WO2017031888A1 (zh) | 指纹识别方法及装置 | |
US9769667B2 (en) | Methods for controlling smart device | |
WO2017113842A1 (zh) | 控制智能设备的方法及装置 | |
WO2016045280A1 (zh) | 信息交互方法及装置、电子设备 | |
US10102505B2 (en) | Server-implemented method, terminal-implemented method and device for acquiring business card information | |
US10425403B2 (en) | Method and device for accessing smart camera | |
WO2016155306A1 (zh) | 网络接入方法及装置 | |
JP6167245B2 (ja) | 通信メッセージ識別方法、通信メッセージ識別装置、プログラム及び記録媒体 | |
WO2016074586A1 (zh) | 权限验证的方法及装置 | |
WO2017045311A1 (zh) | 短信读取方法及装置 | |
WO2017035994A1 (zh) | 外接设备的连接方法及装置 | |
WO2015196665A1 (zh) | 绑定账号与令牌密钥的方法、装置 | |
WO2016155231A1 (zh) | 网络接入方法及装置 | |
WO2016086749A1 (zh) | 路由器设置界面显示方法及装置 | |
WO2015196667A1 (zh) | 获取语音服务的方法和装置 | |
CN104363205B (zh) | 应用登录方法和装置 | |
WO2017219497A1 (zh) | 消息生成方法及装置 | |
WO2017036018A1 (zh) | 指纹识别方法、装置及移动终端 | |
WO2016065760A1 (zh) | 设备连接的提示方法及装置 | |
WO2017000486A1 (zh) | 获取搜索结果的方法及装置 | |
WO2021103994A1 (zh) | 用于信息推荐的模型训练方法、装置、电子设备以及介质 | |
WO2017054350A1 (zh) | 一种提醒方法及装置 | |
WO2016008241A1 (zh) | 服务注册更新方法、装置、服务器及客户端 | |
EP3249566A1 (en) | Method and device for encrypting application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref document number: 2016535335 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 20157001366 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2015102155 Country of ref document: RU Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: MX/A/2015/001121 Country of ref document: MX |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112015001468 Country of ref document: BR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14897942 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 112015001468 Country of ref document: BR Kind code of ref document: A2 Effective date: 20150122 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14897942 Country of ref document: EP Kind code of ref document: A1 |