CN107872435A - A kind of method and device of safety verification - Google Patents
A kind of method and device of safety verification Download PDFInfo
- Publication number
- CN107872435A CN107872435A CN201610856756.5A CN201610856756A CN107872435A CN 107872435 A CN107872435 A CN 107872435A CN 201610856756 A CN201610856756 A CN 201610856756A CN 107872435 A CN107872435 A CN 107872435A
- Authority
- CN
- China
- Prior art keywords
- tile
- verification
- instruction
- target
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 295
- 238000000034 method Methods 0.000 title claims abstract description 67
- 230000004044 response Effects 0.000 claims abstract description 92
- 238000012545 processing Methods 0.000 claims description 87
- 230000002452 interceptive effect Effects 0.000 claims description 17
- 238000010200 validation analysis Methods 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 18
- 230000003993 interaction Effects 0.000 description 14
- 230000008569 process Effects 0.000 description 12
- 238000004891 communication Methods 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 6
- 238000004458 analytical method Methods 0.000 description 5
- 238000004590 computer program Methods 0.000 description 5
- 230000009471 action Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000004927 fusion Effects 0.000 description 3
- 238000007639 printing Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000009191 jumping Effects 0.000 description 2
- 230000033001 locomotion Effects 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000006748 scratching Methods 0.000 description 1
- 230000002393 scratching effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of method of safety verification, including:Checking instruction is sent to second terminal, wherein, the checking instruction carries:The reference segment element of original image, the target segment element of original image and at least one interference segment element;Wherein, it is described to form the original image with reference to segment element and the target segment element;When receiving auth response corresponding to the checking instruction, the pattern information that the auth response carries is obtained;When it is determined that verifying that segment element is consistent with the target segment element corresponding to the pattern information that the auth response carries, it is determined that being proved to be successful.The invention also discloses a kind of device of safety verification.
Description
Technical Field
The present invention relates to the field of communications, and in particular, to a method and an apparatus for security verification.
Background
Under the background of the era of 'internet +', the three-network fusion technology is expected to be developed steadily, the multi-screen fusion technology of computers, PCs, tablets, mobile phones and the like is a main breakthrough direction, the market demand pushes the birth of the related technology, and the method still has many functional directions on how to safely realize the fusion of contents, networks and terminals.
The authentication codes currently used for security authentication are mainly classified into the following types:
(1) standard identifying code (knowledge type identifying code)
Namely, the first generation verification code, which is a common image verification code and a common voice verification code, has computer vision and voice recognition problems which are difficult to process by machines. For the verification code used for identity verification, the knowledge type verification code needs manual processing, the graphic verification code is easily recognized by a machine along with the development of the technology, if the graphic difficulty is improved to decipher, certain use limitation is provided for a user, and the operation is time-consuming and labor-consuming.
(2) Knowledge-free verification code
And judging whether the human or the machine is based on the inherent biological characteristics of the human and the comprehensive decision of the environmental information of the operation. The non-knowledge type verification code does not need human thinking, does not interrupt the operation of the user, and can provide better user experience. With the development of technology, OCR technology has made it possible to easily decipher the authentication code, and authentication has become no longer as secure as might be imagined.
Therefore, a technical solution for security verification is needed to perform security verification with high security.
Disclosure of Invention
In view of the above, it is desirable to provide a method and an apparatus for security verification, which can perform security verification with high security.
The technical scheme of the embodiment of the invention is realized as follows:
the embodiment of the invention provides a safety verification method, which comprises the following steps:
sending a verification instruction to a second terminal, wherein the verification instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interfering tile element;
when a verification response corresponding to the verification instruction is received, obtaining the image block information carried by the verification response;
and when the verification image block element corresponding to the image block information carried by the verification response is determined to be consistent with the target image block element, determining that the verification is successful.
In the above scheme, before sending the verification instruction, the method further includes:
dividing the original picture into at least two tile elements; wherein at least one tile element is a target tile element, and the other tile elements of the at least two tile elements except the target tile element are reference tile elements.
In the foregoing solution, the determining that the verification tile element corresponding to the tile information carried in the verification response is consistent with the target tile element includes:
determining that tile information of the verification tile element is consistent with tile information of the target tile element; wherein the tile information comprises a tile identification and/or a location identification.
In the above aspect, the method further includes:
receiving a first sliding operation; and performing tile processing on the target tile element according to a first tile processing instruction corresponding to the first sliding operation.
In the above scheme, before determining that the verification is successful, the method further includes:
determining a second image block processing instruction according to the sliding track information carried by the verification response;
determining that the second tile processing instruction is a processing instruction having a predetermined relationship with the first tile processing instruction.
In the above aspect, the method further includes:
sending a protocol searching instruction;
receiving a search response instruction corresponding to the protocol search instruction, wherein the search response instruction carries protocol type information of the second terminal;
and calling a protocol corresponding to the protocol type information to establish connection with the second terminal.
The embodiment of the invention provides a safety verification method, which comprises the following steps:
receiving a verification instruction from a first terminal; wherein, the verification instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interfering tile element;
receiving a selection operation, determining a verification tile element from the target tile element and the interference tile element based on the selection operation;
and carrying the tile block information of the verification tile block element in a verification response and sending the verification response to the first terminal.
In the above aspect, the method further includes:
receiving a verification success message; and the verification success message is sent when the first terminal determines that the verification image block element is consistent with the target image block element.
In the above aspect, the method further includes:
carrying sliding operation information corresponding to the second sliding operation received by the verification image block element in the verification response and sending the verification response to the first terminal; and the target image block element is the image block element subjected to image block processing.
In the above aspect, the method further includes:
receiving a protocol searching instruction, and inquiring the protocol type supported by the protocol searching instruction;
and carrying the protocol type information corresponding to the protocol type in the search response instruction and sending the search response instruction to the first terminal.
In the above aspect, the method further includes:
displaying the reference picture block element in a first display window, and reserving a position corresponding to the target picture block element in the first window;
displaying the target tile element and the disturbing tile element in a second display window.
In order to implement the foregoing method, an embodiment of the present invention provides a device for security verification, where the device includes: the device comprises a first sending unit, a first receiving unit and a verification unit; wherein,
the first sending unit is configured to send a verification instruction to a second terminal, where the verification instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interfering tile element;
the first receiving unit is used for acquiring the image block information carried by the verification response when the verification response corresponding to the verification instruction is received;
and the verification unit is used for determining that verification succeeds when the verification image block element corresponding to the image block information carried by the verification response is determined to be consistent with the target image block element.
In the above solution, the apparatus further comprises: a dividing unit for:
dividing the original picture into at least two tile elements; wherein at least one tile element is a target tile element, and the other tile elements of the at least two tile elements except the target tile element are reference tile elements.
In the above scheme, the determining, by the verification unit, that a verification tile element corresponding to the tile information carried in the verification response is consistent with the target tile element includes:
determining that tile information of the verification tile element is consistent with tile information of the target tile element;
wherein the tile information comprises a tile identification and/or a location identification.
In the above solution, the apparatus further comprises: a tile processing unit to:
receiving a first sliding operation;
and performing tile processing on the target tile element according to a first tile processing instruction corresponding to the first sliding operation.
In the foregoing solution, the verification unit is further configured to:
determining a second image block processing instruction according to the sliding track information carried by the verification response;
determining that the second tile processing instruction is a processing instruction having a predetermined relationship with the first tile processing instruction.
In the above solution, the apparatus further comprises: a first protocol determination unit to:
sending a protocol searching instruction;
receiving a search response instruction corresponding to the protocol search instruction, wherein the search response instruction carries protocol type information of the second terminal;
and calling a protocol corresponding to the protocol type information to establish connection with the second terminal.
In order to implement the foregoing method, an embodiment of the present invention provides a security verification apparatus, where the apparatus includes: the device comprises a second receiving unit, a selecting unit and a second sending unit; wherein,
the second receiving unit is used for receiving the verification instruction from the first terminal; wherein, the verification instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interfering tile element;
the selection unit is used for receiving a selection operation, and determining verification tile elements from the target tile elements and the interference tile elements based on the selection operation;
and the second sending unit is used for carrying the tile block information of the verification tile block element in a verification response and sending the verification response to the first terminal.
In the foregoing scheme, the second receiving unit is further configured to:
receiving a verification success message; and the verification success message is sent when the first terminal determines that the verification image block element is consistent with the target image block element.
In the foregoing scheme, the second sending unit is further configured to: carrying a second graphic block processing instruction corresponding to a second sliding operation received by the verification graphic block element in the verification response and sending the verification response to the first terminal; and the target image block element is the image block element subjected to image block processing.
In the above solution, the apparatus further comprises: a second protocol determination unit to:
receiving a protocol searching instruction, and inquiring the protocol type supported by the protocol searching instruction;
and carrying the protocol type information corresponding to the protocol type in the search response instruction and sending the search response instruction to the first terminal.
In the above solution, the apparatus further comprises: a display unit for:
displaying the reference picture block element in a first display window, and reserving a position corresponding to the target picture block element in the first window;
displaying the target tile element and the disturbing tile element in a second display window.
The method and the device for safety verification of the embodiment of the invention send a verification instruction to the second terminal, wherein the verification instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interfering tile element; when a verification response corresponding to the verification instruction is received, obtaining the image block information carried by the verification response; and when the verification image block element corresponding to the image block information carried by the verification response is determined to be consistent with the target image block element, determining that the verification is successful. Therefore, in the process of safety verification, the reference image block element, the target image block element and the interference image block element which are contained in the original picture are sent to the second terminal which receives verification together, the verification image block element and the target image block element which are received from the second terminal are compared, and when the two are consistent, the verification is determined to be successful, so that the machine is difficult to find out the target element which can form the original picture with the reference image block element from the target image block element and the interference image block element, the matching cannot be automatically completed, the verification scheme capable of resisting the machine is provided, and the safety of the verification process is improved.
Drawings
Fig. 1 is a schematic flowchart of a security verification method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a security verification method according to a second embodiment of the present invention;
FIG. 3 is a diagram illustrating an arrangement of reference block elements according to a second embodiment of the present invention;
FIG. 4 is a diagram illustrating an arrangement of elements of another reference block according to a second embodiment of the present invention;
FIG. 5 is a diagram of non-tile processed and tile processed target tile elements according to a second embodiment of the present invention;
fig. 6 is an information interaction diagram of a device search phase and a protocol discovery phase of a source terminal and a target terminal according to a third embodiment of the present invention;
fig. 7 is a schematic flowchart of an authentication process between a source terminal and a target terminal according to a third embodiment of the present invention;
fig. 8 is a schematic interface display diagram of a target terminal according to a third embodiment of the present invention;
fig. 9 is a schematic structural diagram of a security verification apparatus according to a fourth embodiment of the present invention;
fig. 10 is a schematic structural diagram of another security authentication apparatus according to a fourth embodiment of the present invention;
fig. 11 is a schematic structural diagram of a security verification apparatus according to a fifth embodiment of the present invention;
fig. 12 is a schematic structural diagram of a security verification apparatus according to a sixth embodiment of the present invention;
fig. 13 is a schematic structural diagram of another security verification apparatus according to a sixth embodiment of the present invention.
Detailed Description
The following describes the embodiments in further detail with reference to the accompanying drawings.
Example one
An embodiment of the present invention provides a method for security verification, which is applied to a first terminal, and as shown in fig. 1, the method includes:
s101, sending a verification instruction to a second terminal, wherein the verification instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interfering tile element;
here, the first terminal acts as a master of the security authentication, and initiates a security authentication process by sending an authentication instruction to the second terminal. Here, the first terminal may include: a server, a router, a computer, a mobile phone and other terminals. In a multi-screen interaction scene, a first terminal serves as a source terminal and sends a verification instruction to a second terminal serving as a sharing terminal.
Before sending the validation instruction, the method further comprises: dividing the original picture into at least two tile elements; wherein at least one tile element is a target tile element, and the other tile elements of the at least two tile elements except the target tile element are reference tile elements. The original picture is a complete picture, the original picture is divided into M parts of picture block elements, M is greater than 1, one part of the M parts is used as a target picture block element, and picture block elements except the target picture block element in the M parts are used as reference picture block elements. When the first terminal sends the reference element and the target element picture block to the second terminal, for the reference picture block element, the target picture block element is located at a vacant position of the reference picture block element relative to the original picture. Namely, when the original picture is displayed on the second terminal, the position corresponding to the target picture block element in the original picture is vacant, and only the reference picture block element is displayed.
Here, the target tile element may be one or more, and when the target tile element is plural, the corresponding target tile element may be identified by different identifications.
And after the reference image block element and the target image block element are determined, acquiring at least one interference image block element which is not related to the target image block element, wherein the interference image block element is used for being displayed on a display window together with the target image block as an interference factor for searching the target image block element on the second terminal by a user.
Here, the method further includes: receiving a first sliding operation; performing tile processing on the target tile element according to a first tile processing instruction of the first sliding operation; wherein the first sliding operation is a sliding operation received by the first terminal. After the target tile element is determined, a first sliding operation of the user can be received, and the target tile element is processed according to the tile processing instruction corresponding to the first sliding operation. The sliding operation may include operations such as clicking, double-clicking, left-scribing, right-scribing, grabbing, and the corresponding tile processing instruction may include: the processing instructions such as rotation and turning can determine the processing parameters such as direction and angle corresponding to the tile block processing instruction according to the sliding track and the pressure of the sliding operation, so that different tile block processing is performed on target tile block elements according to different sliding operations, for example: when the received sliding operation is upward sliding, the corresponding image block processing instruction is upward overturning, and upward overturning processing is carried out on the target image block element; when the received sliding operation is downward sliding, the corresponding image block processing instruction is downward overturning, and downward overturning processing is carried out on the target image block element; when the received sliding operation is a left rotation operation, the corresponding tile block processing instruction is to rotate 90 degrees to the left, and the target tile block element is processed by rotating 90 degrees to the left.
Here, when the first terminal sends the target tile element to the second terminal, the target tile element which is not subjected to tile processing may be sent, and the target tile element which is subjected to tile processing may also be sent.
When the first terminal needs to verify the second terminal, the reference image block element, the target image block element and the interference image block element are obtained, a verification instruction is triggered to be generated, and the obtained image block elements are carried in the verification instruction and are sent to the first terminal. The transmitted reference tile element may include a plurality of reference tile elements, and in this case, the verification instruction may carry location information of each reference tile element, where the location information is location information displayed in the second terminal after being transmitted to the second terminal. The position information corresponding to each reference picture block element can be determined according to the position of each reference picture block element in the original picture. In the process of determining the position information, the position information can be determined according to the corresponding position of each reference picture block element in the original picture, or the position information can be determined by the position obtained by disordering the original corresponding position of each reference picture block element in the original picture.
When the target image block elements and the reference image block elements are sent through the verification instruction, the target image block elements and the interference image block elements can be respectively identified through target image block element identifications and interference image block element identifications, wherein the sent target image block identifications can also be multiple and are represented through corresponding image block information such as image block identifications, position identifications and the like. In the verification instruction, sorting information of the target tile block elements and the reference tile block elements can be carried, so that the second terminal can sort and display the target tile block elements and the reference tile block elements according to the sorting information.
Here, in the verification instruction, the reference tile element, the target tile element, and the interference tile element may be distinguished by different picture tags.
And after the second terminal receives the verification instruction sent by the first terminal, analyzing the verification instruction to obtain a reference image block element, a target image block element and an interference image block element carried by the verification instruction, and displaying the image block elements. When the second terminal displays the reference tile element and the target tile element, the reference tile element is displayed in one display window, and the target tile element and the interference tile element are displayed together in the other window. And when the second terminal determines to verify the image block elements, sending the image block information of the verification image block elements to the first terminal through the verification response as a response to the verification instruction.
S102, when a verification response corresponding to the verification instruction is received, obtaining image block information carried by the verification response;
and when the first terminal receives the verification response, analyzing the verification response to obtain the image block information carried by the verification instruction. Here, the block element carried by the verification instruction is an identifier of a block element in the target block element and the interference block element selected by the second terminal according to the selection operation received by the second terminal, and is used for representing the verification block element selected by the user from the target block element and the interference block element on the second terminal. Here, the tile information may include a tile identification or a location identification.
S103, when the verification image block element corresponding to the image block information carried by the verification response is determined to be consistent with the target image block element, the verification is determined to be successful.
The first terminal determines the verification image block element selected by the user according to the image block information carried by the verification response, compares the verification image block element with the target image block element, determines whether the verification image block element is consistent with the target image block element, if so, indicates that the selection of the second terminal is correct, determines that the verification is successful, and at this time, can send a verification success message to the second terminal, wherein the verification success message can be a notification message indicating that the verification is successful or a processing command indicating that the terminal executes operation so as to notify the second terminal that the verification is successful.
Here, determining that the verification tile element corresponding to the tile information carried by the verification response is consistent with the target tile element comprises: determining that tile information of the verification tile element is consistent with tile information of the target tile element; wherein the tile information comprises a tile identification and/or a location identification.
Here, it is also possible to determine whether the verification block element and the reference block element can synthesize a complete original picture by placing the verification block element in a vacant position of the reference block with respect to the original picture, that is, placing the verification block element in a position corresponding to the target block element, and in the case that the complete original picture can be synthesized, determining that the verification block element is the target block element to be selected, where the verification block element is consistent with the target block element, and otherwise, the verification block element is not consistent with the target block element.
When the target tile element sent by the first terminal is the tile-processed target tile element, before determining that the verification is successful, the method further comprises: determining the second image block processing instruction according to the sliding track information carried by the verification response; determining that the second tile processing instruction is a processing instruction having a predetermined relationship with the first tile processing instruction. Here, the second tile processing instruction is a tile processing instruction transmitted from the second terminal according to an operation of the user. And performing tile processing on the verification tile elements according to the second tile processing instruction, so that the selected object can return to the original state without the tile processing after being processed by the tile corresponding to the second tile processing instruction again under the condition that the selected object is the target tile subjected to the tile processing. Here, the first tile processing instruction and the second tile processing instruction having a preset relationship may be stored in the terminal in advance, and when the second tile processing instruction is received, it may be searched whether the received second tile processing instruction is a processing instruction having a preset relationship with the stored first tile processing instruction. At this time, not only the verification tile element selected by the user through the second terminal is determined as the target tile element, but also the tile in which the verification tile element is located is correctly identified and processed by the first terminal.
It should be noted that, when the target tile element displayed by the second terminal is processed by the tile, it may also be determined that the received verification tile element is consistent with the target tile element directly according to the tile information.
In an embodiment of the present invention, the method further comprises: sending a protocol searching instruction; and receiving a search response instruction corresponding to the protocol search instruction, wherein the search response instruction carries the protocol type information of the second terminal. And calling a protocol corresponding to the protocol type information to establish connection with the second terminal. Here, before the first terminal and the second terminal send the verification instruction, the protocols used by the first terminal and the second terminal need to be kept consistent, so that the first terminal and the second terminal can perform normal communication. At this time, the first terminal and the second terminal establish a session channel, and send a protocol search instruction through the session channel, so that the second terminal determines the protocol type supported by itself according to the received protocol search instruction, and sends the protocol type information corresponding to the searched protocol type to the first terminal, so that the first terminal can adjust the protocol type used when communicating with the second terminal according to the protocol type supported by the second terminal.
Here, the first terminal may support a plurality of protocol types to perform adaptation of the protocol for different second terminals.
It should be noted that, in the embodiment of the present invention, the verification instruction may carry a plurality of target tile elements, and at this time, the number of the verification tile elements carried in the received verification response is the same as the number of the target tile elements, and the target tile elements to be compared with the verification tile elements are determined by different identifiers. The identifier may be a tile identifier, or may be ordering information or position information corresponding to each target tile element.
In actual use, after the first terminal fails in verification, a verification failure message may be sent to the second terminal to prompt that the verification fails, and a re-verification instruction is sent to the second terminal again, at this time, in the re-verification instruction, each block element is not carried, and a verification block identifier for performing a selection operation again is obtained from the second terminal. And after the verification fails for multiple times, exceeding the input limit and locking the user authority for the second terminal, and automatically unlocking after a period of time.
Example two
In an embodiment of the present invention, a method for security verification is provided, which is applied to a second terminal, and as shown in fig. 2, the method includes:
s201, receiving a verification instruction from a first terminal; wherein, the verification instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interfering tile element;
when the second terminal receives the verification instruction from the first terminal, the verification instruction is analyzed to obtain a reference image block element, a target image block element and an interference image block element which are carried by the verification instruction, at the moment, the reference image block element is displayed in the first display window, the position corresponding to the target image block element is vacant in the first window, and the target image block element and the interference image block element are displayed in the second display window. Here, during the displaying, the reference map block element may be displayed in the first display window according to the position information of the reference map block element carried by the verification instruction. For example: dividing the original picture into 3 x 3 nine equal parts, namely a to I, wherein A, B, C, E, G, H, I is a reference picture block element, D, F is a target picture block element, and when the corresponding position of the target picture block element is vacant in the first display window, only the reference picture block element is displayed. When the reference tile element determines the position information according to the corresponding position of each reference tile element in the original picture, the display is as shown in fig. 3. When the position information is determined by the position obtained by disordering the original corresponding position of each reference image block element in the original picture, the display of the reference image block elements is as shown in fig. 4.
S202, receiving a selection operation, and determining verification tile elements from the target tile elements and the interference tile elements based on the selection operation;
at this time, a selection operation of the user is received, where the selection operation is a selection operation of the user in the second window, and the selected verification tile element is determined from the target tile element and the interference tile element based on the selection operation. Here, when the reference tile element displayed in the first window has vacant positions of the plurality of target tile elements with respect to the original picture, the corresponding verification tile element is selected corresponding to each vacant position.
Here, the target tile element of the second window display may be a tile element subjected to tile processing according to the tile processing instruction. When the target image block element carried by the verification instruction of the first terminal is subjected to image block processing, the target image block element displayed by the second window is the image block processed target image block element. Here, taking the target tile element as F and the tile processing instruction as down-flipping as an example, the non-tile processed target tile element and the tile processed target tile element are as shown in fig. 5.
S203, carrying the tile block information of the verification tile block element in a verification response and sending the verification response to the first terminal.
And sending the tile block information of the verification tile block element selected in the step S202 to the first terminal through a verification response for verification by the first terminal. And when the first terminal is successfully verified, receiving a verification success message, wherein the verification success message is sent when the first terminal determines that the verification image block element is consistent with the image block element, and at the moment, the first terminal is successfully verified.
Here, the method further includes: carrying sliding operation information corresponding to the second sliding operation received by the verification image block element in the verification response and sending the verification response to the first terminal; and the target image block element is the image block element subjected to image block processing. Specifically, when the target image block element is the image block element subjected to image block processing, the selection operation is received, and meanwhile, a second sliding operation for the verification image block element can be received, and sliding operation information corresponding to the second sliding operation is sent to the first terminal through the verification response, so that the first terminal determines a second image block processing instruction according to the received sliding operation information, and the verification image block element is processed.
Before the second terminal receives the verification instruction of the first terminal, the method further comprises: receiving a protocol searching instruction, and inquiring the protocol type supported by the protocol searching instruction; and carrying the protocol type information corresponding to the protocol type in the search response instruction and sending the search response instruction to the first terminal.
The first terminal and the second terminal establish a session channel, a protocol search instruction is sent to the second terminal through the session channel, after the second terminal receives the protocol search instruction, the protocol type supported by the second terminal is determined according to the received protocol search instruction, and the protocol type information corresponding to the protocol type of the second terminal is sent to the first terminal through a search response, so that the first terminal can adjust the protocol type used when communicating with the second terminal according to the protocol type supported by the second terminal.
EXAMPLE III
In this embodiment, a security verification method provided by the embodiment of the present invention is described in an application scenario in which multi-screen interaction is performed, where interaction between a first terminal and a second terminal is divided into a plurality of different stages, where a source terminal is a first terminal and a target terminal is a second terminal.
Here, the interaction between the source terminal and the target terminal is divided into three phases: a device search phase, a protocol discovery phase and a verification phase,
1. in the device search phase: the source terminal establishes a preliminary connection with a device to be accessed (a target terminal) in the same local area network through a simple search protocol: such as a conversation channel. And the source terminal sends a multi-screen interaction request instruction to the target terminal, and the user responds to the source terminal after receiving the instruction and returns an acceptance or rejection result.
2. In the protocol discovery phase, a source terminal sends a protocol search instruction to a target terminal, and the target terminal returns the protocol type supported by the target terminal to the source terminal. And the terminal calls a communication protocol from the bottom layer according to the type of the return protocol and establishes connection with the corresponding target terminal.
The device search phase and the protocol discovery phase are specifically shown in fig. 6, and include:
s601, the source terminal and the target terminal establish a session channel through the wide area network.
S602, the source terminal establishes a local area network session port, informs the port information to the target terminal, and sends a multi-screen interaction request instruction.
And S603, the target terminal returns the result to the source terminal and carries out overtime setting.
And S604, after the source terminal obtains the result, the source terminal continuously sends a protocol searching instruction to the target terminal.
And S605, the source terminal returns to the protocol type, prepares to perform data transmission and waits for the source terminal to send data.
And S606, the source terminal identifies the protocol type and calls a bottom layer protocol to start communication with the target terminal.
S607, the source terminal sends the relevant and irrelevant pictures for identity authentication to the target terminal. The related and unrelated pictures referred to herein are for the original picture, where the related picture includes reference tile elements and target tile elements and the unrelated picture includes interfering tile elements.
3. In the authentication phase, after the source terminal establishes a connection with the target terminal, the source terminal performs user access selection again, selects a device that the source terminal allows to access, triggers the authentication process, as shown in fig. 7,
here, the authentication selects access rights according to the device ID or other identifiers, where the rights include permission to continue accessing the multi-screen interactive system, denial of access, only watching and not sharing, and may be shared with each other.
S701, setting a jigsaw puzzle and storing sliding decoding information by a source terminal;
specifically, the method comprises the following steps: the source terminal divides a complete picture (original picture) into N x N equal parts, cuts out one of the pictures as a target picture block element, puts the cut-out picture and M groups of irrelevant pictures (interference picture block elements) together, records the position information of the picture and keeps the picture, and records the sliding action of the target reference picture block as the basis of unlocking.
Here, taking the example that the original picture is divided into 3 × 3 puzzles, one of the pieces is randomly scratched out, wherein a background picture lacking one piece is shown, the vacant position is the scratching position, the corresponding picture is the target block element, and the picture corresponding to the position having the picture is the reference block element. Here, several unrelated pictures are preset as disturbing tile elements. Here, after the source terminal transmits the reference tile block element, the target tile block element, and the reference tile block element to the target terminal, the display interface of the target terminal is as shown in fig. 8, where the order of the target tile block element and the interference tile block element is scrambled. The user needs to select the piece of the tile missing from the first window above in the lower window and drag to the top to complete the puzzle.
The source terminal saves the action process to simplify the subsequent verification process.
S702, the source terminal sends related pictures and unrelated pictures;
when the verification is performed, the source terminal sends pictures for selection (including the target picture and other irrelevant pictures) to the target device.
S703, the target terminal selects a target picture, namely a sliding action, and returns the target picture to the source terminal;
and when the target equipment receives the pictures, the picture information selected by the user, namely the ID information, is returned to the source terminal according to the selection operation of the user and the sliding track corresponding to the operation of the user.
S704, the source terminal judges whether the picture is a missing picture according to the received ID information and the stored action. When the determination is yes, S705 is executed to trigger multi-screen sharing. If not, executing S706 to judge whether the limited times are exceeded, if not, continuing executing S703, and returning an error prompt to allow the user to reselect the picture.
Here, a limited number of times X (the number of times may be limited to a certain reasonable value, taking 3 as an example) is set, when the authentication fails, it is determined whether the limited number of times is exceeded, and when the limited number of times is exceeded, S707 is executed to deny access, the user operation input limit of the target terminal, that is, the user authority is locked, and the terminal is automatically unlocked after a certain period of time.
In practical use, the adopted image can be a bmp bitmap or a black and white image, so that the operations such as transmission and compression are convenient.
In practical use, for one source terminal, interactive verification can be simultaneously carried out with a plurality of target terminals through connection. Here, the same wireless transmission protocol, such as WiFi, is used for security authentication for terminals of the same local area network.
By the method provided by the embodiment of the invention, various protocols are integrated in the source terminal in advance, the format of the shared content is defined, if the format is met, the on-screen request is sent, and a white list which can be used for selecting the source terminal can be set in the protocol list and is used for monitoring the control authority. The source terminal can obtain information such as a device name, an ID, and a sharable service list of the user equipment. And selecting the optimal protocol and communication channel for connection through the source terminal so as to ensure the channel safety. And finally, performing final identity authentication on the connected target terminal in a jigsaw sliding authentication mode.
The sliding jigsaw verification mode presets a picture at a source terminal in advance when multi-screen interaction is carried out, a part of the picture is scratched out and is combined with other irrelevant pictures for a user to identify and select, and a complete picture can be scratched out by selecting a correct picture. The source terminal prestores the picture position and sliding operation, and sends selectable pictures to the devices allowing access, and the user selects the missing picture in the jigsaw puzzle and returns the picture to the source terminal. And the source terminal judges whether the picture is a missing part of the jigsaw according to the pre-stored sliding operation. And returning the judgment result to the target terminal, and entering a sharing interface if the judgment result is yes.
The verification method provided by the embodiment of the invention is a sliding verification code formed by splicing multiple images, the sliding verification based on behaviors is high in safety, and compared with a pattern verification code, the sliding verification code can be placed on a code printing platform manually for printing codes, so that the speed is high, the quality is high, and the sliding verification code is not easy to access the code printing platform. The design of the sliding interface enables the user experience to be smoother.
The method provided by the embodiment of the invention can guarantee the safety problem that a plurality of intelligent mobile terminals (other devices such as mobile phones or pads and the like can be accessed to the same multi-screen interactive system), allows the devices of different platforms to be accessed simultaneously, and simultaneously carries out safety verification again in an authentication mode of sliding jigsaw puzzle after communication connection is established, thereby preventing machine cracking and having higher safety. Various protocols are integrated in a system of the source terminal, so that a user can conveniently use the system without other external equipment, and cross-platform multi-screen interaction can be overcome.
Example four
In this embodiment, the use of the security verification method provided in the embodiment of the present invention is illustrated.
When a user wants to access several mobile devices simultaneously to share data such as videos and pictures, the same wifi is connected firstly, all the devices are located in the same local area network, the actively shared user searches surrounding user information through a source terminal, the searched devices approve or reject connection, the user agreeing to connection simultaneously feeds back personal information of the user, the source terminal calls a bottom layer protocol according to the personal information of the user to be accessed, a simple communication channel is established, and the next step of communication is started.
After the connection is established, the sliding jigsaw verification module is triggered, the source terminal firstly sends a plurality of pictures for verifying the identity to the accessed equipment, the equipment receiving the pictures selects the target picture, and returns the information of the ID, the sliding operation information and the like of the target picture. And when the source terminal receives the correct verification picture, the identity verification is finished. If the picture selection is verified to be wrong, the source terminal prompts the user to verify the picture selection error information and reselects, and if the picture selection is not selected correctly after the limited times, the user is locked. The source terminal then makes a determination as to whether to continue waiting for verification or to directly reject the input.
And directly jumping to a multi-screen interaction interface for sharing by the verified equipment.
In practical application, the sliding motion can be set in the forms of left-hand sliding, right-hand sliding, grabbing, double-click and jumping, and the like, regardless of the form. The verification form is diversified, and the malicious program is difficult to unlock. The target image can set the rotation angle by itself to increase the difficulty of jigsaw puzzle movement.
The existing fingerprint technology (or eye print technology) can be added in the identity authentication process, and the user can directly access the system as long as the fingerprint (or eye print) of the user is consistent with the preset fingerprint (or eye print) of the source terminal.
Here, the form of the puzzle is not limited, and the disordered picture set can be re-arranged to verify whether the user is a machine or a person in the environment. The image format for the entry authentication is not limited, and a bmp bitmap, a jpg format image and the like can be selected.
EXAMPLE five
In order to implement the security verification method provided in the first embodiment, an embodiment of the present invention further provides a security verification apparatus, which is applied to a first terminal, and as shown in fig. 9, the apparatus includes: a first transmitting unit 901, a first receiving unit 902 and a verifying unit 903; wherein,
a first sending unit 901, configured to send a verification instruction to the second terminal, where the verification instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interfering tile element;
a first receiving unit 902, configured to, when receiving a verification response corresponding to the verification instruction, obtain tile information carried in the verification response;
and the verification unit 903 is configured to determine that verification is successful when a verification tile element corresponding to the tile information carried in the verification response is consistent with the target tile element.
As shown in fig. 10, the apparatus further includes: a dividing unit 904 configured to: dividing the original picture into at least two tile elements; wherein at least one tile element is a target tile element, and the other tile elements of the at least two tile elements except the target tile element are reference tile elements.
The verifying unit 903 determining that the verification tile element corresponding to the tile information carried in the verification response is consistent with the target tile element comprises: determining that tile information of the verification tile element is consistent with tile information of the target tile element; wherein the tile information comprises a tile identification and/or a location identification.
As shown in fig. 10, the apparatus further includes: a tile processing unit 905 to: receiving a first sliding operation; and performing tile processing on the target tile element according to a first tile processing instruction corresponding to the first sliding operation.
Correspondingly, the verification unit 903 is further configured to: determining a second image block processing instruction according to the sliding track information carried by the verification response; determining that the second tile processing instruction is a processing instruction having a predetermined relationship with the first tile processing instruction.
As shown in fig. 10, the apparatus further includes: a first protocol determination unit 906 configured to: sending a protocol searching instruction; receiving a search response instruction corresponding to the protocol search instruction, wherein the search response instruction carries protocol type information of the second terminal; and calling a protocol corresponding to the protocol type information to establish connection with the second terminal.
EXAMPLE six
In a sixth embodiment, the security verification apparatus provided in the fifth embodiment is further described by using a security verification apparatus in a multi-screen interaction scenario, where the security verification apparatus is applied to a source terminal, where the source terminal needs to integrate multiple transmission protocols.
As shown in fig. 11, the apparatus can be divided into four modules: the device discovery module 1101, the device analysis module 1102, the authentication module 1103, and the multi-screen interaction module 1104. The process of the target terminal for safely accessing the source terminal can be divided into three stages: communication channel establishment, identity security verification and security control access. Here, the target terminal may be a plurality of target terminals.
The device discovery module 1101 is configured to discover a device to be accessed (target terminal) in the same local area network environment, where the device can be used for accessing multi-screen interaction for sharing, and collect basic information of the target terminal, where the basic information includes a name, an ID, and a supported transmission protocol of the device.
The device analysis module 1102 is configured to perform basic information analysis on the accessed device, select an optimal transmission channel and protocol, and invoke a pre-integrated related protocol according to an analysis result.
The identity authentication module 1103 performs final identity authentication on the accessed device, and assigns permissions to ensure that no devices are randomly accessed. And simultaneously, triggering a multi-screen interaction module 1104 to perform multi-screen sharing, and sharing data such as pictures and videos for the target terminal.
It should be noted that the identity verification module 1103 in this embodiment corresponds to the first sending unit 901, the first receiving unit 902, the verification unit 903, the dividing unit 904, and the tile processing unit 905 in the fifth embodiment, and the device discovery module 1101 and the device analysis module 1102 correspond to the first protocol determination unit 906 in the fifth embodiment.
EXAMPLE seven
To implement the security verification method provided in the second embodiment, an embodiment of the present invention further provides a security verification apparatus, which is applied to a second terminal, and as shown in fig. 12, the apparatus includes: a second receiving unit 1201, a selecting unit 1202, and a second transmitting unit 1203; wherein,
a second receiving unit 1201, configured to receive a verification instruction from the first terminal; wherein, the verification instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interfering tile element;
a selection unit 1202 for receiving a selection operation, determining a verification tile element from the target tile element and the interference tile element based on the selection operation;
a second sending unit 1203, configured to send the verification tile element to the first terminal by carrying the tile information of the verification tile element in a verification response.
The second receiving unit 1201 is further configured to: receiving a verification success message; and the verification success message is sent when the first terminal determines that the verification image block element is consistent with the target image block element.
The second sending unit 1203 is further configured to: carrying a second graphic block processing instruction corresponding to a second sliding operation received by the verification graphic block element in the verification response and sending the verification response to the first terminal; and the target image block element is the image block element subjected to image block processing.
As shown in fig. 13, the apparatus further includes: a second protocol determining unit 1204, configured to: receiving a protocol searching instruction, and inquiring the protocol type supported by the protocol searching instruction; and carrying the protocol type information corresponding to the protocol type in the search response instruction and sending the search response instruction to the first terminal.
As shown in fig. 13, the apparatus further includes: a display unit 1205 for: displaying the reference picture block element in a first display window, and reserving a position corresponding to the target picture block element in the first window; displaying the target tile element and the disturbing tile element in a second display window.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.
Claims (22)
1. A method of security authentication, the method comprising:
sending a verification instruction to a second terminal, wherein the verification instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interfering tile element;
when a verification response corresponding to the verification instruction is received, obtaining the image block information carried by the verification response;
and when the verification image block element corresponding to the image block information carried by the verification response is determined to be consistent with the target image block element, determining that the verification is successful.
2. The method of claim 1, wherein prior to sending the validation instruction, the method further comprises:
dividing the original picture into at least two tile elements; wherein at least one tile element is a target tile element, and the other tile elements of the at least two tile elements except the target tile element are reference tile elements.
3. The method of claim 1, wherein the determining that the verification tile element corresponding to the tile information carried by the verification response is consistent with the target tile element comprises:
determining that tile information of the verification tile element is consistent with tile information of the target tile element;
wherein the tile information comprises a tile identification and/or a location identification.
4. The method of claim 1, further comprising:
receiving a first sliding operation;
and performing tile processing on the target tile element according to a first tile processing instruction corresponding to the first sliding operation.
5. The method of claim 4, wherein prior to determining that the verification is successful, the method further comprises:
determining a second image block processing instruction according to the sliding track information carried by the verification response;
determining that the second tile processing instruction is a processing instruction having a predetermined relationship with the first tile processing instruction.
6. The method of claim 1, further comprising:
sending a protocol searching instruction;
receiving a search response instruction corresponding to the protocol search instruction, wherein the search response instruction carries protocol type information of the second terminal;
and calling a protocol corresponding to the protocol type information to establish connection with the second terminal.
7. A security authentication method, the method comprising:
receiving a verification instruction from a first terminal; wherein, the verification instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interfering tile element;
receiving a selection operation, determining a verification tile element from the target tile element and the interference tile element based on the selection operation;
and carrying the tile block information of the verification tile block element in a verification response and sending the verification response to the first terminal.
8. The method of claim 7, further comprising:
receiving a verification success message; and the verification success message is sent when the first terminal determines that the verification image block element is consistent with the target image block element.
9. The method of claim 7, further comprising:
carrying sliding operation information corresponding to the second sliding operation received by the verification image block element in the verification response and sending the verification response to the first terminal; and the target image block element is the image block element subjected to image block processing.
10. The method of claim 7, further comprising:
receiving a protocol searching instruction, and inquiring the protocol type supported by the protocol searching instruction;
and carrying the protocol type information corresponding to the protocol type in the search response instruction and sending the search response instruction to the first terminal.
11. The method of claim 7, further comprising:
displaying the reference picture block element in a first display window, and reserving a position corresponding to the target picture block element in the first window;
displaying the target tile element and the disturbing tile element in a second display window.
12. An apparatus for security verification, the apparatus comprising: the device comprises a first sending unit, a first receiving unit and a verification unit; wherein,
the first sending unit is configured to send a verification instruction to a second terminal, where the verification instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interfering tile element;
the first receiving unit is used for acquiring the image block information carried by the verification response when the verification response corresponding to the verification instruction is received;
and the verification unit is used for determining that verification succeeds when the verification image block element corresponding to the image block information carried by the verification response is determined to be consistent with the target image block element.
13. The apparatus of claim 12, further comprising: a dividing unit for:
dividing the original picture into at least two tile elements; wherein at least one tile element is a target tile element, and the other tile elements of the at least two tile elements except the target tile element are reference tile elements.
14. The apparatus of claim 12, wherein the verification unit determining that the verification tile element corresponding to the tile information carried by the verification response is consistent with the target tile element comprises:
determining that tile information of the verification tile element is consistent with tile information of the target tile element;
wherein the tile information comprises a tile identification and/or a location identification.
15. The apparatus of claim 12, further comprising: a tile processing unit to:
receiving a first sliding operation;
and performing tile processing on the target tile element according to a first tile processing instruction corresponding to the first sliding operation.
16. The apparatus of claim 15, wherein the authentication unit is further configured to:
determining a second image block processing instruction according to the sliding track information carried by the verification response;
determining that the second tile processing instruction is a processing instruction having a predetermined relationship with the first tile processing instruction.
17. The apparatus of claim 12, further comprising: a first protocol determination unit to:
sending a protocol searching instruction;
receiving a search response instruction corresponding to the protocol search instruction, wherein the search response instruction carries protocol type information of the second terminal;
and calling a protocol corresponding to the protocol type information to establish connection with the second terminal.
18. A security authentication apparatus, the apparatus comprising: the device comprises a second receiving unit, a selecting unit and a second sending unit; wherein,
the second receiving unit is used for receiving the verification instruction from the first terminal; wherein, the verification instruction carries: a reference tile element of the original picture, a target tile element of the original picture, and at least one interfering tile element;
the selection unit is used for receiving a selection operation, and determining verification tile elements from the target tile elements and the interference tile elements based on the selection operation;
and the second sending unit is used for carrying the tile block information of the verification tile block element in a verification response and sending the verification response to the first terminal.
19. The apparatus of claim 18, wherein the second receiving unit is further configured to:
receiving a verification success message; and the verification success message is sent when the first terminal determines that the verification image block element is consistent with the target image block element.
20. The apparatus of claim 18, wherein the second sending unit is further configured to: carrying a second graphic block processing instruction corresponding to a second sliding operation received by the verification graphic block element in the verification response and sending the verification response to the first terminal; and the target image block element is the image block element subjected to image block processing.
21. The apparatus of claim 18, further comprising: a second protocol determination unit to:
receiving a protocol searching instruction, and inquiring the protocol type supported by the protocol searching instruction;
and carrying the protocol type information corresponding to the protocol type in the search response instruction and sending the search response instruction to the first terminal.
22. The apparatus of claim 18, further comprising: a display unit for:
displaying the reference picture block element in a first display window, and reserving a position corresponding to the target picture block element in the first window;
displaying the target tile element and the disturbing tile element in a second display window.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610856756.5A CN107872435A (en) | 2016-09-27 | 2016-09-27 | A kind of method and device of safety verification |
PCT/CN2017/096192 WO2018059127A1 (en) | 2016-09-27 | 2017-08-07 | Security verification method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610856756.5A CN107872435A (en) | 2016-09-27 | 2016-09-27 | A kind of method and device of safety verification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107872435A true CN107872435A (en) | 2018-04-03 |
Family
ID=61752256
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610856756.5A Pending CN107872435A (en) | 2016-09-27 | 2016-09-27 | A kind of method and device of safety verification |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107872435A (en) |
WO (1) | WO2018059127A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110826046A (en) * | 2019-11-04 | 2020-02-21 | 北京锐安科技有限公司 | Website login method, device, equipment and storage medium |
CN113422687A (en) * | 2021-06-24 | 2021-09-21 | 中国农业银行股份有限公司 | Verification method, verification server and verification system |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109583178B (en) * | 2018-10-09 | 2023-03-10 | 创新先进技术有限公司 | Conference collaborative participation method and system |
CN109800559B (en) * | 2019-01-02 | 2024-01-16 | 平安科技(深圳)有限公司 | Method and device for generating slider verification code, computer equipment and storage medium |
CN114626048B (en) * | 2022-03-18 | 2023-10-13 | 中软国际科技服务有限公司 | Computer login system and method based on verification code identification |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103312512B (en) * | 2013-06-07 | 2016-03-02 | 深圳第七大道网络技术有限公司 | A kind of generation method of picture validation code and device, auth method and device |
CN104580104B (en) * | 2013-10-24 | 2018-05-18 | 深圳市腾讯计算机系统有限公司 | The method, apparatus and system of authentication |
CN104660402B (en) * | 2013-11-19 | 2018-05-25 | 深圳市腾讯计算机系统有限公司 | A kind of method, apparatus and system verified to terminal |
CN104468123A (en) * | 2014-12-12 | 2015-03-25 | 浪潮(北京)电子信息产业有限公司 | Identity authentication method and device |
-
2016
- 2016-09-27 CN CN201610856756.5A patent/CN107872435A/en active Pending
-
2017
- 2017-08-07 WO PCT/CN2017/096192 patent/WO2018059127A1/en active Application Filing
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110826046A (en) * | 2019-11-04 | 2020-02-21 | 北京锐安科技有限公司 | Website login method, device, equipment and storage medium |
CN113422687A (en) * | 2021-06-24 | 2021-09-21 | 中国农业银行股份有限公司 | Verification method, verification server and verification system |
CN113422687B (en) * | 2021-06-24 | 2023-02-28 | 中国农业银行股份有限公司 | Verification method, verification server and verification system |
Also Published As
Publication number | Publication date |
---|---|
WO2018059127A1 (en) | 2018-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104378145B (en) | The matching method and system of bluetooth equipment | |
US9690601B2 (en) | Dynamic profile switching based on user identification | |
JP6842919B2 (en) | Network connection method, hotspot terminal and management terminal | |
CN107872435A (en) | A kind of method and device of safety verification | |
US9253638B2 (en) | Single card multi-mode multi-operator authentication method and device | |
CN103516514B (en) | The establishing method of account access rights and control device | |
CN103248657B (en) | Web Publishing facility information method and facility information sharing method thereof | |
CN107038462B (en) | Equipment control operation method and system | |
CN111221484B (en) | Screen projection method and device | |
CN104123108A (en) | Communication apparatus and communication apparatus control method | |
CN108429879B (en) | Electronic apparatus, camera control method, camera control apparatus, and computer-readable storage medium | |
CN112073289B (en) | Instant messaging control method and device | |
US20230239294A1 (en) | Access processing method and device for remotely controlling terminal and storage medium | |
CN106326718A (en) | Unlocking method, unlocking device and terminal equipment | |
CN110336870B (en) | Method, device and system for establishing remote office operation and maintenance channel and storage medium | |
US10602021B2 (en) | Authentication setting system and image forming apparatus | |
CN100583114C (en) | System and method for remote security enablement | |
JP4888785B2 (en) | Authentication system | |
CN105392137A (en) | Household WIFI embezzlement preventing method, wireless router and terminal equipment | |
US11017121B2 (en) | Information authentication method, apparatus, storage medium and virtual reality device based on virtual reality scenario | |
CN105227579B (en) | Access rights setting method, device and storage medium | |
CN109640374B (en) | Wireless network access method, wireless network processing device, storage medium and computer equipment | |
CN105025548B (en) | A kind of the connection control method and device of SIM card | |
EP4310407A1 (en) | Control right switching method and apparatus for virtual remote control, device, and storage medium | |
CN106921632B (en) | Wireless hotspot access control method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180403 |
|
WD01 | Invention patent application deemed withdrawn after publication |