CN107995150A - Auth method and device - Google Patents
Auth method and device Download PDFInfo
- Publication number
- CN107995150A CN107995150A CN201610955416.8A CN201610955416A CN107995150A CN 107995150 A CN107995150 A CN 107995150A CN 201610955416 A CN201610955416 A CN 201610955416A CN 107995150 A CN107995150 A CN 107995150A
- Authority
- CN
- China
- Prior art keywords
- user account
- common
- login
- place
- login place
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 59
- 238000012795 verification Methods 0.000 claims abstract description 77
- 238000001514 detection method Methods 0.000 claims description 8
- 238000012544 monitoring process Methods 0.000 claims description 3
- 230000006870 function Effects 0.000 description 12
- 238000012545 processing Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 241000700605 Viruses Species 0.000 description 3
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000005484 gravity Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 230000005236 sound signal Effects 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of auth method and device, belong to computer and Internet technical field.The described method includes:The common login of the user account number provided by the operator of user account number is provided checking information, the common login of user account number checking information refer to the common relevant information in login place with user account number, the common place that logs in refers to log in the login place that the frequency is more than predetermined threshold value;Whether checking information is correct with verifying the common login of user account number;According to the verification result person that determines aforesaid operations whether be user account number owner.The authentication requirement that authentication is carried out to operator with user account number relevant information, higher is proposed to operator known based on operator, security higher.
Description
Technical Field
The embodiment of the invention relates to the technical field of computers and internet, in particular to an identity authentication method and device.
Background
In the network application, a user registers a user account, and the user identity is uniquely identified in the network application through the user account.
When the operator of the user account requests to perform some sensitive operations, for example, the sensitive operations may be operations of modifying a password, retrieving the password, paying, and the like, the application needs to perform identity verification on the operator of the user account to verify whether the operator is the owner of the user account. The owner of the user account refers to a user who registers to acquire the user account.
In the prior art, the authentication method is adopted as follows: according to a mobile phone number which is bound with a user account in advance, sending a short message verification code to a mobile phone corresponding to the mobile phone number, and requiring an operator of the user account to input the short message verification code; if the short message verification code input by the operator of the user account is the same as the issued short message verification code, judging that the operator of the user account is the owner of the user account, and passing the identity verification; otherwise, if the short message verification code input by the operator of the user account is different from the issued short message verification code, the operator of the user account is judged not to be the owner of the user account, and the identity verification fails.
The identity authentication mode provided by the prior art has certain potential safety hazard. For example, when a mobile phone bound to a user account is stolen by others, or when a Trojan virus for acquiring a short message verification code is injected into the mobile phone bound to the user account by others, the short message verification code transmitted to the mobile phone can be acquired by others, and others can pass identity verification. Therefore, the identity authentication method based on the short message authentication code provided by the prior art has low security.
Disclosure of Invention
In order to solve the problem of low security of an identity verification method based on a short message verification code provided by the prior art, the embodiment of the invention provides an identity verification method and an identity verification device. The technical scheme is as follows:
in a first aspect, an identity verification method is provided, the method including:
acquiring common login place verification information of the user account, which is provided by an operator of the user account, wherein the common login place verification information of the user account refers to information related to a common login place of the user account, and the common login place refers to a login place with login frequency greater than a preset threshold value;
verifying whether the verification information of the common login place of the user account is correct or not;
and determining whether the operator is the owner of the user account according to the verification result.
In a second aspect, there is provided an authentication apparatus, the apparatus comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring common login place authentication information of a user account, which is provided by an operator of the user account, the common login place authentication information of the user account refers to information related to a common login place of the user account, and the common login place refers to a login place with a login frequency greater than a preset threshold;
the verification module is used for verifying whether the verification information of the common login place of the user account is correct or not;
and the determining module is used for determining whether the operator is the owner of the user account according to the verification result.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
because the identity of the operator is verified according to the verification information of the common login place provided by the operator of the user account, the operator can pass the identity verification only under the condition of knowing the common login place of the user account, the operator cannot pass the identity verification in a mode of stealing a mobile phone or injecting trojan viruses into the mobile phone, the identity of the operator is verified based on the information which is acquired by the operator and is related to the user account, a higher identity verification requirement is put forward to the operator, and the safety is higher.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic illustration of an implementation environment provided by an embodiment of the invention;
fig. 2 is a flowchart of an authentication method provided by an embodiment of the present invention;
fig. 3 is a flowchart of an authentication method according to another embodiment of the present invention;
fig. 4A is a flowchart of an authentication method according to another embodiment of the present invention;
FIG. 4B is a schematic diagram of an implementation environment to which the embodiment shown in FIG. 4A relates;
fig. 5 is a block diagram of an authentication apparatus provided by an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a server according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Referring to fig. 1, a schematic diagram of an implementation environment according to an embodiment of the invention is shown. The implementation environment includes: a terminal 110 and a server 120.
The terminal 110 may be an electronic device such as a mobile phone, a tablet Computer, an e-book reader, a multimedia player, a PDA (Personal Digital Assistant), a PC (Personal Computer), and the like.
The terminal 110 and the server 120 may establish a communication connection through a wired network or a wireless network.
The server 120 may be a server, a server cluster composed of a plurality of servers, or a cloud computing service center.
In the method provided by the embodiment of the invention, the execution main body of each step can be a terminal, a server or the terminal and the server are interactively matched for execution. In the following method embodiments, unless otherwise specified, the execution subject of each step is merely taken as an example, but the present invention is not limited thereto.
Referring to fig. 2, a flowchart of an authentication method according to an embodiment of the present invention is shown. The method may include several steps as follows.
In step 201, a common login authentication information of a user account provided by an operator of the user account is obtained.
The operator of the user account refers to the user who is currently using the user account. The operator of the user account may or may not be the owner of the user account (e.g., a user who steals the user account), and therefore authentication of the operator of the user account is required to confirm whether the operator is the owner of the user account. The owner of the user account refers to a user who registers to acquire the user account. In addition, the user account may be an account registered by the user in any network application, for example, an account registered by the user in a network application such as an instant messaging application, a social application, a payment application, a shopping application, a network game, a website, a forum, and the like, which is not limited in this embodiment of the present invention.
The common login place authentication information of the user account refers to information related to the common login place of the user account. The common login place refers to a login place with the login frequency being greater than a preset threshold. The registration frequency is the number of times of registration per unit time. The unit time may be preset according to actual requirements, for example, the unit time is a past week, a past month, a time period from the registration time of the user account to the current time, and the like. The login location may be a geographic location coordinate; alternatively, the login location may be a geographic location area, such as a building, including but not limited to buildings, streets, squares, and the like. In one example, assuming that the preset threshold is 100, the login frequency of a certain user account in Tengchang is 120 times, and the login frequency in Guarangda is 30 times, Tengchang is the common login location of the user account, and Guarangda is not the common login location of the user account.
In one example, the common login location authentication information for the user account is authentication information provided by the operator to indicate the common login location for the user account. For example, the operator may provide the frequent login location verification information for the user account as Tengchang indicating that the Tengchang is considered by the operator to be the frequent login location for the user account. In another example, the common login-location authentication information of the user account is information indicating a building within an area to which the common login location of the user account belongs. For example, the operator may provide the general entry location verification information for the user account as Tengchang indicating that the operator believes Tengchang is a building in the area of the general entry location belonging to the user account.
In the embodiment of the present invention, a specific manner of obtaining the common login authentication information of the user account provided by the operator is not limited. For example, the user account common login authentication information input by the operator of the user account is acquired, and the operator may input the user account common login authentication information in a text form or a voice form. In one example, step 201 includes several sub-steps as follows:
step 201a, generating n first options and m second options, wherein the content of the first options is related to the common login place of the user account, the content of the second options is unrelated to the common login place of the user account, and n and m are positive integers;
in one example, the content of the first option is a common login location of the user account, and the content of the second option is an unusual login location of the user account. For example, if the user account is registered in flight building, the generated options may include: tengcong buildings, Huaqiang buildings and national trade buildings; the Tengchun building is a common login place of the user account, and the Huaqiang building and the national trade building are very common login places of the user account.
In another example, the content of the first option is a building within an area to which the common login location of the user account belongs, and the content of the second option is a building outside the area to which the common login location of the user account belongs. For example, if the user account is registered in flight building, the generated options may include: huaqiang mansion, national trade mansion and Diwang mansion; the Huaqiang mansion is near the Tengchun mansion and belongs to the building in the region of Tengchun mansion, while the national trade mansion and the King mansion are far away from the Tengchun mansion and belong to the building outside the region of Tengchun mansion. The region to which the common login point belongs may be a region centered on the common login point and having a distance from the common login point smaller than a preset distance. The area to which the common login point belongs may also be an area including the common login point determined according to a preset area division rule. The area division rule may be divided according to administrative areas, or may be divided according to areas served by each base station, or divided according to other preset rules, which is not limited in this embodiment.
Optionally, 1 first option and a plurality of second options are generated.
Step 201b, acquiring a target option selected by an operator of the user account from the n first options and the m second options, wherein the target option is an option selected by the operator and related to a common login place of the user account, and the target option is common login place authentication information of the user account provided by the operator.
For example, the generated options may include: in the Huaqiang mansion, the national trade mansion and the Diwang mansion, assuming that the target option selected by the user from the options is the Huaqiang mansion, the Huaqiang mansion is the option selected by the operator of the user account and related to the common login place of the user account. That is, the operator considers the huaqiang building to be a common login site of the user account, or the operator considers the huaqiang building to be a building in the area where the common login site of the user account belongs.
In addition, in the generated options, the content of the options may be shown in a text form, a picture form, or a form in which text is combined with a picture, which is not limited in the embodiment of the present invention.
Through the mode, the operator can provide the common login authentication information of the user account in a selection mode, the operation is simple, and the efficiency of identity authentication is improved.
Step 202, verifying whether the verification information of the common login place of the user account is correct.
When the verification information of the common login place of the user account is used for indicating the common login place of the user account, the common login place provided by the operator is compared with the actual common login place of the user account, and whether the verification information of the common login place provided by the operator is correct or not is determined according to the comparison result.
When the verification information of the common login place of the user account is used for indicating the building in the area to which the common login place of the user account belongs, the building provided by the operator is compared with the building in the area to which the actual common login place of the user account belongs, and whether the verification information of the common login place provided by the operator is correct is determined according to the comparison result.
Optionally, when the user account common login authentication information provided by the operator is the above target option, step 202 includes the following sub-steps:
step 202a, judging whether the target option is at least one of n first options;
step 202b, if the target option is at least one of the n first options, determining that the verification result is that the verification information of the common login place of the user account is correct;
step 202c, if the target option is not at least one of the n first options, determining that the verification result is that the verification information of the common login place of the user account is incorrect.
When the generated options only include 1 first option, whether the target option is the first option is judged. When the generated option includes a plurality of first options, in a possible implementation, it is determined whether the target option is at least one of the plurality of first options, that is, the operator only needs to correctly select a part (that is, at least one) of the first options from the plurality of first options to verify that the part is passed; in another possible implementation, it is determined whether the target option is all of the first options, that is, the operator needs to correctly select all of the first options from the first options to verify that the target option passes the verification, and at this time, the requirement on the operator is higher, and the security is also higher.
And step 203, determining whether the operator is the owner of the user account according to the verification result.
If the verification result is that the information of the common login place of the user account is correct, determining that the operator is the owner of the user account, and passing the identity verification; and if the verification result is that the information of the common login place of the user account is incorrect, determining that the operator is not the owner of the user account, and failing to verify the identity.
In summary, in the method provided in this embodiment, since the identity of the operator is verified according to the verification information of the common login place provided by the operator of the user account, the operator must know the common login place of the user account to pass the identity verification, the operator cannot pass the identity verification by stealing the mobile phone or injecting trojan viruses into the mobile phone, the operator is authenticated based on the information related to the user account obtained by the operator, a higher identity verification requirement is provided for the operator, and the security is higher.
The following describes the trigger conditions associated with authentication of an operator by means of the embodiment shown in fig. 3. Referring to fig. 3, a flowchart of an authentication method according to another embodiment of the invention is shown. The method may include several steps as follows.
Step 301, when it is monitored that a preset operation is requested to be performed on a user account, acquiring current login location information of the user account.
The current login location information of the user account is used for indicating the current login location of the user account.
In one example, the current login location information of the user account is the current login location of the user account. For example, the current login location of the user account can be obtained through a related Positioning technology, such as a GPS (Global Positioning System) technology.
In another example, the information of the current login place of the user account is an IP (internet protocol) address currently used by the user account. The current login location of the user account can be determined according to the IP address currently used by the user account, or the area to which the current login location of the user account belongs can be determined according to the IP address currently used by the user account. For example, a base station serving the current login location of the user account is determined according to the currently used IP address of the user account, and then an area served by the base station is determined as an area to which the current login location of the user account belongs.
In addition, the preset operation refers to a preset operation for triggering execution of the authentication process. The preset operation generally refers to a sensitive operation performed on the user account, such as password modification, password recovery, payment, and the like, which is not limited in this embodiment.
Step 302, detecting whether the current login location of the user account belongs to the common login location of the user account according to the current login location information of the user account. If not, the following step 303 is executed; if so, the following step 306 is performed.
In one example, step 302 includes several substeps as follows:
step 302a, detecting whether a current login place of a user account indicated by current login place information of the user account is included in a common login place library of the user account, wherein the common login place library of the user account is used for storing indication information of the common login place of the user account;
step 302b, if the common login place library of the user account comprises the current login place of the user account, determining that the current login place of the user account belongs to the common login place of the user account;
step 302c, if the current login location of the user account is not included in the common login location library of the user account, determining that the current login location of the user account does not belong to the common login location of the user account.
The common login place library of the user account can count login places of the user account in past historical time periods, and login places with login frequency larger than a preset threshold are used as common login places and added into the common login place library.
Optionally, the current login location information of the user account is an IP address currently used by the user account, and the common login location library of the user account is used for storing the common IP address of the user account. That is, the common login location library of the user account is the common IP address library of the user account. The step 302a may be implemented by the following steps: and detecting whether the commonly used IP address library of the user account comprises the IP address currently used by the user account. And if the commonly used IP address library of the user account comprises the IP address currently used by the user account, determining that the current login place of the user account belongs to the commonly used login place of the user account. And if the commonly used IP address library of the user account does not comprise the IP address currently used by the user account, determining that the current login place of the user account does not belong to the commonly used login place of the user account.
When the current login location of the user account does not belong to the common login location of the user account, an authentication procedure is triggered to be executed, and the following steps 303 to 305 are executed to authenticate the identity of the operator of the user account. When the current login place of the user account belongs to the common login place of the user account, the authentication process is not required to be executed.
Step 303, obtaining the common login place authentication information of the user account provided by the operator of the user account.
This step can be referred to the introduction and description of step 201 in the embodiment shown in fig. 2, and is not described herein again.
Optionally, when the common login location library of the user account is a common IP address library of the user account, if the option provided in the embodiment shown in fig. 2 is used to obtain the common login location authentication information provided by the operator, each option may be generated as follows: selecting at least one common IP address of a user account from a common IP address library of the user account, and generating at least one first option according to the selected common IP address of the user account; and randomly selecting an unused IP address of at least one user account, and generating at least one second option according to the selected unused IP address of the user account.
And step 304, verifying whether the verification information of the common login place of the user account is correct.
This step can be referred to the description and illustration of step 202 in the embodiment shown in fig. 2, and is not described herein again.
And 305, determining whether the operator is the owner of the user account according to the verification result. If yes, go to step 306; if not, the following step 307 is executed.
This step can be referred to the introduction and description of step 203 in the embodiment shown in fig. 2, and is not described herein again.
Step 306, allowing the requested preset operation to be executed on the user account.
Step 307, prohibiting the preset operation of the request executed to the user account.
Optionally, after the step 305, the method further includes the following steps: and when the preset updating condition is met, adding the current login place of the user account into a common login place library of the user account. Wherein, the preset updating condition comprises: the operator is the owner of the user account, and the login frequency of the user account at the current login place is larger than the first item or the whole two items in the preset threshold value. The value of the preset threshold may be smaller than the value of the preset threshold described above. The larger the value of the preset threshold value is, the higher the safety is. In one example, after determining that the operator is the owner of the user account, the IP address currently used by the user account is added to the commonly used IP address repository of the user account. In another example, after determining that the operator is the owner of the user account, detecting whether the login frequency of the user account at the current login location is greater than a preset threshold value, and if the login frequency of the user account at the current login location is greater than the preset threshold value, adding the current login location of the user account to a common login location library of the user account.
Optionally, after the current login location information of the user account is acquired, the current login location of the user account is determined according to the current login location information of the user account, and the login frequency corresponding to the current login location of the user account is updated. And if the updated login frequency is greater than the preset threshold value, adding the current login location of the user account into a common login location library of the user account.
Through the method, the common login place library of the user account is updated, and the validity and the accuracy of the data in the common login place library of the user account are ensured.
In summary, in the method provided in this embodiment, it is first detected whether the current login location of the user account belongs to a commonly used login location, if not, an authentication procedure is triggered to be executed, and if so, an authentication procedure is not required to be executed, so that necessary authentication is performed on the user of the user account under the condition of potential safety hazard, and the technical effects of performing authentication at a necessary moment and avoiding executing an unnecessary authentication procedure are achieved.
In the following, a detailed embodiment illustrating the interaction between the client and the server in the terminal to complete the authentication procedure is described with the embodiment shown in fig. 4A. Referring to fig. 4A, a flowchart of an authentication method according to another embodiment of the invention is shown. The method may be applied to the implementation environment shown in fig. 4B, which includes: a client 41 and a server 42. The client 41 may be a client of an application program or may be a browser. The client 41 is installed and operated in a terminal such as a mobile phone. The server 42 stores therein a user account database 42a, a common IP address database 42b, and an environment information database 42 c. The user account database 42a stores user accounts registered by each user; a common IP address database 42b stores a common IP address database corresponding to each user account; the environment information database 42c stores the commonly used registered location corresponding to each commonly used IP address, or the information of the building in the area to which the commonly used registered location corresponding to each commonly used IP address belongs.
Illustratively, the method may include several steps as follows.
Step 401, when the client monitors that a preset operation is requested to be performed on the user account, the client acquires an IP address currently used by the user account.
In step 402, the client sends the IP address currently used by the user account to the server.
Correspondingly, the server receives the IP address currently used by the user account sent by the client.
In step 403, the server detects whether the commonly used IP address library of the user account includes the IP address currently used by the user account.
In step 404, if the commonly used IP address library of the user account includes the currently used IP address of the user account, the server sends an execution permission instruction to the client.
The execution permission instruction is used for instructing to permit the preset operation of the request to the user account.
Accordingly, the client receives the execution permission indication sent by the server and executes the requested preset operation after receiving the execution permission indication.
Step 405, if the commonly used IP address library of the user account does not include the currently used IP address of the user account, the server generates a plurality of options according to the commonly used IP address of the user account.
The options comprise n first options and n second options, and n and m are positive integers. The content of the first option is related to the common login place of the user account, and the content of the second option is not related to the common login place of the user account. Optionally, the content of the first option is a building in an area where the common login location of the user account belongs, and the content of the second option is a building outside the area where the common login location of the user account belongs.
Step 406, the server sends the options to the client.
Accordingly, the client receives the options sent by the server.
In step 407, the client displays the above options.
In step 408, the client obtains a target option selected by the operator of the user account from the options, wherein the target option is an option selected by the operator and related to the common login place of the user account.
The target option is the usual login-to-authentication information for the user account provided by the operator.
In step 409, the client sends the target option to the server.
Accordingly, the server receives the target option sent by the client.
The server verifies whether the common login verification information provided by the operator is correct according to the target option, step 410.
In step 411, the server determines whether the operator is the owner of the user account according to the verification result.
In step 412, if the operator is the owner of the user account, the server sends an execution permission instruction to the client.
Accordingly, the client receives the execution permission indication sent by the server and executes the requested preset operation after receiving the execution permission indication.
In step 413, if the operator is not the owner of the user account, the server sends an execution prohibition instruction to the client.
Accordingly, the client receives the execution prohibition indication sent by the server and refuses to execute the requested preset operation after receiving the execution prohibition indication.
The following are embodiments of the apparatus of the present invention that may be used to perform embodiments of the method of the present invention. For details which are not disclosed in the embodiments of the apparatus of the present invention, reference is made to the embodiments of the method of the present invention.
Referring to fig. 5, a block diagram of an authentication apparatus according to an embodiment of the present invention is shown. The device has the functions of realizing the method examples, and the functions can be realized by hardware or by hardware executing corresponding software. The apparatus may include: a first acquisition module 510, a verification module 520, and a determination module 530.
A first obtaining module 510, configured to perform step 201 or step 303.
A verification module 520 for performing the above step 202 or step 304.
A determining module 530, configured to perform step 203 or step 305.
In an optional embodiment provided based on the embodiment shown in fig. 5, the first obtaining module 510 includes: the device comprises a generating unit and an acquiring unit.
A generating unit, configured to execute the step 201 a.
An obtaining unit, configured to perform step 201b described above.
Optionally, the verification module 520 includes: the device comprises a judging unit, a first determining unit and a second determining unit.
A determining unit, configured to perform the step 202 a.
A first determining unit, configured to perform step 202 b.
A second determining unit, configured to perform step 202 c.
In another optional embodiment provided based on the embodiment shown in fig. 5, the apparatus further comprises: the device comprises a second acquisition module and a detection module.
A second obtaining module, configured to perform step 301.
A detection module, configured to perform step 302.
The first obtaining module is further configured to trigger execution of step 201 or step 303 when the current login location of the user account does not belong to a common login location of the user account.
In one example, the detection module includes: the device comprises a detection unit, a third determination unit and a fourth determination unit.
A detecting unit, configured to perform step 302 a.
A third determining unit, configured to perform step 302 b.
A fourth determining unit, configured to perform step 302c described above.
Optionally, the apparatus further comprises: and adding a module. And the adding module is used for adding the current login location of the user account into a common login location library of the user account when the preset updating condition is met.
Reference may be made to the above-described method embodiments for relevant details.
It should be noted that: in the above embodiment, when the device implements the functions thereof, only the division of the functional modules is illustrated, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the internal structure of the device may be divided into different functional modules to implement all or part of the functions described above. In addition, the apparatus and method embodiments provided by the above embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments for details, which are not described herein again.
Referring to fig. 6, a schematic structural diagram of a terminal according to an embodiment of the present invention is shown. The terminal is used for implementing the identity authentication method provided in the above embodiment. Specifically, the method comprises the following steps:
the terminal 600 may include RF (Radio Frequency) circuitry 610, memory 620 including one or more computer-readable storage media, an input unit 630, a display unit 640, a sensor 650, audio circuitry 660, a WiFi (wireless fidelity) module 670, a processor 680 including one or more processing cores, and a power supply 690. Those skilled in the art will appreciate that the terminal structure shown in fig. 6 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components. Wherein:
the RF circuit 610 may be used for receiving and transmitting signals during information transmission and reception or during a call, and in particular, for receiving downlink information from a base station and then processing the received downlink information by the one or more processors 680; in addition, data relating to uplink is transmitted to the base station. In general, RF circuitry 610 includes, but is not limited to, an antenna, at least one Amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, an LNA (Low Noise Amplifier), a duplexer, and the like. In addition, the RF circuitry 610 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA (Code Division Multiple Access), WCDMA (Wideband Code Division Multiple Access), LTE (Long Term Evolution), e-mail, SMS (short messaging Service), etc.
The memory 620 may be used to store software programs and modules, and the processor 680 may execute various functional applications and data processing by operating the software programs and modules stored in the memory 620. The memory 620 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the terminal 600, and the like. Further, the memory 620 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 620 may also include a memory controller to provide the processor 680 and the input unit 630 access to the memory 620.
The input unit 630 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control. Specifically, the input unit 630 may include an image input device 631 and other input devices 632. The image input device 631 may be a camera or a photo scanning device. The input unit 630 may include other input devices 632 in addition to the image input device 631. In particular, other input devices 632 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 640 may be used to display information input by or provided to a user and various graphical user interfaces of the terminal 600, which may be made up of graphics, text, icons, video, and any combination thereof. The Display unit 640 may include a Display panel 641, and optionally, the Display panel 641 may be configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like.
The terminal 600 may also include at least one sensor 650, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display panel 641 according to the brightness of ambient light, and a proximity sensor that may turn off the display panel 641 and/or the backlight when the terminal 600 is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when the mobile phone is stationary, and can be used for applications of recognizing the posture of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured in the terminal 600, detailed descriptions thereof are omitted.
Audio circuit 660, speaker 661, and microphone 662 can provide an audio interface between a user and terminal 600. The audio circuit 660 may transmit the electrical signal converted from the received audio data to the speaker 661, and convert the electrical signal into an audio signal through the speaker 661 for output; on the other hand, the microphone 662 converts the collected sound signal into an electrical signal, which is received by the audio circuit 660 and converted into audio data, which is then processed by the audio data output processor 680 and then passed through the RF circuit 610 to be transmitted to, for example, another terminal, or output to the memory 620 for further processing. The audio circuit 660 may also include an earbud jack to provide communication of a peripheral headset with the terminal 600.
WiFi belongs to short-distance wireless transmission technology, and the terminal 600 can help the user send and receive e-mails, browse web pages, access streaming media, etc. through the WiFi module 670, and it provides wireless broadband internet access for the user. Although fig. 6 shows the WiFi module 670, it is understood that it does not belong to the essential constitution of the terminal 600, and can be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 680 is a control center of the terminal 600, connects various parts of the entire handset using various interfaces and lines, and performs various functions of the terminal 600 and processes data by operating or executing software programs and/or modules stored in the memory 620 and calling data stored in the memory 620, thereby integrally monitoring the handset. Optionally, processor 680 may include one or more processing cores; preferably, the processor 680 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 680.
The terminal 600 also includes a power supply 690 (e.g., a battery) for powering the various components, which may be logically coupled to the processor 680 via a power management system to manage charging, discharging, and power consumption via the power management system. The power supply 690 may also include any component including one or more dc or ac power sources, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, and the like.
Although not shown, the terminal 600 may further include a bluetooth module or the like, which will not be described in detail herein.
In this embodiment, the terminal 600 further includes a memory and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors. The one or more programs include instructions for performing the above-described methods.
Referring to fig. 7, a schematic structural diagram of a server according to an embodiment of the present invention is shown. The server is used for implementing the authentication method provided in the above embodiment. Specifically, the method comprises the following steps:
the server 700 includes a Central Processing Unit (CPU)701, a system memory 704 including a Random Access Memory (RAM)702 and a Read Only Memory (ROM)703, and a system bus 705 connecting the system memory 704 and the central processing unit 701. The server 700 also includes a basic input/output system (I/O system) 706, which facilitates transfer of information between devices within the computer, and a mass storage device 707 for storing an operating system 713, application programs 714, and other program modules 715.
The basic input/output system 706 comprises a display 708 for displaying information and an input device 709, such as a mouse, keyboard, etc., for a user to input information. Wherein the display 708 and input device 709 are connected to the central processing unit 701 through an input output controller 710 coupled to the system bus 705. The basic input/output system 706 may also include an input/output controller 710 for receiving and processing input from a number of other devices, such as a keyboard, mouse, or electronic stylus. Similarly, input-output controller 710 may also provide output to a display screen, a printer, or other type of output device.
The mass storage device 707 is connected to the central processing unit 701 through a mass storage controller (not shown) connected to the system bus 705. The mass storage device 707 and its associated computer-readable media provide non-volatile storage for the server 700. That is, the mass storage device 707 may include a computer-readable medium (not shown), such as a hard disk or CD-ROM drive.
Without loss of generality, the computer-readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes RAM, ROM, EPROM, EEPROM, flash memory or other solid state memory technology, CD-ROM, DVD, or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices. Of course, those skilled in the art will appreciate that the computer storage media is not limited to the foregoing. The system memory 704 and mass storage device 707 described above may be collectively referred to as memory.
The server 700 may also operate as a remote computer connected to a network via a network, such as the internet, according to various embodiments of the invention. That is, the server 700 may be connected to the network 712 through a network interface unit 711 connected to the system bus 705, or may be connected to other types of networks or remote computer systems (not shown) using the network interface unit 711.
The memory also includes one or more programs stored in the memory and configured to be executed by one or more processors. The one or more programs include instructions for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer readable storage medium comprising instructions, such as a memory comprising instructions, executable by a processor of a terminal or a server to perform the steps of the above method embodiments is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
It should be understood that reference to "a plurality" herein means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (16)
1. An identity verification method, the method comprising:
acquiring common login place verification information of the user account, which is provided by an operator of the user account, wherein the common login place verification information of the user account refers to information related to a common login place of the user account, and the common login place refers to a login place with login frequency greater than a preset threshold value;
verifying whether the verification information of the common login place of the user account is correct or not;
and determining whether the operator is the owner of the user account according to the verification result.
2. The method of claim 1, wherein said obtaining of a frequently-used login-location authentication information for a user account provided by an operator of the user account comprises:
generating n first options and m second options, wherein the content of the first options is related to the common login place of the user account, the content of the second options is not related to the common login place of the user account, and n and m are positive integers;
and acquiring a target option selected by an operator of the user account from the n first options and the m second options, wherein the target option is an option selected by the operator and related to a common login place of the user account, and the target option is common login place authentication information of the user account provided by the operator.
3. The method of claim 2, wherein verifying that the user account's frequently-used login verification information is correct comprises:
judging whether the target option is at least one option in the n first options;
if the target option is at least one option in the n first options, determining that the verification result is that the verification information of the common login place of the user account is correct;
and if the target option is not at least one option in the n first options, determining that the verification result is that the verification information of the common login place of the user account is incorrect.
4. The method of claim 2,
the content of the first option is a common login place of the user account, and the content of the second option is an unusual login place of the user account;
or,
the content of the first option is a building in an area where a common login place of the user account belongs, and the content of the second option is a building outside the area where the common login place of the user account belongs.
5. The method of any of claims 1 to 4, wherein prior to obtaining the frequently-used login-location authentication information for the user account provided by the operator of the user account, further comprising:
when monitoring that a request is made for executing preset operation on the user account, acquiring current login place information of the user account, wherein the current login place information of the user account is used for indicating a current login place of the user account;
detecting whether the current login place of the user account belongs to the common login place of the user account or not according to the current login place information of the user account;
and if the current login place of the user account does not belong to the common login place of the user account, triggering and executing the step of acquiring the common login place verification information of the user account provided by an operator of the user account.
6. The method of claim 5, wherein the detecting whether the current login location of the user account belongs to a common login location of the user account according to the current login location information of the user account comprises:
detecting whether a current login place of the user account, which is indicated by current login place information of the user account, is included in a common login place library of the user account, wherein the common login place library of the user account is used for storing the indication information of the common login place of the user account;
if the common login place library of the user account comprises the current login place of the user account, determining that the current login place of the user account belongs to the common login place of the user account;
if the current login location of the user account is not included in the common login location library of the user account, determining that the current login location of the user account does not belong to the common login location of the user account.
7. The method of claim 6, wherein determining whether the operator is the owner of the user account based on the verification further comprises:
when a preset updating condition is met, adding the current login site of the user account into a common login site library of the user account;
wherein the preset updating condition comprises: the operator is the owner of the user account, and the login frequency of the user account at the current login place is larger than the first item or the whole two items in the preset threshold value.
8. The method of claim 6,
the current login place information of the user account is the current login place of the user account, and the common login place library of the user account is used for storing the common login place of the user account;
or,
the current login place information of the user account is a network protocol IP address currently used by the user account, and the common login place library of the user account is used for storing the common IP address of the user account.
9. An authentication apparatus, the apparatus comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring common login place authentication information of a user account, which is provided by an operator of the user account, the common login place authentication information of the user account refers to information related to a common login place of the user account, and the common login place refers to a login place with a login frequency greater than a preset threshold;
the verification module is used for verifying whether the verification information of the common login place of the user account is correct or not;
and the determining module is used for determining whether the operator is the owner of the user account according to the verification result.
10. The apparatus of claim 9, wherein the first obtaining module comprises:
the generation unit is used for generating n first options and m second options, the content of the first options is related to the common login place of the user account, the content of the second options is unrelated to the common login place of the user account, and n and m are positive integers;
an obtaining unit, configured to obtain a target option selected by an operator of the user account from the n first options and the m second options, where the target option is an option selected by the operator and related to a common login location of the user account, and the target option is common login location authentication information of the user account provided by the operator.
11. The apparatus of claim 10, wherein the authentication module comprises:
a judging unit, configured to judge whether the target option is at least one option in the n first options;
a first determining unit, configured to determine that the verification result is that the verification information of the common login place of the user account is correct if the target option is at least one option of the n first options;
and the second determining unit is used for determining that the verification result is that the verification information of the common login place of the user account is incorrect if the target option is not at least one option in the n first options.
12. The apparatus of claim 10,
the content of the first option is a common login place of the user account, and the content of the second option is an unusual login place of the user account;
or,
the content of the first option is a building in an area where a common login place of the user account belongs, and the content of the second option is a building outside the area where the common login place of the user account belongs.
13. The apparatus of any one of claims 9 to 12, further comprising:
the second acquisition module is used for acquiring the current login place information of the user account when monitoring that a preset operation is requested to be executed on the user account, wherein the current login place information of the user account is used for indicating the current login place of the user account;
the detection module is used for detecting whether the current login site of the user account belongs to the common login site of the user account or not according to the current login site information of the user account;
the first obtaining module is further configured to trigger execution of the step of obtaining the verification information of the common login place of the user account provided by the operator of the user account when the current login place of the user account does not belong to the common login place of the user account.
14. The apparatus of claim 13, wherein the detection module comprises:
the detection unit is used for detecting whether the current login place of the user account, which is indicated by the current login place information of the user account, is included in a common login place library of the user account, and the common login place library of the user account is used for storing the indication information of the common login place of the user account;
a third determining unit, configured to determine that the current login location of the user account belongs to the common login location of the user account if the common login location library of the user account includes the current login location of the user account;
a fourth determining unit, configured to determine that the current login location of the user account does not belong to the common login location of the user account if the common login location library of the user account does not include the current login location of the user account.
15. The apparatus of claim 14, further comprising:
the adding module is used for adding the current login site of the user account into a common login site library of the user account when a preset updating condition is met;
wherein the preset updating condition comprises: the operator is the owner of the user account, and the login frequency of the user account at the current login place is larger than the first item or the whole two items in the preset threshold value.
16. The apparatus of claim 14,
the current login place information of the user account is the current login place of the user account, and the common login place library of the user account is used for storing the common login place of the user account;
or,
the current login place information of the user account is a network protocol IP address currently used by the user account, and the common login place library of the user account is used for storing the common IP address of the user account.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610955416.8A CN107995150B (en) | 2016-10-27 | 2016-10-27 | Identity verification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610955416.8A CN107995150B (en) | 2016-10-27 | 2016-10-27 | Identity verification method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107995150A true CN107995150A (en) | 2018-05-04 |
CN107995150B CN107995150B (en) | 2020-08-28 |
Family
ID=62028326
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610955416.8A Active CN107995150B (en) | 2016-10-27 | 2016-10-27 | Identity verification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107995150B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108965294A (en) * | 2018-07-16 | 2018-12-07 | 安徽信尔联信息科技有限公司 | A kind of user name and cipher protection system |
CN112039839A (en) * | 2020-07-16 | 2020-12-04 | 北京天融信网络安全技术有限公司 | Operation and maintenance method and device based on customer premise examination and approval authorization |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102413074A (en) * | 2011-11-30 | 2012-04-11 | 向进轮 | Remote login detection method for instant messaging tool terminal |
CN103138921A (en) * | 2011-11-22 | 2013-06-05 | 阿里巴巴集团控股有限公司 | Method and system for verifying identity information |
CN103973711A (en) * | 2014-05-28 | 2014-08-06 | 中国农业银行股份有限公司 | Verification method and device |
CN104333530A (en) * | 2013-07-22 | 2015-02-04 | 深圳市腾讯计算机系统有限公司 | Information credibility verifying method and apparatus |
CN104468463A (en) * | 2013-09-12 | 2015-03-25 | 深圳市腾讯计算机系统有限公司 | Verification method, verification device and verification system |
CN104869124A (en) * | 2015-06-05 | 2015-08-26 | 飞天诚信科技股份有限公司 | Authentication method based on geographic position information |
CN105100096A (en) * | 2015-07-17 | 2015-11-25 | 小米科技有限责任公司 | Verification method and apparatus |
CN105095205A (en) * | 2014-04-17 | 2015-11-25 | 阿里巴巴集团控股有限公司 | Method and device for address location |
CN105471581A (en) * | 2014-09-10 | 2016-04-06 | 阿里巴巴集团控股有限公司 | Identity verification method and device |
CN105898015A (en) * | 2015-12-04 | 2016-08-24 | 乐视致新电子科技(天津)有限公司 | Safety certification controlling method and terminal |
-
2016
- 2016-10-27 CN CN201610955416.8A patent/CN107995150B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103138921A (en) * | 2011-11-22 | 2013-06-05 | 阿里巴巴集团控股有限公司 | Method and system for verifying identity information |
CN102413074A (en) * | 2011-11-30 | 2012-04-11 | 向进轮 | Remote login detection method for instant messaging tool terminal |
CN104333530A (en) * | 2013-07-22 | 2015-02-04 | 深圳市腾讯计算机系统有限公司 | Information credibility verifying method and apparatus |
CN104468463A (en) * | 2013-09-12 | 2015-03-25 | 深圳市腾讯计算机系统有限公司 | Verification method, verification device and verification system |
CN105095205A (en) * | 2014-04-17 | 2015-11-25 | 阿里巴巴集团控股有限公司 | Method and device for address location |
CN103973711A (en) * | 2014-05-28 | 2014-08-06 | 中国农业银行股份有限公司 | Verification method and device |
CN105471581A (en) * | 2014-09-10 | 2016-04-06 | 阿里巴巴集团控股有限公司 | Identity verification method and device |
CN104869124A (en) * | 2015-06-05 | 2015-08-26 | 飞天诚信科技股份有限公司 | Authentication method based on geographic position information |
CN105100096A (en) * | 2015-07-17 | 2015-11-25 | 小米科技有限责任公司 | Verification method and apparatus |
CN105898015A (en) * | 2015-12-04 | 2016-08-24 | 乐视致新电子科技(天津)有限公司 | Safety certification controlling method and terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108965294A (en) * | 2018-07-16 | 2018-12-07 | 安徽信尔联信息科技有限公司 | A kind of user name and cipher protection system |
CN112039839A (en) * | 2020-07-16 | 2020-12-04 | 北京天融信网络安全技术有限公司 | Operation and maintenance method and device based on customer premise examination and approval authorization |
Also Published As
Publication number | Publication date |
---|---|
CN107995150B (en) | 2020-08-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11057376B2 (en) | Method, apparatus, and system for controlling intelligent device, and storage medium | |
US9703971B2 (en) | Sensitive operation verification method, terminal device, server, and verification system | |
CN104518875B (en) | A kind of method that authentication and account obtain, mobile terminal | |
EP3132385B1 (en) | Methods and systems for generating and reading 2d barcodes | |
CN111066284A (en) | Service certificate management method, terminal and server | |
CN107071775B (en) | Mobile terminal and method and device for redirecting access to base station | |
US10993090B2 (en) | Network access method, apparatus, and system | |
CN103729765A (en) | Verification control method and system, terminal, server, terminal equipment | |
CN106599641A (en) | A method, device and terminal for restricting terminal locking | |
CN107493378A (en) | Application program login method and device, computer equipment and readable storage medium | |
CN106534324A (en) | Data sharing method and cloud server | |
CN109428871B (en) | Defense strategy determination method and device | |
CN109600340B (en) | Operation authorization method, device, terminal and server | |
CN111357245B (en) | Information searching method, terminal, network equipment and system | |
CN107104930A (en) | It is a kind of that the methods, devices and systems for checking authority are set | |
CN117411655A (en) | Equipment decryption control method and device, electronic equipment and storage medium | |
US10476889B2 (en) | Information interaction method, apparatus and system | |
CN106020945B (en) | Shortcut item adding method and device | |
CN109086595B (en) | Service account switching method, system, device and server | |
CN107995150B (en) | Identity verification method and device | |
CN107592289B (en) | Password setting method and device | |
CN104683555B (en) | Message management method and device | |
CN107148011B (en) | Method, device and system for executing target service | |
CN105791253B (en) | Method and device for acquiring authentication information of website | |
CN105490810B (en) | Method, device and system for processing virtual resource data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |