+

WO2018035929A1 - Procédé et appareil de traitement de code de vérification - Google Patents

Procédé et appareil de traitement de code de vérification Download PDF

Info

Publication number
WO2018035929A1
WO2018035929A1 PCT/CN2016/100688 CN2016100688W WO2018035929A1 WO 2018035929 A1 WO2018035929 A1 WO 2018035929A1 CN 2016100688 W CN2016100688 W CN 2016100688W WO 2018035929 A1 WO2018035929 A1 WO 2018035929A1
Authority
WO
WIPO (PCT)
Prior art keywords
verification
verification code
request
timestamp information
code
Prior art date
Application number
PCT/CN2016/100688
Other languages
English (en)
Chinese (zh)
Inventor
陈佳
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2018035929A1 publication Critical patent/WO2018035929A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key

Definitions

  • the present invention relates to the field of verification codes, and in particular, to a method and an apparatus for processing a verification code.
  • the verification code In the process of performing verification code operation on the mobile terminal, the verification code is likely to be intercepted, resulting in leakage of private information and low security.
  • the embodiment of the invention provides a method and a device for processing a verification code, which ensures the security of verification based on the verification code.
  • an embodiment of the present invention provides a method for processing a verification code, including:
  • the verification code is a character string
  • the verification information includes a character string.
  • the character string included in the verification information is the same as the character string corresponding to the verification code, it is determined that the verification is successful.
  • the calculated verification information is unsuccessful for verifying the verification code, sending a prompt message to the mobile terminal, indicating that the verification is unsuccessful.
  • an embodiment of the present invention provides a method for processing a verification code, including:
  • the method before the sending the request for generating the verification code to the server, the method further includes:
  • the obtained timestamp information is stored in association with an application identifier of an application that provides the user interface, where the application identifier includes a process name of the application.
  • an embodiment of the present invention further provides a processing apparatus for a verification code, including:
  • a receiving module configured to receive a verification code generation request of the mobile terminal, where the generation request includes timestamp information, and the generation request is used to request to generate a verification code according to the timestamp information;
  • the first operation module based on the timestamp information sent by the mobile terminal, calculates the verification code by using the preset operation strategy, and sends the obtained verification code to the mobile terminal;
  • a second operation module configured to: when receiving the verification request that includes the verification code and the timestamp information sent by the mobile terminal, calculate the timestamp information based on the preset operation policy to obtain the verification The verification information of the code for verification;
  • the verification module is configured to determine that the verification is successful in response to the verification request, if the calculated verification information succeeds in verifying the verification code.
  • the verification code is a character string
  • the verification information includes a character string.
  • the character string included in the verification information is the same as the character string corresponding to the verification code, it is determined that the verification is successful.
  • the calculated verification information is unsuccessful for verifying the verification code, sending a prompt message to the mobile terminal, indicating that the verification is unsuccessful.
  • the embodiment of the present invention further provides another processing apparatus for the verification code, including:
  • a sending module configured to send a request for generating a verification code to the server, where the generating request includes timestamp information obtained according to the time of the mobile terminal;
  • a submitting module configured to generate a verification request including the received verification code and the timestamp information, and send the verification request to the server if receiving the verification code sent by the server;
  • the prompting module is configured to determine that the verification is successful if the message that the verification code is successfully verified according to the timestamp information returned by the server is received.
  • the sending module is further configured to: monitor a click acquisition event about the verification code on the user interface provided to the user; and if the acquisition event about the verification code is monitored, generate a verification code generation request.
  • the sending module is further configured to store the obtained timestamp information in association with an application identifier of an application that provides the user interface, where the application identifier includes a process name of the application.
  • the verification code cannot be verified even if it is stolen, which ensures the security based on the verification code for verification.
  • FIG. 1 is a schematic flow chart of a method for processing a verification code according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of another method for processing a verification code according to an embodiment of the present invention.
  • FIG. 3 is a schematic flow chart of still another method for processing a verification code according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of a device for processing a verification code according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of another apparatus for processing a verification code according to an embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of another apparatus for processing a verification code according to an embodiment of the present invention.
  • the embodiment of the invention discloses a method and a device for processing a verification code, which can not verify the verification code in the case of being stolen, and ensures the security based on the verification code for verification. The details are explained below.
  • FIG. 1 is a schematic flowchart of a method for processing a verification code according to an embodiment of the present invention.
  • the method in the embodiment of the present invention may be implemented by a mobile terminal, where the mobile terminal includes a smart phone, a tablet computer, and an intelligent device.
  • a network-enabled terminal such as a wearable device.
  • the method in the embodiment of the present invention may include the following steps:
  • the generation request includes terminal timestamp information, and the generation request is used to request to generate a verification code according to the timestamp information.
  • S102 Calculate the timestamp information by using a preset operation strategy to obtain a verification code, and send the obtained verification code to the mobile terminal.
  • the timestamp information is calculated by using a preset operation strategy to obtain a verification code, including generating the verification code by using the timestamp information generated by the mobile terminal as a seed random number or generating a verification algorithm by using another operation strategy. Said verification code.
  • the verification code is generated, including directly using the timestamp information number or a part of the seed random number to generate a six-digit random number to form a verification code.
  • the generating the verification code by using another operation strategy, including: starting from the first digit of the timestamp, taking one digit per interval, taking six consecutive digits to form a verification code; or from the timestamp The last digit starts with one digit removed every interval and six consecutive digits to form a verification code.
  • S103 If receiving the verification request that is sent by the mobile terminal, including the verification code and the timestamp information, calculating the timestamp information based on the preset operation policy to obtain verification for verifying the verification code. information.
  • the verification code is a character string
  • the verification information includes a character string.
  • the character string included in the verification information is the same as the character string corresponding to the verification code, it is determined that the verification is successful.
  • S104 If the verified verification information is successfully verified by the verification code, determine, in response to the verification request, that the verification is successful.
  • the calculated verification information is unsuccessful for verifying the verification code, sending a prompt message to the mobile terminal, indicating that the verification is unsuccessful.
  • the verification code generation request is received by the mobile terminal, where the generation request includes timestamp information, and the generation request is used to request to generate a verification code according to the timestamp information; Timestamp information, using the preset operation strategy to calculate the timestamp information to obtain a verification code, and sending the obtained verification code to the mobile terminal; if receiving the verification code and timestamp information sent by the mobile terminal
  • the verification request the timestamp information is calculated based on the preset operation strategy to obtain verification information for verifying the verification code; and if the calculated verification information is successful for verifying the verification code, the response is
  • the verification request determines that the verification is successful, and the verification code cannot pass the verification even if it is stolen, thereby ensuring the security based on the verification code for verification.
  • FIG. 2 is a schematic flowchart of a method for processing a verification code according to an embodiment of the present invention.
  • the method in the embodiment of the present invention may be implemented by a mobile terminal, where the mobile terminal includes a smart phone and a tablet.
  • a network-enabled terminal such as a computer or a smart wearable device.
  • the method in the embodiment of the present invention may include the following steps:
  • the generation request includes mobile terminal timestamp information, and the generation request is used to request to generate a verification code according to the timestamp information.
  • S202 Calculate the timestamp information by using a preset operation strategy to obtain a verification code, and send the obtained verification code to the mobile terminal.
  • the timestamp information is calculated by using a preset operation strategy to obtain a verification code, including generating the verification code by using the timestamp information generated by the mobile terminal as a seed random number or generating a verification algorithm by using another operation strategy. Said verification code.
  • the verification code is generated, including directly using the timestamp information number or a part of the seed random number to generate a six-digit random number to form a verification code.
  • the generating the verification code by using another operation strategy, including: starting from the first digit of the timestamp, taking one digit per interval, taking six consecutive digits to form a verification code; or from the timestamp The last digit starts with one digit removed every interval and six consecutive digits to form a verification code.
  • S203 If the verification request including the verification code and the timestamp information sent by the mobile terminal is received, calculating the timestamp information based on the preset operation policy to obtain verification for verifying the verification code. information.
  • the verification code is a character string
  • the verification information includes a character string.
  • the character string included in the verification information is the same as the character string corresponding to the verification code, it is determined that the verification is successful.
  • the verification code generation request is received by the mobile terminal, where the generation request includes timestamp information, and the generation request is used to request to generate a verification code according to the timestamp information; Timestamp information, using the preset operation strategy to calculate the timestamp information to obtain a verification code, and sending the obtained verification code to the mobile terminal; if receiving the verification code and timestamp information sent by the mobile terminal
  • the verification request the timestamp information is calculated based on the preset operation strategy to obtain verification information for verifying the verification code; and if the calculated verification information is successful for verifying the verification code, the response is
  • the verification request determines that the verification is successful, and the verification code cannot pass the verification even if it is stolen, thereby ensuring the security based on the verification code for verification.
  • FIG. 3 is a schematic flowchart of a method for processing a verification code according to an embodiment of the present invention.
  • the method in the embodiment of the present invention may be implemented by a mobile terminal, where the mobile terminal includes a smart phone and a tablet.
  • a network-enabled terminal such as a computer or a smart wearable device.
  • the method in the embodiment of the present invention may include the following steps:
  • S301 Listening for a click acquisition event about the verification code on the user interface provided to the user.
  • a request for generating a verification code is generated.
  • S302 Send a request for generating a verification code to the server.
  • the obtained timestamp information is stored in association with an application identifier of an application that provides the user interface, where the application identifier includes a process name of the application.
  • the generation request includes timestamp information obtained according to the time of the mobile terminal.
  • S303 If receiving the verification code sent by the server, generate an authentication request including the received verification code and the timestamp information, and send the verification request to the server.
  • the verification code generation request is received by the mobile terminal, where the generation request includes timestamp information, and the generation request is used to request to generate a verification code according to the timestamp information; Timestamp information, using the preset operation strategy to calculate the timestamp information to obtain a verification code, and sending the obtained verification code to the mobile terminal; if receiving the verification code and timestamp information sent by the mobile terminal
  • the verification request the timestamp information is calculated based on the preset operation strategy to obtain verification information for verifying the verification code; and if the calculated verification information is successful for verifying the verification code, the response is
  • the verification request determines that the verification is successful, and the verification code cannot pass the verification even if it is stolen, thereby ensuring the security based on the verification code for verification.
  • FIG. 4 is a schematic structural diagram of a device for processing a verification code according to an embodiment of the present invention.
  • the device in the embodiment of the present invention may be configured in a mobile terminal, where the mobile terminal may be a smart phone or a tablet computer.
  • a network-enabled terminal such as an intelligent wearable device.
  • the processing device for the verification code in the embodiment of the present invention includes a receiving module 401, a first computing module 402, a second computing module 403, and a verification module 404.
  • the receiving module 401 is configured to receive a verification code generation request of the mobile terminal, where the generation request includes timestamp information, and the generation request is used to request to generate a verification code according to the timestamp information.
  • the first computing module 402 is configured to calculate the verification code according to the timestamp information sent by the mobile terminal by using a preset operation policy, and send the obtained verification code to the Mobile terminal.
  • the second operation module 403 is configured to: if the verification request including the verification code and the timestamp information sent by the mobile terminal is received, calculate the timestamp information based on the preset operation policy to obtain The verification code performs verification information for verification.
  • the verification code is a character string
  • the verification information includes a character string.
  • the character string included in the verification information is the same as the character string corresponding to the verification code, it is determined that the verification is successful.
  • the verification module 404 is configured to determine that the verification is successful in response to the verification request, if the calculated verification information is successfully verified by the verification code.
  • the verification module further includes: if the calculated verification information is unsuccessful for verifying the verification code, sending a prompt message to the mobile terminal, indicating that the verification is unsuccessful.
  • the verification code generation request is received by the mobile terminal, where the generation request includes terminal timestamp information, and the generation request is used to request to generate a verification code according to the timestamp information;
  • the timestamp information is used to calculate the timestamp information by using a preset operation strategy to obtain a verification code, and send the obtained verification code to the mobile terminal; when receiving the verification code and the timestamp sent by the mobile terminal
  • the verification request of the information the timestamp information is calculated based on the preset operation policy to obtain verification information for verifying the verification code; if the calculated verification information is successful for verifying the verification code, In response to the verification request, it is determined that the verification is successful, thereby implementing the verification code generation and verification process, so that the verification code cannot be verified even if it is stolen, thereby ensuring the security based on the verification code for verification.
  • FIG. 5 is a schematic structural diagram of another apparatus for processing a verification code according to an embodiment of the present invention.
  • the apparatus for processing the verification code according to the embodiment of the present invention includes a sending module 501, a submitting module 502, and a prompting module 503.
  • the sending module 501 is configured to send a request for generating a verification code to the server, where the generation request includes timestamp information obtained according to the time of the mobile terminal.
  • the sending module 501 is further configured to listen to a click acquisition event about the verification code, and if the acquisition event about the verification code occurs, generate a verification code generation request.
  • the device adds the obtained timestamp information to the application identifier, and stores the timestamp with the application identifier, where the application identifier includes the process name of the application.
  • the submitting module 502 is configured to generate a verification request including the received verification code and the timestamp information, and send the verification request to the server, if receiving the verification code sent by the server.
  • the prompting module 503 is configured to determine that the verification is successful if the message that the verification code is successfully verified according to the timestamp information returned by the server is received.
  • the verification code generation request is received by the mobile terminal, where the generation request includes timestamp information, and the generation request is used to request to generate a verification code according to the timestamp information; Timestamp information, using the preset operation strategy to calculate the timestamp information to obtain a verification code, and sending the obtained verification code to the mobile terminal; if receiving the verification code and timestamp information sent by the mobile terminal
  • the verification request the timestamp information is calculated based on the preset operation strategy to obtain verification information for verifying the verification code; and if the calculated verification information is successful for verifying the verification code, the response is
  • the verification request determines that the verification is successful, and the verification code cannot pass the verification even if it is stolen, thereby ensuring the security based on the verification code for verification.
  • FIG. 6 is a schematic structural diagram of another apparatus for processing a verification code according to an embodiment of the present invention.
  • the apparatus in the embodiment of the present invention may be configured in a mobile terminal, where the mobile terminal may be a smart phone.
  • a network-enabled terminal such as a tablet or smart wearable device.
  • the processing device of the verification code according to the embodiment of the present invention may include: at least one input device 601, at least one processor 603, at least one memory 604, at least one output device 605, and the like, wherein the components pass through a Or a plurality of buses 602 are in communication connection. among them:
  • the input device 601 is a device for inputting data and information, and may include an on-screen keyboard, a camera, a scanner, a voice input device, and the like for inputting original data and a program for processing the data into the terminal device.
  • the bus 602 is a peripheral component interconnect (PCI) bus or an extended industry standard architecture (EISA) bus.
  • PCI peripheral component interconnect
  • EISA extended industry standard architecture
  • the bus 602 can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is shown in Figure 6, but it does not mean that there is only one bus or one type of bus.
  • the processor 603 can be a central processing unit (CPU).
  • the memory 604 can be a circuit having a storage function in an integrated circuit, such as a RAM, a FIFO, or the like, or a storage device having a physical form, such as a memory stick, a TF card, or the like.
  • a volatile memory such as a random-access memory (RAM) may be included; the memory may also include a non-volatile memory such as a flash memory.
  • a hard disk drive (HDD) or a solid state drive (SSD); the memory 404 may also include a combination of the above types of memories.
  • the memory 604 stores and retrieves data according to the location specified by the processor 603.
  • the processor 603, the input device 604, and the output device 605 call the program of the memory 604 to execute various functions to implement data processing.
  • the memory 604 is further configured to store program instructions.
  • the processor 603 can invoke the program instructions to implement a data acquisition method as shown in the embodiment of FIG. 2 of the present application.
  • Output device 605 can include a display, a printer, a plotter, an image output system, a voice output system, a magnetic recording device, and the like.
  • the processor 603 calls an application in the memory 604 for performing the following steps:
  • the processor 603 invokes an application stored in the memory 604, and if the verification information obtained by the calculation fails to verify the verification code, sends a prompt message to the mobile terminal, indicating that the verification is unsuccessful.
  • the processor 603 calls the application in the memory 604, and is also used to perform the following steps:
  • the processor 603 invokes an application stored in the memory 604, and the sending is used to monitor a click request for the verification code on the user interface provided to the user before requesting the generation of the verification code generation request to the server.
  • An event if an acquisition event regarding the verification code is monitored, a request for generating a verification code is generated.
  • the processor 603 invokes an application stored in the memory 604, and performs the associating the acquired timestamp information with an application identifier of an application that provides the user interface, where the application identifier includes The process name of the application.
  • the verification code generation request is received by the mobile terminal, where the generation request includes timestamp information, and the generation request is used to request to generate a verification code according to the timestamp information; Timestamp information, using the preset operation strategy to calculate the timestamp information to obtain a verification code, and sending the obtained verification code to the mobile terminal; if receiving the verification code and timestamp information sent by the mobile terminal
  • the verification request the timestamp information is calculated based on the preset operation strategy to obtain verification information for verifying the verification code; and if the calculated verification information is successful for verifying the verification code, the response is
  • the verification request determines that the verification is successful, and the verification code cannot pass the verification even if it is stolen, thereby ensuring the security based on the verification code for verification.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

L'invention concerne un procédé et un appareil de traitement d'un code de vérification. Le procédé consiste à : recevoir une demande de génération de code de vérification d'un terminal mobile, la demande de génération contenant des informations d'horodatage, et la demande de génération étant utilisée pour demander qu'un code de vérification soit généré d'après les informations d'horodatage ; sur la base des informations d'horodatage envoyées par le terminal mobile, utiliser une stratégie opérationnelle prédéfinie pour exécuter un calcul sur les informations d'horodatage de sorte à obtenir un code de vérification, et envoyer le code de vérification obtenu au terminal mobile ; si une demande de vérification envoyée par le terminal mobile et contenant le code de vérification et les informations d'horodatage est reçue, sur la base de la stratégie opérationnelle prédéfinie, exécuter un calcul sur les informations d'horodatage pour obtenir des informations de vérification et vérifier le code de vérification ; et si le code de vérification est vérifié avec succès au moyen des informations de vérification obtenues via un calcul, répondre à la demande de vérification, et déterminer que cette instance de vérification est réussie. La présente invention garantit la sécurité de vérification en se basant sur un code de vérification.
PCT/CN2016/100688 2016-08-23 2016-09-28 Procédé et appareil de traitement de code de vérification WO2018035929A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610712027.2A CN106330458B (zh) 2016-08-23 2016-08-23 一种验证码的处理方法及装置
CN201610712027.2 2016-08-23

Publications (1)

Publication Number Publication Date
WO2018035929A1 true WO2018035929A1 (fr) 2018-03-01

Family

ID=57742560

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/100688 WO2018035929A1 (fr) 2016-08-23 2016-09-28 Procédé et appareil de traitement de code de vérification

Country Status (2)

Country Link
CN (1) CN106330458B (fr)
WO (1) WO2018035929A1 (fr)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113159784A (zh) * 2021-04-29 2021-07-23 北京达佳互联信息技术有限公司 验证码的发送方法、装置、计算机设备及存储介质
CN113283264A (zh) * 2021-04-16 2021-08-20 维沃移动通信有限公司 识别码的共享方法和装置
CN114726595A (zh) * 2022-03-24 2022-07-08 中科吉芯(昆山)信息科技有限公司 一种利用时空信息认证人机身份的方法
CN116132164A (zh) * 2023-02-10 2023-05-16 上海众旗信息咨询有限公司 一种网站交互验证方法、装置、电子设备及存储介质
EP4014163A4 (fr) * 2019-08-16 2023-06-14 Focus Universal Inc. Sécurité de carte de paiement

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108959899A (zh) * 2018-07-03 2018-12-07 四川长虹电器股份有限公司 一种基于React实现图片验证码生成及刷新的方法
CN112149100A (zh) * 2020-09-01 2020-12-29 长沙市到家悠享网络科技有限公司 一种验证方法、装置、电子设备及存储介质
CN114363034B (zh) * 2021-12-29 2024-02-02 上海众源网络有限公司 验证码生成及校验方法、装置、电子设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152172A (zh) * 2011-12-07 2013-06-12 中国电信股份有限公司 一种手机令牌动态口令生成方法、客户端、服务器以及系统
CN104283689A (zh) * 2014-10-20 2015-01-14 优仕达资讯股份有限公司 无线验证系统及其方法
US20150286815A1 (en) * 2014-04-03 2015-10-08 Electronics And Telecommunications Research Institute Access control management apparatus and method for open service components
CN105827591A (zh) * 2016-02-22 2016-08-03 北京启迪思创科技有限公司 一种身份认证方法、客户端、服务器及系统

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103685384A (zh) * 2012-09-12 2014-03-26 中兴通讯股份有限公司 防恶意骚扰的用户身份验证方法及装置
CN104579649B (zh) * 2013-10-28 2019-01-11 腾讯科技(深圳)有限公司 身份识别方法和系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152172A (zh) * 2011-12-07 2013-06-12 中国电信股份有限公司 一种手机令牌动态口令生成方法、客户端、服务器以及系统
US20150286815A1 (en) * 2014-04-03 2015-10-08 Electronics And Telecommunications Research Institute Access control management apparatus and method for open service components
CN104283689A (zh) * 2014-10-20 2015-01-14 优仕达资讯股份有限公司 无线验证系统及其方法
CN105827591A (zh) * 2016-02-22 2016-08-03 北京启迪思创科技有限公司 一种身份认证方法、客户端、服务器及系统

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4014163A4 (fr) * 2019-08-16 2023-06-14 Focus Universal Inc. Sécurité de carte de paiement
CN113283264A (zh) * 2021-04-16 2021-08-20 维沃移动通信有限公司 识别码的共享方法和装置
CN113159784A (zh) * 2021-04-29 2021-07-23 北京达佳互联信息技术有限公司 验证码的发送方法、装置、计算机设备及存储介质
CN114726595A (zh) * 2022-03-24 2022-07-08 中科吉芯(昆山)信息科技有限公司 一种利用时空信息认证人机身份的方法
CN114726595B (zh) * 2022-03-24 2023-09-29 中科吉芯(昆山)信息科技有限公司 一种利用时空信息认证人机身份的方法
CN116132164A (zh) * 2023-02-10 2023-05-16 上海众旗信息咨询有限公司 一种网站交互验证方法、装置、电子设备及存储介质

Also Published As

Publication number Publication date
CN106330458A (zh) 2017-01-11
CN106330458B (zh) 2019-05-14

Similar Documents

Publication Publication Date Title
WO2018035929A1 (fr) Procédé et appareil de traitement de code de vérification
WO2017071329A1 (fr) Procédé de gestion de mot de passe, système de gestion de mot de passe et dispositif terminal
WO2018155822A1 (fr) Procédé pour fournir un service d'enregistrement de compte simplifié et service d'authentification d'utilisateur, et serveur d'authentification l'utilisant
WO2018124857A1 (fr) Procédé et terminal d'authentification sur la base d'une base de données de chaînes de blocs d'un utilisateur sans face-à-face au moyen d'un id mobile, et serveur utilisant le procédé et le terminal
WO2018030707A1 (fr) Système et procédé d'authentification, et équipement d'utilisateur, serveur d'authentification, et serveur de service pour exécuter ledit procédé
WO2020164280A1 (fr) Procédé de chiffrement de transmission de données, dispositif, support de stockage et serveur
WO2016190476A1 (fr) Procédé destiné à la gestion de clé de chiffrement pour service en nuage et appareil correspondant
WO2020220413A1 (fr) Procédé et système de preuve à divulgation nulle de connaissance pour informations personnelles, et support de données
WO2015147547A1 (fr) Procédé et appareil permettant la prise en charge de l'ouverture de session au moyen d'un terminal d'utilisateur
WO2017122980A1 (fr) Dispositif électronique et procédé d'authentification d'informations d'identification associé
WO2017173838A1 (fr) Procédé d'affichage de message basé sur la vérification, et terminal de communication
WO2017071396A1 (fr) Procédé d'établissement de connexion et terminal mobile
WO2017190561A1 (fr) Procédé permettant de réaliser une entrée de mot de passe au moyen d'un clavier virtuel, terminal, serveur, système et support d'informations
WO2018124856A1 (fr) Procédé et terminal d'authentification d'un utilisateur au moyen d'un id mobile grâce à une base de données de chaînes de blocs, et serveur utilisant le procédé et le terminal
WO2017206506A1 (fr) Procédé de gestion d'élément sécurisé pour un terminal de paiement mobile nfc, et terminal
WO2017116062A1 (fr) Procédé et serveur d'authentification et de vérification de fichier
WO2017105072A1 (fr) Dispositif d'authentification basé sur des informations biométriques et son procédé de fonctionnement
WO2020147384A1 (fr) Procédé, dispositif et appareil de transaction sécurisée à base de chaîne de blocs, et support de stockage
WO2018036168A1 (fr) Procédé et dispositif d'exécution de tâche de traitement de données, serveur d'exécution et support de stockage
WO2018000978A1 (fr) Procédé de sauvegarde de données et terminal
WO2020042482A1 (fr) Procédé, appareil et dispositif de traitement de service d'agent, et support de stockage lisible par ordinateur
WO2020117020A1 (fr) Procédé pour générer une clé pki sur la base d'informations biométriques et dispositif pour générer une clé au moyen de ce procédé
WO2019144512A1 (fr) Procédé, dispositif et système de mise en œuvre de changement de numéro de téléphone portable de carte bancaire, et support de stockage
WO2020042471A1 (fr) Procédé, système, et dispositif de vérification de politique de pare-feu, et support de stockage lisible par machine
WO2016123898A1 (fr) Procédé de gestion de message court et terminal mobile associé

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16913949

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16913949

Country of ref document: EP

Kind code of ref document: A1

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载