Movatterモバイル変換


[0]ホーム

URL:


CN106060027B - Method, apparatus, equipment and the system verified based on identifying code - Google Patents

Method, apparatus, equipment and the system verified based on identifying code
Download PDF

Info

Publication number
CN106060027B
CN106060027BCN201610354003.4ACN201610354003ACN106060027BCN 106060027 BCN106060027 BCN 106060027BCN 201610354003 ACN201610354003 ACN 201610354003ACN 106060027 BCN106060027 BCN 106060027B
Authority
CN
China
Prior art keywords
code
verified
target
verification code
operation instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610354003.4A
Other languages
Chinese (zh)
Other versions
CN106060027A (en
Inventor
高毅
王洪强
龙海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co LtdfiledCriticalBeijing Xiaomi Mobile Software Co Ltd
Priority to CN201610354003.4ApriorityCriticalpatent/CN106060027B/en
Publication of CN106060027ApublicationCriticalpatent/CN106060027A/en
Application grantedgrantedCritical
Publication of CN106060027BpublicationCriticalpatent/CN106060027B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The disclosure is directed to a kind of method, apparatus verified based on identifying code, equipment and systems.This method comprises: obtaining target verification code and target hardware operational order corresponding with the target verification code;The target verification code and the target hardware operational order are prompted the user with, and obtains identifying code to be verified and the hardware operation to be verified instruction of user's input;Checking request message is sent to server, the checking request message includes the identifying code to be verified and the hardware operation instruction to be verified, and the checking request message is verified for the server according to the identifying code to be verified and the hardware operation instruction to be verified;Receive the verification result that the server returns.Safety can be improved in the method for the embodiment of the present disclosure.

Description

Method, apparatus, equipment and the system verified based on identifying code
Technical field
This disclosure relates to internet area more particularly to a kind of method, apparatus verified based on identifying code, equipment andSystem.
Background technique
Identifying code is the public full auto-programs that a kind of differentiation user is robot program or people, by it is most mutuallyThe Internet services, such as forum, microblogging, for evading security risk;Mainly evade service security aspect risk, as maliciously crackedPassword, brush ticket, forum pour water.
In the related technology, being widely used with identifying code, safety issue is also more and more prominent.Identifying code, userAccount and password be usually all text information, some bogusware in equipment can steal these information, then directly progressThe operation not authorized by user, safety are lower.
Summary of the invention
To overcome the problems in correlation technique, the disclosure provides a kind of method verified based on identifying code, dressIt sets, equipment and system.
According to the first aspect of the embodiments of the present disclosure, a kind of method verified based on identifying code is provided, comprising: obtainTarget verification code and target hardware operational order corresponding with the target verification code;Prompt the user with the target verification code andThe target hardware operational order, and obtain identifying code to be verified and the hardware operation to be verified instruction of user's input;To serviceDevice sends checking request message, which includes that the identifying code to be verified and the hardware operation to be verified instruct,The checking request message is verified for the server according to the identifying code to be verified and the hardware operation instruction to be verified;Receive the verification result of server return.
The technical scheme provided by this disclosed embodiment can include the following benefits: prompt the user with mesh by terminalIdentifying code and target hardware operational order are marked, identifying code to be verified and the hardware operation to be verified instruction of user's input are obtained,And the checking request message instructed including the identifying code to be verified and the hardware operation to be verified, the verifying are sent to serverRequest message is verified for the server according to the identifying code to be verified and the hardware operation instruction to be verified, so that withFamily also needs input hardware operational order when inputting identifying code, and rogue program can not simulate people and complete hardware operation instructionInput, compared with determining verification result according only to identifying code in the related technology, avoids Malware by stealing target verificationThe operation not authorized by user is directly carried out after the information such as code, improves safety.
Further, the acquisition target verification code and target hardware operational order corresponding with the target verification code, packetIt includes: receiving the identifying code response message of server transmission, which includes the target verification code and the meshMark hardware operation instruction.
Further, this method further include: send identifying code request message, the identifying code request message packet to the serverIt includes and is used to indicate the instruction information that terminal supports the corresponding input type of target hardware operational order.
Further, the acquisition target verification code and target hardware operational order corresponding with the target verification code, packetIt includes: receiving the identifying code response message that server is sent, which includes the target verification code;According to the targetIdentifying code generates the target hardware operational order.
Further, the corresponding target hardware operational order of the target verification code, comprising: the position the M code of the target verification codeThe corresponding target hardware operational order of the code value of each in value;Wherein, M is greater than 0 and to be less than or equal to the target verificationThe integer of the digit of code.
Further, which is pressure rating.
According to the second aspect of an embodiment of the present disclosure, a kind of method verified based on identifying code is provided, comprising: receiveThe checking request message that terminal is sent, the checking request message include the identifying code to be verified and hardware to be verified of user's inputOperational order;Referred to according to the operation of the checking request message, target verification code and target hardware corresponding with the target verification codeIt enables, determines verification result;The verification result is returned into the terminal.
The technical scheme provided by this disclosed embodiment can include the following benefits: be tested by server according to targetDemonstrate,prove code, target hardware operational order corresponding with the target verification code and terminal transmission includes the to be verified of user's inputThe checking request message of identifying code and hardware operation to be verified instruction, determines verification result, so that user is when inputting identifying codeInput hardware operational order is also needed, and rogue program can not simulate the input that people completes hardware operation instruction, with the relevant technologiesIn according only to identifying code determine that verification result is compared, avoid Malware by steal after the information such as target verification code directly intoThe operation that row is not authorized by user, improves safety.
Further, this method further include: receive the identifying code request message of terminal transmission, the identifying code request messageThe instruction information of the corresponding input type of target hardware operational order is supported including being used to indicate terminal;It is asked according to the identifying codeMessage is sought, sends identifying code response message to the terminal, which includes the target verification code and the targetHardware operation instruction.
Further, the corresponding target hardware operational order of the target verification code, comprising: the position the M code of the target verification codeThe corresponding target hardware operational order of the code value of each in value;Wherein, M is greater than 0 and to be less than or equal to the target verificationThe integer of the digit of code.
Further, this is according to the checking request message, target verification code and target corresponding with the target verification codeHardware operation instruction, determines verification result, comprising: judge whether the identifying code to be verified matches with the target verification code;IfThe identifying code to be verified is matched with the target verification code, then judges that the hardware operation instruction to be verified is operated with the target hardwareWhether instruction matches;If the hardware operation instruction to be verified is matched with the target hardware operational order, it is determined that the verification resultTo be proved to be successful.
Further, this judges whether the identifying code to be verified matches with the target verification code, comprising: to be verified to thisIdentifying code in the code value of each execute the first judgement operation, determine the judging result of this each code value;If this is everyThe judging result of one code value is matching, it is determined that the identifying code to be verified is matched with the target verification code;
Wherein, which includes: the N code values and the target verification for judging the identifying code to be verifiedWhether N code values of code are identical;If N of N code values of the identifying code to be verified and the target verification codeCode value it is identical, it is determined that the judging result of N code values of the identifying code to be verified be matching.
Further, this judges whether the hardware operation instruction to be verified matches with the target hardware operational order, comprising:The judgement of hardware operation instruction execution second operation to be verified corresponding to the code value of each in the identifying code to be verified, reallyThe judging result of fixed this each the corresponding hardware operation instruction to be verified of code value;If this each code value is corresponding to be testedThe judging result of card hardware operation instruction is matching, it is determined that the hardware operation instruction to be verified refers to target hardware operationEnable matching;
Wherein, which includes: to judge that N code values of the identifying code to be verified are corresponding to be verifiedWhether hardware operation instructs target hardware operational order corresponding with N of target verification code code values identical;If should be toN code values of N code values of the identifying code of verifying corresponding hardware operation instruction and the target verification code to be verifiedCorresponding target hardware operational order is identical, it is determined that N code values of the identifying code to be verified are corresponding to be verified hardThe judging result of part operational order is matching.
Further, the checking request message include user input the identifying code to be verified N code values withHardware operation instruction to be verified corresponding with N of the identifying code to be verified code values;
This refers to according to the operation of the checking request message, target verification code and target hardware corresponding with the target verification codeIt enables, determines verification result, comprising: judge N code values of the identifying code to be verified and N of the target verification codeWhether code value is identical, obtains the first judging result of the N code values;The N is greater than 0 and to be less than or equal to the target verificationThe integer of the digit of code;Judge the corresponding hardware operation instruction to be verified of N code values of the identifying code to be verified and is somebody's turn to doWhether the corresponding target verification hardware operation instruction of N code values of target verification code is identical, obtains the N code valuesSecond judging result;If first judging result and second judging result are identical, and the N is equal to the target verification codeDigit, it is determined that the verification result is to be proved to be successful;If first judging result and second judging result are identical, and shouldN is less than the digit of the target verification code, then exports the first prompt information to the user, first prompt information is for prompting the useFamily inputs N+1 hardware operation instructions to be verified corresponding with the N+1 code values of the identifying code to be verified;If shouldFirst judging result or second judging result are not identical, it is determined that the verification result is authentication failed.
According to the third aspect of an embodiment of the present disclosure, a kind of device verified based on identifying code is provided, comprising: firstModule is obtained, is configured as obtaining target verification code and target hardware operational order corresponding with the target verification code;SecondModule is obtained, is configured as prompting the user with the target verification code and the target hardware operational order, and obtains user's inputIdentifying code to be verified and hardware operation to be verified instruction;First sending module is configured as sending to verify to server askingMessage is sought, which includes the identifying code to be verified and the hardware operation instruction to be verified, which disappearsBreath is verified for the server according to the identifying code to be verified and the hardware operation instruction to be verified;Receiving module, quiltIt is configured to receive the verification result of server return.
Further, which includes: the first acquisition submodule;First acquisition submodule, is configured asThe identifying code response message of server transmission is received, which includes that the target verification code and the target are hardPart operational order.
Further, device further include: the second sending module;Second sending module, is configured as to the serverIdentifying code request message is sent, which includes being used to indicate terminal to support that the target hardware operational order is correspondingInput type instruction information.
Further, which includes: the second acquisition submodule;Second acquisition submodule, is configured as:
The identifying code response message that server is sent is received, which includes the target verification code;According toThe target verification code generates the target hardware operational order.
Further, the corresponding target hardware operational order of the target verification code, comprising: the position the M code of the target verification codeThe corresponding target hardware operational order of the code value of each in value;Wherein, M is greater than 0 and to be less than or equal to the target verificationThe integer of the digit of code.
Further, which is pressure rating.
It is carried out provided by each possible embodiment of the above-mentioned third aspect and the above-mentioned third aspect based on identifying codeThe device of verifying, its advantages may refer to brought by each possible embodiment of above-mentioned first aspect and first aspectBeneficial effect, details are not described herein.
According to a fourth aspect of embodiments of the present disclosure, a kind of device verified based on identifying code is provided, comprising: firstReceiving module is configured as receiving the checking request message that terminal is sent, which includes the to be tested of user's inputThe identifying code of card and hardware operation to be verified instruction;Determining module is configured as according to the checking request message, target verification codeAnd target hardware operational order corresponding with the target verification code, determine verification result;First sending module, be configured as byThe verification result returns to the terminal.
Further, device further include: the second receiving module and the second sending module;Second receiving module, is matchedIt is set to and receives the identifying code request message that the terminal is sent, which includes being used to indicate terminal to support the targetHardware operation instructs the instruction information of corresponding input type;Second sending module is configured as being requested according to the identifying codeMessage sends identifying code response message to the terminal, which includes that the target verification code and the target are hardPart operational order.
Further, the corresponding target hardware operational order of the target verification code, comprising: the position the M code of the target verification codeThe corresponding target hardware operational order of the code value of each in value;Wherein, M is greater than 0 and to be less than or equal to the target verificationThe integer of the digit of code.
Further, which includes: the first determining module;First determining module, is configured as: judgement should be toWhether the identifying code of verifying matches with the target verification code;If the identifying code to be verified is matched with the target verification code, sentenceWhether hardware operation to be verified instruction of breaking matches with the target hardware operational order;If the hardware operation to be verified instructs and shouldTarget hardware operational order matching, it is determined that the verification result is to be proved to be successful.
Further, which includes the first determining submodule;The first determining submodule, is configured as:
First judgement operation is executed to the code value of each in the identifying code to be verified, determines this each code valueJudging result;If the judging result of this each code value is matching, it is determined that the identifying code to be verified and the targetIdentifying code matching;
Wherein, which includes: the N code values and the target verification for judging the identifying code to be verifiedWhether N code values of code are identical;If N of N code values of the identifying code to be verified and the target verification codeCode value it is identical, it is determined that the judging result of N code values of the identifying code to be verified be matching.
Further, which includes the second determining submodule;The second determining submodule, is configured as:
Hardware operation instruction execution second to be verified corresponding to the code value of each in the identifying code to be verified is sentencedDisconnected operation determines the judging result of this each the corresponding hardware operation instruction to be verified of code value;If this each code valueThe judging result of corresponding hardware operation instruction to be verified is matching, it is determined that the hardware operation instruction to be verified and the targetHardware operation instructions match;
Wherein, which includes: to judge that N code values of the identifying code to be verified are corresponding to be verifiedWhether hardware operation instructs target hardware operational order corresponding with N of target verification code code values identical;If should be toN code values of N code values of the identifying code of verifying corresponding hardware operation instruction and the target verification code to be verifiedCorresponding target hardware operational order is identical, it is determined that N code values of the identifying code to be verified are corresponding to be verified hardThe judging result of part operational order is matching.
Further, the checking request message include user input the identifying code to be verified N code values withHardware operation instruction to be verified corresponding with N of the identifying code to be verified code values;The determining module includes: second trueCover half block;
Second determining module, is configured as: judging the N code values and the target verification of the identifying code to be verifiedWhether N code values of code are identical, obtain the first judging result of the N code values;The N is greater than 0 and to be less than or waitIn the integer of the digit of the target verification code;Judge the corresponding hardware to be verified of code value of N of the identifying code to be verifiedWhether operational order target verification hardware operation instruction corresponding with N of target verification code code values is identical, is somebody's turn to doSecond judging result of N code values;If first judging result and second judging result are identical, and the N is equal toThe digit of the target verification code, it is determined that the verification result is to be proved to be successful;If first judging result and the second judgement knotFruit is identical, and the N is less than the digit of the target verification code, then exports the first prompt information to the user, first promptInformation be used to prompting the user input N+1 of the identifying code to be verified it is corresponding to be verified with the N+1 code valuesHardware operation instruction;If first judging result or second judging result are not identical, it is determined that the verification result is verifyingFailure.
It is carried out provided by each possible embodiment of above-mentioned fourth aspect and above-mentioned fourth aspect based on identifying codeThe device of verifying, its advantages may refer to brought by each possible embodiment of above-mentioned second aspect and second aspectBeneficial effect, details are not described herein.
According to a fifth aspect of the embodiments of the present disclosure, a kind of system verified based on identifying code is provided, comprising: thirdDevice involved in each possible implementation of aspect or the third aspect and each of fourth aspect or fourth aspect are able to achieveDevice involved in mode.
According to a sixth aspect of an embodiment of the present disclosure, a kind of terminal is provided, comprising: processor, transmitter, receiver and byIt is configured to the memory of storage processor executable instruction;
Wherein, which is configured as: obtaining target verification code and target hardware corresponding with the target verification codeOperational order;The target verification code and the target hardware operational order are prompted the user with, and obtains the to be verified of user's inputIdentifying code and hardware operation to be verified instruction;The transmitter is configured as: sending checking request message, the verifying to serverRequest message includes the identifying code to be verified and the hardware operation instruction to be verified, which is used for the serverIt is verified according to the identifying code to be verified and the hardware operation instruction to be verified;The receiver is configured as: receiving the clothesThe verification result that business device returns.
According to the 7th of embodiment of the present disclosure aspect, provide a kind of server, comprising: processor, transmitter, receiver andIt is configured as the memory of storage processor executable instruction;Wherein, which is configured as: receiving the verifying that terminal is sentRequest message, the checking request message include identifying code to be verified and the hardware operation to be verified instruction of user's input;At thisReason device is configured as: being grasped according to the checking request message, target verification code and target hardware corresponding with the target verification codeIt instructs, determines verification result;The transmitter is configured as returning to the verification result into the terminal.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, notThe disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the inventionExample, and be used to explain the principle of the present invention together with specification.
Fig. 1 is a kind of method flow diagram verified based on identifying code shown according to an exemplary embodiment;
Fig. 2 is a kind of method flow diagram verified based on identifying code shown according to another exemplary embodiment;
Fig. 3 is a kind of method flow diagram verified based on identifying code shown according to another exemplary embodiment;
Fig. 4 is a kind of method flow diagram verified based on identifying code shown according to another exemplary embodiment;
Fig. 5 is a kind of block diagram of device verified based on identifying code shown according to an exemplary embodiment;
Fig. 6 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment;
Fig. 7 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment;
Fig. 8 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment;
Fig. 9 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment;
Figure 10 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment;
Figure 11 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment;
Figure 12 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment;
Figure 13 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment;
Figure 14 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment;
Figure 15 is the block diagram of the entity of terminal shown according to an exemplary embodiment;
Figure 16 is the block diagram of the terminal 800 shown according to another exemplary embodiment;
Figure 17 is the block diagram of the server 1900 shown according to another exemplary embodiment.
Through the above attached drawings, it has been shown that the specific embodiment of the disclosure will be hereinafter described in more detail.These attached drawingsIt is not intended to limit the scope of this disclosure concept by any means with verbal description, but is by referring to specific embodimentsThose skilled in the art illustrate the concept of the disclosure.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related toWhen attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodimentDescribed in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appendedThe example of device and method being described in detail in claims, some aspects of the invention are consistent.
Fig. 1 is a kind of method flow diagram verified based on identifying code shown according to an exemplary embodiment, the partyMethod can be applied to need to input in any terminal that identifying code is verified, such as mobile phone, tablet computer etc., as shown in Figure 1,The following steps are included:
In a step 101, target verification code and target hardware operational order corresponding with the target verification code are obtained.
In this step, which is used to indicate the identifying code for needing user to input, which can beSome unordered texts, such as " FXCB ", " 0536 " etc..The target hardware operational order, which is used to indicate, needs the hard of user's inputPart operational order, the target hardware operational order include: pressure rating, rock number, trace information etc..Wherein, terminal obtainsThe mode of target verification code can obtain for terminal from server.The mode that terminal obtains target hardware operational order specifically can be withAre as follows: terminal is obtained from server or is generated by terminal oneself.
In a step 102, the target verification code and the target hardware operational order are prompted the user with, and it is defeated to obtain userThe identifying code to be verified entered and hardware operation to be verified instruction.
In this step, specifically, can by way of popping up prompt window to the user prompt the target verification code andThe target hardware operational order;Alternatively, can also by way of sending short message to the user prompt the target verification code andThe target hardware operational order.Here, to the user prompt the purpose of the target verification code and target hardware operational order be forIt allows user to input identifying code to be verified according to prompt and hardware operation to be verified instructs.In this step, user is inputtedIdentifying code to be verified and the sequence of hardware operation to be verified instruction be not restricted.Optionally, user can first input toThe identifying code of verifying inputs hardware operation instruction to be verified or user again can also first input hardware operation instruction to be verified againIt inputs identifying code or user to be verified and can also input hardware operation to be verified while inputting identifying code to be verified and refer toIt enables.
In step 103, checking request message is sent to server, which includes the verifying to be verifiedCode and the hardware operation instruction to be verified.
In this step, the checking request message is for the server according to the identifying code to be verified and the hardware to be verifiedOperational order is verified, so that the server when obtaining verification result, is not only needed according to the to be verified of user's inputIdentifying code, it is also necessary to be instructed according to the hardware operation to be verified of user's input.It should be noted that according to identifying code to be verifiedThe step of being verified with hardware operation to be verified instruction can also be carried out by terminal.
At step 104, the verification result of server return is received.
In this step, it is specifically as follows and receives the authentication response information that the server returns, the identifying code response message packetInclude the verification result.Wherein, which, which is specifically as follows, is proved to be successful or authentication failed.Optionally, when verification result isWhen authentication failed, which can also include the failure cause of authentication failed, which for example can be to testDemonstrate,prove code input error and/or hardware operation instruction input mistake.
The method verified based on identifying code of the present embodiment prompts the user with target verification code and target by terminalHardware operation instruction, obtains identifying code to be verified and the hardware operation to be verified instruction of user's input, and sends to serverChecking request message including the identifying code to be verified and the hardware operation instruction to be verified, the checking request message is for being somebody's turn to doServer is verified according to the identifying code to be verified and the hardware operation instruction to be verified, so that user is in input identifying codeWhen also need input hardware operational order, and rogue program can not simulate the input that people completes hardware operation instruction, to related skillIt determines that verification result is compared according only to identifying code in art, avoids Malware by stealing after the information such as target verification code directlyThe operation not authorized by user is carried out, safety is improved.
Fig. 2 is a kind of method flow diagram verified based on identifying code shown according to another exemplary embodiment, shouldMethod can be applied in any server verified using identifying code, as shown in Figure 2, comprising the following steps:
In step 201, receive terminal send checking request message, the checking request message include user input toThe identifying code of verifying and hardware operation to be verified instruction.
In this step, interacting message, the wireless communication can be carried out by network by wireless communication between server and terminalNetwork for example can be global system for mobile communications (GSM, Global System for Mobile Communication) netNetwork, long term evolution (LTE, Long Term Evolution) network, bluetooth (Bluetooth) network, Wireless Fidelity (WiFi,Wireless Fidelity) network etc..
In step 202, according to the checking request message, target verification code and target corresponding with the target verification codeHardware operation instruction, determines verification result.
In this step, server not only needs the identifying code to be verified inputted according to user when determining verification resultWith target verification code, it is also necessary to according to the hardware operation to be verified instruction of user's input and target hardware operational order.
In step 203, which is returned into the terminal.
In this step, it is specifically as follows server to terminal and sends authentication response information, which includes shouldVerification result.Wherein, which may be considered the corresponding response message of above-mentioned checking request message.
The method verified based on identifying code of the present embodiment, by server according to target verification code and the targetWhat the corresponding target hardware operational order of identifying code and terminal were sent includes the identifying code to be verified of user's input and to be testedThe checking request message for demonstrate,proving hardware operation instruction, determines verification result, so that user also needs to input when inputting identifying code firmlyPart operational order, and rogue program can not simulate the input that people completes hardware operation instruction, and in the related technology according only to verifyingCode determines that verification result is compared, and avoids Malware by directly carrying out not awarded by user after stealing the information such as target verification codeThe operation of power, improves safety.
Fig. 3 is a kind of method flow diagram verified based on identifying code shown according to another exemplary embodiment, shouldMethod essentially describes the interactive process of server and terminal on the basis of Fig. 1 and embodiment illustrated in fig. 2, as shown in figure 3,The following steps are included:
In step 301, terminal to server sends identifying code request message.
In this step, which is used for the server requests authentication code.Optionally, which requestsMessage may include the instruction information for being used to indicate terminal and supporting the corresponding input type of target hardware operational order.For example, working asWhen object run instruction is pressure rating, which for example may include being used to indicate what terminal support pressure inputtedIndicate information.
In step 302, which sends identifying code response message to the terminal according to the identifying code request message.
In this step, which includes target verification code.Optionally, which can be withIncluding the corresponding target hardware operational order of the target verification code.Optionally, step 302 is specifically as follows server and is tested according to thisCode request message is demonstrate,proved, target verification code is generated, target hardware corresponding with the target verification code is generated according to the target verification codeOperational order, and the identifying code response message including the target verification code and the target hardware operational order is sent to terminal.Wherein, the corresponding target hardware operational order of the target verification code, comprising: each in the position the M code value of the target verification codeCode value corresponds to a target hardware operational order, wherein M is the whole of the digit greater than 0 and less than or equal to the target verification codeNumber;Alternatively, entire target verification code can correspond to a target hardware operational order.For example, for target verification code " FXCB ",When M is equal to digit (that is, 4) of target verification code, primary code value F can correspond to a target hardware operational order, theTwo code value X can correspond to a target hardware operation, and the code value C of third position can correspond to a target hardware operation and refer toIt enables, the 4th code value B can correspond to a target hardware operational order.It is with pressure rating with target hardware operational orderExample, server can be determined when generating target hardware operational order according to target verification code according to the length of target verification codePressure rating number, and M pressure rating is randomly choosed in the pressure rating number.It should be noted that when identifying code response disappearsWhen not including target hardware operational order in breath, which can also be generated by terminal, specific generation sideFormula is similar according to target verification code generation target hardware operational order with server, repeats no more.In Fig. 3 with target verification code andFor target hardware operational order is all generated by server.
In step 303, which prompts the user with the target verification code and the target hardware operational order, and obtainsThe identifying code to be verified of user's input and hardware operation to be verified instruction.
In this step, user can input identifying code by the identifying code input frame in terminal.Wherein, terminal can rootAccording to the length of target verification code, identifying code input frame is divided into the input grid of corresponding number.For example, if target verification codeLength is 6, then identifying code input frame is divided into 6 lattice, the corresponding target verification code of every lattice.Optionally, defeated in acquisition userIt can also include: to recall entering method keyboard before the identifying code to be verified entered and hardware operation to be verified instruction.
Using target hardware operational order as pressure rating, and for all corresponding pressure rating of the code value of each, useFamily can input identifying code and hardware operation instruction in the following way: user can test after one code value of every inputThe corresponding grid position of this code value in code input frame is demonstrate,proved, presses this grid using the corresponding pressure rating of this code value.It is above-mentionedIn mode, user is after entering method keyboard clicks a code value, it is also necessary to screen is pressed in the corresponding grid of this code value, thisSample can allow user explicitly to understand identifying code currently entered or target hardware operational order, but need user's fingerPosition changes to identifying code input frame by entering method keyboard.In order to simplify the operation of user, user clicks on entering method keyboardScreen can be pressed while one code value with the corresponding pressure rating of this code value, after pressing, terminal can both be obtainedThe corresponding pressure rating of this code value can also be obtained by obtaining this code value.
In step 304, which sends checking request message to the server, which includes that this is to be testedThe identifying code of card and the verifying hardware operation instruct.
It should be noted that step 304 is similar with step 103, details are not described herein.
In step 305, which judges whether the identifying code to be verified matches with the target verification code.
In this step, if the identifying code to be verified is matched with the target verification code, 306 are thened follow the steps.If this is to be testedThe identifying code of card and the target verification code mismatch, and then follow the steps 308.Optionally, step 305 is specifically as follows: waiting for thisThe code value of each in the identifying code of verifying executes the first judgement operation, determines the judging result of this each code value;IfThe judging result of this each code value is matching, it is determined that the identifying code to be verified is matched with the target verification code;ItsIn, which includes: N for judge N code values of the identifying code to be verified and the target verification codeCode value it is whether identical;If N code values of the identifying code to be verified and N of target verification code code value phasesTogether, it is determined that the judging result of N code values of the identifying code to be verified is matching.
Within step 306, which judges that the hardware operation to be verified instructs and whether is the target hardware operational orderMatching.
In this step, if the hardware operation instruction to be verified is matched with the target hardware operational order, then follow the steps307;If the hardware operation instruction to be verified is mismatched with the target hardware operational order, 308 are thened follow the steps.Optionally, it walksRapid 306 are specifically as follows: hardware operation instruction to be verified corresponding to the code value of each in the identifying code to be verified is heldThe judgement operation of row second determines the judging result of the corresponding hardware operation instruction to be verified of this each code value;If this is eachThe judging result of the corresponding hardware operation instruction to be verified of the code value of position is matching, it is determined that the hardware operation instruction to be verifiedIt is matched with the target hardware operational order;Wherein, which includes: N for judging the identifying code to be verifiedThe corresponding hardware operation to be verified of code value instruct target hardware corresponding with N of target verification code code values to operate to refer toIt whether identical enables;If the corresponding hardware operation instruction to be verified of N code values of the identifying code to be verified is tested with the targetThe corresponding target hardware operational order of N code values for demonstrate,proving code is identical, it is determined that N codes of the identifying code to be verifiedThe judging result for being worth corresponding hardware operation instruction to be verified is matching.
It should be noted that server can also first judge the hardware operation to be verified instruction of user's input in the present embodimentWhether matched with the target hardware operational order, then judge user input identifying code to be verified and the target verification code whetherMatching show that the Specific Principles of verification result can be with are as follows: if the identifying code to be verified is matched with the target verification code, and this toVerifying hardware operation instruction is matched with the target hardware operational order, then verification result is to be proved to be successful;It is tested if this is to be verifiedIt demonstrate,proves code and the target verification code mismatches or the hardware operation instruction to be verified is mismatched with the target hardware operational order,Then determine that verification result is authentication failed.
In step 307, which determines that verification result is to be proved to be successful.
It should be noted that executing step 309 after step 307 has executed.
In step 308, which determines that verification result is authentication failed.
In a step 309, which returns to the terminal for the verification result.
In this step, when verification result is authentication failed, terminal is after the verification result for receiving server returnCan also be performed: terminal is back to target pages and shows, which can be for example homepage, identifying code input page etc.Step.
The method verified based on identifying code of the present embodiment, by inputting identifying code to be verified and to be tested in userAfter demonstrate,proving hardware operation instruction, if it is determined that the identifying code to be verified of user's input is matched with the target verification code, and determining shouldThe hardware operation to be verified instruction of user's input is matched with the target hardware operational order, it is determined that is proved to be successful, is otherwise determinedAuthentication failed, so that user also needs input hardware operational order when inputting identifying code, and can not to simulate people complete for rogue programAt the input that hardware operation instructs, Malware is avoided by directly carrying out after stealing the information such as target verification code not by userThe operation of authorization, improves safety.
Fig. 4 is a kind of method flow diagram verified based on identifying code shown according to another exemplary embodiment, shouldOn the basis of method embodiment shown in Fig. 3, in step 304 checking request message may include user's input this is to be verifiedN code values of identifying code and hardware operation instruction to be verified corresponding with N of the identifying code to be verified code values.As shown in figure 4, step 305- step 308 could alternatively be following steps:
In step 401, which judges the N code values and the target verification code of the identifying code to be verifiedWhether N code values are identical, obtain the first judging result of the N code values.
In this step, N is the integer of the digit greater than 0 and less than or equal to the target verification code.
In step 402, which judges the corresponding hardware to be verified of code value of N of the identifying code to be verifiedWhether operational order target verification hardware operation instruction corresponding with N of target verification code code values is identical, is somebody's turn to doSecond judging result of N code values.
It should be noted that there is no the limitations of sequencing between step 401 and step 402.
In step 403, which judges whether first judging result with second judging result is identical.
In this step, if first judging result with second judging result be it is identical, then follow the steps 404.If shouldFirst judging result or second judging result be it is not identical, then follow the steps 407.Optionally, in the first judging result orTwo judging results are not mutually at the same time it can also include: the server to the user the second prompt information of output, which believesThe reason of breath is for prompting the user's checking to fail.Specifically, if first judging result be it is not identical, the authentication failedReason is identifying code input error;If second judging result be it is not identical, the identifying code fail the reason of be hardware operationInstruction input mistake.It should be noted that the server can be by being sent to the terminal for second prompt information, so that shouldTerminal exports the mode of second prompt information to the user, realizes that the server exports the second prompt information to the user.
In step 404, which judges whether N is equal to the digit of the target verification code.
In this step, if N is equal to the digit of the target verification code, 405 are thened follow the steps.If N is less than the target verification codePosition, then follow the steps 406.
In step 405, which determines that verification result is to be proved to be successful.
It should be noted that step 405 terminates after having executed.
In a step 406, which exports the first prompt information to the user.
In this step, first prompt information be used to prompting the user input N+1 of the identifying code to be verified withThe corresponding hardware operation instruction to be verified of the N+1 code values.It should be noted that the server can by by this firstPrompt information is sent to the terminal, in a manner of making the terminal export first prompt information to the user, realizes the serverThe first prompt information is exported to the user.
It should be noted that the server can be further to the identifying code to be verified after step 406 has executedThe hardware operation instruction to be verified corresponding with N+1 of the identifying code to be verified code values of N+1 code values is testedTo N code values of the identifying code to be verified and the verifying to be verified in card, detailed process and step 401- step 407The process that the corresponding hardware operation instruction to be verified of N code values of code is verified is similar, repeats no more.
In step 407, which determines that verification result is authentication failed.
It should be noted that the main distinction of the present embodiment and embodiment illustrated in fig. 3 is, it is defeated in user in the present embodimentIt is verified during entering identifying code and hardware operation instruction, and embodiment illustrated in fig. 3 is all in user's input completionIt is verified again after identifying code and hardware operation instruction.In the present embodiment, implement shown in the specific implementation of other parts and Fig. 3It is similar in example, therefore the part not being described in detail in this present embodiment is closed, it specifically may refer to embodiment illustrated in fig. 3.
The method verified based on identifying code of the present embodiment, by inputting identifying code and hardware operation instruction in userDuring verified, determine verification result so that user also needs input hardware operational order when inputting identifying code, andRogue program can not simulate the input that people completes hardware operation instruction, avoid Malware by stealing the letter such as target verification codeThe operation not authorized by user is directly carried out after breath, improves safety.
Following is embodiment of the present disclosure, can be used for executing embodiments of the present disclosure.It is real for disclosure deviceUndisclosed details in example is applied, embodiments of the present disclosure is please referred to.
Fig. 5 is a kind of block diagram of device verified based on identifying code shown according to an exemplary embodiment.The dressSetting being implemented in combination with as some or all of of terminal by software, hardware or both.Referring to Fig. 5, the device packetIt includes the first acquisition module 501, second and obtains module 502, the first sending module 503 and receiving module 504.
Wherein, first module 501 is obtained, is configured as obtaining target verification code and mesh corresponding with the target verification codeMark hardware operation instruction;
Second obtains module 502, is configured as prompting the user with the target verification code that the first acquisition module 501 is gotAnd the target hardware operational order, and obtain identifying code to be verified and the hardware operation to be verified instruction of user's input;
First sending module 503 is configured as sending checking request message to server, which includes theIdentifying code to be verified and the hardware operation instruction to be verified, the checking request message that two acquisition modules 502 are got are usedIt is verified in the server according to the identifying code to be verified and the hardware operation instruction to be verified;
Receiving module 504 is configured as receiving the verification result of server return.
Optionally, the corresponding target hardware operational order of the target verification code, comprising: the position the M code value of the target verification codeIn each the corresponding target hardware operational order of code value;Wherein, M is greater than 0 and to be less than or equal to the target verification codeDigit integer.
Optionally, which is pressure rating.
In conclusion the device verified based on identifying code that the embodiment of the present disclosure provides, obtains module by secondTarget verification code and target hardware operational order are prompted the user with, and obtains the identifying code to be verified and to be verified of user's inputHardware operation instruction, it includes that the identifying code to be verified and the hardware operation to be verified refer to that the first sending module is sent to serverThe checking request message of order, the checking request message is for the server according to the identifying code to be verified and the hardware to be verifiedOperational order is verified, so that user also needs input hardware operational order when inputting identifying code, and rogue program can notThe input that simulation people completes hardware operation instruction avoids compared with determining verification result according only to identifying code in the related technologyMalware improves safety by directly carrying out the operation not authorized by user after stealing the information such as target verification code.
Fig. 6 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment.GinsengAccording to Fig. 6, on the basis of device block diagram shown in Fig. 5, first obtains module 501, comprising: the first acquisition submodule 5011.It shouldFirst acquisition submodule 5011 is configured as receiving the identifying code response message of server transmission, the identifying code response messageIncluding the target verification code and the target hardware operational order.
In conclusion the device verified based on identifying code that the embodiment of the present disclosure provides, obtains submodule by firstBlock receives the identifying code response message including target verification code and target hardware operational order that server is sent, so that terminal canTo obtain target verification code and target hardware operational order.
Fig. 7 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment.GinsengAccording to Fig. 7, on the basis of device block diagram shown in Fig. 6, which can also include: the second sending module 505.
Second sending module 505 is configured as sending identifying code request message to the server, and identifying code request disappearsBreath includes being used to indicate the instruction information that terminal supports the corresponding input type of target hardware operational order.
Fig. 8 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment.GinsengAccording to Fig. 8, on the basis of device block diagram shown in Fig. 5, first obtains module 501, comprising: the second acquisition submodule 5012.
Second acquisition submodule 5012, is configured as:
The identifying code response message that server is sent is received, which includes the target verification code;According toThe target verification code generates the target hardware operational order.
In conclusion the device verified based on identifying code that the embodiment of the present disclosure provides, obtains submodule by secondBlock receives the identifying code response message including target verification code that server is sent, and generates target hardware according to target verification codeOperational order allows terminal to obtain target verification code and target hardware operational order.
Fig. 9 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment.It shouldDevice being implemented in combination with as some or all of of server by software, hardware or both.Referring to Fig. 9, the dressSet includes: the first receiving module 901, determining module 902 and the first sending module 903.
Wherein, the first receiving module 901 is configured as receiving the checking request message that terminal is sent, which disappearsBreath includes identifying code to be verified and the hardware operation to be verified instruction of user's input;
Determining module 902 is configured as being tested according to the checking request message, target that the first receiving module 901 receivesCode and target hardware operational order corresponding with the target verification code are demonstrate,proved, determines verification result;
First sending module 903 is configured as the verification result that determining module 902 determines returning to the terminal.
Optionally, the corresponding target hardware operational order of the target verification code, comprising:
The corresponding target hardware operational order of the code value of each in the position the M code value of the target verification code;Wherein, M isThe integer of digit greater than 0 and less than or equal to the target verification code.
In conclusion the embodiment of the present disclosure provide the device verified based on identifying code, by determining module according toWhat target verification code, target hardware operational order corresponding with the target verification code and terminal were sent include user's input toThe checking request message of the identifying code of verifying and hardware operation to be verified instruction, determines verification result, so that user tests in inputInput hardware operational order is also needed when demonstrate,proving code, and rogue program can not simulate the input that people completes hardware operation instruction, with phaseDetermine that verification result is compared according only to identifying code in the technology of pass, after avoiding Malware by stealing the information such as target verification codeThe operation not authorized by user is directly carried out, safety is improved.
Figure 10 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment.GinsengAccording to Figure 10, on the basis of device block diagram shown in Fig. 9, optionally, which further includes the second receiving module 904 and the second hairSend module 905.
Wherein, second receiving module 904 is configured as receiving the identifying code request message of terminal transmission, the verifyingCode request message includes the instruction information for being used to indicate terminal and supporting the corresponding input type of target hardware operational order;
Second sending module 905, is configured as according to the identifying code request message, sends identifying code response to the terminalMessage, the identifying code response message include the target verification code and the target hardware operational order.
In conclusion the device verified based on identifying code that the embodiment of the present disclosure provides, passes through the second sending moduleThe identifying code response message including target verification code and target hardware operational order is sent to terminal, terminal is obtainedThe target verification code and target hardware operational order.
Figure 11 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment.GinsengAccording to Figure 11, on the basis of device block diagram shown in Fig. 9, optionally, determining module 902 includes the first determining module 9021;
Wherein, the first determining module 9021, is configured as:
Judge whether the identifying code to be verified matches with the target verification code;
If the identifying code to be verified is matched with the target verification code, the hardware operation instruction to be verified and the mesh are judgedWhether mark hardware operation instruction matches;
If the hardware operation instruction to be verified is matched with the target hardware operational order, it is determined that the verification result is verifyingSuccess.
In conclusion the device verified based on identifying code that the embodiment of the present disclosure provides, passes through the first determining moduleIt is inputted in user after identifying code and hardware operation to be verified instruction to be verified, if it is determined that the verifying to be verified of user's inputCode is matched with the target verification code, and determines hardware operation to be verified instruction and the target hardware operational order of user inputMatching, it is determined that be proved to be successful, authentication failed otherwise determined, so that user also needs input hardware to operate when inputting identifying codeInstruction, and rogue program can not simulate the input that people completes hardware operation instruction, avoid Malware and tested by stealing targetThe operation not authorized by user is directly carried out after the information such as card code, improves safety.
Figure 12 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment.GinsengAccording to Figure 12, on the basis of device block diagram shown in Figure 11, optionally, the first determining module 9021 includes first determining submodule90211。
Wherein, the first determining submodule 90211, is configured as: to the code of each in the identifying code to be verifiedValue executes the first judgement operation, determines the judging result of this each code value;If the judging result of this each code value is equalFor matching, it is determined that the identifying code to be verified is matched with the target verification code;
Wherein, which, which operates, includes:
Judge whether N code values of the identifying code to be verified are identical as N of target verification code code values;
If N code values of the identifying code to be verified are identical as N of target verification code code values, it is determined thatThe judging result of N code values of the identifying code to be verified is matching.
Figure 13 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment.GinsengAccording to Figure 13, on the basis of device block diagram shown in Figure 11, optionally, the first determining module 9021 includes second determining submodule90212。
The second determining submodule 90212, is configured as: corresponding to the code value of each in the identifying code to be verifiedHardware operation instruction execution second to be verified judge operation, determine that this each the corresponding hardware operation to be verified of code value refers toThe judging result of order;If the judging result of the corresponding hardware operation instruction to be verified of this each code value is matching, reallyThe fixed hardware operation instruction to be verified is matched with the target hardware operational order;
Wherein, which, which operates, includes:
Judge the corresponding hardware operation instruction to be verified of N code values of the identifying code to be verified and the target verificationWhether the corresponding target hardware operational order of N code values of code is identical;
If the corresponding hardware operation instruction to be verified of N code values of the identifying code to be verified and the target verification codeThe corresponding target hardware operational order of N code values it is identical, it is determined that N code values pair of the identifying code to be verifiedThe judging result for the hardware operation to be verified instruction answered is matching.
Figure 14 is a kind of block diagram of the device verified based on identifying code shown according to another exemplary embodiment.GinsengAccording to Figure 14, on the basis of device block diagram shown in Fig. 9, optionally, the checking request message include user's input this is to be testedN code values of the identifying code of card and hardware operation to be verified corresponding with N of the identifying code to be verified code valuesInstruction;Determining module 902 includes the second determining module 9022;
Second determining module 9022, is configured as:
Judge whether N code values of the identifying code to be verified are identical as N of target verification code code values,Obtain the first judging result of the N code values;The N is the whole of the digit greater than 0 and less than or equal to the target verification codeNumber;
Judge the corresponding hardware operation instruction to be verified of N code values of the identifying code to be verified and the target verificationWhether the corresponding target verification hardware operation instruction of N code values of code is identical, obtains the second judgement of the N code valuesAs a result;
If first judging result and second judging result are identical, and the N is equal to the digit of the target verification code,Then determine that the verification result is to be proved to be successful;
If first judging result and second judging result are identical, and the N is less than the digit of the target verification code,The first prompt information then is exported to the user, first prompt information is for prompting the user to input the identifying code to be verifiedN+1 hardware operation instructions to be verified corresponding with the N+1 code values;
If first judging result or second judging result are not identical, it is determined that the verification result is authentication failed.
In conclusion the device verified based on identifying code that the embodiment of the present disclosure provides, passes through the second determining moduleIt is verified during user inputs identifying code and hardware operation instructs, verification result is determined, so that user tests in inputAlso input hardware is needed to operate when demonstrate,proving code, and rogue program can not simulate the input that people completes hardware operation, and it is soft to avoid malicePart improves safety by directly carrying out the operation not authorized by user after stealing the information such as target verification code.
The disclosure also provides a kind of system verified based on identifying code, comprising: above-mentioned figure 5-8 is any based on verifyingDevice and any device verified based on identifying code of above-mentioned Fig. 9-Figure 14 described in the Installation practice that code is verifiedDevice described in embodiment.Its realization principle is similar with above-mentioned apparatus embodiment with effect, and details are not described herein.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this methodEmbodiment in be described in detail, no detailed explanation will be given here.
The foregoing describe the inner function module for the device verified based on identifying code and structural schematic diagram, Figure 15 is rootAccording to the block diagram of the entity of the terminal shown in an exemplary embodiment, which can be for example mobile phone or tablet computer etc..Such as figureShown in 15, which may include: processor 1501, transmitter 1502, receiver 1503 and is configured as storage processorThe memory 1504 of 1501 executable instruction.
Processor 1501 is configured as: obtaining target verification code and target hardware corresponding with target verification code operationInstruction;The target verification code and the target hardware operational order are prompted the user with, and obtains to be verified the testing of user's inputDemonstrate,prove code and hardware operation to be verified instruction;
Transmitter 1502 is configured as: sending checking request message to server, which includes that this is to be testedThe identifying code of card and the hardware operation instruction to be verified, the checking request message is for the server according to the verifying to be verifiedCode and the hardware operation instruction to be verified are verified;
Receiver 1503 is configured as: receiving the verification result of server return.
The block diagram of entity of block diagram and terminal of the entity of server is similar, equally may include: processor, transmitter,Receiver and the memory for being configured as storage processor executable instruction;
Wherein, the receiver is configured as: receiving the checking request message that terminal is sent, the checking request message packageInclude identifying code to be verified and the hardware operation to be verified instruction of user's input;
The processor is configured to: according to the checking request message, target verification code and with the target verificationThe corresponding target hardware operational order of code, determines verification result;
The transmitter is configured as the verification result returning to the terminal.
In above-mentioned terminal and the embodiment of server, it should be appreciated that the processor can be central processing unit (English:Central Processing Unit, referred to as: CPU), can also be other general processors, digital signal processor (English:Digital Signal Processor, referred to as: DSP), specific integrated circuit (English: Application SpecificIntegrated Circuit, referred to as: ASIC) etc..General processor the can be microprocessor person processor is also possible to appointWhat conventional processor etc..And memory above-mentioned can be read-only memory (English: read-only memory, abbreviation:ROM), random access memory (English: random access memory, abbreviation: RAM), flash memory, hard disk or solidState hard disk.SIM card is also referred to as subscriber identification card, smart card, and digital mobile telephone must load onto this card and can use.I.e.Store the information of digital mobile phone client on computer chip, the contents such as telephone directory of the key of encryption and user.BeforeThe receiver stated can be the element with receive capabilities, such as the antenna with receive capabilities.Transmitter above-mentioned can beElement with sending function, such as the antenna with sending function.The step of method in conjunction with disclosed in the embodiment of the present inventionHardware processor can be embodied directly in and execute completion, or in processor hardware and software module combination execute completion.
Figure 16 is the block diagram of the terminal 800 shown according to another exemplary embodiment.For example, terminal 800 can be movementPhone, computer, digital broadcasting terminal, messaging device, game console, tablet device, Medical Devices, body-building equipment,Personal digital assistant etc..
Referring to Fig.1 6, terminal 800 may include following one or more components: processing component 802, memory 804, power supplyComponent 806, multimedia component 808, audio component 810, the interface 812 of input/output (I/O), sensor module 814, andCommunication component 816.
The integrated operation of the usual controlling terminal 800 of processing component 802, such as with display, telephone call, data communication, phaseMachine operation and record operate associated operation.Processing component 802 may include that one or more processors 820 refer to executeIt enables, to perform all or part of the steps of the methods described above.In addition, processing component 802 may include one or more modules, justInteraction between processing component 802 and other assemblies.For example, processing component 802 may include multi-media module, it is more to facilitateInteraction between media component 808 and processing component 802.
Memory 804 is configured as storing various types of data to support the operation in terminal 800.These data are shownExample includes the instruction of any application or method for operating in terminal 800, contact data, and telephone book data disappearsBreath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their groupIt closes and realizes, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM) is erasable to compileJourney read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flashDevice, disk or CD.
Power supply module 806 provides electric power for the various assemblies of terminal 800.Power supply module 806 may include power management systemSystem, one or more power supplys and other with for terminal 800 generate, manage, and distribute the associated component of electric power.
Multimedia component 808 includes the screen of one output interface of offer between the terminal 800 and user.SomeIn embodiment, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screenIt may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touch sensorsTo sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense the side of touch or sliding actionBoundary, but also detect duration and pressure relevant to the touch or slide.In some embodiments, multimedia component808 include a front camera and/or rear camera.When equipment 800 is in operation mode, such as screening-mode or video screen moduleWhen formula, front camera and/or rear camera can receive external multi-medium data.Each front camera and postposition are taken the photographAs head can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 810 is configured as output and/or input audio signal.For example, audio component 810 includes a MikeWind (MIC), when terminal 800 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone is matchedIt is set to reception external audio signal.The received audio signal can be further stored in memory 804 or via communication setPart 816 is sent.In some embodiments, audio component 810 further includes a loudspeaker, is used for output audio signal.
I/O interface 812 provides interface between processing component 802 and peripheral interface module, and above-mentioned peripheral interface module canTo be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lockDetermine button.
Sensor module 814 includes one or more sensors, and the state for providing various aspects for terminal 800 is commentedEstimate.For example, sensor module 814 can detecte the state that opens/closes of equipment 800, the relative positioning of component, such as the groupPart is the display and keypad of terminal 800, and sensor module 814 can also detect 800 1 components of terminal 800 or terminalPosition change, the existence or non-existence that user contacts with terminal 800, the temperature in 800 orientation of terminal or acceleration/deceleration and terminal 800Degree variation.Sensor module 814 may include proximity sensor, be configured to detect without any physical contact attachedThe presence of nearly object.Sensor module 814 can also include optical sensor, such as CMOS or ccd image sensor, for being imagedIt is used in.In some embodiments, the sensor module 814 can also include acceleration transducer, gyro sensor,Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between terminal 800 and other equipment.Terminal800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or their combination.In an exemplary implementationIn example, communication component 816 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.In one exemplary embodiment, which further includes near-field communication (NFC) module, to promote short range communication.ExampleSuch as, NFC module can be based on radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology,Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, terminal 800 can be believed by one or more application specific integrated circuit (ASIC), numberNumber processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally providedIt such as include the memory 804 of instruction, above-metioned instruction can be executed by the processor 820 of terminal 800 to complete the above method.For example,The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk andOptical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in storage medium is held by the processor of terminal 800When row, so that terminal 800 is able to carry out a kind of method verified based on identifying code, this method comprises:
Obtain target verification code and target hardware operational order corresponding with the target verification code;Prompt the user with the meshIdentifying code and the target hardware operational order are marked, and obtains the identifying code to be verified and hardware operation to be verified of user's inputInstruction;Checking request message is sent to server, which includes the identifying code to be verified and this is to be verified hardPart operational order, the checking request message refer to for the server according to the identifying code to be verified and the hardware operation to be verifiedOrder is verified;Receive the verification result of server return.
Further, the acquisition target verification code and target hardware operational order corresponding with the target verification code, packetIt includes: receiving the identifying code response message of server transmission, which includes the target verification code and the meshMark hardware operation instruction.
Further, this method further include: send identifying code request message, the identifying code request message packet to the serverIt includes and is used to indicate the instruction information that terminal supports the corresponding input type of target hardware operational order.
Further, the acquisition target verification code and target hardware operational order corresponding with the target verification code, packetIt includes: receiving the identifying code response message that server is sent, which includes the target verification code;According to the targetIdentifying code generates the target hardware operational order.
Further, the corresponding target hardware operational order of the target verification code, comprising: the position the M code of the target verification codeThe corresponding target hardware operational order of the code value of each in value;Wherein, M is greater than 0 and to be less than or equal to the target verificationThe integer of the digit of code.
Further, which is pressure rating.
Figure 17 is the block diagram of the server 1900 shown according to another exemplary embodiment.Referring to Fig.1 7, server 1900It further comprise one or more processors and memory represented by a memory 1932 including processing component 1922Resource, can be by the instruction of the execution of processing component 1922, such as application program for storing.The application stored in memory 1932Program may include it is one or more each correspond to one group of instruction module.In addition, processing component 1922 is matchedIt is set to and executes instruction, to execute the above method.
Server 1900 can also include the power management that a power supply module 1926 is configured as execute server 1900,One wired or wireless network interface 1950 is configured as server 1900 being connected to network and an input and output (I/O)Interface 1958.Server 1900 can be operated based on the operating system for being stored in memory 1932, such as WindowsServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally providedIt such as include the memory 1932 of instruction, above-metioned instruction can be executed by the processing component 1922 of server 1900 to complete above-mentioned sideMethod.For example, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, magneticBand, floppy disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in storage medium is executed by the processor of serverWhen, it enables the server to execute a kind of method verified based on identifying code, this method comprises:
The checking request message that terminal is sent is received, which includes the identifying code to be verified of user's inputIt is instructed with hardware operation to be verified;According to the checking request message, target verification code and mesh corresponding with the target verification codeHardware operation instruction is marked, determines verification result;The verification result is returned into the terminal.
Further, this method further include: receive the identifying code request message of terminal transmission, the identifying code request messageThe instruction information of the corresponding input type of target hardware operational order is supported including being used to indicate terminal;It is asked according to the identifying codeMessage is sought, sends identifying code response message to the terminal, which includes the target verification code and the targetHardware operation instruction.
Further, the corresponding target hardware operational order of the target verification code, comprising: the position the M code of the target verification codeThe corresponding target hardware operational order of the code value of each in value;Wherein, M is greater than 0 and to be less than or equal to the target verificationThe integer of the digit of code.
Further, this is according to the checking request message, target verification code and target corresponding with the target verification codeHardware operation instruction, determines verification result, comprising: judge whether the identifying code to be verified matches with the target verification code;IfThe identifying code to be verified is matched with the target verification code, then judges that the hardware operation instruction to be verified is operated with the target hardwareWhether instruction matches;If the hardware operation instruction to be verified is matched with the target hardware operational order, it is determined that the verification resultTo be proved to be successful.
Further, this judges whether the identifying code to be verified matches with the target verification code, comprising: to be verified to thisIdentifying code in the code value of each execute the first judgement operation, determine the judging result of this each code value;If this is everyThe judging result of one code value is matching, it is determined that the identifying code to be verified is matched with the target verification code;
Wherein, which, which operates, includes:
Judge whether N code values of the identifying code to be verified are identical as N of target verification code code values;If N code values of the identifying code to be verified are identical as N of target verification code code values, it is determined that this is to be verifiedIdentifying code N code values judging result be matching.
Further, this judges whether the hardware operation instruction to be verified matches with the target hardware operational order, comprising:The judgement of hardware operation instruction execution second operation to be verified corresponding to the code value of each in the identifying code to be verified, reallyThe judging result of fixed this each the corresponding hardware operation instruction to be verified of code value;If this each code value is corresponding to be testedThe judging result of card hardware operation instruction is matching, it is determined that the hardware operation instruction to be verified refers to target hardware operationEnable matching;
Wherein, which includes: to judge that N code values of the identifying code to be verified are corresponding to be verifiedWhether hardware operation instructs target hardware operational order corresponding with N of target verification code code values identical;If should be toN code values of N code values of the identifying code of verifying corresponding hardware operation instruction and the target verification code to be verifiedCorresponding target hardware operational order is identical, it is determined that N code values of the identifying code to be verified are corresponding to be verified hardThe judging result of part operational order is matching.
Further, the checking request message include user input the identifying code to be verified N code values withHardware operation instruction to be verified corresponding with N of the identifying code to be verified code values;
This refers to according to the operation of the checking request message, target verification code and target hardware corresponding with the target verification codeIt enables, determines verification result, comprising:
Judge whether N code values of the identifying code to be verified are identical as N of target verification code code values,Obtain the first judging result of the N code values;The N is the whole of the digit greater than 0 and less than or equal to the target verification codeNumber;Judge the corresponding hardware operation instruction to be verified of N code values of the identifying code to be verified and the target verification codeWhether the corresponding target verification hardware operation instruction of N code values is identical, obtains the second judgement knot of the N code valuesFruit;If first judging result and second judging result are identical, and the N is equal to the digit of the target verification code, then reallyThe fixed verification result is to be proved to be successful;If first judging result and second judging result are identical, and the N is less than the meshThe digit of identifying code is marked, then exports the first prompt information to the user, first prompt information is for prompting user input shouldThe hardware operation instruction to be verified corresponding with the N+1 code values of N+1 of identifying code to be verified;If first judgementAs a result or second judging result is not identical, it is determined that the verification result is authentication failed.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention itsIts embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes orPerson's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the disclosureOr conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by followingClaim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, andAnd various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.

Claims (25)

Translated fromChinese
1.一种基于验证码进行验证的方法,其特征在于,包括:1. a method for verifying based on verification code, is characterized in that, comprises:获取目标验证码以及与所述目标验证码对应的目标硬件操作指令;Obtain the target verification code and the target hardware operation instruction corresponding to the target verification code;向用户提示所述目标验证码以及所述目标硬件操作指令,并获取用户输入的待验证的验证码和待验证硬件操作指令;Prompt the target verification code and the target hardware operation instruction to the user, and obtain the verification code to be verified and the hardware operation instruction to be verified input by the user;向服务器发送验证请求消息,所述验证请求消息包括所述待验证的验证码和所述待验证硬件操作指令,所述验证请求消息用于所述服务器根据所述待验证的验证码和所述待验证硬件操作指令进行验证;Send a verification request message to the server, where the verification request message includes the verification code to be verified and the hardware operation instruction to be verified, and the verification request message is used by the server according to the verification code to be verified and the hardware operation instruction to be verified. The hardware operation instructions to be verified are verified;接收所述服务器返回的验证结果;receiving the verification result returned by the server;所述目标验证码对应的目标硬件操作指令,包括:The target hardware operation instruction corresponding to the target verification code includes:所述目标验证码的M位码值中每一位的码值对应一个目标硬件操作指令;其中,M为大于0且小于或等于所述目标验证码的位数的整数。The code value of each digit in the M-bit code value of the target verification code corresponds to a target hardware operation instruction; wherein, M is an integer greater than 0 and less than or equal to the number of digits of the target verification code.2.根据权利要求1所述的方法,其特征在于,所述获取目标验证码以及与所述目标验证码对应的目标硬件操作指令,包括:2. The method according to claim 1, wherein the obtaining target verification code and the target hardware operation instruction corresponding to the target verification code comprises:接收所述服务器发送的验证码响应消息,所述验证码响应消息包括所述目标验证码以及所述目标硬件操作指令。A verification code response message sent by the server is received, where the verification code response message includes the target verification code and the target hardware operation instruction.3.根据权利要求2所述的方法,其特征在于,所述方法还包括:3. The method according to claim 2, wherein the method further comprises:向所述服务器发送验证码请求消息,所述验证码请求消息包括用于指示终端支持所述目标硬件操作指令对应的输入类型的指示信息。Sending a verification code request message to the server, where the verification code request message includes indication information for indicating that the terminal supports the input type corresponding to the target hardware operation instruction.4.根据权利要求1所述的方法,其特征在于,所述获取目标验证码以及与所述目标验证码对应的目标硬件操作指令,包括:4. The method according to claim 1, wherein the obtaining target verification code and the target hardware operation instruction corresponding to the target verification code comprises:接收服务器发送的验证码响应消息,所述验证码响应消息包括所述目标验证码;根据所述目标验证码,生成所述目标硬件操作指令。Receive a verification code response message sent by the server, where the verification code response message includes the target verification code; and generate the target hardware operation instruction according to the target verification code.5.根据权利要求1-4任一项所述的方法,其特征在于,所述目标硬件操作指令为压力等级。5. The method according to any one of claims 1-4, wherein the target hardware operation instruction is a pressure level.6.一种基于验证码进行验证的方法,其特征在于,包括:6. a method for verifying based on verification code, is characterized in that, comprises:接收终端发送的验证请求消息,所述验证请求消息包括用户输入的待验证的验证码和待验证硬件操作指令;receiving a verification request message sent by the terminal, where the verification request message includes a verification code to be verified and a hardware operation instruction to be verified entered by the user;根据所述验证请求消息、目标验证码以及与所述目标验证码对应的目标硬件操作指令,确定验证结果;Determine the verification result according to the verification request message, the target verification code and the target hardware operation instruction corresponding to the target verification code;将所述验证结果返回给所述终端;returning the verification result to the terminal;所述目标验证码对应的目标硬件操作指令,包括:The target hardware operation instruction corresponding to the target verification code includes:所述目标验证码的M位码值中每一位的码值对应一个目标硬件操作指令;其中,M为大于0且小于或等于所述目标验证码的位数的整数。The code value of each digit in the M-bit code value of the target verification code corresponds to a target hardware operation instruction; wherein, M is an integer greater than 0 and less than or equal to the number of digits of the target verification code.7.根据权利要求6所述的方法,其特征在于,所述方法还包括:7. The method according to claim 6, wherein the method further comprises:接收所述终端发送的验证码请求消息,所述验证码请求消息包括用于指示终端支持所述目标硬件操作指令对应的输入类型的指示信息;receiving a verification code request message sent by the terminal, where the verification code request message includes indication information for indicating that the terminal supports the input type corresponding to the target hardware operation instruction;根据所述验证码请求消息,向所述终端发送验证码响应消息,所述验证码响应消息包括所述目标验证码以及所述目标硬件操作指令。According to the verification code request message, a verification code response message is sent to the terminal, where the verification code response message includes the target verification code and the target hardware operation instruction.8.根据权利要求6所述的方法,其特征在于,所述根据所述验证请求消息、目标验证码以及与所述目标验证码对应的目标硬件操作指令,确定验证结果,包括:8. The method according to claim 6, wherein determining the verification result according to the verification request message, the target verification code and the target hardware operation instruction corresponding to the target verification code, comprising:判断所述待验证的验证码与所述目标验证码是否匹配;Determine whether the verification code to be verified matches the target verification code;若所述待验证的验证码与所述目标验证码匹配,则判断所述待验证硬件操作指令与所述目标硬件操作指令是否匹配;If the verification code to be verified matches the target verification code, then determine whether the hardware operation instruction to be verified matches the target hardware operation instruction;若所述待验证硬件操作指令与所述目标硬件操作指令匹配,则确定所述验证结果为验证成功。If the hardware operation instruction to be verified matches the target hardware operation instruction, it is determined that the verification result is a successful verification.9.根据权利要求8所述的方法,其特征在于,所述判断所述待验证的验证码与所述目标验证码是否匹配,包括:9. The method according to claim 8, wherein the judging whether the verification code to be verified matches the target verification code comprises:对所述待验证的验证码中的每一位的码值执行第一判断操作,确定所述每一位的码值的判断结果;Perform a first judgment operation on the code value of each bit in the verification code to be verified, and determine the judgment result of the code value of each bit;若所述每一位的码值的判断结果均为匹配,则确定所述待验证的验证码与所述目标验证码匹配;If the judgment result of the code value of each bit is a match, it is determined that the verification code to be verified matches the target verification code;其中,所述第一判断操作包括:Wherein, the first judgment operation includes:判断所述待验证的验证码的第N位的码值与所述目标验证码的第N位的码值是否相同;Determine whether the code value of the Nth digit of the verification code to be verified is the same as the code value of the Nth digit of the target verification code;若所述待验证的验证码的第N位的码值与所述目标验证码的第N位的码值相同,则确定所述待验证的验证码的第N位的码值的判断结果为匹配。If the code value of the Nth digit of the verification code to be verified is the same as the code value of the Nth digit of the target verification code, the judgment result of determining the code value of the Nth digit of the verification code to be verified is: match.10.根据权利要求8所述的方法,其特征在于,所述判断所述待验证硬件操作指令与所述目标硬件操作指令是否匹配,包括:10. The method according to claim 8, wherein the judging whether the hardware operation instruction to be verified matches the target hardware operation instruction comprises:对所述待验证的验证码中的每一位的码值对应的待验证硬件操作指令执行第二判断操作,确定所述每一位的码值对应的待验证硬件操作指令的判断结果;Perform a second judgment operation on the hardware operation instruction to be verified corresponding to the code value of each bit in the verification code to be verified, and determine the judgment result of the hardware operation instruction to be verified corresponding to the code value of each bit;若所述每一位的码值对应的待验证硬件操作指令的判断结果均为匹配,则确定所述待验证硬件操作指令与所述目标硬件操作指令匹配;If the judgment result of the to-be-verified hardware operation instruction corresponding to the code value of each bit is a match, then it is determined that the to-be-verified hardware operation instruction matches the target hardware operation instruction;其中,所述第二判断操作包括:Wherein, the second judgment operation includes:判断所述待验证的验证码的第N位的码值对应的待验证硬件操作指令与所述目标验证码的第N位的码值对应的目标硬件操作指令是否相同;Determine whether the hardware operation instruction to be verified corresponding to the code value of the Nth bit of the verification code to be verified is the same as the target hardware operation instruction corresponding to the code value of the Nth bit of the target verification code;若所述待验证的验证码的第N位的码值对应的待验证硬件操作指令与所述目标验证码的第N位的码值对应的目标硬件操作指令相同,则确定所述待验证的验证码的第N位的码值对应的待验证硬件操作指令的判断结果为匹配。If the hardware operation instruction to be verified corresponding to the code value of the Nth bit of the verification code to be verified is the same as the target hardware operation instruction corresponding to the code value of the Nth bit of the target verification code, it is determined that the to-be-verified hardware operation instruction The judgment result of the hardware operation instruction to be verified corresponding to the code value of the Nth bit of the verification code is a match.11.根据权利要求6所述的方法,其特征在于,所述验证请求消息包括用户输入的所述待验证的验证码的第N位的码值和与所述待验证的验证码的第N位的码值对应的待验证硬件操作指令;11. The method according to claim 6, wherein the verification request message comprises the code value of the Nth digit of the verification code to be verified input by the user and the Nth digit of the verification code to be verified. The hardware operation instruction to be verified corresponding to the code value of the bit;所述根据所述验证请求消息、目标验证码以及与所述目标验证码对应的目标硬件操作指令,确定验证结果,包括:The determining of the verification result according to the verification request message, the target verification code and the target hardware operation instruction corresponding to the target verification code includes:判断所述待验证的验证码的第N位的码值与所述目标验证码的第N位的码值是否相同,获得所述第N位的码值的第一判断结果;所述N为大于0且小于或等于所述目标验证码的位数的整数;Determine whether the code value of the Nth digit of the verification code to be verified is the same as the code value of the Nth digit of the target verification code, and obtain the first judgment result of the code value of the Nth digit; the N is an integer greater than 0 and less than or equal to the number of digits of the target verification code;判断所述待验证的验证码的第N位的码值对应的待验证硬件操作指令与所述目标验证码的第N位的码值对应的目标验证硬件操作指令是否相同,获得所述第N位的码值的第二判断结果;Determine whether the hardware operation instruction to be verified corresponding to the code value of the Nth bit of the verification code to be verified is the same as the target verification hardware operation instruction corresponding to the code value of the Nth bit of the target verification code, and obtain the Nth bit the second judgment result of the code value of the bit;若所述第一判断结果和所述第二判断结果均为相同,且所述N等于所述目标验证码的位数,则确定所述验证结果为验证成功;If the first judgment result and the second judgment result are the same, and the N is equal to the number of digits of the target verification code, it is determined that the verification result is a successful verification;若所述第一判断结果和所述第二判断结果均为相同,且所述N小于所述目标验证码的位数,则向所述用户输出第一提示信息,所述第一提示信息用于提示所述用户输入所述待验证的验证码的第N+1位和所述第N+1位的码值对应的待验证硬件操作指令;If the first judgment result and the second judgment result are the same, and the N is less than the number of digits of the target verification code, output first prompt information to the user, and the first prompt information uses in prompting the user to input the hardware operation instruction to be verified corresponding to the code value of the N+1th bit of the verification code to be verified and the code value of the N+1th bit;若所述第一判断结果或所述第二判断结果为不相同,则确定所述验证结果为验证失败。If the first judgment result or the second judgment result is not the same, it is determined that the verification result is a verification failure.12.一种基于验证码进行验证的装置,其特征在于,包括:12. A device for verifying based on a verification code, comprising:第一获取模块,被配置为获取目标验证码以及与所述目标验证码对应的目标硬件操作指令;a first obtaining module, configured to obtain a target verification code and a target hardware operation instruction corresponding to the target verification code;第二获取模块,被配置为向用户提示所述目标验证码以及所述目标硬件操作指令,并获取用户输入的待验证的验证码和待验证硬件操作指令;a second acquiring module, configured to prompt the user for the target verification code and the target hardware operation instruction, and acquire the verification code to be verified and the hardware operation instruction to be verified input by the user;第一发送模块,被配置为向服务器发送验证请求消息,所述验证请求消息包括所述待验证的验证码和所述待验证硬件操作指令,所述验证请求消息用于所述服务器根据所述待验证的验证码和所述待验证硬件操作指令进行验证;The first sending module is configured to send a verification request message to the server, where the verification request message includes the verification code to be verified and the hardware operation instruction to be verified, and the verification request message is used by the server according to the The verification code to be verified and the hardware operation instruction to be verified are verified;接收模块,被配置为接收所述服务器返回的验证结果;a receiving module, configured to receive the verification result returned by the server;所述目标验证码对应的目标硬件操作指令,包括:The target hardware operation instruction corresponding to the target verification code includes:所述目标验证码的M位码值中每一位的码值对应一个目标硬件操作指令;其中,M为大于0且小于或等于所述目标验证码的位数的整数。The code value of each digit in the M-bit code value of the target verification code corresponds to a target hardware operation instruction; wherein, M is an integer greater than 0 and less than or equal to the number of digits of the target verification code.13.根据权利要求12所述的装置,其特征在于,所述第一获取模块包括:第一获取子模块;13. The apparatus according to claim 12, wherein the first obtaining module comprises: a first obtaining sub-module;所述第一获取子模块,被配置为接收所述服务器发送的验证码响应消息,所述验证码响应消息包括所述目标验证码以及所述目标硬件操作指令。The first obtaining submodule is configured to receive a verification code response message sent by the server, where the verification code response message includes the target verification code and the target hardware operation instruction.14.根据权利要求13所述的装置,其特征在于,所述装置还包括:第二发送模块;14. The apparatus according to claim 13, wherein the apparatus further comprises: a second sending module;所述第二发送模块,被配置为向所述服务器发送验证码请求消息,所述验证码请求消息包括用于指示终端支持所述目标硬件操作指令对应的输入类型的指示信息。The second sending module is configured to send a verification code request message to the server, where the verification code request message includes indication information for indicating that the terminal supports the input type corresponding to the target hardware operation instruction.15.根据权利要求12所述的装置,其特征在于,所述第一获取模块包括:第二获取子模块;15. The apparatus according to claim 12, wherein the first obtaining module comprises: a second obtaining sub-module;所述第二获取子模块,被配置为:The second acquisition sub-module is configured as:接收服务器发送的验证码响应消息,所述验证码响应消息包括所述目标验证码;根据所述目标验证码,生成所述目标硬件操作指令。Receive a verification code response message sent by the server, where the verification code response message includes the target verification code; and generate the target hardware operation instruction according to the target verification code.16.根据权利要求12-15任一项所述的装置,其特征在于,所述目标硬件操作指令为压力等级。16. The apparatus according to any one of claims 12-15, wherein the target hardware operation instruction is a pressure level.17.一种基于验证码进行验证的装置,其特征在于,包括:17. A device for verifying based on a verification code, characterized in that it comprises:第一接收模块,被配置为接收终端发送的验证请求消息,所述验证请求消息包括用户输入的待验证的验证码和待验证硬件操作指令;a first receiving module, configured to receive a verification request message sent by the terminal, where the verification request message includes a verification code to be verified and a hardware operation instruction to be verified entered by a user;确定模块,被配置为根据所述验证请求消息、目标验证码以及与所述目标验证码对应的目标硬件操作指令,确定验证结果;a determining module, configured to determine a verification result according to the verification request message, the target verification code, and the target hardware operation instruction corresponding to the target verification code;第一发送模块,被配置为将所述验证结果返回给所述终端;a first sending module, configured to return the verification result to the terminal;所述目标验证码对应的目标硬件操作指令,包括:The target hardware operation instruction corresponding to the target verification code includes:所述目标验证码的M位码值中每一位的码值对应一个目标硬件操作指令;其中,M为大于0且小于或等于所述目标验证码的位数的整数。The code value of each digit in the M-bit code value of the target verification code corresponds to a target hardware operation instruction; wherein, M is an integer greater than 0 and less than or equal to the number of digits of the target verification code.18.根据权利要求17所述的装置,其特征在于,所述装置还包括:第二接收模块和第二发送模块;18. The apparatus according to claim 17, wherein the apparatus further comprises: a second receiving module and a second sending module;所述第二接收模块,被配置为接收所述终端发送的验证码请求消息,所述验证码请求消息包括用于指示终端支持所述目标硬件操作指令对应的输入类型的指示信息;The second receiving module is configured to receive a verification code request message sent by the terminal, where the verification code request message includes indication information for indicating that the terminal supports the input type corresponding to the target hardware operation instruction;所述第二发送模块,被配置为根据所述验证码请求消息,向所述终端发送验证码响应消息,所述验证码响应消息包括所述目标验证码以及所述目标硬件操作指令。The second sending module is configured to send a verification code response message to the terminal according to the verification code request message, where the verification code response message includes the target verification code and the target hardware operation instruction.19.根据权利要求17所述的装置,其特征在于,所述确定模块包括:第一确定模块;19. The apparatus according to claim 17, wherein the determining module comprises: a first determining module;所述第一确定模块,被配置为:The first determining module is configured as:判断所述待验证的验证码与所述目标验证码是否匹配;Determine whether the verification code to be verified matches the target verification code;若所述待验证的验证码与所述目标验证码匹配,则判断所述待验证硬件操作指令与所述目标硬件操作指令是否匹配;If the verification code to be verified matches the target verification code, then determine whether the hardware operation instruction to be verified matches the target hardware operation instruction;若所述待验证硬件操作指令与所述目标硬件操作指令匹配,则确定所述验证结果为验证成功。If the hardware operation instruction to be verified matches the target hardware operation instruction, it is determined that the verification result is a successful verification.20.根据权利要求19所述的装置,其特征在于,所述第一确定模块包括第一确定子模块;20. The apparatus according to claim 19, wherein the first determination module comprises a first determination sub-module;所述第一确定子模块,被配置为:The first determination submodule is configured as:对所述待验证的验证码中的每一位的码值执行第一判断操作,确定所述每一位的码值的判断结果;Perform a first judgment operation on the code value of each bit in the verification code to be verified, and determine the judgment result of the code value of each bit;若所述每一位的码值的判断结果均为匹配,则确定所述待验证的验证码与所述目标验证码匹配;If the judgment result of the code value of each bit is a match, it is determined that the verification code to be verified matches the target verification code;其中,所述第一判断操作包括:Wherein, the first judgment operation includes:判断所述待验证的验证码的第N位的码值与所述目标验证码的第N位的码值是否相同;Determine whether the code value of the Nth digit of the verification code to be verified is the same as the code value of the Nth digit of the target verification code;若所述待验证的验证码的第N位的码值与所述目标验证码的第N位的码值相同,则确定所述待验证的验证码的第N位的码值的判断结果为匹配。If the code value of the Nth digit of the verification code to be verified is the same as the code value of the Nth digit of the target verification code, the judgment result of determining the code value of the Nth digit of the verification code to be verified is: match.21.根据权利要求19所述的装置,其特征在于,所述第一确定模块包括第二确定子模块;21. The apparatus according to claim 19, wherein the first determining module comprises a second determining sub-module;所述第二确定子模块,被配置为:The second determination submodule is configured as:对所述待验证的验证码中的每一位的码值对应的待验证硬件操作指令执行第二判断操作,确定所述每一位的码值对应的待验证硬件操作指令的判断结果;Perform a second judgment operation on the hardware operation instruction to be verified corresponding to the code value of each bit in the verification code to be verified, and determine the judgment result of the hardware operation instruction to be verified corresponding to the code value of each bit;若所述每一位的码值对应的待验证硬件操作指令的判断结果均为匹配,则确定所述待验证硬件操作指令与所述目标硬件操作指令匹配;If the judgment result of the to-be-verified hardware operation instruction corresponding to the code value of each bit is a match, then it is determined that the to-be-verified hardware operation instruction matches the target hardware operation instruction;其中,所述第二判断操作包括:Wherein, the second judgment operation includes:判断所述待验证的验证码的第N位的码值对应的待验证硬件操作指令与所述目标验证码的第N位的码值对应的目标硬件操作指令是否相同;Determine whether the hardware operation instruction to be verified corresponding to the code value of the Nth bit of the verification code to be verified is the same as the target hardware operation instruction corresponding to the code value of the Nth bit of the target verification code;若所述待验证的验证码的第N位的码值对应的待验证硬件操作指令与所述目标验证码的第N位的码值对应的目标硬件操作指令相同,则确定所述待验证的验证码的第N位的码值对应的待验证硬件操作指令的判断结果为匹配。If the hardware operation instruction to be verified corresponding to the code value of the Nth bit of the verification code to be verified is the same as the target hardware operation instruction corresponding to the code value of the Nth bit of the target verification code, it is determined that the to-be-verified hardware operation instruction The judgment result of the hardware operation instruction to be verified corresponding to the code value of the Nth bit of the verification code is a match.22.根据权利要求17所述的装置,其特征在于,所述验证请求消息包括用户输入的所述待验证的验证码的第N位的码值和与所述待验证的验证码的第N位的码值对应的待验证硬件操作指令;22. The apparatus according to claim 17, wherein the verification request message comprises the code value of the Nth digit of the verification code to be verified input by the user and the Nth digit of the verification code to be verified. The hardware operation instruction to be verified corresponding to the code value of the bit;所述确定模块包括:第二确定模块;The determining module includes: a second determining module;所述第二确定模块,被配置为:The second determining module is configured to:判断所述待验证的验证码的第N位的码值与所述目标验证码的第N位的码值是否相同,获得所述第N位的码值的第一判断结果;所述N为大于0且小于或等于所述目标验证码的位数的整数;Determine whether the code value of the Nth digit of the verification code to be verified is the same as the code value of the Nth digit of the target verification code, and obtain the first judgment result of the code value of the Nth digit; the N is an integer greater than 0 and less than or equal to the number of digits of the target verification code;判断所述待验证的验证码的第N位的码值对应的待验证硬件操作指令与所述目标验证码的第N位的码值对应的目标验证硬件操作指令是否相同,获得所述第N位的码值的第二判断结果;Determine whether the hardware operation instruction to be verified corresponding to the code value of the Nth bit of the verification code to be verified is the same as the target verification hardware operation instruction corresponding to the code value of the Nth bit of the target verification code, and obtain the Nth bit the second judgment result of the code value of the bit;若所述第一判断结果和所述第二判断结果均为相同,且所述N等于所述目标验证码的位数,则确定所述验证结果为验证成功;If the first judgment result and the second judgment result are the same, and the N is equal to the number of digits of the target verification code, it is determined that the verification result is a successful verification;若所述第一判断结果和所述第二判断结果均为相同,且所述N小于所述目标验证码的位数,则向所述用户输出第一提示信息,所述第一提示信息用于提示所述用户输入所述待验证的验证码的第N+1位和所述第N+1位的码值对应的待验证硬件操作指令;If the first judgment result and the second judgment result are the same, and the N is less than the number of digits of the target verification code, output first prompt information to the user, and the first prompt information uses in prompting the user to input the hardware operation instruction to be verified corresponding to the code value of the N+1th bit of the verification code to be verified and the code value of the N+1th bit;若所述第一判断结果或所述第二判断结果为不相同,则确定所述验证结果为验证失败。If the first judgment result or the second judgment result is not the same, it is determined that the verification result is a verification failure.23.一种基于验证码进行验证的系统,其特征在于,包括:权利要求12-16任一项所述的装置,以及权利要求17-22任一项所述的装置。23. A system for verification based on a verification code, characterized by comprising: the device according to any one of claims 12-16 and the device according to any one of claims 17-22.24.一种终端,其特征在于,包括:处理器、发送器、接收器和被配置为存储处理器可执行指令的存储器;24. A terminal, comprising: a processor, a transmitter, a receiver, and a memory configured to store processor-executable instructions;其中,所述处理器被配置为:获取目标验证码以及与所述目标验证码对应的目标硬件操作指令;向用户提示所述目标验证码以及所述目标硬件操作指令,并获取用户输入的待验证的验证码和待验证硬件操作指令;Wherein, the processor is configured to: obtain a target verification code and a target hardware operation instruction corresponding to the target verification code; prompt the target verification code and the target hardware operation instruction to the user, and obtain the pending input input by the user. Verified verification code and hardware operation instructions to be verified;所述发送器被配置为:向服务器发送验证请求消息,所述验证请求消息包括所述待验证的验证码和所述待验证硬件操作指令,所述验证请求消息用于所述服务器根据所述待验证的验证码和所述待验证硬件操作指令进行验证;The transmitter is configured to: send a verification request message to the server, where the verification request message includes the verification code to be verified and the hardware operation instruction to be verified, and the verification request message is used by the server according to the The verification code to be verified and the hardware operation instruction to be verified are verified;所述接收器被配置为:接收所述服务器返回的验证结果;The receiver is configured to: receive the verification result returned by the server;所述目标验证码对应的目标硬件操作指令,包括:The target hardware operation instruction corresponding to the target verification code includes:所述目标验证码的M位码值中每一位的码值对应一个目标硬件操作指令;其中,M为大于0且小于或等于所述目标验证码的位数的整数。The code value of each digit in the M-bit code value of the target verification code corresponds to a target hardware operation instruction; wherein, M is an integer greater than 0 and less than or equal to the number of digits of the target verification code.25.一种服务器,其特征在于,包括:处理器、发送器、接收器和被配置为存储处理器可执行指令的存储器;25. A server, comprising: a processor, a transmitter, a receiver, and a memory configured to store processor-executable instructions;其中,所述接收器被配置为:接收终端发送的验证请求消息,所述验证请求消息包括用户输入的待验证的验证码和待验证硬件操作指令;The receiver is configured to: receive a verification request message sent by the terminal, where the verification request message includes a verification code to be verified and a hardware operation instruction to be verified entered by the user;所述处理器被配置为:根据所述验证请求消息、目标验证码以及与所述目标验证码对应的目标硬件操作指令,确定验证结果;The processor is configured to: determine a verification result according to the verification request message, the target verification code, and the target hardware operation instruction corresponding to the target verification code;所述发送器,被配置为将所述验证结果返回给所述终端;the transmitter, configured to return the verification result to the terminal;所述目标验证码对应的目标硬件操作指令,包括:The target hardware operation instruction corresponding to the target verification code includes:所述目标验证码的M位码值中每一位的码值对应一个目标硬件操作指令;其中,M为大于0且小于或等于所述目标验证码的位数的整数。The code value of each digit in the M-bit code value of the target verification code corresponds to a target hardware operation instruction; wherein, M is an integer greater than 0 and less than or equal to the number of digits of the target verification code.
CN201610354003.4A2016-05-252016-05-25Method, apparatus, equipment and the system verified based on identifying codeActiveCN106060027B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201610354003.4ACN106060027B (en)2016-05-252016-05-25Method, apparatus, equipment and the system verified based on identifying code

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201610354003.4ACN106060027B (en)2016-05-252016-05-25Method, apparatus, equipment and the system verified based on identifying code

Publications (2)

Publication NumberPublication Date
CN106060027A CN106060027A (en)2016-10-26
CN106060027Btrue CN106060027B (en)2019-04-12

Family

ID=57174420

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201610354003.4AActiveCN106060027B (en)2016-05-252016-05-25Method, apparatus, equipment and the system verified based on identifying code

Country Status (1)

CountryLink
CN (1)CN106060027B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108460268A (en)*2017-02-202018-08-28阿里巴巴集团控股有限公司Verification method and device
CN108737346B (en)*2017-04-212020-06-19珠海格力电器股份有限公司Password verification method and device, server and communication system
CN109446056B (en)*2018-09-112023-03-21平安科技(深圳)有限公司Code verification method and device, electronic equipment and medium
CN109740323A (en)*2018-10-262019-05-10深圳壹账通智能科技有限公司Verify code verification method, device, storage medium and computer equipment
CN109697343B (en)*2018-12-282021-08-17联想(北京)有限公司Verification method and system and computer system

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103065077A (en)*2013-01-062013-04-24于朔Real user authentication method and real user authentication device
CN104023029A (en)*2014-06-192014-09-03百度在线网络技术(北京)有限公司Method and device for verifying verification codes
CN104348617A (en)*2013-07-262015-02-11中兴通讯股份有限公司Verification code processing method and device, and terminal and server
CN104836778A (en)*2014-02-112015-08-12腾讯科技(深圳)有限公司Method, device and system for realizing identifying code

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20120183270A1 (en)*2011-01-142012-07-19International Business Machines CorporationWebcam captcha

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103065077A (en)*2013-01-062013-04-24于朔Real user authentication method and real user authentication device
CN104348617A (en)*2013-07-262015-02-11中兴通讯股份有限公司Verification code processing method and device, and terminal and server
CN104836778A (en)*2014-02-112015-08-12腾讯科技(深圳)有限公司Method, device and system for realizing identifying code
CN104023029A (en)*2014-06-192014-09-03百度在线网络技术(北京)有限公司Method and device for verifying verification codes

Also Published As

Publication numberPublication date
CN106060027A (en)2016-10-26

Similar Documents

PublicationPublication DateTitle
US20220398594A1 (en)Pro-active identity verification for authentication of transaction initiated via non-voice channel
TWI635409B (en) Query system, method and non-transitory machine readable medium for determining authentication capability
CN104270404B (en)A kind of login method and device based on terminal iidentification
US20180159847A1 (en)Systems and methods for using imaging to authenticate online users
CN106060027B (en)Method, apparatus, equipment and the system verified based on identifying code
JP2018532301A (en) User authentication method and apparatus
CN109039990B (en)Behavior verification method and device based on verification code
JP2013524314A (en) Authentication method and system using portable terminal
CN105577375B (en)Identity verification method and device
CN109407528A (en)Safety access method, device, server and storage medium
CN105678549A (en)Payment method and device
CN106375096A (en) SMS verification method and device
CN108475304A (en)A kind of method, apparatus and mobile terminal of affiliate application and biological characteristic
KR101633965B1 (en)User security authentication system in internet and method thereof
CN109547480A (en)A kind of login method and device
CN110049062A (en)Verify code check method, device, electronic equipment and storage medium
CN110990826A (en) Authentication method and device for logging in to applet
CN104158665A (en)Method and device of verification
CN106600768A (en)Intelligent door lock authentication method, device and terminal
CN107231338B (en)Network connection method, device and device for network connection
CN107145771A (en) App unlocking method, device and terminal
CN108777692A (en)Method, apparatus, electronic equipment, login service device and the medium that user logs in
CN106133736B (en) Fingerprint verification method and device
CN108712384A (en)terminal authentication method, device, terminal and server
CN108985036A (en)Method, apparatus, electronic equipment, login service device and the medium that user logs in

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp