Disclosure of Invention
In view of the above, it is necessary to provide an information verification method, an apparatus, a computer device, and a storage medium capable of improving security in view of the above technical problems.
In a first aspect, an information verification method is provided, and the method includes:
when information verification is carried out, a plurality of first verification fields sent by a first terminal are sequentially received;
splicing the plurality of first verification fields to obtain spliced first verification fields;
and comparing the spliced first verification field with a prestored legal verification field, and outputting information verification passing information when the spliced first verification field is the same as the prestored legal verification field.
In one embodiment, the sequentially receiving a plurality of first authentication fields sent by the first terminal includes:
receiving first verification field input completion information after receiving a first verification field input based on the field input interface each time;
after receiving the first verification field input completion information every time, providing a refreshed field input interface for inputting the first verification field next time.
In one embodiment, the receiving a plurality of first authentication fields sent by a first terminal in sequence includes:
sequentially receiving the plurality of first authentication fields transmitted by a plurality of different first terminals; or,
and sequentially receiving the plurality of first verification fields transmitted by the same first terminal.
In one embodiment, before sequentially receiving a plurality of first authentication fields when performing information authentication, the method further includes:
when receiving a verification field setting instruction, sequentially receiving a plurality of second verification fields sent by a second terminal;
and splicing the plurality of second verification fields to obtain the legal verification fields, and storing the legal verification fields.
In one embodiment, the receiving the plurality of second authentication fields in sequence comprises:
receiving second verification field input completion information after receiving a second verification field input based on the field setting interface each time;
and after receiving the second field input completion information every time, providing a refreshed field setting interface for inputting a second verification field next time.
In one embodiment, the receiving the plurality of second authentication fields sent by the second terminal in sequence includes:
sequentially receiving the plurality of second authentication fields transmitted by a plurality of different second terminals; or,
and sequentially receiving the plurality of second verification fields transmitted by the same second terminal.
In one embodiment, the method further comprises:
when the spliced first verification field is different from the prestored legal verification field, receiving a preset verification information carrier sent by a third terminal, wherein the verification information carrier stores a plurality of second verification fields, and the plurality of second verification fields belong to the legal verification field;
acquiring the plurality of second authentication fields from the authentication information carrier according to a pre-stored authentication information carrier enabling password;
splicing the plurality of second verification fields to obtain spliced second verification fields;
and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
In one embodiment, the method further comprises:
when the spliced first verification field is different from the prestored legal verification field, receiving a plurality of second verification fields sent by the third terminal, wherein the plurality of second verification fields are obtained from the verification information carrier through the verification information carrier starting password;
splicing the plurality of second verification fields to obtain spliced second verification fields;
and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
In a second aspect, there is provided an information verification apparatus, the apparatus comprising:
the receiving module is used for sequentially receiving a plurality of first verification fields sent by a first terminal when information verification is carried out;
the splicing module is used for splicing the plurality of first verification fields to obtain spliced first verification fields;
and the comparison module is used for comparing the spliced first verification field with a prestored legal verification field and outputting information verification passing information when the spliced first verification field is the same as the prestored legal verification field.
In one embodiment, the receiving module is specifically configured to receive the first verification field input completion information after receiving the first verification field input based on the field input interface each time;
after receiving the first verification field input completion information every time, providing a refreshed field input interface for inputting the first verification field next time.
In one embodiment, the first terminal is a terminal, or the first terminal is a plurality of different terminals, and the receiving module is specifically configured to sequentially receive the plurality of first authentication fields sent by the plurality of different first terminals; or, the plurality of first authentication fields transmitted by the same first terminal are received in sequence.
In one embodiment, the apparatus further includes a valid verification field obtaining module, where the valid verification field obtaining module is configured to, when receiving a verification field setting instruction, sequentially receive a plurality of second verification fields sent by the second terminal;
and splicing the plurality of second verification fields to obtain the legal verification fields, and storing the legal verification fields.
In one embodiment, the valid verification field obtaining module is specifically configured to receive second verification field input completion information after receiving a second verification field input based on the field setting interface each time;
and after receiving the second field input completion information every time, providing a refreshed field setting interface for inputting a second verification field next time.
In one embodiment, the second terminal is a terminal, or the second terminal is a plurality of different terminals, and the valid authentication field obtaining module is specifically configured to sequentially receive the plurality of second authentication fields sent by the plurality of different second terminals; alternatively, the plurality of second authentication fields transmitted by the same second terminal are sequentially received.
In one embodiment, the apparatus further includes a second verification field obtaining module, where the second verification field obtaining module is configured to receive a preset verification information carrier sent by a third terminal when the spliced first verification field is different from the pre-stored legal verification field, where the verification information carrier stores the plurality of second verification fields;
acquiring a plurality of second verification fields from the verification information carrier according to a prestored verification information carrier starting password, wherein the plurality of second verification fields belong to the legal verification fields;
splicing the plurality of second verification fields to obtain spliced second verification fields;
and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
In one embodiment, the second authentication field obtaining module is further configured to receive the plurality of second authentication fields sent by the third terminal when the spliced first authentication field is different from the pre-stored legal authentication field, where the plurality of second authentication fields are obtained from the authentication information carrier through the authentication information carrier enabling password;
splicing the plurality of second verification fields to obtain spliced second verification fields;
and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
In a third aspect, there is provided a computer device comprising a memory and a processor, wherein the memory stores a computer program, and the processor implements the information verification method according to any one of the first aspect when executing the computer program.
In a fourth aspect, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the information verification method of any one of the first aspects described above.
According to the information verification method, the information verification device, the computer equipment and the storage medium, firstly, when information verification is carried out, a plurality of first verification fields sent by a first terminal are sequentially received; then splicing the plurality of first verification fields to obtain spliced first verification fields; and finally, comparing the spliced first verification field with a prestored legal verification field, and outputting information verification passing information when the spliced first verification field is the same as the prestored legal verification field. According to the information verification method provided by the application, when information verification is carried out, the combination of the plurality of first verification fields is used as the basis of final information verification, so that a user only knowing one of the first verification fields cannot leak all the contents of the real legal verification fields. Compared with the traditional situation that the specific content of the verification information is mastered by at least one user, the information verification method provided by the application greatly improves the safety of information verification.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
In daily life, for some specific information, a user needs to ensure the security of the information. Often, a user can ensure the security of information by using authentication information. Specifically, the user may set a legal verification field for the specific information to be protected, and when the user wants to obtain the specific information, the user needs to input a correct legal verification field to pass the information verification, so as to obtain the specific information.
For example, if a bank administrator wants to protect information of the whole bank system, the bank administrator may set a validity verification field 123456 for the whole bank system, and when the information of the bank system needs to be acquired, the bank administrator must correctly input the validity verification field 123456 set in advance, so as to acquire the information of the whole bank system.
However, in the conventional process of using the authentication information, the specific contents of the authentication information can be grasped by at least one user. When a user who grasps the authentication information intentionally reveals specific content of the authentication information, or the user who grasps the authentication information is maliciously stolen with the specific content of the authentication information, a very large security risk will be caused. For example, the bank administrator may know the specific content of the legal verification field, and when the bank administrator intentionally leaks the legal verification field to another person, the bank administrator may pose a very great security risk to the bank system.
Therefore, an information verification method capable of improving security is required.
The information verification method provided by the application can be applied to the application environment shown in fig. 1. Wherein thefirst terminal 101 and thesecond terminal 102 may communicate with theserver 103 through a network connection. Theserver 103 has a valid authentication field stored thereon. First, theserver 103 may receive a plurality of first verification fields sent by thefirst terminal 101, then theserver 103 may splice the received plurality of first verification fields to obtain a spliced first verification field, then theserver 103 may compare the spliced first verification field with a pre-stored legal verification field, and when the spliced first verification field is the same as the pre-stored legal verification field, theserver 103 may output verification information passing information.
Moreover, theserver 103 may further receive a verification field setting instruction sent by thesecond terminal 102, after theserver 103 receives the verification field setting instruction sent by thesecond terminal 102, theserver 103 may sequentially receive a plurality of second verification fields sent by thesecond terminal 102, and then theserver 103 may splice the plurality of second verification fields received sequentially and store the spliced second verification fields as valid verification fields.
In the information verification method provided by the present application, the application environment may further include athird terminal 104, and in the case that the implementation environment includes thethird terminal 104, a specific schematic diagram thereof may refer to fig. 2. Wherein, thefirst terminal 101, thesecond terminal 102 and thethird terminal 104 can all communicate with theserver 103 through network connection. The specific functions of thefirst terminal 101 and thesecond terminal 102 are the same as those in the above-described implementation environment, and are not described herein again. Thethird terminal 104 may store an authentication information carrier, where a plurality of preset second authentication fields are stored in the authentication information carrier, and when the first authentication field spliced on theserver 103 is different from the prestored valid authentication field, theserver 103 may receive the authentication information carrier sent by thethird terminal 104, then obtain the plurality of second authentication fields from the authentication information carrier by using the prestored authentication information carrier activation password, and finally, theserver 103 completes information authentication according to the obtained plurality of second authentication fields.
The number of thefirst terminals 101 may be one or more. The number of thesecond terminals 102 may be one or more. Thefirst terminal 101, thesecond terminal 102, and thethird terminal 104 may be implemented by the same terminal.
Thefirst terminal 101, thesecond terminal 102 and thethird terminal 104 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices, and theserver 103 may be implemented by an independent server or a server cluster composed of a plurality of servers.
In the embodiment of the present application, as shown in fig. 3, an information verification method is provided, which is described by taking an example that the method is applied to the server in fig. 1 or fig. 2, and includes the following steps:
step 301, when performing information verification, the server sequentially receives a plurality of first verification fields sent by the first terminal.
The first authentication field may be a part of a pre-stored legal authentication field, for example, the pre-stored legal authentication field is 123456, and then the first authentication field may be a part of 123456 with any length such as 1234 or 56. In practical applications, the plurality of first authentication fields may be sequentially input by different users on the first terminal. For example, for two users a and B and a first terminal, the a user may input 1234 on the first terminal, then the B user inputs 56 on the first terminal, and then the server receives the two first authentication fields which are input by the a and B users in sequence from the first terminal.
Step 302, the server splices the plurality of first verification fields to obtain spliced first verification fields.
Based on the steps, after receiving that the two first verification fields are sequentially input by the user A and the user B sent by the first terminal, the server splices the two received first verification fields. Specifically, taking the two first verification fields 1234 and 56 as an example, the server concatenates the sequentially received 1234 and 56 to obtain a concatenated first verification field 123456.
Optionally, the server may splice the received first verification fields according to the order sent by the first terminal, or may splice the received first verification fields according to other predefined orders.
Step 303, the server compares the spliced first verification field with a pre-stored legal verification field, and outputs information verification passing information when the spliced first verification field is the same as the pre-stored legal verification field.
Based on the above steps, after obtaining the spliced first verification field 123456, the server compares the spliced first verification field 123456 with the pre-stored legal verification field, finds that the spliced first verification field is the same as the pre-stored legal verification field, and then outputs information verification passing information.
In the information verification method, when information verification is carried out, a plurality of first verification fields sent by a first terminal are received in sequence; then splicing the plurality of first verification fields to obtain spliced first verification fields; and finally, comparing the spliced first verification field with a prestored legal verification field, and outputting information verification passing information when the spliced first verification field is the same as the prestored legal verification field. According to the information verification method provided by the application, when information verification is carried out, the combination of the plurality of first verification fields is used as the basis of final information verification, so that a user only knowing one of the first verification fields cannot leak all the contents of the real legal verification fields. Compared with the traditional situation that the specific content of the verification information is mastered by at least one user, the information verification method provided by the application greatly improves the safety of information verification.
In an embodiment of the present application, please refer to fig. 4, which provides a method for receiving a first verification field, the method including:
instep 401, the server receives the first verification field input completion information after receiving the first verification field input based on the field input interface each time.
Specifically, the server provides a field input interface, and the field input interface is displayed to the user through the first terminal. After a user inputs a first verification field mastered by the user on the field input interface, a confirmation button can be selected in the field input interface to indicate that the user has finished inputting, and after receiving field input completion information triggered by the user, the server can prepare for receiving the next first verification field.
Instep 402, after receiving the first verification field input completion information each time, the server provides a refreshed field input interface for the next input of the first verification field.
Optionally, in order to distinguish between a plurality of first verification fields sent by the first terminal, after receiving field input completion information each time, the server provides a refreshed field input interface for receiving different first verification fields.
Assuming that the plurality of first authentication fields are input by a plurality of users, after the server receives the first authentication field input by the user and the authentication field input completion information sent by the terminal each time, the interface of the user input first authentication field is refreshed, and a new field input interface is provided for the next user. The server may provide the new field entry interface by replacing the first verification field of the previous user input with a unicode on the new field entry interface or hiding the first verification field of the previous user input on the new field entry interface and also setting the first verification field of the previous user input in a non-editable mode on the new field entry interface.
For ease of understanding, the manner in which the server refreshes the field input interface in actual application is illustrated. After the a user inputs the first verification field 1234 and then sends field input completion information to the server through the confirmation button, the server refreshes the field input interface in such a manner that the first verification field 1234 input by the a user in the field input interface is collectively displayed with "+" instead, and the first verification field 1234 input by the a user in the field input interface is locked in a non-editable mode. This prevents the user B from directly knowing the first authentication field mastered by the user a when entering the first authentication field 56 mastered by the user B, thereby mastering the real valid authentication field, and at the same time, prevents the user B from modifying the first authentication field entered by the user a.
In the embodiment of the application, by means of refreshing the field input interface after field input completion information is received every time, under the condition that a plurality of first verification fields exist, the risk that the first verification fields are leaked can be effectively reduced, and the safety during information verification is greatly improved.
In this embodiment, the first terminal is one terminal, or the first terminal is a plurality of different terminals. The sequentially receiving a plurality of first verification fields sent by a first terminal includes: the server receives the first verification fields sent by different first terminals in sequence; alternatively, the server receives the plurality of first authentication fields transmitted by the same first terminal in sequence.
In the embodiment of the present application, it is assumed that there are two users a and B, where the two users a and B may sequentially input the first authentication field mastered by themselves on the same terminal, and the two users a and B may also respectively input the first authentication field mastered by themselves on different terminals.
In the embodiment of the application, the plurality of first verification fields are not limited to be sent by one terminal, and the plurality of first verification fields can be sent by a plurality of terminals, so that the flexibility and the usability of the information verification method are greatly improved.
In an embodiment of the present application, please refer to fig. 5, which provides a method for setting a verification field, the method includes:
step 501, when receiving a verification field setting instruction, the server sequentially receives a plurality of second verification fields sent by the second terminal.
In the embodiment of the present application, before information authentication is performed, it is necessary to set an authentication field, which is equivalent to setting a password in advance before using the password. The second terminal mentioned in this step may be the same terminal as the first terminal.
In practical application, the setting of the verification field can be completed by a plurality of users, specifically, when the verification field is set, one of the users can trigger the verification field setting instruction, and then the other users can respectively input the second verification field which the other users want to set.
For example, the setting of the authentication field may be done by A, B along with the C user, where the C user may trigger an authentication field setting instruction on the second terminal and then leave the scene. Then the a-user and the B-user can respectively input the second authentication field they want to set. The server will receive the second authentication field that was last entered by both user a and user B at the second terminal.
Step 502, the server splices the plurality of second verification fields to obtain the legal verification field, and stores the legal verification field.
Based on the above steps, after receiving the plurality of second verification fields sent by the second verification terminal, the server splices the plurality of second verification fields received in sequence, and stores the spliced second verification fields as the valid verification fields.
For example, the setting of the verification field may be performed by A, B together with the user C who first requests for setting the verification field and leaves the site for setting the verification field after triggering a verification field setting instruction at the second terminal. After receiving the verification field setting instruction sent by the second terminal, the server prepares for receiving a plurality of second verification fields. At this point, the a user may first enter the second authentication field 1234 on the second terminal, and then the B user may again enter the second authentication field 56 on the second terminal. And after receiving the two second verification fields sent by the second terminal, the server splices the two received second verification fields. Specifically, the splicing sequence of the received second verification fields by the server may be the sequence in which the second verification fields are sent by the second terminal, or may be other preset splicing sequences. For example, for the second verification field 1234 set by the user a and the second verification field 56 set by the user B, after the server splices the two received second verification fields according to the sequence that the second terminal first sends the second verification field 1234 and then sends the second verification field 56, the obtained spliced second verification field may be 123456. The server will then store the concatenated second authentication field 123456 as a valid authentication field.
In the embodiment of the application, the received second verification fields are spliced together to serve as the legal verification fields by adopting a component verification field setting mode, so that no independent individual can master all contents of the legal verification fields, and the safety when the verification fields are set is greatly improved.
In an embodiment of the present application, please refer to fig. 6, which provides a method for receiving a second verification field, the method includes:
step 601, after receiving the second verification field input based on the field setting interface each time, the server receives second verification field input completion information.
Instep 602, after receiving the second field input completion information each time, the server provides a refreshed field setting interface for inputting the second verification field next time.
The implementation principle and technical effect of the method for receiving the second verification field provided in the embodiment of the present application may refer to the above-mentioned specific description content for receiving the first verification field, and are not described herein again.
In this embodiment of the present application, the receiving a plurality of second verification fields sent by a second terminal in sequence, where the second terminal is a terminal, or the second terminal is a plurality of different terminals, includes: the server receives the second verification fields sent by different second terminals in sequence; alternatively, the server receives the plurality of second authentication fields transmitted by the same second terminal in sequence.
The implementation principle and technical effect of the embodiment are similar to that of the embodiment in which the server receives the plurality of first verification fields sent by the first terminal in sequence and the server receives the plurality of first verification fields sent by the plurality of different terminals in sequence, and thus, the description is omitted here.
In an embodiment of the present application, please refer to fig. 7, which provides a method for information verification using a verification information carrier, the method comprising:
step 701, when the spliced first verification field is different from the pre-stored legal verification field, the server receives a pre-set verification information carrier sent by the third terminal, where the verification information carrier stores the plurality of second verification fields, and the plurality of second verification fields belong to the legal verification field.
In this step, the spliced first verification field is different from the preset legal verification field, and can be understood as a password input error condition in practical application. The reason for this may be that the user forgets the correct first authentication field and enters the wrong first authentication field. At this time, if the correct information verification is to be continued, the correct first verification field needs to be acquired. Optionally, the information verification method provided by the present application may store the correct first verification field in a verification information carrier in advance, where the verification information carrier may be a folder or a file compression package.
Further, the verification information carrier may be pre-stored in a third terminal, and it should be noted that the third terminal in this step may be the same terminal as the first terminal and the second terminal.
The production and storage of the authentication information carrier will now be described in detail. Assuming that there are A, B and C three users, after the a and B users successfully set the valid authentication field using the method for setting the authentication field provided in the above embodiment, at this time, the a user grasps the first half 1234 of the valid authentication field 123456, and the B user grasps the second half 56 of the valid authentication field 123456. Then, the a user may store the first half field 1234 of the legitimacy verification field set by the B user as a text file, and the second half field 56 of the legitimacy verification field set by the B user may also be stored as a text file. The first half section and the second half section of the legal verification field can be set and stored on the same terminal, or the first half section and the second half section of the legal verification field can be set and stored on two different terminals.
The terminal storing the two text files may then send the two text files to a third terminal, and the terminal storing the two text files may not continue to save the two text files. Then, the user C may store the two received text files on the third terminal, package the two received text files into a folder, compress the folder to obtain a compressed packet, set an enabling password for the compressed packet, and send the enabling password to the server, where the server stores the enabling password. This compressed package may be referred to as an authentication information carrier in the embodiments of the present application.
Instep 702, the server obtains the plurality of second authentication fields from the authentication information carrier according to a pre-stored authentication information carrier enabling password.
When a plurality of second authentication fields in the authentication information carrier need to be used, the enabling password of the authentication information carrier needs to be input, and after the user C correctly inputs the preset enabling password of the authentication information carrier, a plurality of second authentication fields stored in advance can be obtained from the authentication information carrier.
Instep 703, the server splices the plurality of second verification fields to obtain spliced second verification fields.
Step 704, the server compares the spliced second verification field with the pre-stored legal verification field, and outputs the information verification passing information when the spliced second verification field is the same as the pre-stored legal verification field.
The implementation principle and technical effect ofstep 703 and step 704 in the embodiment of the present application are similar to those ofstep 302 and step 303 described above, and are not described herein again.
In the embodiment of the application, the verification information carrier is used and the password is started by setting the verification information carrier, so that the user can conveniently and accurately continue to carry out information verification when the user inputs the first verification field by mistake or forgets the first verification field mastered by the user, and the practicability of the information verification is improved.
In an embodiment of the present application, please refer to fig. 8, there is provided another method for information verification using a verification information carrier, the method comprising:
step 801, when the spliced first authentication field is different from the pre-stored legal authentication field, the server receives the plurality of second authentication fields sent by the third terminal, where the plurality of second authentication fields are obtained from the authentication information carrier through the authentication information carrier enabling password.
Based on the specific contents ofstep 701 and step 702 in the foregoing embodiment, optionally, the server may obtain the plurality of second authentication fields by using the authentication information carrier sent by the third terminal and the authentication information carrier enabling password stored in the server, and may also directly receive the plurality of second authentication fields sent by the third authentication terminal. Specifically, when the plurality of second authentication fields in the authentication information carrier needs to be used, the user C may input the authentication information carrier enabling password set in advance on the third terminal, thereby obtaining the plurality of second authentication fields in the authentication information carrier, and then send the plurality of second authentication fields to the server by using the third terminal.
Step 802, the server splices the plurality of second verification fields to obtain spliced second verification fields.
Step 803, the server compares the spliced second verification field with the prestored legal verification field, and outputs the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
The implementation principle and technical effect ofstep 802 and step 803 in this embodiment are similar to those ofstep 302 and step 303 described above, and are not described herein again.
It should be understood that, although the respective steps in the flowcharts of fig. 3 to 8 are sequentially shown as indicated by arrows, the steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 3-8 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performing the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least some of the sub-steps or stages of other steps.
In an embodiment of the present application, as shown in fig. 9, there is provided aninformation verification apparatus 900 including: a receivingmodule 901, asplicing module 902, and a comparingmodule 903, wherein:
areceiving module 901, configured to sequentially receive a plurality of first verification fields sent by a first terminal when performing information verification;
asplicing module 902, configured to splice the multiple first verification fields to obtain spliced first verification fields;
a comparingmodule 903, configured to compare the spliced first verification field with a pre-stored legal verification field, and output information verification passing information when the spliced first verification field is the same as the pre-stored legal verification field.
In this embodiment of the application, the receivingmodule 901 is specifically configured to receive the first verification field input completion information after receiving the first verification field input based on the field input interface each time;
after receiving the first verification field input completion information every time, providing a refreshed field input interface for inputting the first verification field next time.
In this embodiment of the application, the first terminal is a terminal, or the first terminal is a plurality of different terminals, and the receivingmodule 901 is specifically configured to sequentially receive the plurality of first verification fields sent by the plurality of different first terminals; or, the plurality of first authentication fields transmitted by the same first terminal are received in sequence.
In the embodiment of the present application, please refer to fig. 10, anotherinformation verification apparatus 1000 is provided, wherein theinformation verification apparatus 1000 includes, in addition to the modules included in theinformation verification apparatus 900, optionally, theinformation verification apparatus 1000 further includes a legal verificationfield obtaining module 904 and a second verificationfield obtaining module 905.
The valid verificationfield obtaining module 904 is configured to, when receiving the verification field setting instruction, sequentially receive a plurality of second verification fields sent by the second terminal;
and splicing the plurality of second verification fields to obtain the legal verification fields, and storing the legal verification fields.
In this embodiment of the application, the legal verificationfield obtaining module 904 is specifically configured to receive the second verification field input completion information after receiving the second verification field input based on the field setting interface each time;
and after receiving the second field input completion information every time, providing a refreshed field setting interface for inputting a second verification field next time.
In this embodiment, the second terminal is a terminal, or the second terminal is a plurality of different terminals, and the valid authenticationfield obtaining module 904 is specifically configured to sequentially receive the plurality of second authentication fields sent by the plurality of different second terminals; alternatively, the plurality of second authentication fields transmitted by the same second terminal are sequentially received.
In this embodiment of the present application, the second verificationfield obtaining module 905 is configured to, when the spliced first verification field is different from the pre-stored legal verification field, receive a pre-set verification information carrier sent by a third terminal, where the verification information carrier stores the plurality of second verification fields, and the plurality of second verification fields belong to the legal verification field;
acquiring the plurality of second authentication fields from the authentication information carrier according to a pre-stored authentication information carrier enabling password;
splicing the plurality of second verification fields to obtain spliced second verification fields;
and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
In this embodiment of the application, the second verificationfield obtaining module 905 is further configured to, when the spliced first verification field is different from the pre-stored legal verification field, receive the plurality of second verification fields sent by the third terminal, where the plurality of second verification fields are obtained from the verification information carrier through the verification information carrier enabling password;
splicing the plurality of second verification fields to obtain spliced second verification fields;
and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
For specific limitations of the information verification apparatus, reference may be made to the above limitations of the information verification method, which are not described herein again. The modules in the information verification device can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In the embodiment of the present application, a computer device is provided, and the computer device may be a server, and its internal structure diagram may be as shown in fig. 11. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing information verification data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement an information verification method.
Those skilled in the art will appreciate that the architecture shown in fig. 11 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In an embodiment of the present application, there is provided a computer device including a memory and a processor, the memory storing a computer program, and the processor implementing the following steps when executing the computer program:
when information verification is carried out, a plurality of first verification fields sent by a first terminal are sequentially received;
splicing the plurality of first verification fields to obtain spliced first verification fields;
and comparing the spliced first verification field with a prestored legal verification field, and outputting information verification passing information when the spliced first verification field is the same as the prestored legal verification field.
In the embodiment of the present application, the processor, when executing the computer program, further implements the following steps:
receiving first verification field input completion information after receiving a first verification field input based on the field input interface each time; after receiving the first verification field input completion information every time, providing a refreshed field input interface for inputting the first verification field next time.
In this embodiment, the first terminal is a terminal, or the first terminal is a plurality of different terminals, and the processor executes the computer program to further implement the following steps:
sequentially receiving the plurality of first authentication fields transmitted by a plurality of different first terminals; or, the plurality of first authentication fields transmitted by the same first terminal are received in sequence.
In the embodiment of the present application, the processor, when executing the computer program, further implements the following steps:
when receiving a verification field setting instruction, sequentially receiving a plurality of second verification fields sent by a second terminal; and splicing the plurality of second verification fields to obtain the legal verification fields, and storing the legal verification fields.
In the embodiment of the present application, the processor, when executing the computer program, further implements the following steps:
receiving second verification field input completion information after receiving a second verification field input based on the field setting interface each time; and after receiving the second field input completion information every time, providing a refreshed field setting interface for inputting a second verification field next time.
In this embodiment, the second terminal is a terminal, or the second terminal is a plurality of different terminals, and the processor executes the computer program to further implement the following steps:
sequentially receiving the plurality of second authentication fields transmitted by a plurality of different second terminals; alternatively, the plurality of second authentication fields transmitted by the same second terminal are sequentially received.
In the embodiment of the present application, the processor, when executing the computer program, further implements the following steps:
when the spliced first verification field is different from the prestored legal verification field, receiving a preset verification information carrier sent by a third terminal, wherein the verification information carrier stores a plurality of second verification fields, and the plurality of second verification fields belong to the legal verification field; acquiring the plurality of second authentication fields from the authentication information carrier according to a pre-stored authentication information carrier enabling password; splicing the plurality of second verification fields to obtain spliced second verification fields; and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
In the embodiment of the present application, the processor, when executing the computer program, further implements the following steps:
when the spliced first verification field is different from the prestored legal verification field, receiving a plurality of second verification fields sent by the third terminal, wherein the plurality of second verification fields are obtained from the verification information carrier through the verification information carrier starting password; splicing the plurality of second verification fields to obtain spliced second verification fields; and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
In an embodiment of the application, a computer-readable storage medium is provided, on which a computer program is stored, which computer program, when being executed by a processor, realizes the steps of:
when information verification is carried out, a plurality of first verification fields sent by a first terminal are sequentially received; splicing the plurality of first verification fields to obtain spliced first verification fields; and comparing the spliced first verification field with a prestored legal verification field, and outputting information verification passing information when the spliced first verification field is the same as the prestored legal verification field.
In an embodiment of the application, the computer program when executed by the processor further performs the steps of:
receiving first verification field input completion information after receiving a first verification field input based on the field input interface each time; after receiving the first verification field input completion information every time, providing a refreshed field input interface for inputting the first verification field next time.
In this embodiment, the first terminal is a terminal, or the first terminal is a plurality of different terminals, and the computer program further implements the following steps when executed by the processor:
sequentially receiving the plurality of first authentication fields transmitted by a plurality of different first terminals; or, the plurality of first authentication fields transmitted by the same first terminal are received in sequence.
In an embodiment of the application, the computer program when executed by the processor further performs the steps of:
when receiving a verification field setting instruction, sequentially receiving a plurality of second verification fields sent by a second terminal; and splicing the plurality of second verification fields to obtain the legal verification fields, and storing the legal verification fields.
In an embodiment of the application, the computer program when executed by the processor further performs the steps of:
receiving second verification field input completion information after receiving a second verification field input based on the field setting interface each time; and after receiving the second field input completion information every time, providing a refreshed field setting interface for inputting a second verification field next time.
In this embodiment, the second terminal is a terminal, or the second terminal is a plurality of different terminals, and the computer program further implements the following steps when executed by the processor:
sequentially receiving the plurality of second authentication fields transmitted by a plurality of different second terminals; alternatively, the plurality of second authentication fields transmitted by the same second terminal are sequentially received.
In an embodiment of the application, the computer program when executed by the processor further performs the steps of:
when the spliced first verification field is different from the prestored legal verification field, receiving a preset verification information carrier sent by a third terminal, wherein the verification information carrier stores a plurality of second verification fields, and the plurality of second verification fields belong to the legal verification field; acquiring the plurality of second authentication fields from the authentication information carrier according to a pre-stored authentication information carrier enabling password; splicing the plurality of second verification fields to obtain spliced second verification fields; and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
In an embodiment of the application, the computer program when executed by the processor further performs the steps of:
when the spliced first verification field is different from the prestored legal verification field, receiving a plurality of second verification fields sent by the third terminal, wherein the plurality of second verification fields are obtained from the verification information carrier through the verification information carrier starting password; splicing the plurality of second verification fields to obtain spliced second verification fields; and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.