Summary of the invention
To overcome the problems in correlation technique, the disclosure provides a kind of method verified based on identifying code, dressIt sets, equipment and system.
According to the first aspect of the embodiments of the present disclosure, a kind of method verified based on identifying code is provided, comprising: obtainTarget verification code and target hardware operational order corresponding with the target verification code;Prompt the user with the target verification code andThe target hardware operational order, and obtain identifying code to be verified and the hardware operation to be verified instruction of user's input;To serviceDevice sends checking request message, which includes that the identifying code to be verified and the hardware operation to be verified instruct,The checking request message is verified for the server according to the identifying code to be verified and the hardware operation instruction to be verified;Receive the verification result of server return.
The technical scheme provided by this disclosed embodiment can include the following benefits: prompt the user with mesh by terminalIdentifying code and target hardware operational order are marked, identifying code to be verified and the hardware operation to be verified instruction of user's input are obtained,And the checking request message instructed including the identifying code to be verified and the hardware operation to be verified, the verifying are sent to serverRequest message is verified for the server according to the identifying code to be verified and the hardware operation instruction to be verified, so that withFamily also needs input hardware operational order when inputting identifying code, and rogue program can not simulate people and complete hardware operation instructionInput, compared with determining verification result according only to identifying code in the related technology, avoids Malware by stealing target verificationThe operation not authorized by user is directly carried out after the information such as code, improves safety.
Further, the acquisition target verification code and target hardware operational order corresponding with the target verification code, packetIt includes: receiving the identifying code response message of server transmission, which includes the target verification code and the meshMark hardware operation instruction.
Further, this method further include: send identifying code request message, the identifying code request message packet to the serverIt includes and is used to indicate the instruction information that terminal supports the corresponding input type of target hardware operational order.
Further, the acquisition target verification code and target hardware operational order corresponding with the target verification code, packetIt includes: receiving the identifying code response message that server is sent, which includes the target verification code;According to the targetIdentifying code generates the target hardware operational order.
Further, the corresponding target hardware operational order of the target verification code, comprising: the position the M code of the target verification codeThe corresponding target hardware operational order of the code value of each in value;Wherein, M is greater than 0 and to be less than or equal to the target verificationThe integer of the digit of code.
Further, which is pressure rating.
According to the second aspect of an embodiment of the present disclosure, a kind of method verified based on identifying code is provided, comprising: receiveThe checking request message that terminal is sent, the checking request message include the identifying code to be verified and hardware to be verified of user's inputOperational order;Referred to according to the operation of the checking request message, target verification code and target hardware corresponding with the target verification codeIt enables, determines verification result;The verification result is returned into the terminal.
The technical scheme provided by this disclosed embodiment can include the following benefits: be tested by server according to targetDemonstrate,prove code, target hardware operational order corresponding with the target verification code and terminal transmission includes the to be verified of user's inputThe checking request message of identifying code and hardware operation to be verified instruction, determines verification result, so that user is when inputting identifying codeInput hardware operational order is also needed, and rogue program can not simulate the input that people completes hardware operation instruction, with the relevant technologiesIn according only to identifying code determine that verification result is compared, avoid Malware by steal after the information such as target verification code directly intoThe operation that row is not authorized by user, improves safety.
Further, this method further include: receive the identifying code request message of terminal transmission, the identifying code request messageThe instruction information of the corresponding input type of target hardware operational order is supported including being used to indicate terminal;It is asked according to the identifying codeMessage is sought, sends identifying code response message to the terminal, which includes the target verification code and the targetHardware operation instruction.
Further, the corresponding target hardware operational order of the target verification code, comprising: the position the M code of the target verification codeThe corresponding target hardware operational order of the code value of each in value;Wherein, M is greater than 0 and to be less than or equal to the target verificationThe integer of the digit of code.
Further, this is according to the checking request message, target verification code and target corresponding with the target verification codeHardware operation instruction, determines verification result, comprising: judge whether the identifying code to be verified matches with the target verification code;IfThe identifying code to be verified is matched with the target verification code, then judges that the hardware operation instruction to be verified is operated with the target hardwareWhether instruction matches;If the hardware operation instruction to be verified is matched with the target hardware operational order, it is determined that the verification resultTo be proved to be successful.
Further, this judges whether the identifying code to be verified matches with the target verification code, comprising: to be verified to thisIdentifying code in the code value of each execute the first judgement operation, determine the judging result of this each code value;If this is everyThe judging result of one code value is matching, it is determined that the identifying code to be verified is matched with the target verification code;
Wherein, which includes: the N code values and the target verification for judging the identifying code to be verifiedWhether N code values of code are identical;If N of N code values of the identifying code to be verified and the target verification codeCode value it is identical, it is determined that the judging result of N code values of the identifying code to be verified be matching.
Further, this judges whether the hardware operation instruction to be verified matches with the target hardware operational order, comprising:The judgement of hardware operation instruction execution second operation to be verified corresponding to the code value of each in the identifying code to be verified, reallyThe judging result of fixed this each the corresponding hardware operation instruction to be verified of code value;If this each code value is corresponding to be testedThe judging result of card hardware operation instruction is matching, it is determined that the hardware operation instruction to be verified refers to target hardware operationEnable matching;
Wherein, which includes: to judge that N code values of the identifying code to be verified are corresponding to be verifiedWhether hardware operation instructs target hardware operational order corresponding with N of target verification code code values identical;If should be toN code values of N code values of the identifying code of verifying corresponding hardware operation instruction and the target verification code to be verifiedCorresponding target hardware operational order is identical, it is determined that N code values of the identifying code to be verified are corresponding to be verified hardThe judging result of part operational order is matching.
Further, the checking request message include user input the identifying code to be verified N code values withHardware operation instruction to be verified corresponding with N of the identifying code to be verified code values;
This refers to according to the operation of the checking request message, target verification code and target hardware corresponding with the target verification codeIt enables, determines verification result, comprising: judge N code values of the identifying code to be verified and N of the target verification codeWhether code value is identical, obtains the first judging result of the N code values;The N is greater than 0 and to be less than or equal to the target verificationThe integer of the digit of code;Judge the corresponding hardware operation instruction to be verified of N code values of the identifying code to be verified and is somebody's turn to doWhether the corresponding target verification hardware operation instruction of N code values of target verification code is identical, obtains the N code valuesSecond judging result;If first judging result and second judging result are identical, and the N is equal to the target verification codeDigit, it is determined that the verification result is to be proved to be successful;If first judging result and second judging result are identical, and shouldN is less than the digit of the target verification code, then exports the first prompt information to the user, first prompt information is for prompting the useFamily inputs N+1 hardware operation instructions to be verified corresponding with the N+1 code values of the identifying code to be verified;If shouldFirst judging result or second judging result are not identical, it is determined that the verification result is authentication failed.
According to the third aspect of an embodiment of the present disclosure, a kind of device verified based on identifying code is provided, comprising: firstModule is obtained, is configured as obtaining target verification code and target hardware operational order corresponding with the target verification code;SecondModule is obtained, is configured as prompting the user with the target verification code and the target hardware operational order, and obtains user's inputIdentifying code to be verified and hardware operation to be verified instruction;First sending module is configured as sending to verify to server askingMessage is sought, which includes the identifying code to be verified and the hardware operation instruction to be verified, which disappearsBreath is verified for the server according to the identifying code to be verified and the hardware operation instruction to be verified;Receiving module, quiltIt is configured to receive the verification result of server return.
Further, which includes: the first acquisition submodule;First acquisition submodule, is configured asThe identifying code response message of server transmission is received, which includes that the target verification code and the target are hardPart operational order.
Further, device further include: the second sending module;Second sending module, is configured as to the serverIdentifying code request message is sent, which includes being used to indicate terminal to support that the target hardware operational order is correspondingInput type instruction information.
Further, which includes: the second acquisition submodule;Second acquisition submodule, is configured as:
The identifying code response message that server is sent is received, which includes the target verification code;According toThe target verification code generates the target hardware operational order.
Further, the corresponding target hardware operational order of the target verification code, comprising: the position the M code of the target verification codeThe corresponding target hardware operational order of the code value of each in value;Wherein, M is greater than 0 and to be less than or equal to the target verificationThe integer of the digit of code.
Further, which is pressure rating.
It is carried out provided by each possible embodiment of the above-mentioned third aspect and the above-mentioned third aspect based on identifying codeThe device of verifying, its advantages may refer to brought by each possible embodiment of above-mentioned first aspect and first aspectBeneficial effect, details are not described herein.
According to a fourth aspect of embodiments of the present disclosure, a kind of device verified based on identifying code is provided, comprising: firstReceiving module is configured as receiving the checking request message that terminal is sent, which includes the to be tested of user's inputThe identifying code of card and hardware operation to be verified instruction;Determining module is configured as according to the checking request message, target verification codeAnd target hardware operational order corresponding with the target verification code, determine verification result;First sending module, be configured as byThe verification result returns to the terminal.
Further, device further include: the second receiving module and the second sending module;Second receiving module, is matchedIt is set to and receives the identifying code request message that the terminal is sent, which includes being used to indicate terminal to support the targetHardware operation instructs the instruction information of corresponding input type;Second sending module is configured as being requested according to the identifying codeMessage sends identifying code response message to the terminal, which includes that the target verification code and the target are hardPart operational order.
Further, the corresponding target hardware operational order of the target verification code, comprising: the position the M code of the target verification codeThe corresponding target hardware operational order of the code value of each in value;Wherein, M is greater than 0 and to be less than or equal to the target verificationThe integer of the digit of code.
Further, which includes: the first determining module;First determining module, is configured as: judgement should be toWhether the identifying code of verifying matches with the target verification code;If the identifying code to be verified is matched with the target verification code, sentenceWhether hardware operation to be verified instruction of breaking matches with the target hardware operational order;If the hardware operation to be verified instructs and shouldTarget hardware operational order matching, it is determined that the verification result is to be proved to be successful.
Further, which includes the first determining submodule;The first determining submodule, is configured as:
First judgement operation is executed to the code value of each in the identifying code to be verified, determines this each code valueJudging result;If the judging result of this each code value is matching, it is determined that the identifying code to be verified and the targetIdentifying code matching;
Wherein, which includes: the N code values and the target verification for judging the identifying code to be verifiedWhether N code values of code are identical;If N of N code values of the identifying code to be verified and the target verification codeCode value it is identical, it is determined that the judging result of N code values of the identifying code to be verified be matching.
Further, which includes the second determining submodule;The second determining submodule, is configured as:
Hardware operation instruction execution second to be verified corresponding to the code value of each in the identifying code to be verified is sentencedDisconnected operation determines the judging result of this each the corresponding hardware operation instruction to be verified of code value;If this each code valueThe judging result of corresponding hardware operation instruction to be verified is matching, it is determined that the hardware operation instruction to be verified and the targetHardware operation instructions match;
Wherein, which includes: to judge that N code values of the identifying code to be verified are corresponding to be verifiedWhether hardware operation instructs target hardware operational order corresponding with N of target verification code code values identical;If should be toN code values of N code values of the identifying code of verifying corresponding hardware operation instruction and the target verification code to be verifiedCorresponding target hardware operational order is identical, it is determined that N code values of the identifying code to be verified are corresponding to be verified hardThe judging result of part operational order is matching.
Further, the checking request message include user input the identifying code to be verified N code values withHardware operation instruction to be verified corresponding with N of the identifying code to be verified code values;The determining module includes: second trueCover half block;
Second determining module, is configured as: judging the N code values and the target verification of the identifying code to be verifiedWhether N code values of code are identical, obtain the first judging result of the N code values;The N is greater than 0 and to be less than or waitIn the integer of the digit of the target verification code;Judge the corresponding hardware to be verified of code value of N of the identifying code to be verifiedWhether operational order target verification hardware operation instruction corresponding with N of target verification code code values is identical, is somebody's turn to doSecond judging result of N code values;If first judging result and second judging result are identical, and the N is equal toThe digit of the target verification code, it is determined that the verification result is to be proved to be successful;If first judging result and the second judgement knotFruit is identical, and the N is less than the digit of the target verification code, then exports the first prompt information to the user, first promptInformation be used to prompting the user input N+1 of the identifying code to be verified it is corresponding to be verified with the N+1 code valuesHardware operation instruction;If first judging result or second judging result are not identical, it is determined that the verification result is verifyingFailure.
It is carried out provided by each possible embodiment of above-mentioned fourth aspect and above-mentioned fourth aspect based on identifying codeThe device of verifying, its advantages may refer to brought by each possible embodiment of above-mentioned second aspect and second aspectBeneficial effect, details are not described herein.
According to a fifth aspect of the embodiments of the present disclosure, a kind of system verified based on identifying code is provided, comprising: thirdDevice involved in each possible implementation of aspect or the third aspect and each of fourth aspect or fourth aspect are able to achieveDevice involved in mode.
According to a sixth aspect of an embodiment of the present disclosure, a kind of terminal is provided, comprising: processor, transmitter, receiver and byIt is configured to the memory of storage processor executable instruction;
Wherein, which is configured as: obtaining target verification code and target hardware corresponding with the target verification codeOperational order;The target verification code and the target hardware operational order are prompted the user with, and obtains the to be verified of user's inputIdentifying code and hardware operation to be verified instruction;The transmitter is configured as: sending checking request message, the verifying to serverRequest message includes the identifying code to be verified and the hardware operation instruction to be verified, which is used for the serverIt is verified according to the identifying code to be verified and the hardware operation instruction to be verified;The receiver is configured as: receiving the clothesThe verification result that business device returns.
According to the 7th of embodiment of the present disclosure aspect, provide a kind of server, comprising: processor, transmitter, receiver andIt is configured as the memory of storage processor executable instruction;Wherein, which is configured as: receiving the verifying that terminal is sentRequest message, the checking request message include identifying code to be verified and the hardware operation to be verified instruction of user's input;At thisReason device is configured as: being grasped according to the checking request message, target verification code and target hardware corresponding with the target verification codeIt instructs, determines verification result;The transmitter is configured as returning to the verification result into the terminal.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, notThe disclosure can be limited.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related toWhen attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodimentDescribed in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appendedThe example of device and method being described in detail in claims, some aspects of the invention are consistent.
Fig. 1 is a kind of method flow diagram verified based on identifying code shown according to an exemplary embodiment, the partyMethod can be applied to need to input in any terminal that identifying code is verified, such as mobile phone, tablet computer etc., as shown in Figure 1,The following steps are included:
In a step 101, target verification code and target hardware operational order corresponding with the target verification code are obtained.
In this step, which is used to indicate the identifying code for needing user to input, which can beSome unordered texts, such as " FXCB ", " 0536 " etc..The target hardware operational order, which is used to indicate, needs the hard of user's inputPart operational order, the target hardware operational order include: pressure rating, rock number, trace information etc..Wherein, terminal obtainsThe mode of target verification code can obtain for terminal from server.The mode that terminal obtains target hardware operational order specifically can be withAre as follows: terminal is obtained from server or is generated by terminal oneself.
In a step 102, the target verification code and the target hardware operational order are prompted the user with, and it is defeated to obtain userThe identifying code to be verified entered and hardware operation to be verified instruction.
In this step, specifically, can by way of popping up prompt window to the user prompt the target verification code andThe target hardware operational order;Alternatively, can also by way of sending short message to the user prompt the target verification code andThe target hardware operational order.Here, to the user prompt the purpose of the target verification code and target hardware operational order be forIt allows user to input identifying code to be verified according to prompt and hardware operation to be verified instructs.In this step, user is inputtedIdentifying code to be verified and the sequence of hardware operation to be verified instruction be not restricted.Optionally, user can first input toThe identifying code of verifying inputs hardware operation instruction to be verified or user again can also first input hardware operation instruction to be verified againIt inputs identifying code or user to be verified and can also input hardware operation to be verified while inputting identifying code to be verified and refer toIt enables.
In step 103, checking request message is sent to server, which includes the verifying to be verifiedCode and the hardware operation instruction to be verified.
In this step, the checking request message is for the server according to the identifying code to be verified and the hardware to be verifiedOperational order is verified, so that the server when obtaining verification result, is not only needed according to the to be verified of user's inputIdentifying code, it is also necessary to be instructed according to the hardware operation to be verified of user's input.It should be noted that according to identifying code to be verifiedThe step of being verified with hardware operation to be verified instruction can also be carried out by terminal.
At step 104, the verification result of server return is received.
In this step, it is specifically as follows and receives the authentication response information that the server returns, the identifying code response message packetInclude the verification result.Wherein, which, which is specifically as follows, is proved to be successful or authentication failed.Optionally, when verification result isWhen authentication failed, which can also include the failure cause of authentication failed, which for example can be to testDemonstrate,prove code input error and/or hardware operation instruction input mistake.
The method verified based on identifying code of the present embodiment prompts the user with target verification code and target by terminalHardware operation instruction, obtains identifying code to be verified and the hardware operation to be verified instruction of user's input, and sends to serverChecking request message including the identifying code to be verified and the hardware operation instruction to be verified, the checking request message is for being somebody's turn to doServer is verified according to the identifying code to be verified and the hardware operation instruction to be verified, so that user is in input identifying codeWhen also need input hardware operational order, and rogue program can not simulate the input that people completes hardware operation instruction, to related skillIt determines that verification result is compared according only to identifying code in art, avoids Malware by stealing after the information such as target verification code directlyThe operation not authorized by user is carried out, safety is improved.
Fig. 2 is a kind of method flow diagram verified based on identifying code shown according to another exemplary embodiment, shouldMethod can be applied in any server verified using identifying code, as shown in Figure 2, comprising the following steps:
In step 201, receive terminal send checking request message, the checking request message include user input toThe identifying code of verifying and hardware operation to be verified instruction.
In this step, interacting message, the wireless communication can be carried out by network by wireless communication between server and terminalNetwork for example can be global system for mobile communications (GSM, Global System for Mobile Communication) netNetwork, long term evolution (LTE, Long Term Evolution) network, bluetooth (Bluetooth) network, Wireless Fidelity (WiFi,Wireless Fidelity) network etc..
In step 202, according to the checking request message, target verification code and target corresponding with the target verification codeHardware operation instruction, determines verification result.
In this step, server not only needs the identifying code to be verified inputted according to user when determining verification resultWith target verification code, it is also necessary to according to the hardware operation to be verified instruction of user's input and target hardware operational order.
In step 203, which is returned into the terminal.
In this step, it is specifically as follows server to terminal and sends authentication response information, which includes shouldVerification result.Wherein, which may be considered the corresponding response message of above-mentioned checking request message.
The method verified based on identifying code of the present embodiment, by server according to target verification code and the targetWhat the corresponding target hardware operational order of identifying code and terminal were sent includes the identifying code to be verified of user's input and to be testedThe checking request message for demonstrate,proving hardware operation instruction, determines verification result, so that user also needs to input when inputting identifying code firmlyPart operational order, and rogue program can not simulate the input that people completes hardware operation instruction, and in the related technology according only to verifyingCode determines that verification result is compared, and avoids Malware by directly carrying out not awarded by user after stealing the information such as target verification codeThe operation of power, improves safety.
Fig. 3 is a kind of method flow diagram verified based on identifying code shown according to another exemplary embodiment, shouldMethod essentially describes the interactive process of server and terminal on the basis of Fig. 1 and embodiment illustrated in fig. 2, as shown in figure 3,The following steps are included:
In step 301, terminal to server sends identifying code request message.
In this step, which is used for the server requests authentication code.Optionally, which requestsMessage may include the instruction information for being used to indicate terminal and supporting the corresponding input type of target hardware operational order.For example, working asWhen object run instruction is pressure rating, which for example may include being used to indicate what terminal support pressure inputtedIndicate information.
In step 302, which sends identifying code response message to the terminal according to the identifying code request message.
In this step, which includes target verification code.Optionally, which can be withIncluding the corresponding target hardware operational order of the target verification code.Optionally, step 302 is specifically as follows server and is tested according to thisCode request message is demonstrate,proved, target verification code is generated, target hardware corresponding with the target verification code is generated according to the target verification codeOperational order, and the identifying code response message including the target verification code and the target hardware operational order is sent to terminal.Wherein, the corresponding target hardware operational order of the target verification code, comprising: each in the position the M code value of the target verification codeCode value corresponds to a target hardware operational order, wherein M is the whole of the digit greater than 0 and less than or equal to the target verification codeNumber;Alternatively, entire target verification code can correspond to a target hardware operational order.For example, for target verification code " FXCB ",When M is equal to digit (that is, 4) of target verification code, primary code value F can correspond to a target hardware operational order, theTwo code value X can correspond to a target hardware operation, and the code value C of third position can correspond to a target hardware operation and refer toIt enables, the 4th code value B can correspond to a target hardware operational order.It is with pressure rating with target hardware operational orderExample, server can be determined when generating target hardware operational order according to target verification code according to the length of target verification codePressure rating number, and M pressure rating is randomly choosed in the pressure rating number.It should be noted that when identifying code response disappearsWhen not including target hardware operational order in breath, which can also be generated by terminal, specific generation sideFormula is similar according to target verification code generation target hardware operational order with server, repeats no more.In Fig. 3 with target verification code andFor target hardware operational order is all generated by server.
In step 303, which prompts the user with the target verification code and the target hardware operational order, and obtainsThe identifying code to be verified of user's input and hardware operation to be verified instruction.
In this step, user can input identifying code by the identifying code input frame in terminal.Wherein, terminal can rootAccording to the length of target verification code, identifying code input frame is divided into the input grid of corresponding number.For example, if target verification codeLength is 6, then identifying code input frame is divided into 6 lattice, the corresponding target verification code of every lattice.Optionally, defeated in acquisition userIt can also include: to recall entering method keyboard before the identifying code to be verified entered and hardware operation to be verified instruction.
Using target hardware operational order as pressure rating, and for all corresponding pressure rating of the code value of each, useFamily can input identifying code and hardware operation instruction in the following way: user can test after one code value of every inputThe corresponding grid position of this code value in code input frame is demonstrate,proved, presses this grid using the corresponding pressure rating of this code value.It is above-mentionedIn mode, user is after entering method keyboard clicks a code value, it is also necessary to screen is pressed in the corresponding grid of this code value, thisSample can allow user explicitly to understand identifying code currently entered or target hardware operational order, but need user's fingerPosition changes to identifying code input frame by entering method keyboard.In order to simplify the operation of user, user clicks on entering method keyboardScreen can be pressed while one code value with the corresponding pressure rating of this code value, after pressing, terminal can both be obtainedThe corresponding pressure rating of this code value can also be obtained by obtaining this code value.
In step 304, which sends checking request message to the server, which includes that this is to be testedThe identifying code of card and the verifying hardware operation instruct.
It should be noted that step 304 is similar with step 103, details are not described herein.
In step 305, which judges whether the identifying code to be verified matches with the target verification code.
In this step, if the identifying code to be verified is matched with the target verification code, 306 are thened follow the steps.If this is to be testedThe identifying code of card and the target verification code mismatch, and then follow the steps 308.Optionally, step 305 is specifically as follows: waiting for thisThe code value of each in the identifying code of verifying executes the first judgement operation, determines the judging result of this each code value;IfThe judging result of this each code value is matching, it is determined that the identifying code to be verified is matched with the target verification code;ItsIn, which includes: N for judge N code values of the identifying code to be verified and the target verification codeCode value it is whether identical;If N code values of the identifying code to be verified and N of target verification code code value phasesTogether, it is determined that the judging result of N code values of the identifying code to be verified is matching.
Within step 306, which judges that the hardware operation to be verified instructs and whether is the target hardware operational orderMatching.
In this step, if the hardware operation instruction to be verified is matched with the target hardware operational order, then follow the steps307;If the hardware operation instruction to be verified is mismatched with the target hardware operational order, 308 are thened follow the steps.Optionally, it walksRapid 306 are specifically as follows: hardware operation instruction to be verified corresponding to the code value of each in the identifying code to be verified is heldThe judgement operation of row second determines the judging result of the corresponding hardware operation instruction to be verified of this each code value;If this is eachThe judging result of the corresponding hardware operation instruction to be verified of the code value of position is matching, it is determined that the hardware operation instruction to be verifiedIt is matched with the target hardware operational order;Wherein, which includes: N for judging the identifying code to be verifiedThe corresponding hardware operation to be verified of code value instruct target hardware corresponding with N of target verification code code values to operate to refer toIt whether identical enables;If the corresponding hardware operation instruction to be verified of N code values of the identifying code to be verified is tested with the targetThe corresponding target hardware operational order of N code values for demonstrate,proving code is identical, it is determined that N codes of the identifying code to be verifiedThe judging result for being worth corresponding hardware operation instruction to be verified is matching.
It should be noted that server can also first judge the hardware operation to be verified instruction of user's input in the present embodimentWhether matched with the target hardware operational order, then judge user input identifying code to be verified and the target verification code whetherMatching show that the Specific Principles of verification result can be with are as follows: if the identifying code to be verified is matched with the target verification code, and this toVerifying hardware operation instruction is matched with the target hardware operational order, then verification result is to be proved to be successful;It is tested if this is to be verifiedIt demonstrate,proves code and the target verification code mismatches or the hardware operation instruction to be verified is mismatched with the target hardware operational order,Then determine that verification result is authentication failed.
In step 307, which determines that verification result is to be proved to be successful.
It should be noted that executing step 309 after step 307 has executed.
In step 308, which determines that verification result is authentication failed.
In a step 309, which returns to the terminal for the verification result.
In this step, when verification result is authentication failed, terminal is after the verification result for receiving server returnCan also be performed: terminal is back to target pages and shows, which can be for example homepage, identifying code input page etc.Step.
The method verified based on identifying code of the present embodiment, by inputting identifying code to be verified and to be tested in userAfter demonstrate,proving hardware operation instruction, if it is determined that the identifying code to be verified of user's input is matched with the target verification code, and determining shouldThe hardware operation to be verified instruction of user's input is matched with the target hardware operational order, it is determined that is proved to be successful, is otherwise determinedAuthentication failed, so that user also needs input hardware operational order when inputting identifying code, and can not to simulate people complete for rogue programAt the input that hardware operation instructs, Malware is avoided by directly carrying out after stealing the information such as target verification code not by userThe operation of authorization, improves safety.
Fig. 4 is a kind of method flow diagram verified based on identifying code shown according to another exemplary embodiment, shouldOn the basis of method embodiment shown in Fig. 3, in step 304 checking request message may include user's input this is to be verifiedN code values of identifying code and hardware operation instruction to be verified corresponding with N of the identifying code to be verified code values.As shown in figure 4, step 305- step 308 could alternatively be following steps:
In step 401, which judges the N code values and the target verification code of the identifying code to be verifiedWhether N code values are identical, obtain the first judging result of the N code values.
In this step, N is the integer of the digit greater than 0 and less than or equal to the target verification code.
In step 402, which judges the corresponding hardware to be verified of code value of N of the identifying code to be verifiedWhether operational order target verification hardware operation instruction corresponding with N of target verification code code values is identical, is somebody's turn to doSecond judging result of N code values.
It should be noted that there is no the limitations of sequencing between step 401 and step 402.
In step 403, which judges whether first judging result with second judging result is identical.
In this step, if first judging result with second judging result be it is identical, then follow the steps 404.If shouldFirst judging result or second judging result be it is not identical, then follow the steps 407.Optionally, in the first judging result orTwo judging results are not mutually at the same time it can also include: the server to the user the second prompt information of output, which believesThe reason of breath is for prompting the user's checking to fail.Specifically, if first judging result be it is not identical, the authentication failedReason is identifying code input error;If second judging result be it is not identical, the identifying code fail the reason of be hardware operationInstruction input mistake.It should be noted that the server can be by being sent to the terminal for second prompt information, so that shouldTerminal exports the mode of second prompt information to the user, realizes that the server exports the second prompt information to the user.
In step 404, which judges whether N is equal to the digit of the target verification code.
In this step, if N is equal to the digit of the target verification code, 405 are thened follow the steps.If N is less than the target verification codePosition, then follow the steps 406.
In step 405, which determines that verification result is to be proved to be successful.
It should be noted that step 405 terminates after having executed.
In a step 406, which exports the first prompt information to the user.
In this step, first prompt information be used to prompting the user input N+1 of the identifying code to be verified withThe corresponding hardware operation instruction to be verified of the N+1 code values.It should be noted that the server can by by this firstPrompt information is sent to the terminal, in a manner of making the terminal export first prompt information to the user, realizes the serverThe first prompt information is exported to the user.
It should be noted that the server can be further to the identifying code to be verified after step 406 has executedThe hardware operation instruction to be verified corresponding with N+1 of the identifying code to be verified code values of N+1 code values is testedTo N code values of the identifying code to be verified and the verifying to be verified in card, detailed process and step 401- step 407The process that the corresponding hardware operation instruction to be verified of N code values of code is verified is similar, repeats no more.
In step 407, which determines that verification result is authentication failed.
It should be noted that the main distinction of the present embodiment and embodiment illustrated in fig. 3 is, it is defeated in user in the present embodimentIt is verified during entering identifying code and hardware operation instruction, and embodiment illustrated in fig. 3 is all in user's input completionIt is verified again after identifying code and hardware operation instruction.In the present embodiment, implement shown in the specific implementation of other parts and Fig. 3It is similar in example, therefore the part not being described in detail in this present embodiment is closed, it specifically may refer to embodiment illustrated in fig. 3.
The method verified based on identifying code of the present embodiment, by inputting identifying code and hardware operation instruction in userDuring verified, determine verification result so that user also needs input hardware operational order when inputting identifying code, andRogue program can not simulate the input that people completes hardware operation instruction, avoid Malware by stealing the letter such as target verification codeThe operation not authorized by user is directly carried out after breath, improves safety.
Following is embodiment of the present disclosure, can be used for executing embodiments of the present disclosure.It is real for disclosure deviceUndisclosed details in example is applied, embodiments of the present disclosure is please referred to.
Fig. 5 is a kind of block diagram of device verified based on identifying code shown according to an exemplary embodiment.The dressSetting being implemented in combination with as some or all of of terminal by software, hardware or both.Referring to Fig. 5, the device packetIt includes the first acquisition module 501, second and obtains module 502, the first sending module 503 and receiving module 504.
Wherein, first module 501 is obtained, is configured as obtaining target verification code and mesh corresponding with the target verification codeMark hardware operation instruction;
Second obtains module 502, is configured as prompting the user with the target verification code that the first acquisition module 501 is gotAnd the target hardware operational order, and obtain identifying code to be verified and the hardware operation to be verified instruction of user's input;
First sending module 503 is configured as sending checking request message to server, which includes theIdentifying code to be verified and the hardware operation instruction to be verified, the checking request message that two acquisition modules 502 are got are usedIt is verified in the server according to the identifying code to be verified and the hardware operation instruction to be verified;
Receiving module 504 is configured as receiving the verification result of server return.
Optionally, the corresponding target hardware operational order of the target verification code, comprising: the position the M code value of the target verification codeIn each the corresponding target hardware operational order of code value;Wherein, M is greater than 0 and to be less than or equal to the target verification codeDigit integer.
Optionally, which is pressure rating.
In conclusion the device verified based on identifying code that the embodiment of the present disclosure provides, obtains module by secondTarget verification code and target hardware operational order are prompted the user with, and obtains the identifying code to be verified and to be verified of user's inputHardware operation instruction, it includes that the identifying code to be verified and the hardware operation to be verified refer to that the first sending module is sent to serverThe checking request message of order, the checking request message is for the server according to the identifying code to be verified and the hardware to be verifiedOperational order is verified, so that user also needs input hardware operational order when inputting identifying code, and rogue program can notThe input that simulation people completes hardware operation instruction avoids compared with determining verification result according only to identifying code in the related technologyMalware improves safety by directly carrying out the operation not authorized by user after stealing the information such as target verification code.
Fig. 6 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment.GinsengAccording to Fig. 6, on the basis of device block diagram shown in Fig. 5, first obtains module 501, comprising: the first acquisition submodule 5011.It shouldFirst acquisition submodule 5011 is configured as receiving the identifying code response message of server transmission, the identifying code response messageIncluding the target verification code and the target hardware operational order.
In conclusion the device verified based on identifying code that the embodiment of the present disclosure provides, obtains submodule by firstBlock receives the identifying code response message including target verification code and target hardware operational order that server is sent, so that terminal canTo obtain target verification code and target hardware operational order.
Fig. 7 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment.GinsengAccording to Fig. 7, on the basis of device block diagram shown in Fig. 6, which can also include: the second sending module 505.
Second sending module 505 is configured as sending identifying code request message to the server, and identifying code request disappearsBreath includes being used to indicate the instruction information that terminal supports the corresponding input type of target hardware operational order.
Fig. 8 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment.GinsengAccording to Fig. 8, on the basis of device block diagram shown in Fig. 5, first obtains module 501, comprising: the second acquisition submodule 5012.
Second acquisition submodule 5012, is configured as:
The identifying code response message that server is sent is received, which includes the target verification code;According toThe target verification code generates the target hardware operational order.
In conclusion the device verified based on identifying code that the embodiment of the present disclosure provides, obtains submodule by secondBlock receives the identifying code response message including target verification code that server is sent, and generates target hardware according to target verification codeOperational order allows terminal to obtain target verification code and target hardware operational order.
Fig. 9 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment.It shouldDevice being implemented in combination with as some or all of of server by software, hardware or both.Referring to Fig. 9, the dressSet includes: the first receiving module 901, determining module 902 and the first sending module 903.
Wherein, the first receiving module 901 is configured as receiving the checking request message that terminal is sent, which disappearsBreath includes identifying code to be verified and the hardware operation to be verified instruction of user's input;
Determining module 902 is configured as being tested according to the checking request message, target that the first receiving module 901 receivesCode and target hardware operational order corresponding with the target verification code are demonstrate,proved, determines verification result;
First sending module 903 is configured as the verification result that determining module 902 determines returning to the terminal.
Optionally, the corresponding target hardware operational order of the target verification code, comprising:
The corresponding target hardware operational order of the code value of each in the position the M code value of the target verification code;Wherein, M isThe integer of digit greater than 0 and less than or equal to the target verification code.
In conclusion the embodiment of the present disclosure provide the device verified based on identifying code, by determining module according toWhat target verification code, target hardware operational order corresponding with the target verification code and terminal were sent include user's input toThe checking request message of the identifying code of verifying and hardware operation to be verified instruction, determines verification result, so that user tests in inputInput hardware operational order is also needed when demonstrate,proving code, and rogue program can not simulate the input that people completes hardware operation instruction, with phaseDetermine that verification result is compared according only to identifying code in the technology of pass, after avoiding Malware by stealing the information such as target verification codeThe operation not authorized by user is directly carried out, safety is improved.
Figure 10 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment.GinsengAccording to Figure 10, on the basis of device block diagram shown in Fig. 9, optionally, which further includes the second receiving module 904 and the second hairSend module 905.
Wherein, second receiving module 904 is configured as receiving the identifying code request message of terminal transmission, the verifyingCode request message includes the instruction information for being used to indicate terminal and supporting the corresponding input type of target hardware operational order;
Second sending module 905, is configured as according to the identifying code request message, sends identifying code response to the terminalMessage, the identifying code response message include the target verification code and the target hardware operational order.
In conclusion the device verified based on identifying code that the embodiment of the present disclosure provides, passes through the second sending moduleThe identifying code response message including target verification code and target hardware operational order is sent to terminal, terminal is obtainedThe target verification code and target hardware operational order.
Figure 11 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment.GinsengAccording to Figure 11, on the basis of device block diagram shown in Fig. 9, optionally, determining module 902 includes the first determining module 9021;
Wherein, the first determining module 9021, is configured as:
Judge whether the identifying code to be verified matches with the target verification code;
If the identifying code to be verified is matched with the target verification code, the hardware operation instruction to be verified and the mesh are judgedWhether mark hardware operation instruction matches;
If the hardware operation instruction to be verified is matched with the target hardware operational order, it is determined that the verification result is verifyingSuccess.
In conclusion the device verified based on identifying code that the embodiment of the present disclosure provides, passes through the first determining moduleIt is inputted in user after identifying code and hardware operation to be verified instruction to be verified, if it is determined that the verifying to be verified of user's inputCode is matched with the target verification code, and determines hardware operation to be verified instruction and the target hardware operational order of user inputMatching, it is determined that be proved to be successful, authentication failed otherwise determined, so that user also needs input hardware to operate when inputting identifying codeInstruction, and rogue program can not simulate the input that people completes hardware operation instruction, avoid Malware and tested by stealing targetThe operation not authorized by user is directly carried out after the information such as card code, improves safety.
Figure 12 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment.GinsengAccording to Figure 12, on the basis of device block diagram shown in Figure 11, optionally, the first determining module 9021 includes first determining submodule90211。
Wherein, the first determining submodule 90211, is configured as: to the code of each in the identifying code to be verifiedValue executes the first judgement operation, determines the judging result of this each code value;If the judging result of this each code value is equalFor matching, it is determined that the identifying code to be verified is matched with the target verification code;
Wherein, which, which operates, includes:
Judge whether N code values of the identifying code to be verified are identical as N of target verification code code values;
If N code values of the identifying code to be verified are identical as N of target verification code code values, it is determined thatThe judging result of N code values of the identifying code to be verified is matching.
Figure 13 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment.GinsengAccording to Figure 13, on the basis of device block diagram shown in Figure 11, optionally, the first determining module 9021 includes second determining submodule90212。
The second determining submodule 90212, is configured as: corresponding to the code value of each in the identifying code to be verifiedHardware operation instruction execution second to be verified judge operation, determine that this each the corresponding hardware operation to be verified of code value refers toThe judging result of order;If the judging result of the corresponding hardware operation instruction to be verified of this each code value is matching, reallyThe fixed hardware operation instruction to be verified is matched with the target hardware operational order;
Wherein, which, which operates, includes:
Judge the corresponding hardware operation instruction to be verified of N code values of the identifying code to be verified and the target verificationWhether the corresponding target hardware operational order of N code values of code is identical;
If the corresponding hardware operation instruction to be verified of N code values of the identifying code to be verified and the target verification codeThe corresponding target hardware operational order of N code values it is identical, it is determined that N code values pair of the identifying code to be verifiedThe judging result for the hardware operation to be verified instruction answered is matching.
Figure 14 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment.GinsengAccording to Figure 14, on the basis of device block diagram shown in Fig. 9, optionally, the checking request message include user's input this is to be testedN code values of the identifying code of card and hardware operation to be verified corresponding with N of the identifying code to be verified code valuesInstruction;Determining module 902 includes the second determining module 9022;
Second determining module 9022, is configured as:
Judge whether N code values of the identifying code to be verified are identical as N of target verification code code values,Obtain the first judging result of the N code values;The N is the whole of the digit greater than 0 and less than or equal to the target verification codeNumber;
Judge the corresponding hardware operation instruction to be verified of N code values of the identifying code to be verified and the target verificationWhether the corresponding target verification hardware operation instruction of N code values of code is identical, obtains the second judgement of the N code valuesAs a result;
If first judging result and second judging result are identical, and the N is equal to the digit of the target verification code,Then determine that the verification result is to be proved to be successful;
If first judging result and second judging result are identical, and the N is less than the digit of the target verification code,The first prompt information then is exported to the user, first prompt information is for prompting the user to input the identifying code to be verifiedN+1 hardware operation instructions to be verified corresponding with the N+1 code values;
If first judging result or second judging result are not identical, it is determined that the verification result is authentication failed.
In conclusion the device verified based on identifying code that the embodiment of the present disclosure provides, passes through the second determining moduleIt is verified during user inputs identifying code and hardware operation instructs, verification result is determined, so that user tests in inputAlso input hardware is needed to operate when demonstrate,proving code, and rogue program can not simulate the input that people completes hardware operation, and it is soft to avoid malicePart improves safety by directly carrying out the operation not authorized by user after stealing the information such as target verification code.
The disclosure also provides a kind of system verified based on identifying code, comprising: above-mentioned figure 5-8 is any based on verifyingDevice and any device verified based on identifying code of above-mentioned Fig. 9-Figure 14 described in the Installation practice that code is verifiedDevice described in embodiment.Its realization principle is similar with above-mentioned apparatus embodiment with effect, and details are not described herein.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this methodEmbodiment in be described in detail, no detailed explanation will be given here.
The foregoing describe the inner function module for the device verified based on identifying code and structural schematic diagram, Figure 15 is rootAccording to the block diagram of the entity of the terminal shown in an exemplary embodiment, which can be for example mobile phone or tablet computer etc..Such as figureShown in 15, which may include: processor 1501, transmitter 1502, receiver 1503 and is configured as storage processorThe memory 1504 of 1501 executable instruction.
Processor 1501 is configured as: obtaining target verification code and target hardware corresponding with target verification code operationInstruction;The target verification code and the target hardware operational order are prompted the user with, and obtains to be verified the testing of user's inputDemonstrate,prove code and hardware operation to be verified instruction;
Transmitter 1502 is configured as: sending checking request message to server, which includes that this is to be testedThe identifying code of card and the hardware operation instruction to be verified, the checking request message is for the server according to the verifying to be verifiedCode and the hardware operation instruction to be verified are verified;
Receiver 1503 is configured as: receiving the verification result of server return.
The block diagram of entity of block diagram and terminal of the entity of server is similar, equally may include: processor, transmitter,Receiver and the memory for being configured as storage processor executable instruction;
Wherein, the receiver is configured as: receiving the checking request message that terminal is sent, the checking request message packageInclude identifying code to be verified and the hardware operation to be verified instruction of user's input;
The processor is configured to: according to the checking request message, target verification code and with the target verificationThe corresponding target hardware operational order of code, determines verification result;
The transmitter is configured as the verification result returning to the terminal.
In above-mentioned terminal and the embodiment of server, it should be appreciated that the processor can be central processing unit (English:Central Processing Unit, referred to as: CPU), can also be other general processors, digital signal processor (English:Digital Signal Processor, referred to as: DSP), specific integrated circuit (English: Application SpecificIntegrated Circuit, referred to as: ASIC) etc..General processor the can be microprocessor person processor is also possible to appointWhat conventional processor etc..And memory above-mentioned can be read-only memory (English: read-only memory, abbreviation:ROM), random access memory (English: random access memory, abbreviation: RAM), flash memory, hard disk or solidState hard disk.SIM card is also referred to as subscriber identification card, smart card, and digital mobile telephone must load onto this card and can use.I.e.Store the information of digital mobile phone client on computer chip, the contents such as telephone directory of the key of encryption and user.BeforeThe receiver stated can be the element with receive capabilities, such as the antenna with receive capabilities.Transmitter above-mentioned can beElement with sending function, such as the antenna with sending function.The step of method in conjunction with disclosed in the embodiment of the present inventionHardware processor can be embodied directly in and execute completion, or in processor hardware and software module combination execute completion.
Figure 16 is the block diagram of the terminal 800 shown according to another exemplary embodiment.For example, terminal 800 can be movementPhone, computer, digital broadcasting terminal, messaging device, game console, tablet device, Medical Devices, body-building equipment,Personal digital assistant etc..
Referring to Fig.1 6, terminal 800 may include following one or more components: processing component 802, memory 804, power supplyComponent 806, multimedia component 808, audio component 810, the interface 812 of input/output (I/O), sensor module 814, andCommunication component 816.
The integrated operation of the usual controlling terminal 800 of processing component 802, such as with display, telephone call, data communication, phaseMachine operation and record operate associated operation.Processing component 802 may include that one or more processors 820 refer to executeIt enables, to perform all or part of the steps of the methods described above.In addition, processing component 802 may include one or more modules, justInteraction between processing component 802 and other assemblies.For example, processing component 802 may include multi-media module, it is more to facilitateInteraction between media component 808 and processing component 802.
Memory 804 is configured as storing various types of data to support the operation in terminal 800.These data are shownExample includes the instruction of any application or method for operating in terminal 800, contact data, and telephone book data disappearsBreath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their groupIt closes and realizes, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM) is erasable to compileJourney read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flashDevice, disk or CD.
Power supply module 806 provides electric power for the various assemblies of terminal 800.Power supply module 806 may include power management systemSystem, one or more power supplys and other with for terminal 800 generate, manage, and distribute the associated component of electric power.
Multimedia component 808 includes the screen of one output interface of offer between the terminal 800 and user.SomeIn embodiment, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screenIt may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touch sensorsTo sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense the side of touch or sliding actionBoundary, but also detect duration and pressure relevant to the touch or slide.In some embodiments, multimedia component808 include a front camera and/or rear camera.When equipment 800 is in operation mode, such as screening-mode or video screen moduleWhen formula, front camera and/or rear camera can receive external multi-medium data.Each front camera and postposition are taken the photographAs head can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 810 is configured as output and/or input audio signal.For example, audio component 810 includes a MikeWind (MIC), when terminal 800 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone is matchedIt is set to reception external audio signal.The received audio signal can be further stored in memory 804 or via communication setPart 816 is sent.In some embodiments, audio component 810 further includes a loudspeaker, is used for output audio signal.
I/O interface 812 provides interface between processing component 802 and peripheral interface module, and above-mentioned peripheral interface module canTo be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lockDetermine button.
Sensor module 814 includes one or more sensors, and the state for providing various aspects for terminal 800 is commentedEstimate.For example, sensor module 814 can detecte the state that opens/closes of equipment 800, the relative positioning of component, such as the groupPart is the display and keypad of terminal 800, and sensor module 814 can also detect 800 1 components of terminal 800 or terminalPosition change, the existence or non-existence that user contacts with terminal 800, the temperature in 800 orientation of terminal or acceleration/deceleration and terminal 800Degree variation.Sensor module 814 may include proximity sensor, be configured to detect without any physical contact attachedThe presence of nearly object.Sensor module 814 can also include optical sensor, such as CMOS or ccd image sensor, for being imagedIt is used in.In some embodiments, the sensor module 814 can also include acceleration transducer, gyro sensor,Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between terminal 800 and other equipment.Terminal800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or their combination.In an exemplary implementationIn example, communication component 816 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.In one exemplary embodiment, which further includes near-field communication (NFC) module, to promote short range communication.ExampleSuch as, NFC module can be based on radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology,Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, terminal 800 can be believed by one or more application specific integrated circuit (ASIC), numberNumber processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally providedIt such as include the memory 804 of instruction, above-metioned instruction can be executed by the processor 820 of terminal 800 to complete the above method.For example,The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk andOptical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in storage medium is held by the processor of terminal 800When row, so that terminal 800 is able to carry out a kind of method verified based on identifying code, this method comprises:
Obtain target verification code and target hardware operational order corresponding with the target verification code;Prompt the user with the meshIdentifying code and the target hardware operational order are marked, and obtains the identifying code to be verified and hardware operation to be verified of user's inputInstruction;Checking request message is sent to server, which includes the identifying code to be verified and this is to be verified hardPart operational order, the checking request message refer to for the server according to the identifying code to be verified and the hardware operation to be verifiedOrder is verified;Receive the verification result of server return.
Further, the acquisition target verification code and target hardware operational order corresponding with the target verification code, packetIt includes: receiving the identifying code response message of server transmission, which includes the target verification code and the meshMark hardware operation instruction.
Further, this method further include: send identifying code request message, the identifying code request message packet to the serverIt includes and is used to indicate the instruction information that terminal supports the corresponding input type of target hardware operational order.
Further, the acquisition target verification code and target hardware operational order corresponding with the target verification code, packetIt includes: receiving the identifying code response message that server is sent, which includes the target verification code;According to the targetIdentifying code generates the target hardware operational order.
Further, the corresponding target hardware operational order of the target verification code, comprising: the position the M code of the target verification codeThe corresponding target hardware operational order of the code value of each in value;Wherein, M is greater than 0 and to be less than or equal to the target verificationThe integer of the digit of code.
Further, which is pressure rating.
Figure 17 is the block diagram of the server 1900 shown according to another exemplary embodiment.Referring to Fig.1 7, server 1900It further comprise one or more processors and memory represented by a memory 1932 including processing component 1922Resource, can be by the instruction of the execution of processing component 1922, such as application program for storing.The application stored in memory 1932Program may include it is one or more each correspond to one group of instruction module.In addition, processing component 1922 is matchedIt is set to and executes instruction, to execute the above method.
Server 1900 can also include the power management that a power supply module 1926 is configured as execute server 1900,One wired or wireless network interface 1950 is configured as server 1900 being connected to network and an input and output (I/O)Interface 1958.Server 1900 can be operated based on the operating system for being stored in memory 1932, such as WindowsServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally providedIt such as include the memory 1932 of instruction, above-metioned instruction can be executed by the processing component 1922 of server 1900 to complete above-mentioned sideMethod.For example, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, magneticBand, floppy disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in storage medium is executed by the processor of serverWhen, it enables the server to execute a kind of method verified based on identifying code, this method comprises:
The checking request message that terminal is sent is received, which includes the identifying code to be verified of user's inputIt is instructed with hardware operation to be verified;According to the checking request message, target verification code and mesh corresponding with the target verification codeHardware operation instruction is marked, determines verification result;The verification result is returned into the terminal.
Further, this method further include: receive the identifying code request message of terminal transmission, the identifying code request messageThe instruction information of the corresponding input type of target hardware operational order is supported including being used to indicate terminal;It is asked according to the identifying codeMessage is sought, sends identifying code response message to the terminal, which includes the target verification code and the targetHardware operation instruction.
Further, the corresponding target hardware operational order of the target verification code, comprising: the position the M code of the target verification codeThe corresponding target hardware operational order of the code value of each in value;Wherein, M is greater than 0 and to be less than or equal to the target verificationThe integer of the digit of code.
Further, this is according to the checking request message, target verification code and target corresponding with the target verification codeHardware operation instruction, determines verification result, comprising: judge whether the identifying code to be verified matches with the target verification code;IfThe identifying code to be verified is matched with the target verification code, then judges that the hardware operation instruction to be verified is operated with the target hardwareWhether instruction matches;If the hardware operation instruction to be verified is matched with the target hardware operational order, it is determined that the verification resultTo be proved to be successful.
Further, this judges whether the identifying code to be verified matches with the target verification code, comprising: to be verified to thisIdentifying code in the code value of each execute the first judgement operation, determine the judging result of this each code value;If this is everyThe judging result of one code value is matching, it is determined that the identifying code to be verified is matched with the target verification code;
Wherein, which, which operates, includes:
Judge whether N code values of the identifying code to be verified are identical as N of target verification code code values;If N code values of the identifying code to be verified are identical as N of target verification code code values, it is determined that this is to be verifiedIdentifying code N code values judging result be matching.
Further, this judges whether the hardware operation instruction to be verified matches with the target hardware operational order, comprising:The judgement of hardware operation instruction execution second operation to be verified corresponding to the code value of each in the identifying code to be verified, reallyThe judging result of fixed this each the corresponding hardware operation instruction to be verified of code value;If this each code value is corresponding to be testedThe judging result of card hardware operation instruction is matching, it is determined that the hardware operation instruction to be verified refers to target hardware operationEnable matching;
Wherein, which includes: to judge that N code values of the identifying code to be verified are corresponding to be verifiedWhether hardware operation instructs target hardware operational order corresponding with N of target verification code code values identical;If should be toN code values of N code values of the identifying code of verifying corresponding hardware operation instruction and the target verification code to be verifiedCorresponding target hardware operational order is identical, it is determined that N code values of the identifying code to be verified are corresponding to be verified hardThe judging result of part operational order is matching.
Further, the checking request message include user input the identifying code to be verified N code values withHardware operation instruction to be verified corresponding with N of the identifying code to be verified code values;
This refers to according to the operation of the checking request message, target verification code and target hardware corresponding with the target verification codeIt enables, determines verification result, comprising:
Judge whether N code values of the identifying code to be verified are identical as N of target verification code code values,Obtain the first judging result of the N code values;The N is the whole of the digit greater than 0 and less than or equal to the target verification codeNumber;Judge the corresponding hardware operation instruction to be verified of N code values of the identifying code to be verified and the target verification codeWhether the corresponding target verification hardware operation instruction of N code values is identical, obtains the second judgement knot of the N code valuesFruit;If first judging result and second judging result are identical, and the N is equal to the digit of the target verification code, then reallyThe fixed verification result is to be proved to be successful;If first judging result and second judging result are identical, and the N is less than the meshThe digit of identifying code is marked, then exports the first prompt information to the user, first prompt information is for prompting user input shouldThe hardware operation instruction to be verified corresponding with the N+1 code values of N+1 of identifying code to be verified;If first judgementAs a result or second judging result is not identical, it is determined that the verification result is authentication failed.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention itsIts embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes orPerson's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the disclosureOr conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by followingClaim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, andAnd various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.