CN107204959A - Verification method, the apparatus and system of identifying code - Google Patents
Verification method, the apparatus and system of identifying code Download PDFInfo
- Publication number
- CN107204959A CN107204959A CN201610151493.8A CN201610151493A CN107204959A CN 107204959 A CN107204959 A CN 107204959A CN 201610151493 A CN201610151493 A CN 201610151493A CN 107204959 A CN107204959 A CN 107204959A
- Authority
- CN
- China
- Prior art keywords
- server
- code information
- verification code
- request
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Computer And Data Communications (AREA)
Abstract
This application discloses a kind of verification method of identifying code, apparatus and system.Wherein, this method includes:The first request that first server receiving terminal is sent, wherein, first asks to be used for acquisition request identifying code;First server generates response message in response to the first request, wherein, code carrier and corresponding first verification code information of code carrier are at least included in response message;First verification code information of code carrier and encryption is at least back to terminal by first server, wherein, code carrier is used for instruction terminal and inputs the second verification code information, and the second checking information that the first verification code information of encryption is used in the second request that second server is sent to terminal is verified.Present application addresses the trans-regional technical problem verified and there is time delay.
Description
Technical field
The application is related to internet arena, in particular to a kind of verification method of identifying code, apparatus and system.
Background technology
In the prior art, in large-scale website, may in multiple location arrangements identifying code servers, such as Beijing, on
Multiple identifying code servers are disposed on the ground such as sea, Hangzhou, Guangzhou.User terminal on these servers requests verification code
And when verifying, it is understood that there may be a kind of situation be:User has taken identifying code picture from the server for be deployed in Shanghai,
But user is after input validation code, when being verified to identifying code, it is assigned to and is deployed in Pekinese's server and enters
Row checking.Being tested due to conventional method handle allows code to be stored in KV servers (key assignments storage server), in authentication
During code, it can judge whether identifying code is correct by contrasting the value in KV servers, and KV servers are in cross-region
On different server, carrying out the synchronization of verification code information has time delay, if synchronization delayed time is beyond the effective of identifying code
Phase, user's checking may be caused to fail, it is poor to experience.
As shown in figure 1, in the prior art, user can be achieved by the steps of to server requests authentication code:
Step S101:User is to the application requests page.
Step S102:Application program returns to the checking page to user, wherein, it can ask to be used in the checking page defeated
The URL addresses for the identifying code server for pointing to checking resource are carried in access customer name and password, and the checking page
(i.e. code fetch server).
Step S103:User accesses code fetch server using the URL addresses.
Step S104:Code fetch server requests verification code picture and image results from KV storages.The image results are
For the image results carried in identifying code picture.
Step S105:Identifying code picture is issued user by code fetch server.
Step S106:Code fetch server stores image results and session information write-in KV.
Wherein, the session information is carried in the access request that user accesses code fetch server using the URL addresses.
As shown in Fig. 2 in the prior art, can be by as follows when sending identifying code requests verification with user orientation server
Step is realized:
Step S201:User submits identifying code to ask to application program.
Step S202:Identifying code request is sent to corresponding authentication server by application program.
Step S203:Authentication server obtains image results, and is verified.
Alternatively, authentication server obtains the corresponding image results of session information from KV storages, still, if the checking
Server is not same server with the code fetch server in Fig. 1, and the authentication server also needs to obtain to code fetch server
Image results are taken, the image results is then based on and is verified, it is as described above, if two server dispositions are not
, then there is time delay in same region, user's checking can be caused to fail.
Step S204:Authentication server deletes the session information and image results stored in KV storages.
Step S205:Authentication server returns to the result.
The problem of there is checking time delay during for above-mentioned trans-regional checking, not yet proposes effective solution at present.
The content of the invention
The embodiment of the present application provides a kind of verification method of identifying code, apparatus and system, at least to solve trans-regional test
In the presence of the technical problem of checking time delay during card.
According to the one side of the embodiment of the present application there is provided a kind of verification method of identifying code, this method includes:The
The first request that one server receiving terminal is sent, wherein, first asks to be used for acquisition request identifying code;First service
Device generates response message in response to the first request, wherein, code carrier and identifying code are at least included in response message
Corresponding first verification code information of carrier;First server is at least by code carrier and the first verification code information of encryption
Terminal is back to, wherein, code carrier is used for instruction terminal and inputs the second verification code information, the first checking of encryption
The second checking information that code information is used in the second request that second server is sent to terminal is verified.
According to the one side of the embodiment of the present application there is provided a kind of verification method of identifying code, this method includes:The
The second request that two server receiving terminals are sent, wherein, the first verification code information of encryption is carried in the second request
Asked with the second verification code information, second for asking the first verification code information using encryption to the second verification code information
Verified, the first verification code information of encryption is sent to terminal for first server, and the second verification code information is eventually
The information that end group is inputted in the code carrier that first server is sent, code carrier and the first verification code information phase
Correspondence;Second server is entered in response to the second request using the first verification code information of encryption to the second verification code information
Row checking.
According to the one side of the embodiment of the present application there is provided a kind of verification method of identifying code, this method includes:Eventually
Hold to first server and send the first request, wherein, first asks to be used for acquisition request identifying code;Terminal receives first
The response message that server is returned in response to the first request, wherein, code carrier is at least included in response message and is added
The first close verification code information;Terminal is based on code carrier and obtains the second verification code information;Terminal generation second is asked,
At least include the first verification code information of the second verification code information and encryption in second request;Terminal sends the second request
To second server, wherein, second is asked for being entered using the first verification code information of encryption to the second verification code information
Row checking.
According to the one side of the embodiment of the present application there is provided a kind of checking system of identifying code, the system includes:The
One server, the first request sent for receiving terminal, wherein, first asks to be used for acquisition request identifying code, and
In response to the first request, response message is generated, wherein, at least include code carrier in response message and identifying code is carried
Corresponding first verification code information of body;First server is additionally operable to code carrier and the first identifying code of encryption at least
Information is back to terminal;Second server, the second request sent for receiving terminal, wherein, taken in the second request
The first verification code information and the second verification code information with encryption, second asks for asking to test using the first of encryption
Card code information verifies that the second verification code information is what terminal was sent based on first server to the second verification code information
Code carrier and the information inputted;Second server is additionally operable in response to the second request, utilizes the first checking of encryption
Code information is verified to the second verification code information.
According to the another aspect of the embodiment of the present application, additionally provide a kind of checking device of identifying code, the identifying code is tested
Card device is arranged in first server, including:First receiving unit, the first request sent for receiving terminal,
Wherein, first ask to be used for acquisition request identifying code;First response unit, in response to the first request, generation to ring
Information is answered, wherein, code carrier and corresponding first verification code information of code carrier are at least included in response message;
First returning unit, at least end is back to for first server by the first verification code information of code carrier and encryption
End, wherein, code carrier is used for instruction terminal and inputs the second verification code information, and the first verification code information of encryption is used
The second checking information in the second request that second server is sent to terminal is verified.
According to the another aspect of the embodiment of the present application, a kind of checking device of identifying code is additionally provided, the second clothes are arranged on
It is engaged on device, the checking device of the identifying code includes:Second receiving unit, the second request sent for receiving terminal,
Wherein, the first verification code information and the second verification code information of encryption are carried in the second request, second asks to be used to ask
Ask and the second verification code information is verified using the first verification code information of encryption, the first verification code information of encryption is
First server is sent to terminal, and the second verification code information is the code carrier that terminal is sent based on first server
And the information inputted, code carrier is corresponding with the first verification code information;Second response unit, for second service
Device is verified in response to the second request using the first verification code information of encryption to the second verification code information.
According to the another aspect of the embodiment of the present application, a kind of checking device of identifying code is additionally provided, is arranged in terminal,
Including:First transmitting element, is asked for sending first to first server, wherein, first asks to obtain for request
Take identifying code;3rd receiving unit, for receiving the response message that first server is returned in response to the first request, its
In, the first verification code information of code carrier and encryption is at least included in response message;Acquiring unit, for based on
Code carrier obtains the second verification code information;Generation unit, is asked for generating second, is at least wrapped in the second request
Include the first verification code information of the second verification code information and encryption;Second transmitting element, for the second request to be sent extremely
Second server, wherein, second asks to carry out the second verification code information for the first verification code information using encryption
Checking.
In the embodiment of the present application, using the embodiment of the present application, first server is sent to terminal by code carrier
When, while the first verification code information of encryption is sent to terminal, terminal is in second identifying code of the request to input
When information is verified, the first verification code information of encryption is sent to second server in the lump, server can be based on
First verification code information of the encryption is verified to the second verification code information.In the above-described embodiments, even first
In the case that server and second server are not same server, second server from first server without obtaining the
One verification code information, second server can directly using terminal send the first verification code information the second identifying code is believed
Breath is verified, without the information exchange between two servers, so that transregional in first server and second server
When domain is verified, also in the absence of time delay, the checking to identifying code can be quickly realized, prior art mid span area is solved
The problem of there is checking time delay during checking.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes the part of the application, this Shen
Schematic description and description please is used to explain the application, does not constitute the improper restriction to the application.In accompanying drawing
In:
Fig. 1 is a kind of interaction diagrams of acquisition identifying code according to prior art;
Fig. 2 is a kind of interaction diagrams verified to identifying code according to prior art;
Fig. 3 is a kind of hardware block diagram of the terminal of the verification method of identifying code of the embodiment of the present application
Fig. 4 is the flow chart one of the verification method of the identifying code according to the embodiment of the present application;
Fig. 5 is the interaction figure one of the verification method of the identifying code according to the embodiment of the present application;
Fig. 6 is the flowchart 2 of the verification method of the identifying code according to the embodiment of the present application;
Fig. 7 is the interaction figure two of the verification method of the identifying code according to the embodiment of the present application;
Fig. 8 is the flow chart 3 of the verification method of the identifying code according to the embodiment of the present application;
Fig. 9 is the schematic diagram of the checking system according to the identifying code of the embodiment of the present application;
Figure 10 is the schematic diagram one of the checking device according to the identifying code of the embodiment of the present application;
Figure 11 is the schematic diagram two of the checking device according to the identifying code of the embodiment of the present application;
Figure 12 is the schematic diagram three of the checking device according to the identifying code of the embodiment of the present application;And
Figure 13 is the flow chart of the verification method of the identifying code according to the embodiment of the present application.
Embodiment
In order that those skilled in the art more fully understand application scheme, below in conjunction with the embodiment of the present application
Accompanying drawing, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described embodiment
The only embodiment of the application part, rather than whole embodiments.Based on the embodiment in the application, ability
The every other embodiment that domain those of ordinary skill is obtained under the premise of creative work is not made, should all belong to
The scope of the application protection.
It should be noted that term " first " in the description and claims of this application and above-mentioned accompanying drawing, "
Two " etc. be for distinguishing similar object, without for describing specific order or precedence.It should be appreciated that this
The data that sample is used can be exchanged in the appropriate case, so as to embodiments herein described herein can with except
Here the order beyond those for illustrating or describing is implemented.In addition, term " comprising " and " having " and they
Any deformation, it is intended that covering is non-exclusive to be included, for example, containing process, the side of series of steps or unit
Method, system, product or equipment are not necessarily limited to those steps clearly listed or unit, but may include unclear
It is that ground is listed or for the intrinsic other steps of these processes, method, product or equipment or unit.
First, the term that the application is related to is explained as follows:
Data encryption:Processing is changed by data key, third party can not obtain raw information, and can not be pseudo-
Make, distort the information, only possess key and data can be decrypted just now and obtain raw information.
Reset:Attacker sends the bag of a destination host received mistake, and particularly in certification, (such as the application's tests
Demonstrate,prove code checking) during, the bag received for certification user identity, to reach the purpose of fraud system, mainly
For authentication procedures, the security of certification is destroyed.
Anti-replay:Whether it is processed by the request of KV stored records, refusal is handled if treated.
Embodiment 1
According to the embodiment of the present application, a kind of embodiment of the verification method of identifying code is additionally provided, it is necessary to illustrate,
It can be performed the step of the flow of accompanying drawing is illustrated in the computer system of such as one group computer executable instructions,
And, although logical order is shown in flow charts, but in some cases, can be with suitable different from herein
Sequence performs shown or described step.
The embodiment of the method that the embodiment of the present application one is provided can be in mobile terminal, terminal or similar fortune
Calculate in device and perform.Exemplified by running on computer terminals, Fig. 3 is a kind of testing for identifying code of the embodiment of the present application
The hardware block diagram of the terminal of card method.As shown in figure 3, terminal 10 can include one or many
(processor 302 can include but is not limited to Micro-processor MCV or can individual (one is only shown in figure) processor 302
Programmed logic device FPGA etc. processing unit), the memory 304 for data storage and for communication function
Transmitting device 306.It will appreciated by the skilled person that the structure shown in Fig. 3 is only signal, it is not
Structure to above-mentioned electronic installation causes to limit.For example, terminal 10 may also include it is more more than shown in Fig. 3 or
The less component of person, or with the configuration different from shown in Fig. 3.
The checking that memory 304 can be used in the software program and module of storage application software, such as the embodiment of the present application
Corresponding programmed instruction/the module of verification method of code, processor 302 is stored in the software in memory 304 by operation
Program and module, so as to perform various function application and data processing, that is, realize the authentication of above-mentioned identifying code
Method.Memory 304 may include high speed random access memory, may also include nonvolatile memory, such as one or more
Magnetic storage device, flash memory or other non-volatile solid state memories.In some instances, memory 304 can
Further comprise the memory remotely located relative to processor 302, these remote memories can pass through network connection
To terminal 10.The example of above-mentioned network includes but is not limited to internet, intranet, LAN, movement
Communication network and combinations thereof.
Transmitting device 306 is used to data are received or sent via a network.Above-mentioned network instantiation may include
The wireless network that the communication providerses of terminal 10 are provided.In an example, transmitting device 306 includes one
Network adapter (Network Interface Controller, NIC), it can pass through base station and other network equipments
It is connected to be communicated with internet.In an example, transmitting device 306 can be radio frequency (Radio
Frequency, RF) module, it is used to wirelessly be communicated with internet.
Under above-mentioned running environment, this application provides the verification method of identifying code as shown in Figure 4.Fig. 4 is basis
The flow chart one of the verification method of the identifying code of the embodiment of the present application.As shown in figure 4, the program can be by walking as follows
It is rapid to realize:
Step S402:The first request that first server receiving terminal is sent, wherein, first asks to be used for acquisition request
Identifying code;
Step S404:First server generates response message in response to the first request, wherein, in response message at least
Including corresponding first verification code information of code carrier and code carrier;
Step S406:First verification code information of code carrier and encryption is at least back to terminal by first server,
Wherein, code carrier is used for instruction terminal and inputs the second verification code information, and the first verification code information of encryption is used for the
The second checking information in the second request that two servers are sent to terminal is verified.
Using the embodiment of the present application, first server is when code carrier is sent to terminal, while will encryption
The first verification code information send to terminal, terminal is when request is verified to the second verification code information of input, one
And send the first verification code information of encryption to second server, server can the first identifying code based on the encryption
Information is verified to the second verification code information.In the above-described embodiments, even first server and second server
In the case of not being same server, second server from first server without obtaining the first verification code information, second
Server can directly using terminal send the first verification code information the second verification code information is verified, without two
Information exchange between individual server, so as in first server and the trans-regional checking of second server, also be not present
Time delay, can quickly realize the checking to identifying code, there is checking time delay when solving the checking of prior art mid span area
The problem of.
Code carrier in above-described embodiment can be identifying code picture, that is, carry the picture of verification code information, e.g.,
First server can first generate the character of the first verification code information, and the character of first verification code information is turned round at random
Turn, the character after torsion write on painting canvas, generate picture, the picture is the above-mentioned picture for carrying identifying code,
Also it is code carrier.
The first verification code information in above-described embodiment can be the character information carried on the code carrier, such as one
The information carried on identifying code picture is " 1234 ", then first verification code information is " 1234 ".
Specifically, in the above-described embodiments, terminal (such as logging request, places an order in request access target application server
Request or registration request) after, receive the URL addresses (verifying resource address) for accessing first server, base
Asked in URL generations first, first server is received after the first request of terminal transmission, and first server is rung
The response of code carrier and corresponding first verification code information of code carrier should at least be included in the first request, generation
Information, after the response message is generated, the response message is sent to terminal, the terminal receives first server
Response message after, by the code carrier in the response message include on the screen of terminal, user can pass through
The input frame on terminal screen is operated to input the second verification code information.Terminal is obtained after second verification code information, will
Encryption the first verification code information and input the second verification code information, and application account and password send in the lump to should
With program, the application program uses application account and password to carry out authentication to terminal, and the application program is also by second
Verification code information and the first verification code information of encryption are sent to second server, and second server first is verified using this
Code information is verified to the second verification code information.
Wherein, the second server is based on application account determination, and such as destination application server judges that this belongs to using account
Account in Shanghai, then send the checking request (the i.e. second request) to the second server for being deployed in Shanghai.
In above-described embodiment, it is desirable to the first verification code information be cryptographically stored in user terminal (i.e. above-described embodiment
In terminal), and when terminal request is verified, while by the first verification code information of encryption and the second identifying code of input
Information is submitted to server end in the lump, has both reached data confidentiality effect, cross-region KV server datas is solved again same
The risk that step time delay is brought, realizes the verification code system of cross-region deployment.
In above-described embodiment of the application, first server generation response message can include:First server is from right
Code carrier and the first verification code information are read in the key assignments data storage storehouse answered;The session carried in asking first
Information and the first verification code information are encrypted, the first verification code information of the session information encrypted and encryption;Base
Session information, the first verification code information of encryption and code carrier in encryption, generate response message.
In the above-described embodiments, first server can be read from KV data storages storehouse (i.e. key assignments data storage storehouse)
Code carrier and the first verification code information, session information in the first request then sent to terminal and get the
One verification code information is encrypted, the first verification code information of the session information encrypted and encryption, based on the encryption
Session information, encryption the first verification code information and code carrier generation response message.
Specifically, the first verification code information of code carrier and encryption is at least back to terminal in first server
Meanwhile, first server sends the session information of encryption to terminal, wherein, the of the session information of encryption and encryption
One verification code information judges whether the second request is playback request for second server.
By above-described embodiment, the session information (such as session number or session id) of encryption is carried in response message,
In the case where ensureing session information and the first verification code information safety, it can also be ensured that the clothes verified to identifying code
Business device may determine that whether the terminal has initiated Replay Attack, further ensure the safety of the checking system of identifying code.
According to above-described embodiment, the first verification code information of the encryption of acquisition request can be stored in cookie.But
Be due to that multiple pages under a domain name share a cookie, if user in terminal simultaneously in multiple page requests
The first verification code information of the encryption finally obtained can only be write in identifying code, cookie, in order to ensure multiple pages all
The first verification code information of encryption can be got, terminal, can be with after the first verification code information of encryption is received
Save it in hidden domains (i.e. the Hidden field of the page).
In addition, cookie size is restricted, if the cookie under a domain name is excessive, it may cause cookie's
Lose, after terminal gets the first verification code information of encryption, the first verification code information of encryption is stored in hidden
The problem of information is lost can also be avoided by hiding in domain.
As shown in figure 5, so that code carrier is identifying code picture as an example, the above embodiments of the present application are described in detail:
Step S501:Terminal initiates access request to destination application server.
Alternatively, the access request such as logging request, can place an order request (such as that need to carry out the request of authentication
The destination application server is the server of resource transfers website, then the request can be resource transfers request) and note
Volume request etc..
Step S502:Destination application server returns to request response message.
The request response message is used for instruction terminal input and applies account and password, and input validation code.
Further, checking resource address is carried in the request response message, the checking resource address points to first and taken
Business device.
Step S503:The first server that terminal is pointed to the checking resource address sends first and asked, and the request is used for
Acquisition request identifying code.
Step S504:First server responds first request and identifying code picture and figure is obtained from KV data storages storehouse
Piece result, wherein, the image results are the first above-mentioned verification code information.
Step S505:First server writes the session information in first request and the first verification code information got
The session information of encryption, the first verification code information encrypted and encryption.
Step S506:First server generates response message.
The step is consistent with the implementation in above-described embodiment, will not be repeated here.
Step S507:Response message is back to terminal by first server.
After terminal obtains the response message, it can obtain this according to the processing mode in above-described embodiment and second test
Demonstrate,prove code information after, by the first verification code information of encryption and input the second verification code information, and application account and
Password is sent to application program in the lump, and the application program uses application account and password to carry out authentication to terminal, should
Application program also sends the first verification code information of the second verification code information and encryption to second server, second service
Device is verified using first verification code information to the second verification code information.
Pass through above-described embodiment, it is possible to achieve the trans-regional deployment of authentication server, and user is in checking, accurate,
Safety can ensure that checking request can not be played without time delay.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as to one it is
The combination of actions of row, but those skilled in the art should know, the application is not limited by described sequence of movement
System, because according to the application, some steps can be carried out sequentially or simultaneously using other.Secondly, art technology
Personnel should also know that embodiment described in this description belongs to preferred embodiment, involved action and module
Not necessarily necessary to the application.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation
The method of example can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but
The former is more preferably embodiment in many cases.Based on it is such understand, the technical scheme of the application substantially or
Say that the part contributed to prior art can be embodied in the form of software product, the computer software product is deposited
Storage is in a storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions are to cause a station terminal
Described in each embodiment of equipment (can be mobile phone, computer, server, or network equipment etc.) execution the application
Method.
Embodiment 2
According to the embodiment of the present application, a kind of verification method of identifying code is additionally provided, this method is applied in second server
On, as shown in fig. 6, this method can include:
Step S601:The second request that second server receiving terminal is sent, wherein, carry encryption in the second request
The first verification code information and the second verification code information, second ask for ask using encryption the first verification code information
Second verification code information is verified, the first verification code information of encryption is sent to terminal for first server, the
The information that two verification code informations are inputted for terminal based on the code carrier that first server is sent, code carrier with
First verification code information is corresponding;
Step S603:Second server is verified in response to the second request using the first verification code information of encryption to second
Code information is verified.
Using the embodiment of the present application, first server is when code carrier is sent to terminal, while will encryption
The first verification code information send to terminal, terminal is when request is verified to the second verification code information of input, one
And send the first verification code information of encryption to second server, server can the first identifying code based on the encryption
Information is verified to the second verification code information.In the above-described embodiments, even first server and second server
In the case of not being same server, second server from first server without obtaining the first verification code information, second
Server can directly using terminal send the first verification code information the second verification code information is verified, without two
Information exchange between individual server, so as in first server and the trans-regional checking of second server, also be not present
Time delay, can quickly realize the checking to identifying code, there is checking time delay when solving the checking of prior art mid span area
The problem of.
Code carrier in above-described embodiment can be identifying code picture, that is, carry the picture of verification code information, e.g.,
First server can first generate the character of the first verification code information, and the character of first verification code information is turned round at random
Turn, the character after torsion write on painting canvas, generate picture, the picture is the above-mentioned picture for carrying identifying code,
Also it is code carrier.
The first verification code information in above-described embodiment can be the character information carried on the code carrier, such as one
The information carried on identifying code picture is " 1234 ", then first verification code information is " 1234 ".
Specifically, in the above-described embodiments, terminal (such as logging request, places an order in request access target application server
Request or registration request) after, receive the URL addresses (verifying resource address) for accessing first server, base
Asked in URL generations first, first server is received after the first request of terminal transmission, and first server is rung
The response of code carrier and corresponding first verification code information of code carrier should at least be included in the first request, generation
Information, after the response message is generated, the response message is sent to terminal, the terminal receives first server
Response message after, by the code carrier in the response message include on the screen of terminal, user can pass through
The input frame on terminal screen is operated to input the second verification code information.Terminal is obtained after second verification code information, will
Encryption the first verification code information and input the second verification code information, and application account and password send in the lump to should
With program, the application program uses application account and password to carry out authentication to terminal, and the application program is also by second
Verification code information and the first verification code information of encryption are sent to second server, and second server first is verified using this
Code information is verified to the second verification code information.
Wherein, the second server is based on application account determination, and such as destination application server judges that this belongs to using account
Account in Shanghai, then send the checking request (the i.e. second request) to the second server for being deployed in Shanghai.
In above-described embodiment, it is desirable to the first verification code information be cryptographically stored in user terminal (i.e. above-described embodiment
In terminal), and when terminal request is verified, while by the first verification code information of encryption and the second identifying code of input
Information is submitted to server end in the lump, has both reached data confidentiality effect, cross-region KV server datas is solved again same
The risk that step time delay is brought, realizes the verification code system of cross-region deployment.
Specifically, carrying out checking to the second verification code information using the first verification code information of encryption can include:Second
First verification code information of encryption is decrypted server, obtains the first verification code information;If the first verification code information
Consistent with the second verification code information, then to verify the second verification code information correct for second server;If the first identifying code is believed
Breath is inconsistent with the second verification code information, then to verify the second verification code information incorrect for second server.
Second server using the first verification code information of encryption to the second verification code information when being verified, the second clothes
First verification code information of the device first to encryption of being engaged in is decrypted, and obtains the first verification code information;Compare decryption is obtained the
Whether one verification code information is consistent with the second verification code information, if the first verification code information is consistent with the second verification code information,
Then to verify the second verification code information correct for second server;If the first verification code information differs with the second verification code information
Cause, then to verify the second verification code information incorrect for second server.
Wherein, the first verification code information is consistent with the second verification code information, refers to that the character in verification code information is consistent,
Character boundary writes difference and falls within consistent category, e.g., and the first verification code information is " ABCd ", the second verification code information
For " ABCD ", also judge that the first verification code information is consistent with the second verification code information.
According to above-described embodiment of the application, the encryption that first server is sent to terminal is also carried in the second request
Session information, wherein, after being verified using the first verification code information of encryption to the second verification code information, the
Session information and the first verification code information are saved into corresponding key assignments data storage storehouse by two servers.
In this embodiment, please by the second of the terminal after each checking completes the second verification code information of terminal
The first verification code information of the encryption of middle carrying and the session information of encryption are asked as key-value pair, storage such as second server
Corresponding KV data storages storehouse, the second request (during such as checking request) is received in next time, in being asked using second
Session information searches whether second request is playback request (i.e. playback request), if it is, second server does not ring
Should second request, if it is not, then second server responds the request.
Specifically, before being verified using the first verification code information of encryption to the second verification code information, the second clothes
Device be engaged in corresponding key assignments data storage storehouse, searches whether that record has and corresponding with session information has deposited verification code information;
Find it is corresponding with session information deposited verification code information in the case of, second server determines that the second request is attached most importance to
Put request;Do not find it is corresponding with session information deposited verification code information in the case of, second server determines
Two requests are not playback request.
Specifically, carrying out checking to the second verification code information using the first verification code information of encryption includes:Please second
Ask in the case of not being playback request, the second verification code information is verified using the first verification code information of encryption;
In the case where the second request is playback request, then second server is not responding to second request, namely does not utilize
First verification code information of encryption is verified to the second verification code information.
In the above-described embodiments, when receiving the second request every time, the detection of Replay Attack is carried out to it, is protected
The safety of the checking system of whole identifying code is demonstrate,proved.
According to above-described embodiment, the first verification code information of the encryption of acquisition request can be stored in cookie.But
Be due to that multiple pages under a domain name share a cookie, if user in terminal simultaneously in multiple page requests
The first verification code information of the encryption finally obtained can only be write in identifying code, cookie, in order to ensure multiple pages all
The first verification code information of encryption can be got, terminal, can be with after the first verification code information of encryption is received
Save it in hidden domains (i.e. the Hidden field of the page).
In addition, cookie size is restricted, if the cookie under a domain name is excessive, it may cause cookie's
Lose, after terminal gets the first verification code information of encryption, the first verification code information of encryption is stored in hidden
The problem of information is lost can also be avoided by hiding in domain.
Above-described embodiment of the application is described in detail with reference to Fig. 7, as shown in fig. 7, above-described embodiment can
To comprise the following steps:
Step S701:Terminal sends the second request to destination application server.
It can be carried using account, password, the session encrypted in the second request as checking request, the checking request
The second verification code information that information, the first verification code information of encryption and terminal are received.
Step S702:Destination application server connects the session information of encryption, the first verification code information of encryption and terminal
The second verification code information received is sent to second server.
Destination application server uses application account and password to carry out authentication to user, while by the session of the encryption
The second verification code information that information, the first verification code information of encryption and terminal are received is sent to second server.
The corresponding table using account and region being pre-set, determining that this applies the corresponding region of account, as determined
Region is Beijing-tianjin-tangshan Area, then receives the session information of the encryption, the first verification code information of encryption and terminal
Second verification code information sends the server (i.e. second server) disposed to the Beijing-tianjin-tangshan Area.
Step S703:Second server is received after the second request, decrypts the session information of encryption and encrypt first
Verification code information, obtains session information and the first verification code information.
First server and second server can make an appointment encryption and decryption key.
Step S704:Whether second server is attached most importance to using the session information and the request of the first verification code information checking second
Put request.
The implementation of the step is consistent with the implementation of correspondence step in above-described embodiment, will not be repeated here.
Step S705:In the case where the second request is not playback request, second server verifies the first verification code information
With the uniformity of the second verification code information, result is verified.
The implementation of the step is consistent with the implementation of correspondence scheme in above-described embodiment, will not be repeated here.
Step S706:The result is back to terminal by second server.
The result can be the result being verified, or the result that checking does not pass through.
Step S707:Session information and the first verification code information are used as key-value pair to be stored in corresponding KV by second server
Data storage storehouse.
The session information and the first verification code information in deposit KV data storages storehouse are used to verify the checking request received
Whether it is playback request.
The application is not limited the sequencing for performing above-mentioned steps S706 and step S707.
Pass through above-described embodiment, it is possible to achieve the trans-regional deployment of authentication server, and user is in checking, accurate,
Safety can ensure that checking request can not be played without time delay.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as to one it is
The combination of actions of row, but those skilled in the art should know, the application is not limited by described sequence of movement
System, because according to the application, some steps can be carried out sequentially or simultaneously using other.Secondly, art technology
Personnel should also know that embodiment described in this description belongs to preferred embodiment, involved action and module
Not necessarily necessary to the application.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation
The method of example can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but
The former is more preferably embodiment in many cases.Based on it is such understand, the technical scheme of the application substantially or
Say that the part contributed to prior art can be embodied in the form of software product, the computer software product is deposited
Storage is in a storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions are to cause a station terminal
Described in each embodiment of equipment (can be mobile phone, computer, server, or network equipment etc.) execution the application
Method.
Embodiment 3
According to the embodiment of the present application, a kind of verification method of identifying code is additionally provided, this method is applied in second server
On, as shown in figure 8, this method may include steps of:
Step S801:Terminal sends first to first server and asked, wherein, first asks to be used for acquisition request checking
Code;
Step S802:Terminal receives the response message that first server is returned in response to the first request, wherein, response letter
At least include the first verification code information of code carrier and encryption in breath;
Step S803:Terminal is based on code carrier and obtains the second verification code information;
Step S804:Terminal generation second is asked, and at least includes the of the second verification code information and encryption in the second request
One verification code information;
Step S805:Terminal sends the second request to second server, wherein, second asks for utilizing encryption
First verification code information is verified to the second verification code information.
Using the embodiment of the present application, first server is when code carrier is sent to terminal, while will encryption
The first verification code information send to terminal, terminal is when request is verified to the second verification code information of input, one
And send the first verification code information of encryption to second server, server can the first identifying code based on the encryption
Information is verified to the second verification code information.In the above-described embodiments, even first server and second server
In the case of not being same server, second server from first server without obtaining the first verification code information, second
Server can directly using terminal send the first verification code information the second verification code information is verified, without two
Information exchange between individual server, so as in first server and the trans-regional checking of second server, also be not present
Time delay, can quickly realize the checking to identifying code, there is checking time delay when solving the checking of prior art mid span area
The problem of.
Code carrier in above-described embodiment can be identifying code picture, that is, carry the picture of verification code information, e.g.,
First server can first generate the character of the first verification code information, and the character of first verification code information is turned round at random
Turn, the character after torsion write on painting canvas, generate picture, the picture is the above-mentioned picture for carrying identifying code,
Also it is code carrier.
The first verification code information in above-described embodiment can be the character information carried on the code carrier, such as one
The information carried on identifying code picture is " 1234 ", then first verification code information is " 1234 ".
Specifically, in the above-described embodiments, terminal (such as logging request, places an order in request access target application server
Request or registration request) after, receive the URL addresses (verifying resource address) for accessing first server, base
Asked in URL generations first, first server is received after the first request of terminal transmission, and first server is rung
The response of code carrier and corresponding first verification code information of code carrier should at least be included in the first request, generation
Information, after the response message is generated, the response message is sent to terminal, the terminal receives first server
Response message after, by the code carrier in the response message include on the screen of terminal, user can pass through
The input frame on terminal screen is operated to input the second verification code information.Terminal is obtained after second verification code information, will
Encryption the first verification code information and input the second verification code information, and application account and password send in the lump to should
With program, the application program uses application account and password to carry out authentication to terminal, and the application program is also by second
Verification code information and the first verification code information of encryption are sent to second server, and second server first is verified using this
Code information is verified to the second verification code information.
Wherein, the second server is based on application account determination, and such as destination application server judges that this belongs to using account
Account in Shanghai, then send the checking request (the i.e. second request) to the second server for being deployed in Shanghai.
In above-described embodiment, it is desirable to the first verification code information be cryptographically stored in user terminal (i.e. above-described embodiment
In terminal), and when terminal request is verified, while by the first verification code information of encryption and the second identifying code of input
Information is submitted to server end in the lump, has both reached data confidentiality effect, cross-region KV server datas is solved again same
The risk that step time delay is brought, realizes the verification code system of cross-region deployment.
Specifically, before terminal sends the first request to first server, method also includes:Terminal is to intended application
Server sends access request;Terminal receives the checking resource address that destination application server is returned, wherein, checking money
Source address points to first server.
Alternatively, the request of terminal generation second includes:Terminal based on the second verification code information inputted by terminal, plus
Close the first verification code information, application account and the password generation second for access target application server are asked.
According to above-described embodiment of the application, terminal, which sends the second request to second server, to be included:Terminal is by second
Request is sent to destination application server, wherein, application account and password in the second request are used for the conjunction for verifying terminal
Method, second request in the first verification code information and the second verification code information be used for by destination application server send to
Second server.
Pass through above-described embodiment, it is possible to achieve the trans-regional deployment of authentication server, and user is in checking, accurate,
Safety can ensure that checking request can not be played without time delay.
According to above-described embodiment, the first verification code information of the encryption of acquisition request can be stored in cookie.But
Be due to that multiple pages under a domain name share a cookie, if user in terminal simultaneously in multiple page requests
The first verification code information of the encryption finally obtained can only be write in identifying code, cookie, in order to ensure multiple pages all
The first verification code information of encryption can be got, terminal, can be with after the first verification code information of encryption is received
Save it in hidden domains (i.e. the Hidden field of the page).
In addition, cookie size is restricted, if the cookie under a domain name is excessive, it may cause cookie's
Lose, after terminal gets the first verification code information of encryption, the first verification code information of encryption is stored in hidden
The problem of information is lost can also be avoided by hiding in domain.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as to one it is
The combination of actions of row, but those skilled in the art should know, the application is not limited by described sequence of movement
System, because according to the application, some steps can be carried out sequentially or simultaneously using other.Secondly, art technology
Personnel should also know that embodiment described in this description belongs to preferred embodiment, involved action and module
Not necessarily necessary to the application.
Embodiment 4
According to the embodiment of the present application, a kind of testing for identifying code for being used to implement the verification method of above-mentioned identifying code is additionally provided
Card system, as shown in figure 9, the checking system of the identifying code includes:
First server 91, the first request sent for receiving terminal, wherein, first asks to test for acquisition request
Demonstrate,prove code, and in response to first request, generate response message, wherein, in response message at least include code carrier and
Corresponding first verification code information of code carrier;First server is additionally operable at least by code carrier and encryption
One verification code information is back to terminal;
Second server 93, the second request sent for receiving terminal, wherein, carry encryption in the second request
First verification code information and the second verification code information, second asks for asking the first verification code information pair using encryption
Second verification code information is verified that the second verification code information is the code carrier that terminal is sent based on first server
And the information inputted;Second server is additionally operable in response to the second request, using the first verification code information of encryption to the
Two verification code informations are verified.
Using the embodiment of the present application, first server is when code carrier is sent to terminal, while will encryption
The first verification code information send to terminal, terminal is when request is verified to the second verification code information of input, one
And send the first verification code information of encryption to second server, server can the first identifying code based on the encryption
Information is verified to the second verification code information.In the above-described embodiments, even first server and second server
In the case of not being same server, second server from first server without obtaining the first verification code information, second
Server can directly using terminal send the first verification code information the second verification code information is verified, without two
Information exchange between individual server, so as in first server and the trans-regional checking of second server, also be not present
Time delay, can quickly realize the checking to identifying code, there is checking time delay when solving the checking of prior art mid span area
The problem of.
Code carrier in above-described embodiment can be identifying code picture, that is, carry the picture of verification code information, e.g.,
First server can first generate the character of the first verification code information, and the character of first verification code information is turned round at random
Turn, the character after torsion write on painting canvas, generate picture, the picture is the above-mentioned picture for carrying identifying code,
Also it is code carrier.
The first verification code information in above-described embodiment can be the character information carried on the code carrier, such as one
The information carried on identifying code picture is " 1234 ", then first verification code information is " 1234 ".
Specifically, in the above-described embodiments, terminal (such as logging request, places an order in request access target application server
Request or registration request) after, receive the URL addresses (verifying resource address) for accessing first server, base
Asked in URL generations first, first server is received after the first request of terminal transmission, and first server is rung
The response of code carrier and corresponding first verification code information of code carrier should at least be included in the first request, generation
Information, after the response message is generated, the response message is sent to terminal, the terminal receives first server
Response message after, by the code carrier in the response message include on the screen of terminal, user can pass through
The input frame on terminal screen is operated to input the second verification code information.Terminal is obtained after second verification code information, will
Encryption the first verification code information and input the second verification code information, and application account and password send in the lump to should
With program, the application program uses application account and password to carry out authentication to terminal, and the application program is also by second
Verification code information and the first verification code information of encryption are sent to second server, and second server first is verified using this
Code information is verified to the second verification code information.
Wherein, the second server is based on application account determination, and such as destination application server judges that this belongs to using account
Account in Shanghai, then send the checking request (the i.e. second request) to the second server for being deployed in Shanghai.
In above-described embodiment, it is desirable to the first verification code information be cryptographically stored in user terminal (i.e. above-described embodiment
In terminal), and when terminal request is verified, while by the first verification code information of encryption and the second identifying code of input
Information is submitted to server end in the lump, has both reached data confidentiality effect, cross-region KV server datas is solved again same
The risk that step time delay is brought, realizes the verification code system of cross-region deployment.
Specifically, the first server in the program, is additionally operable in first server at least by code carrier and encryption
The first verification code information while be back to terminal, the session information of encryption is sent to terminal;Second server,
It is additionally operable to after the second request of terminal is received, the session information of the encryption in being asked using second and the of encryption
One verification code information judges whether the second request is playback request.
Embodiment 5
According to the embodiment of the present application, a kind of testing for identifying code for being used to implement the verification method of above-mentioned identifying code is additionally provided
Card device, as shown in Figure 10, is arranged in first server, and the device includes:
First receiving unit 101, the first request sent for receiving terminal, wherein, first asks to obtain for request
Take identifying code;
First response unit 103, in response to the first request, generating response message, wherein, in response message extremely
Include code carrier and corresponding first verification code information of code carrier less;
First returning unit 105, for first server at least by code carrier and the first verification code information of encryption
Terminal is back to, wherein, code carrier is used for instruction terminal and inputs the second verification code information, the first checking of encryption
The second checking information that code information is used in the second request that second server is sent to terminal is verified.
Using the embodiment of the present application, first server is when code carrier is sent to terminal, while will encryption
The first verification code information send to terminal, terminal is when request is verified to the second verification code information of input, one
And send the first verification code information of encryption to second server, server can the first identifying code based on the encryption
Information is verified to the second verification code information.In the above-described embodiments, even first server and second server
In the case of not being same server, second server from first server without obtaining the first verification code information, second
Server can directly using terminal send the first verification code information the second verification code information is verified, without two
Information exchange between individual server, so as in first server and the trans-regional checking of second server, also be not present
Time delay, can quickly realize the checking to identifying code, there is checking time delay when solving the checking of prior art mid span area
The problem of.
Present invention also provides a kind of checking device of identifying code, it is arranged on second server, the device can include
As shown in figure 11:Second receiving unit 111, the second request sent for receiving terminal, wherein, the second request
In carry the first verification code information and the second verification code information of encryption, second asks for asking the using encryption
One verification code information verifies that the first verification code information of encryption sends for first server to the second verification code information
To terminal, the information that the second verification code information is inputted for terminal based on the code carrier that first server is sent,
Code carrier is corresponding with the first verification code information;Second response unit 113, for second server in response to
Two requests, are verified using the first verification code information of encryption to the second verification code information.
Using the embodiment of the present application, first server is when code carrier is sent to terminal, while will encryption
The first verification code information send to terminal, terminal is when request is verified to the second verification code information of input, one
And send the first verification code information of encryption to second server, server can the first identifying code based on the encryption
Information is verified to the second verification code information.In the above-described embodiments, even first server and second server
In the case of not being same server, second server from first server without obtaining the first verification code information, second
Server can directly using terminal send the first verification code information the second verification code information is verified, without two
Information exchange between individual server, so as in first server and the trans-regional checking of second server, also be not present
Time delay, can quickly realize the checking to identifying code, there is checking time delay when solving the checking of prior art mid span area
The problem of.
Present invention also provides a kind of checking device for the identifying code being arranged in terminal, the device includes as shown in figure 12
's:First transmitting element 121, is asked for sending first to first server, wherein, first asks to be used to ask
Obtain identifying code;3rd receiving unit 123, for receiving first server in response to the first request, the response of return
Information, wherein, the first verification code information that code carrier and code carrier are carried at least is included in response message;
Acquiring unit 125, for obtaining the second verification code information based on code carrier;Generation unit 127, for generating the
Two requests, at least include the first verification code information of the second verification code information and encryption in the second request;Second sends single
Member 129, for the second request to be sent to second server, wherein, second is asked for being tested using the first of encryption
Card code information is verified to the second verification code information.
Using the embodiment of the present application, first server is when code carrier is sent to terminal, while will encryption
The first verification code information send to terminal, terminal is when request is verified to the second verification code information of input, one
And send the first verification code information of encryption to second server, server can the first identifying code based on the encryption
Information is verified to the second verification code information.In the above-described embodiments, even first server and second server
In the case of not being same server, second server from first server without obtaining the first verification code information, second
Server can directly using terminal send the first verification code information the second verification code information is verified, without two
Information exchange between individual server, so as in first server and the trans-regional checking of second server, also be not present
Time delay, can quickly realize the checking to identifying code, there is checking time delay when solving the checking of prior art mid span area
The problem of.
Code carrier in above-described embodiment can be identifying code picture, that is, carry the picture of verification code information, e.g.,
First server can first generate the character of the first verification code information, and the character of first verification code information is turned round at random
Turn, the character after torsion write on painting canvas, generate picture, the picture is the above-mentioned picture for carrying identifying code,
Also it is code carrier.
The first verification code information in above-described embodiment can be the character information carried on the code carrier, such as one
The information carried on identifying code picture is " 1234 ", then first verification code information is " 1234 ".
Specifically, in the above-described embodiments, terminal (such as logging request, places an order in request access target application server
Request or registration request) after, receive the URL addresses (verifying resource address) for accessing first server, base
Asked in URL generations first, first server is received after the first request of terminal transmission, and first server is rung
The response of code carrier and corresponding first verification code information of code carrier should at least be included in the first request, generation
Information, after the response message is generated, the response message is sent to terminal, the terminal receives first server
Response message after, by the code carrier in the response message include on the screen of terminal, user can pass through
The input frame on terminal screen is operated to input the second verification code information.Terminal is obtained after second verification code information, will
Encryption the first verification code information and input the second verification code information, and application account and password send in the lump to should
With program, the application program uses application account and password to carry out authentication to terminal, and the application program is also by second
Verification code information and the first verification code information of encryption are sent to second server, and second server first is verified using this
Code information is verified to the second verification code information.
Wherein, the second server is based on application account determination, and such as destination application server judges that this belongs to using account
Account in Shanghai, then send the checking request (the i.e. second request) to the second server for being deployed in Shanghai.
In above-described embodiment, it is desirable to the first verification code information be cryptographically stored in user terminal (i.e. above-described embodiment
In terminal), and when terminal request is verified, while by the first verification code information of encryption and the second identifying code of input
Information is submitted to server end in the lump, has both reached data confidentiality effect, cross-region KV server datas is solved again same
The risk that step time delay is brought, realizes the verification code system of cross-region deployment.
It should be noted that example and applied field that said units or module are realized with the step in corresponding embodiment
Scape is identical, but is not limited to above-described embodiment disclosure of that.It should be noted that said units are used as the one of device
Part may operate in the terminal of embodiment offer, can be realized by software, can also be real by hardware
It is existing.
Embodiment 6
Embodiments herein can provide a kind of terminal, the terminal can be terminal group in
Any one computer terminal (terminal described above, first server or second server).Alternatively, exist
In the present embodiment, above computer terminal can also replace with the terminal devices such as mobile terminal.
Alternatively, in the present embodiment, above computer terminal can be located in multiple network equipments of computer network
At least one network equipment.
Alternatively, Figure 13 is a kind of structured flowchart of terminal according to the embodiment of the present application.As shown in figure 13,
Terminal A can include:One or more (one is only shown in figure) processors 1301, memory 1303,
And transmitting device 1305.
Wherein, memory 1303 can be used for storage software program and module, such as the identifying code in the embodiment of the present application
Verification method and the corresponding programmed instruction/module of device, processor 1301 are stored in memory 1303 by operation
Software program and module, so as to perform various function application and data processing, that is, realize testing for above-mentioned identifying code
Card method.Memory 1303 may include high speed random access memory, can also include nonvolatile memory, such as one or
The multiple magnetic storage devices of person, flash memory or other non-volatile solid state memories.In some instances, memory
1303 can further comprise the memory remotely located relative to processor 1301, and these remote memories can pass through
Network connection is to terminal A.The example of above-mentioned network includes but is not limited to internet, intranet, LAN, shifting
Dynamic communication network and combinations thereof.
Above-mentioned transmitting device 1305 is used to data are received or sent via a network.Above-mentioned network instantiation
It may include cable network and wireless network.In an example, transmitting device 1305 includes a network adapter
(Network Interface Controller, NIC), it can pass through netting twine and other network equipments and router phase
Connect to be communicated with internet or LAN.In an example, transmitting device 1305 is radio frequency (Radio
Frequency, RF) module, it is used to wirelessly be communicated with internet.
Wherein, specifically, memory 1303 be used for the information for storing deliberate action condition and default access user and
Application program.
In the present embodiment, above computer terminal can perform following steps in the verification method of identifying code:
Step S1:The first request that first server receiving terminal is sent, wherein, first asks to test for acquisition request
Demonstrate,prove code;
Step S2:First server generates response message in response to the first request, wherein, at least wrapped in response message
Include code carrier and corresponding first verification code information of code carrier;
Step S3:First verification code information of code carrier and encryption is at least back to terminal by first server, its
In, code carrier is used for instruction terminal and inputs the second verification code information, and the first verification code information of encryption is used for second
The second checking information in the second request that server is sent to terminal is verified.
Above computer terminal can also carry out following steps in the verification method of identifying code:
Step S4:The second request that second server receiving terminal is sent, wherein, carry encryption in the second request
First verification code information and the second verification code information, second asks for asking the first verification code information pair using encryption
Second verification code information is verified that the first verification code information of encryption is sent to terminal, second for first server
The information that verification code information is inputted for terminal based on the code carrier that first server is sent, code carrier and
One verification code information is corresponding;
Step S5:Second server is in response to the second request, using the first verification code information of encryption to the second identifying code
Information is verified.
Above-mentioned processor can also carry out following steps in the verification method of identifying code:
Step S6:Terminal sends first to first server and asked, wherein, first asks to be used for acquisition request identifying code;
Step S7:Terminal receives the response message that first server is returned in response to the first request, wherein, response message
In at least include code carrier and encryption the first verification code information, first verification code information be code carrier in
The information of carrying;
Step S8:Terminal is based on code carrier and obtains the second verification code information;
Step S9:Terminal generation second is asked, and at least includes the first of the second verification code information and encryption in the second request
Verification code information;
Step S10:Terminal sends the second request to second server, wherein, second asks for utilizing encryption
First verification code information is verified to the second verification code information.
Using the embodiment of the present application, first server is when code carrier is sent to terminal, while will encryption
The first verification code information send to terminal, terminal is when request is verified to the second verification code information of input, one
And send the first verification code information of encryption to second server, server can the first identifying code based on the encryption
Information is verified to the second verification code information.In the above-described embodiments, even first server and second server
In the case of not being same server, second server from first server without obtaining the first verification code information, second
Server can directly using terminal send the first verification code information the second verification code information is verified, without two
Information exchange between individual server, so as in first server and the trans-regional checking of second server, also be not present
Time delay, can quickly realize the checking to identifying code, there is checking time delay when solving the checking of prior art mid span area
The problem of.
Code carrier in above-described embodiment can be identifying code picture, that is, carry the picture of verification code information, e.g.,
First server can first generate the character of the first verification code information, and the character of first verification code information is turned round at random
Turn, the character after torsion write on painting canvas, generate picture, the picture is the above-mentioned picture for carrying identifying code,
Also it is code carrier.
The first verification code information in above-described embodiment can be the character information carried on the code carrier, such as one
The information carried on identifying code picture is " 1234 ", then first verification code information is " 1234 ".
Specifically, in the above-described embodiments, terminal (such as logging request, places an order in request access target application server
Request or registration request) after, receive the URL addresses (verifying resource address) for accessing first server, base
Asked in URL generations first, first server is received after the first request of terminal transmission, and first server is rung
The response of code carrier and corresponding first verification code information of code carrier should at least be included in the first request, generation
Information, after the response message is generated, the response message is sent to terminal, the terminal receives first server
Response message after, by the code carrier in the response message include on the screen of terminal, user can pass through
The input frame on terminal screen is operated to input the second verification code information.Terminal is obtained after second verification code information, will
Encryption the first verification code information and input the second verification code information, and application account and password send in the lump to should
With program, the application program uses application account and password to carry out authentication to terminal, and the application program is also by second
Verification code information and the first verification code information of encryption are sent to second server, and second server first is verified using this
Code information is verified to the second verification code information.
Wherein, the second server is based on application account determination, and such as destination application server judges that this belongs to using account
Account in Shanghai, then send the checking request (the i.e. second request) to the second server for being deployed in Shanghai.
In above-described embodiment, it is desirable to the first verification code information be cryptographically stored in user terminal (i.e. above-described embodiment
In terminal), and when terminal request is verified, while by the first verification code information of encryption and the second identifying code of input
Information is submitted to server end in the lump, has both reached data confidentiality effect, cross-region KV server datas is solved again same
The risk that step time delay is brought, realizes the verification code system of cross-region deployment.
It will appreciated by the skilled person that the structure shown in Figure 13 is only signal, terminal can also be
Smart mobile phone (such as Android phone, iOS mobile phones), tablet personal computer, applause computer and mobile internet device
The terminal device such as (Mobile Internet Devices, MID), PAD.Figure 13 its not to above-mentioned electronic installation
Structure cause limit.For example, terminal may also include the component more or less than shown in Figure 13 (such as
Network interface, display device etc.), or with the configuration different from shown in Figure 13.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can be with
Completed by program come the device-dependent hardware of command terminal, the program can be stored in a computer-readable storage medium
In matter, storage medium can include:Flash disk, read-only storage (Read-Only Memory, ROM), deposit at random
Take device (Random Access Memory, RAM), disk or CD etc..
Embodiment 7
Embodiments herein additionally provides a kind of storage medium.Alternatively, in the present embodiment, above-mentioned storage medium
It can be used for preserving the program code performed by the verification method for the identifying code that above-described embodiment one is provided.
Alternatively, in the present embodiment, above-mentioned storage medium can be located in computer network Computer terminal group
In any one terminal, or in any one mobile terminal in mobile terminal group.
Alternatively, in the present embodiment, storage medium is arranged to the program code that storage is used to perform following steps:
Step S1:The first request that first server receiving terminal is sent, wherein, first asks to test for acquisition request
Demonstrate,prove code;
Step S2:First server generates response message in response to the first request, wherein, at least wrapped in response message
Include code carrier and corresponding first verification code information of code carrier;
Step S3:First verification code information of code carrier and encryption is at least back to terminal by first server, its
In, code carrier is used for instruction terminal and inputs the second verification code information, and the first verification code information of encryption is used for second
The second checking information in the second request that server is sent to terminal is verified.
Alternatively, in the present embodiment, storage medium is arranged to the program code that storage is used to perform following steps:
Step S4:The second request that second server receiving terminal is sent, wherein, carry encryption in the second request
First verification code information and the second verification code information, second asks for asking the first verification code information pair using encryption
Second verification code information is verified that the first verification code information of encryption is sent to terminal, second for first server
The information that verification code information is inputted for terminal based on the code carrier that first server is sent, code carrier and
One verification code information is corresponding;
Step S5:Second server is in response to the second request, using the first verification code information of encryption to the second identifying code
Information is verified.
Alternatively, in the present embodiment, storage medium is arranged to the program code that storage is used to perform following steps:
Step S6:Terminal sends first to first server and asked, wherein, first asks to be used for acquisition request identifying code;
Step S7:Terminal receives the response message that first server is returned in response to the first request, wherein, response message
In at least include code carrier and encryption the first verification code information;
Step S8:Terminal is based on code carrier and obtains the second verification code information;
Step S9:Terminal generation second is asked, and at least includes the first of the second verification code information and encryption in the second request
Verification code information;
Step S10:Terminal sends the second request to second server, wherein, second asks for utilizing encryption
First verification code information is verified to the second verification code information.
Using the embodiment of the present application, first server is when code carrier is sent to terminal, while will encryption
The first verification code information send to terminal, terminal is when request is verified to the second verification code information of input, one
And send the first verification code information of encryption to second server, server can the first identifying code based on the encryption
Information is verified to the second verification code information.In the above-described embodiments, even first server and second server
In the case of not being same server, second server from first server without obtaining the first verification code information, second
Server can directly using terminal send the first verification code information the second verification code information is verified, without two
Information exchange between individual server, so as in first server and the trans-regional checking of second server, also be not present
Time delay, can quickly realize the checking to identifying code, there is checking time delay when solving the checking of prior art mid span area
The problem of.
Code carrier in above-described embodiment can be identifying code picture, that is, carry the picture of verification code information, e.g.,
First server can first generate the character of the first verification code information, and the character of first verification code information is turned round at random
Turn, the character after torsion write on painting canvas, generate picture, the picture is the above-mentioned picture for carrying identifying code,
Also it is code carrier.
The first verification code information in above-described embodiment can be the character information carried on the code carrier, such as one
The information carried on identifying code picture is " 1234 ", then first verification code information is " 1234 ".
Specifically, in the above-described embodiments, terminal (such as logging request, places an order in request access target application server
Request or registration request) after, receive the URL addresses (verifying resource address) for accessing first server, base
Asked in URL generations first, first server is received after the first request of terminal transmission, and first server is rung
The response of code carrier and corresponding first verification code information of code carrier should at least be included in the first request, generation
Information, after the response message is generated, the response message is sent to terminal, the terminal receives first server
Response message after, by the code carrier in the response message include on the screen of terminal, user can pass through
The input frame on terminal screen is operated to input the second verification code information.Terminal is obtained after second verification code information, will
Encryption the first verification code information and input the second verification code information, and application account and password send in the lump to should
With program, the application program uses application account and password to carry out authentication to terminal, and the application program is also by second
Verification code information and the first verification code information of encryption are sent to second server, and second server first is verified using this
Code information is verified to the second verification code information.
Wherein, the second server is based on application account determination, and such as destination application server judges that this belongs to using account
Account in Shanghai, then send the checking request (the i.e. second request) to the second server for being deployed in Shanghai.
In above-described embodiment, it is desirable to the first verification code information be cryptographically stored in user terminal (i.e. above-described embodiment
In terminal), and when terminal request is verified, while by the first verification code information of encryption and the second identifying code of input
Information is submitted to server end in the lump, has both reached data confidentiality effect, cross-region KV server datas is solved again same
The risk that step time delay is brought, realizes the verification code system of cross-region deployment.
Above-mentioned the embodiment of the present application sequence number is for illustration only, and the quality of embodiment is not represented.
In above-described embodiment of the application, the description to each embodiment all emphasizes particularly on different fields, and does not have in some embodiment
The part of detailed description, may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed client, others can be passed through
Mode is realized.Wherein, device embodiment described above is only schematical, such as division of described unit,
It is only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component
Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.It is another, institute
Display or the coupling each other discussed or direct-coupling or communication connection can be by some interfaces, unit or mould
The INDIRECT COUPLING of block or communication connection, can be electrical or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to
On multiple NEs.Some or all of unit therein can be selected to realize the present embodiment according to the actual needs
The purpose of scheme.
In addition, each functional unit in the application each embodiment can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.It is above-mentioned integrated
Unit can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is realized using in the form of SFU software functional unit and as independent production marketing or used
When, it can be stored in a computer read/write memory medium.Understood based on such, the technical scheme of the application
The part substantially contributed in other words to prior art or all or part of the technical scheme can be produced with software
The form of product is embodied, and the computer software product is stored in a storage medium, including some instructions are to make
Obtain a computer equipment (can be personal computer, server or network equipment etc.) and perform each implementation of the application
The all or part of step of example methods described.And foregoing storage medium includes:USB flash disk, read-only storage (ROM,
Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic
Dish or CD etc. are various can be with the medium of store program codes.
Described above is only the preferred embodiment of the application, it is noted that for the ordinary skill people of the art
For member, on the premise of the application principle is not departed from, some improvements and modifications can also be made, these improve and moistened
Decorations also should be regarded as the protection domain of the application.
Claims (19)
1. a kind of verification method of identifying code, it is characterised in that including:
The first request that first server receiving terminal is sent, wherein, described first asks to test for acquisition request
Demonstrate,prove code;
The first server generates response message in response to the described first request, wherein, the response message
In at least include code carrier and corresponding first verification code information of the code carrier;
First verification code information of the code carrier and encryption is at least back to described by the first server
Terminal, wherein, the code carrier is used to indicate that the terminal inputs the second verification code information, the encryption
The first verification code information be used for second server the terminal is sent second request in it is described second verify
Information is verified.
2. according to the method described in claim 1, it is characterised in that generation response message includes:
The first server reads the code carrier and described first from corresponding key assignments data storage storehouse
Verification code information;
The session information and first verification code information carried in asking described first is encrypted, and is added
Close session information and the first verification code information of the encryption;
Session information based on the encryption, the first verification code information of the encryption and the code carrier,
Generate the response message.
3. method according to claim 2, it is characterised in that in the first server at least by the identifying code
While carrier and the first verification code information of encryption are back to the terminal, methods described also includes:
The first server sends the session information of the encryption to the terminal, wherein, the encryption
Session information and the first verification code information of the encryption judge that second request is for the second server
No is playback request.
4. method according to claim 2, it is characterised in that the session information carried in first request includes:
Session number or session id.
5. method as claimed in any of claims 1 to 4, it is characterised in that the code carrier includes:
Identifying code picture.
6. a kind of verification method of identifying code, it is characterised in that including:
The second request that second server receiving terminal is sent, wherein, carry encryption in second request
First verification code information and the second verification code information, described second asks for asking first using the encryption
Verification code information verifies that the first verification code information of the encryption is first to second verification code information
Server is sent to the terminal, and second verification code information is that the terminal is based on the first server
The code carrier of transmission and the information inputted, the code carrier are corresponding with first verification code information;
The second server is in response to the described second request, using the first verification code information of the encryption to institute
The second verification code information is stated to be verified.
7. method according to claim 6, it is characterised in that using the first verification code information of the encryption to institute
Stating the progress checking of the second verification code information includes:
First verification code information of the encryption is decrypted the second server, obtains first checking
Code information;
If first verification code information is consistent with second verification code information, the second server checking
Go out second verification code information correct;
If first verification code information and second verification code information are inconsistent, the second server is tested
Demonstrate,prove out second verification code information incorrect.
8. method according to claim 6, it is characterised in that first clothes are also carried in second request
Business device is sent to the session information of the encryption of the terminal, wherein, believe using the first identifying code of the encryption
After breath is verified to second verification code information, methods described also includes:
The session information and first verification code information are saved into corresponding key assignments and deposited by the second server
Store up database.
9. the method according to any one in claim 6 to 8, it is characterised in that also taken in second request
The session information of the encryption of the terminal is sent to the first server, wherein,
Before being verified using the first verification code information of the encryption to second verification code information, institute
Stating method also includes:In corresponding key assignments data storage storehouse, search whether that record has and the session information pair
That answers has deposited verification code information;Find it is corresponding with the session information deposited verification code information in the case of,
The second server determines that second request is playback request;It is corresponding with the session information not finding
Deposited verification code information in the case of, the second server determine it is described second request for the playback please
Ask;
Carrying out checking to second verification code information using the first verification code information of the encryption includes:Institute
State the second request not be the playback request in the case of, using the first verification code information of the encryption to described
Second verification code information is verified.
10. a kind of verification method of identifying code, it is characterised in that including:
Terminal sends first to first server and asked, wherein, described first asks to be used for acquisition request identifying code;
The terminal receives the response message that the first server is returned in response to the described first request, wherein,
At least include the first verification code information of code carrier and encryption in the response message;
The terminal is based on the code carrier and obtains the second verification code information;
The terminal generation second is asked, and at least includes second verification code information and institute in second request
State the first verification code information of encryption;
The terminal sends the described second request to second server, wherein, described second asks to be used to utilize
First verification code information of the encryption is verified to second verification code information.
11. method according to claim 10, it is characterised in that send the first request to first server in terminal
Before, methods described also includes:
The terminal sends access request to destination application server;
The terminal receives the checking resource address that the destination application server is returned, wherein, the checking money
Source address points to the first server.
12. method according to claim 10, it is characterised in that the request of terminal generation second includes:
The terminal is tested based on second verification code information inputted by the terminal, the first of the encryption
Demonstrate,prove code information, application account and password generation second request for access target application server.
13. method according to claim 12, it is characterised in that the terminal sends the described second request to second
Server includes:
The terminal sends the described second request to the destination application server, wherein, second request
In the application account and the password be used to verify the legitimacy of the terminal, the institute in second request
Stating the first verification code information and second verification code information is used to be sent to described by the destination application server
Second server.
14. method according to claim 12, it is characterised in that the terminal receive the first server in response to
After the response message that first request is returned, methods described also includes:The terminal is by the of the encryption
One verification code information is stored in the Hidden field of the page.
15. a kind of checking system of identifying code, it is characterised in that including:
First server, the first request sent for receiving terminal, wherein, described first asks to be used to ask
Identifying code is obtained, and in response to the described first request, generates response message, wherein, in the response message extremely
Include code carrier and corresponding first verification code information of the code carrier less;The first server is also
For the first verification code information of the code carrier and encryption at least to be back into the terminal;
Second server, for receiving the second request that the terminal is sent, wherein, taken in second request
The first verification code information and the second verification code information with the encryption, described second asks to be used to ask to utilize
First verification code information of the encryption verifies that second identifying code is believed to second verification code information
Cease the information inputted for the terminal based on the code carrier that the first server is sent;Second clothes
Business device is additionally operable to, in response to the described second request, test described second using the first verification code information of the encryption
Card code information is verified.
16. system according to claim 15, it is characterised in that
The first server, is additionally operable in the first server at least by the code carrier and encryption
While first verification code information is back to the terminal, the session information of encryption is sent to the terminal;
The second server, is additionally operable to after the second request of the terminal is received, utilizes described second
The session information of the encryption in request and the first verification code information of the encryption judge that second request is
No is playback request.
17. the checking device of a kind of identifying code, it is characterised in that be arranged in first server, including:
First receiving unit, the first request sent for receiving terminal, wherein, described first asks to be used to ask
Seek acquisition identifying code;
First response unit, in response to the described first request, generating response message, wherein, the response
At least include code carrier and corresponding first verification code information of the code carrier in information;
First returning unit, is at least tested for the first server by the first of the code carrier and encryption
Card code information is back to the terminal, wherein, the code carrier is used to indicate that the terminal input second is tested
Code information is demonstrate,proved, the first verification code information of the encryption is asked for second server is sent to the terminal second
Second checking information in asking is verified.
18. the checking device of a kind of identifying code, it is characterised in that be arranged on second server, including:
Second receiving unit, the second request sent for receiving terminal, wherein, carried in second request
There are the first verification code information and the second verification code information of encryption, described second asks to be used to ask to add using described
The first close verification code information verifies that the first identifying code of the encryption is believed to second verification code information
Cease and be sent to the terminal for first server, second verification code information is that the terminal is based on described the
Code carrier that one server is sent and the information that inputs, the code carrier are believed with first identifying code
Manner of breathing correspondence;
Second response unit, for the second server in response to the described second request, utilizes the encryption
First verification code information is verified to second verification code information.
19. the checking device of a kind of identifying code, it is characterised in that be arranged in terminal, including:
First transmitting element, is asked for sending first to first server, wherein, described first asks to be used for
Acquisition request identifying code;
3rd receiving unit, believes for receiving the response that the first server is returned in response to the described first request
Breath, wherein, the first verification code information of code carrier and encryption is at least included in the response message;
Acquiring unit, for obtaining the second verification code information based on the code carrier;
Generation unit, is asked for generating second, and at least including second identifying code in second request believes
Breath and the first verification code information of the encryption;
Second transmitting element, for the described second request to be sent to second server, wherein, described second please
Ask and second verification code information is verified for the first verification code information using the encryption.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610151493.8A CN107204959B (en) | 2016-03-16 | 2016-03-16 | Verification method, device and system of verification code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610151493.8A CN107204959B (en) | 2016-03-16 | 2016-03-16 | Verification method, device and system of verification code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107204959A true CN107204959A (en) | 2017-09-26 |
CN107204959B CN107204959B (en) | 2020-07-24 |
Family
ID=59903657
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610151493.8A Active CN107204959B (en) | 2016-03-16 | 2016-03-16 | Verification method, device and system of verification code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107204959B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108769083A (en) * | 2018-08-01 | 2018-11-06 | 北京奇虎科技有限公司 | Login method, apparatus and system based on distributed server |
CN109063456A (en) * | 2018-08-02 | 2018-12-21 | 浙江大学 | The safety detecting method and system of image-type identifying code |
CN112261103A (en) * | 2020-10-16 | 2021-01-22 | 深圳市网心科技有限公司 | Node access method and related equipment |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080301447A1 (en) * | 2007-06-01 | 2008-12-04 | Microsoft Corporation | Secure offline activation process for licensed software application programs |
CN101645890A (en) * | 2009-08-06 | 2010-02-10 | 北京飞天诚信科技有限公司 | Method, system and corresponding equipment for verifying information source integrality |
CN101977194A (en) * | 2010-10-29 | 2011-02-16 | 赵俊平 | Third-party verification code system and third-party verification code provision method |
CN102377784A (en) * | 2011-11-24 | 2012-03-14 | 飞天诚信科技股份有限公司 | Dynamic password identification method and system |
CN102891828A (en) * | 2011-07-18 | 2013-01-23 | 华为软件技术有限公司 | IMS user authentication method, equipment and system |
CN103647645A (en) * | 2013-11-05 | 2014-03-19 | 北京宏基恒信科技有限责任公司 | Method, system and equipment for dynamic password authentication of multiple authentication servers |
CN103685311A (en) * | 2013-12-27 | 2014-03-26 | 网易(杭州)网络有限公司 | Log-in validation method and device |
CN104253687A (en) * | 2013-06-26 | 2014-12-31 | 深圳市腾讯计算机系统有限公司 | Method for reducing verification efficiency, method for generating captcha, correlated system, and server |
CN104519066A (en) * | 2014-12-23 | 2015-04-15 | 飞天诚信科技股份有限公司 | Method for activating token of mobile terminal |
CN104683358A (en) * | 2015-03-26 | 2015-06-03 | 上海众人网络安全技术有限公司 | Anti-repudiation dynamic password generating method and dynamic password verification system |
-
2016
- 2016-03-16 CN CN201610151493.8A patent/CN107204959B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080301447A1 (en) * | 2007-06-01 | 2008-12-04 | Microsoft Corporation | Secure offline activation process for licensed software application programs |
CN101645890A (en) * | 2009-08-06 | 2010-02-10 | 北京飞天诚信科技有限公司 | Method, system and corresponding equipment for verifying information source integrality |
CN101977194A (en) * | 2010-10-29 | 2011-02-16 | 赵俊平 | Third-party verification code system and third-party verification code provision method |
CN102891828A (en) * | 2011-07-18 | 2013-01-23 | 华为软件技术有限公司 | IMS user authentication method, equipment and system |
CN102377784A (en) * | 2011-11-24 | 2012-03-14 | 飞天诚信科技股份有限公司 | Dynamic password identification method and system |
CN104253687A (en) * | 2013-06-26 | 2014-12-31 | 深圳市腾讯计算机系统有限公司 | Method for reducing verification efficiency, method for generating captcha, correlated system, and server |
CN103647645A (en) * | 2013-11-05 | 2014-03-19 | 北京宏基恒信科技有限责任公司 | Method, system and equipment for dynamic password authentication of multiple authentication servers |
CN103685311A (en) * | 2013-12-27 | 2014-03-26 | 网易(杭州)网络有限公司 | Log-in validation method and device |
CN104519066A (en) * | 2014-12-23 | 2015-04-15 | 飞天诚信科技股份有限公司 | Method for activating token of mobile terminal |
CN104683358A (en) * | 2015-03-26 | 2015-06-03 | 上海众人网络安全技术有限公司 | Anti-repudiation dynamic password generating method and dynamic password verification system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108769083A (en) * | 2018-08-01 | 2018-11-06 | 北京奇虎科技有限公司 | Login method, apparatus and system based on distributed server |
CN109063456A (en) * | 2018-08-02 | 2018-12-21 | 浙江大学 | The safety detecting method and system of image-type identifying code |
CN109063456B (en) * | 2018-08-02 | 2021-10-08 | 浙江大学 | Security detection method and system for image type verification code |
CN112261103A (en) * | 2020-10-16 | 2021-01-22 | 深圳市网心科技有限公司 | Node access method and related equipment |
Also Published As
Publication number | Publication date |
---|---|
CN107204959B (en) | 2020-07-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7434342B2 (en) | Container builder for personalized network services | |
CN106657152A (en) | Authentication method, server and access control device | |
US9372987B1 (en) | Apparatus and method for masking a real user controlling synthetic identities | |
CN110351228A (en) | Remote entry method, device and system | |
CN106503589A (en) | The method of calibration of block chain Transaction Information correctness, apparatus and system | |
CN106161392A (en) | A kind of auth method and equipment | |
CN103780396B (en) | Token acquisition methods and device | |
US9680812B1 (en) | Enrolling a user in a new authentication procdure only if trusted | |
CN110519268B (en) | Voting method, device, equipment, system and storage medium based on block chain | |
CN108200089A (en) | Implementation method, device, system and the storage medium of information security | |
CN106302332B (en) | Access control method, the apparatus and system of user data | |
CN108076056A (en) | Cloud server login method and device | |
CN113079134A (en) | Mobile terminal access method, mobile terminal access device, computer equipment and medium | |
CN106156133A (en) | Method that control table substance is submitted to again, Apparatus and system | |
CN107547565A (en) | A kind of network access verifying method and device | |
CN107612901A (en) | One kind applies encryption method and terminal | |
CN105992204A (en) | Access authentication method of applications of mobile intelligent terminal and device | |
CN105099983B (en) | authorization method, authority setting method and device | |
CN110399717A (en) | Key acquisition method and device, storage medium and electronic device | |
CN110120928A (en) | A kind of identity authentication method, device, server and computer-readable medium | |
CN107204959A (en) | Verification method, the apparatus and system of identifying code | |
CN105337739B (en) | Safe login method, device, server and terminal | |
CN107172027A (en) | Certificate management method, storage device, storage medium and device | |
CN106850865A (en) | The distribution method of MAC Address, apparatus and system | |
CN107241292B (en) | Vulnerability detection method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1244968 Country of ref document: HK |
|
GR01 | Patent grant | ||
GR01 | Patent grant |