CN106550089A - The processing method of identifying code, client and user terminal - Google Patents
The processing method of identifying code, client and user terminal Download PDFInfo
- Publication number
- CN106550089A CN106550089A CN201510590465.1A CN201510590465A CN106550089A CN 106550089 A CN106550089 A CN 106550089A CN 201510590465 A CN201510590465 A CN 201510590465A CN 106550089 A CN106550089 A CN 106550089A
- Authority
- CN
- China
- Prior art keywords
- user terminal
- identifying code
- message
- character string
- note
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Information Transfer Between Computers (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
This application discloses a kind of processing method of identifying code, client and user terminal.Wherein, the method includes:Client is being detected in the case that user terminal receives note, detects whether the note includes identifying code;If the note includes the identifying code, the identifying code is copied in the pasting boards of the user terminal;By the user terminal displays first message, wherein, the first message indicates the identifying code to be copied in the pasting boards of the user terminal.Present application addresses as existing identifying code needs the more technical problem of the cell phone system execution step that user's memory is caused.
Description
Technical field
The application is related to application software field, in particular to a kind of processing method of identifying code, client and use
Family terminal.
Background technology
Nowadays, user can usually be triggered " identifying code " note when the operation such as registering, being authorized and being paid,
User is needed the identifying code digital extraction in note out, then is input in mobile phone.
According to the survey, 84.85% mobile phone can see identifying code, user in the case where user does not open note to root
After needing to remember quietly identifying code numeral, then it is input in corresponding application;Remaining 15.15% user must come out application,
SMS is opened, application after checking identifying code, is returned again to, process is loaded down with trivial details, cause cell phone system to need execution more
Step, signaling consume larger, and the operating time is longer.
For above-mentioned problem, effective solution is not yet proposed at present.
The content of the invention
The embodiment of the present application provide a kind of processing method of identifying code, client and user terminal, with least solve by
The more technical problem of the cell phone system execution step that user's memory is caused is needed in existing identifying code.
According to the one side of the embodiment of the present application, there is provided a kind of processing method of identifying code, including:Client exists
Detect in the case that user terminal receives note, detect whether the note includes identifying code;If the note bag
Containing the identifying code, the identifying code is copied in the pasting boards of the user terminal;It is aobvious by the user terminal
Show first message, wherein, the first message indicates the pasting boards that the identifying code has been copied to the user terminal
In.
According to the another aspect of the embodiment of the present application, a kind of client is additionally provided, including:First detector unit, uses
In detecting in the case that user terminal receives note, detect whether the note includes identifying code;Copied cells,
If including the identifying code for the note, the identifying code is copied in the pasting boards of the user terminal;Place
Reason unit, for by the user terminal displays first message, wherein, the first message instruction is tested described
Card code is copied in the pasting boards of the user terminal.
According to the another aspect of the embodiment of the present application, a kind of user terminal is additionally provided, be provided with above-mentioned any spy
The client levied.
In the embodiment of the present application, detected in the case that user terminal receives note using client, detected short
Whether letter includes identifying code;If note includes identifying code, identifying code is copied in the pasting boards of user terminal;Pass through
User terminal displays first message, wherein, during first message indicates the pasting boards for copied to identifying code user terminal
Mode, by the identifying code in note is automatically copied in the pasting boards of user terminal, reached user without the need for note
Recall identifying code, by only need to performing paste operation, complete the purpose of identifying code input, it is achieved thereby that reducing cell phone system
Execution step, the technique effect for reducing signaling consumption, reducing the operating time, and then solve due to existing checking
Code needs the more technical problem of the cell phone system execution step that user's memory is caused.
Description of the drawings
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes the part of the application, this Shen
Schematic description and description please does not constitute the improper restriction to the application for explaining the application.In accompanying drawing
In:
Fig. 1 is a kind of hardware configuration frame of the mobile terminal of the processing method of the runtime verification code according to the embodiment of the present application
Figure;
Fig. 2 is the schematic flow sheet of the processing method of a kind of optional identifying code according to the embodiment of the present application;
Fig. 3 is the schematic flow sheet of the processing method of the optional identifying code of another kind according to the embodiment of the present application;
Fig. 4 is the page schematic diagram of a kind of optional user terminal according to the embodiment of the present application;
Fig. 5 is the page schematic diagram of the optional user terminal of another kind according to the embodiment of the present application;
Fig. 6 is the page schematic diagram of another the optional user terminal according to the embodiment of the present application;
Fig. 7 is the page schematic diagram of another the optional user terminal according to the embodiment of the present application;
Fig. 8 is the structural representation of a kind of optional client according to the embodiment of the present application;
Fig. 9 is the structural representation of the optional client of another kind according to the embodiment of the present application;
Figure 10 is the structural representation of another the optional client according to the embodiment of the present application;
Figure 11 is the structural representation of another the optional client according to the embodiment of the present application.
Specific embodiment
In order that those skilled in the art more fully understand application scheme, below in conjunction with the embodiment of the present application
Accompanying drawing, is clearly and completely described to the technical scheme in the embodiment of the present application, it is clear that described embodiment
The only embodiment of the application part, rather than the embodiment of whole.Based on the embodiment in the application, ability
The every other embodiment obtained under the premise of creative work is not made by domain those of ordinary skill, should all belong to
The scope of the application protection.
It should be noted that the description and claims of this application and the term " first " in above-mentioned accompanying drawing, "
Two " it is etc. for distinguishing similar object, without for describing specific order or precedence.It should be appreciated that this
The data that sample is used can be exchanged in the appropriate case, so as to embodiments herein described herein can with except
Here the order beyond those for illustrating or describing is implemented.Additionally, term " comprising " and " having " and they
Any deformation, it is intended that cover non-exclusive process, the side for including, for example, containing series of steps or unit
Method, system, product or equipment are not necessarily limited to those steps clearly listed or unit, but may include unclear
List or other intrinsic for these processes, method, product or equipment step or unit.
Embodiment 1
According to the embodiment of the present application, a kind of embodiment of the method for the processing method of identifying code is additionally provided, need explanation
It is can to hold in the such as computer system of one group of computer executable instructions the step of the flow process of accompanying drawing is illustrated
OK, and, although show logical order in flow charts, but in some cases, can be with different from herein
Order perform shown or described step.
The embodiment of the method provided by the embodiment of the present application one can be in mobile terminal, terminal or similar fortune
Perform in calculating device.As a example by running on mobile terminals, Fig. 1 is a kind of process of identifying code of the embodiment of the present application
The hardware block diagram of the mobile terminal of method.As shown in figure 1, mobile terminal 10 can include one or more (figures
In only illustrate one) (processor 102 can include but is not limited to Micro-processor MCV or programmable patrol for processor 102
The processing meanss of volume device FPGA etc.), the memory 104 for data storage, and for the transmission of communication function
Device 106.It will appreciated by the skilled person that the structure shown in Fig. 1 is only illustrated, which is not to above-mentioned
The structure of electronic installation causes to limit.For example, mobile terminal 10 may also include more more or less than shown in Fig. 1
Component, or with the configuration different from shown in Fig. 1.
Memory 104 can be used for the software program and module for storing application software, the such as checking in the embodiment of the present application
Corresponding programmed instruction/the module of processing method of code, processor 102 are stored in the software in memory 104 by operation
Program and module, so as to perform various function application and data processing, that is, realize the leak of above-mentioned application program
Detection method.Memory 104 may include high speed random access memory, may also include nonvolatile memory, such as one or
The multiple magnetic storage devices of person, flash memory or other non-volatile solid state memories.In some instances, memory
104 can further include that, relative to the remotely located memory of processor 102, these remote memories can pass through net
Network is connected to mobile terminal 10.The example of above-mentioned network include but is not limited to internet, intranet, LAN,
Mobile radio communication and combinations thereof.
Transmitting device 106 is for via a network reception or transmission data.Above-mentioned network instantiation may include
The wireless network that the communication providerses of mobile terminal 10 are provided.In an example, transmitting device 106 includes a net
Network adapter (Network Interface Controller, NIC), which can pass through base station and other network equipment phases
Connect so as to be communicated with internet.In an example, transmitting device 106 can be radio frequency (Radio
Frequency, RF) module, which is used to wirelessly be communicated with internet.
Under above-mentioned running environment, this application provides the processing method of identifying code as shown in Figure 2.Fig. 2 is basis
The flow chart of the processing method of the identifying code of the embodiment of the present application one.
Step S202, detecting in the case that user terminal receives note, whether detection note is comprising testing for client
Card code.
In the application above-mentioned steps S202, client is operation software on the subscriber terminal, and user terminal is mobile phone etc.
Mobile terminal, when detecting in the case that user terminal receives note, in the note that client detection is received whether
Comprising identifying code.
So that client is using A as an example, using A monitor in real time user terminals, after user triggers identifying code note,
User terminal can receive the note comprising identifying code, for example,【X manufacturers】Identifying code:793177 (dynamic log is tested
Card code), whether if user terminal is detected using A receives note, include identifying code in detecting the note.
Step S204, if note includes identifying code, identifying code is copied in the pasting boards of user terminal.
In the application above-mentioned steps S204, comprising in the case of identifying code in note is detected, client is by identifying code
Copy in the pasting boards of user terminal.
Still so that client is using A as an example, detect whether comprising identifying code in the note that user terminal is received using A,
If identifying code is included in note, then identifying code is copied in the pasting boards of user terminal, such as by 793177 using A
Copy in the pasting boards of user terminal.
Step S206, by user terminal displays first message, wherein, first message indicates to copy to identifying code
In the pasting boards of user terminal.
In the application above-mentioned steps S206, after client is in the pasting boards that identifying code is copied to user terminal, meeting
Pointed out to user, specifically, by user terminal displays first message, first message indicates that identifying code is multiple
Make in the pasting boards of user terminal.
Still so that client is using A as an example, after copy to 793177, meeting
Prompt the user with and identifying code is copied in pasting boards, now, first message, first message can be generated using A
Include【X manufacturers】And 793177, and then, by the user terminal displays first message, first message is concrete
Can be【X manufacturers】Identifying code is copied to pasting boards by identifying code 793177, and long is Pasting by input frame.
From the foregoing, it will be observed that the scheme provided by the above embodiments of the present application one, by the identifying code in note is replicated automatically
To in the pasting boards of user terminal, user is reached and need not remember identifying code, completed to test by only need to performing paste operation
The purpose of card code input, it is achieved thereby that when reducing the execution step of cell phone system, reducing signaling consumption, reduce operation
Between technique effect, and then solve user's cell phone system execution step for causing of memory needed due to existing identifying code
More technical problem.
In a kind of alternative that the above embodiments of the present application are provided, as shown in figure 3, in step S206, by user
Before terminal shows first message, the processing method of identifying code also includes:
Step S302, detects the current state of user terminal.
In the application above-mentioned steps S302, client according to the current state of user terminal, in a different manner by use
Family terminal shows first message.
As a kind of optional implementation, when current state indicating user terminal is in application state, by user
Terminal shows first message, including:First message is shown in the user terminal by pop-up or simple message notifying frame, its
In, in application state, user terminal refers to that the system foreground of user terminal has the program being currently running.
Alternatively, first message is shown in the user terminal by pop-up or simple message notifying frame, including:
Step S10, detects whether the system configuration of user terminal allows pop-up and current pop-up whether occupied.
Step S12, if the system configuration of user terminal allows pop-up and current pop-up is unoccupied, by pop-up with
First message is shown in the terminal of family.
Step S14, if the system configuration of user terminal does not allow pop-up or current pop-up occupied, by simple message
Prompting frame shows first message in the user terminal.
Into step S14, client detects the current state of user terminal to the application above-mentioned steps S10, if user
, in application state, in the page of identifying code note triggering, prompting is comprising two kinds for terminal:Pop-up is pointed out and simple message
Prompting frame is pointed out, and is occurred when the two is different.Being particularly shown logic is, whether the system configuration of detection user terminal first
Allowing pop-up and the current pop-up of detection user terminal, whether occupied (whether the current pop-up of user terminal is occupied
The current pop-up that may refer to user terminal is taken by the primary note of the system of user terminal, when the current bullet of user terminal
When window is taken by the application in addition to the primary note of system, client still can show the by pop-up in the user terminal
One message, the content before being override with first message in current pop-up), if the system configuration of user terminal allows pop-up,
And the current pop-up of user terminal is unoccupied, then show that pop-up is pointed out in the user terminal, wherein, when pop-up is stopped
Between be set to " length " (for example, or so 5-8 seconds disappear), if the system configuration of other situations, such as user terminal is not
Allow pop-up or current pop-up occupied, then show simple message notifying frame (toast) prompting, letter in the user terminal
The easily message notifying frame time of staying is set to " length " (for example, or so 5-8 seconds disappearance).
Wherein, pop-up can select top pop-up, top pop-up include in have identifying code manufacturer, identifying code and
Official documents and correspondence:Pasting boards length has been copied to by input frame i.e. Pasting.It should be noted that the content of pop-up, pop-up when
Machine and jump location can be configured according to different demands, and the present embodiment is not limited.Simple message notifying frame
Comprising in have identifying code manufacturer, identifying code and official documents and correspondence:Stickup version is copied to, long is Pasting by input frame.
Still so that client is using A as an example, as shown in figure 4, the system configuration in user terminal allows pop-up, and use
In the case that the current pop-up of family terminal is unoccupied, using A by pop-up in user terminal displays first message:【X
Manufacturer】Identifying code is copied to pasting boards by identifying code 793177, and long is Pasting by input frame;As shown in figure 5,
In the case of the system configuration of user terminal does not allow pop-up or current pop-up occupied, using A by simple message
Prompting frame is in user terminal displays first message:【X manufacturers】Identifying code is copied to pasting boards by identifying code 793177,
Long is Pasting by input frame.
As another kind of optional implementation, when current state indicating user terminal is in non-application state, do not exist
First message is shown in user terminal;Or, when current state indicating user terminal is in non-application state, pass through
Informing shows first message in the user terminal.
Wherein, informing include in have identifying code manufacturer, identifying code and word " having copied to pasting boards ".With
After click, left cunning or right sliding informing, informing disappears at family.Receive in note 5s by first message in informing most
Front position shows, after 5s, resident informing prompting lower section first, a disappearance is moved on to behind the position of first message
Before, identifying code note is received again by, old prompting is replaced in new prompting.Unless there are being operated (or mobile phone such as cuts out at the system
Carry informing prompting Disappearance Scenarios to occur), otherwise informing does not disappear.
Alternatively, user terminal includes user terminal in screen lock state or user terminal in master in non-application state
Screen state.
Still so that client is using A as an example, as shown in fig. 6, when current state indicating user terminal is in screen lock state
When, first message is shown in the user terminal by informing:【X manufacturers】Identifying code 793177, has copied to stickup
Plate;As shown in fig. 7, when current state indicating user terminal be in main screen state when, by drop-down informing with
First message is shown in the terminal of family:【X manufacturers】Identifying code 793177, has copied to pasting boards.
Used as a kind of optional implementation, when current state indicating user terminal is in non-application state, method is also
Including:
Step S20, identifying code is sent to terminal the application software installed, wherein, application software is stepped on
The account of record is identical with the current logon account of client, and identifying code is copied to the viscous of terminal by application software
In pasting board, and the second message is shown in terminal, the second message indicates identifying code is copied to computer end
In the pasting boards at end.
In the application above-mentioned steps S20, when user terminal be in non-application state when, then it is assumed that identifying code note be by
What user was triggered by terminal, therefore, the client of the embodiment of the present application can be with peace on terminal
The application software of dress carries out intercommunication, and the identifying code that user terminal is received is sent to what terminal was installed by realization
Application software, the listed account of the application software installed by terminal are identical with the current logon account of client,
Further, identifying code is copied to by the application software in the pasting boards of terminal, and is shown in terminal
Second message, during the second message indicates the pasting boards for copied to identifying code terminal, to reach without the need for user
Memory, is automatically obtained the purpose of identifying code duplication.
Used as a kind of optional implementation, whether detection note includes comprising identifying code:
Step S30, identifies whether the keyword comprising identifying code from note.
In the application above-mentioned steps S30, client is being detected in the case that user terminal receives note, is sentenced first
Whether the keyword of identifying code is included in the note of breaking, and herein, identifying code refers to the character string of numeral and/or letter composition,
Keyword refers to " identifying code " these three words.For example, the content of a note is:“【X manufacturers】793117 is (dynamic
State login authentication code).Staff will not be asked for you, please don't be to anyone leakage." in the present embodiment, identifying code
793117 are referred to, keyword refers to " identifying code " these three Chinese characters.
Step S32, if the keyword comprising identifying code in note, extracts the character string of preset length in note, wherein,
The character string of preset length includes keyword.
In the application above-mentioned steps S32, if the keyword comprising identifying code in note, client is then extracted pre- in note
If the character string of length, the character string of preset length includes the keyword.For example, obtain " identifying code " three in note
Individual 20 word of the word left side and 20 word of the right.
Step S34, extracts the character string being continuously made up of numeral and/or letter from the character string of preset length.
In the application above-mentioned steps S34, after the character string of above length is extracted, client is from preset length
The character string being continuously made up of numeral, letter or number letter mixing is extracted in character string.
Extract character string, if the quantity of the character string for extracting is one, is defined as checking by step S36
Code.
In the application above-mentioned steps S36, if only recognizing a character string, the character string is identifying code.
Step S38, if the quantity of the character string for extracting is multiple, determines identifying code according to the type of multiple character strings.
In the application above-mentioned steps S36, determine that identifying code includes according to the type of multiple character strings:In multiple character strings
Type differ in the case of, the character string of highest priority is defined as into identifying code, wherein, be made up of numeral
Priority of the priority of character string higher than the character string being made up of numeral and letter, the character being made up of numeral and letter
Priority of the priority of string higher than the character string being made up of letter;In the case of the type identical of multiple character strings,
Original position apart from note nearest character string is defined as into identifying code.
In above-mentioned steps, whether client is detected in the note for receiving first comprising keyword --- " identifying code " this
Three words, if " identifying code " these three words are included in note, extract default comprising " identifying code " from short breath
The character string of length, for example, obtains " identifying code " three 20 words of the word left side and the right 20 word (concrete word in note
Number can be adjusted), secondly, the character being continuously made up of numeral and/or letter is extracted from the character string of preset length
String, i.e., " numeral ", " digital alphabet mixing ", " letter ", finally, if only recognizing a character string, the word
Symbol string is identifying code, if recognizing multiple character strings:(1) different types of character string:According to priority, for example,
Pure digi-tal>Digital alphabet mixes>Pure letter, the character string of highest priority is identifying code;(2) character of same type
String:It is identifying code apart from the nearest character string in note starting position.
Alternatively, before whether detection note is comprising identifying code, method also includes:Determine whether open-authentication code certainly
Dynamic identification function;If open-authentication code automatic identification function, determines whether client has the authority of short message reading;In visitor
In the case that family end has the authority of short message reading, whether perform detection note includes identifying code.
Wherein, client can arrange a switch:Identifying code automatic identification, when identifying code automatic identification function is opened
When, client can go to detect whether user terminal receives note that client also needs to read user terminal note
Authority, and then, in the case where client has the authority of short message reading, whether perform detection note includes identifying code.
From the foregoing, it will be observed that the user that prior art is present needs to leave application, opening SMS is checked after identifying code again
Application is returned, process is loaded down with trivial details, cause cell phone system to need to perform more step, signaling consumption larger, operating time
Longer problem, the application propose a kind of method of automatic duplication identifying code, by the identifying code in note is automatically multiple
Make in the pasting boards of user terminal, reached user and need not remember identifying code, complete by only need to performing paste operation
The purpose of identifying code input, it is achieved thereby that reducing the execution step of cell phone system, reducing signaling consumption, reduce operation
The technique effect of time.
It should be noted that for aforesaid each method embodiment, in order to be briefly described, therefore which is all expressed as one it is
The combination of actions of row, but those skilled in the art should know, and the application is not limited by described sequence of movement
System, because according to the application, some steps can adopt other orders or while carry out.Secondly, art technology
Personnel should also know that embodiment described in this description belongs to preferred embodiment, involved action and module
Not necessarily necessary to the application.
Through the above description of the embodiments, those skilled in the art is can be understood that according to above-mentioned enforcement
The method of example can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but
The former is more preferably embodiment in many cases.Based on such understanding, the technical scheme of the application substantially or
Say that the part contributed to prior art can be embodied in the form of software product, the computer software product is deposited
Storage is used so that a station terminal including some instructions in a storage medium (such as ROM/RAM, magnetic disc, CD)
Equipment (can be mobile phone, computer, server, or network equipment etc.) is performed described in the application each embodiment
Method.
Embodiment 2
According to the embodiment of the present application, a kind of device embodiment for implementing said method embodiment, this Shen are additionally provided
Please the device that provided of above-described embodiment can run on mobile terminals.
Fig. 8 is the structural representation of the client according to the embodiment of the present application.
As shown in figure 8, the client can include the first detector unit 802, copied cells 804 and processing unit
806。
Wherein, the first detector unit 802, for detecting in the case that user terminal receives note, detects institute
Note is stated whether comprising identifying code;Copied cells 804, if including the identifying code for the note, tests described
Card code is copied in the pasting boards of the user terminal;Processing unit 806, for by the user terminal displays
One message, wherein, the first message indicates the identifying code to be copied in the pasting boards of the user terminal.
From the foregoing, it will be observed that the scheme provided by the above embodiments of the present application two, by the identifying code in note is replicated automatically
To in the pasting boards of user terminal, user is reached and need not remember identifying code, completed to test by only need to performing paste operation
The purpose of card code input, it is achieved thereby that when reducing the execution step of cell phone system, reducing signaling consumption, reduce operation
Between technique effect, and then solve user's cell phone system execution step for causing of memory needed due to existing identifying code
More technical problem.
Herein it should be noted that above-mentioned first detector unit 802, copied cells 804 and processing unit 806 pairs
Should be in step S202 in embodiment one to step S206, example that three modules are realized with corresponding step and should
It is identical with scene, but it is not limited to one disclosure of that of above-described embodiment.It should be noted that above-mentioned module is used as dress
The part put is may operate in the mobile terminal 10 of the offer of embodiment one, can be realized by software, it is also possible to logical
Cross hardware realization.
Alternatively, as shown in figure 9, client also includes:Second detector unit 902.
Wherein, the second detector unit 902, for detecting the current state of the user terminal;Wherein, work as when described
When user terminal described in front state instruction is in application state, the processing unit 806 passes through for performing following steps
The user terminal displays first message:Show described in the user terminal by pop-up or simple message notifying frame
First message, wherein, in application state, the user terminal refers to that the system foreground of the user terminal is present
The program of operation.
Herein it should be noted that above-mentioned second detector unit 902 is corresponding to step S302 in embodiment one, the mould
Block is identical with example and application scenarios that the step of correspondence is realized, but is not limited to one disclosure of that of above-described embodiment.
It should be noted that above-mentioned module may operate in the mobile terminal 10 that embodiment one is provided as a part for device
In, can be realized by software, it is also possible to realized by hardware.
Alternatively, the processing unit 806 is used to perform following steps by pop-up or simple message notifying frame described
The first message is shown in user terminal:Detect whether the system configuration of the user terminal allows pop-up and current
Whether pop-up is occupied;If the system configuration of the user terminal allows pop-up and the current pop-up is unoccupied, lead to
Cross the pop-up and the first message is shown in the user terminal;If the system configuration of the user terminal is not allowed
Pop-up or the current pop-up are occupied, show described by the simple message notifying frame in the user terminal
One message.
Herein it should be noted that above-mentioned processing unit 806 corresponding to step S10 in embodiment one to step S14,
The module is identical with example and application scenarios that the step of correspondence is realized, but is not limited to disclosed in above-described embodiment one
Content.It should be noted that above-mentioned module may operate in the mobile end that embodiment one is provided as a part for device
In end 10, can be realized by software, it is also possible to realized by hardware.
Alternatively, the processing unit 806 is used to indicate that the user terminal is in non-application shape when the current state
During state, the first message is not shown in the user terminal;Or, when the current state indicates the user
When terminal is in non-application state, the first message is shown in the user terminal by informing.
Alternatively, as shown in Figure 10, client also includes:Transmitting element 1002.
Wherein, transmitting element 1002, for the identifying code is sent to terminal the application software installed,
Wherein, the listed account of the application software is identical with the current logon account of the client, by described using soft
The identifying code is copied in the pasting boards of the terminal by part, and in the terminal shows second
Message, second message indicate the identifying code to be copied in the pasting boards of the terminal.
Herein it should be noted that above-mentioned transmitting element 1002 is corresponding to step S20 in embodiment one, the module with
The example realized by the step of correspondence is identical with application scenarios, but is not limited to one disclosure of that of above-described embodiment.Need
It is noted that above-mentioned module is may operate in the mobile terminal 10 of the offer of embodiment one as a part for device,
Can be realized by software, it is also possible to realized by hardware.
Alternatively, the user terminal includes the user terminal in screen lock state or the use in non-application state
Family terminal is in main screen state.
Alternatively, whether first detector unit 802 is used to perform the following steps detection note comprising identifying code:
Identify whether the keyword comprising the identifying code from the note;If the pass comprising the identifying code in the note
Key word, extracts the character string of preset length in the note, wherein, the character string of the preset length includes the pass
Key word;The character string being continuously made up of numeral and/or letter is extracted from the character string of the preset length;If extracting
The quantity of the character string for going out is one, and extract character string is defined as the identifying code;If the word for extracting
The quantity of symbol string is multiple, determines the identifying code according to the type of multiple character strings.
Herein it should be noted that above-mentioned first detector unit 802 corresponding to step S30 in embodiment one to step
S38, the module are identical with example and application scenarios that the step of correspondence is realized, but it is public to be not limited to one institute of above-described embodiment
The content opened.It should be noted that above-mentioned module may operate in the shifting that embodiment one is provided as a part for device
In dynamic terminal 10, can be realized by software, it is also possible to realized by hardware.
Alternatively, first detector unit 802 determines institute according to the type of multiple character strings for performing following steps
State identifying code:In the case where the type of multiple character strings is differed, the character string of highest priority is defined as described
Identifying code, wherein, the priority of the character string being made up of numeral is preferential higher than the character string being made up of numeral and letter
Level, priority of the priority of character string being made up of numeral and letter higher than the character string being made up of letter;Multiple
In the case of the type identical of character string, the original position apart from the note nearest character string is defined as into described testing
Card code.
Alternatively, as shown in figure 11, client also includes:Determining unit 1102.
Wherein it is determined that unit 1102, is used to determine whether open-authentication code automatic identification function;If open-authentication code is certainly
Dynamic identification function, determines whether the client has the authority of short message reading;There is short message reading in the client
In the case of authority, first detector unit performs whether the detection note includes the identifying code.
According to the embodiment of the present application, a kind of user terminal is additionally provided, the user terminal is provided with above-mentioned any spy
The client levied.
From the foregoing, it will be observed that the user that prior art is present needs to leave application, opening SMS is checked after identifying code again
Application is returned, process is loaded down with trivial details, cause cell phone system to need to perform more step, signaling consumption larger, operating time
Longer problem, the application propose a kind of method of automatic duplication identifying code, by the identifying code in note is automatically multiple
Make in the pasting boards of user terminal, reached user and need not remember identifying code, complete by only need to performing paste operation
The purpose of identifying code input, it is achieved thereby that reducing the execution step of cell phone system, reducing signaling consumption, reduce operation
The technique effect of time.
Embodiment 3
Embodiments herein additionally provides a kind of storage medium.Alternatively, in the present embodiment, above-mentioned storage medium
Can be used for preserving the program code performed by the processing method of the identifying code provided by above-described embodiment one.
Alternatively, in the present embodiment, above-mentioned storage medium is may be located in computer network Computer terminal group
In any one terminal, or in any one mobile terminal in mobile terminal group.
Alternatively, in the present embodiment, storage medium is arranged to store the program code for being used to performing following steps:
Client is being detected in the case that user terminal receives note, detects whether the note includes identifying code;If institute
Note is stated comprising the identifying code, the identifying code is copied in the pasting boards of the user terminal;By the use
Family terminal shows first message, wherein, the first message indicates the identifying code is copied to the user terminal
Pasting boards in.
Alternatively, storage medium is also configured to store the program code for being used to performing following steps:Detect the user
The current state of terminal;Wherein, it is when the current state indicates that the user terminal is in application state, described logical
The user terminal displays first message is crossed, including:Shown in the user terminal by pop-up or simple message notifying frame
Show the first message, wherein, in application state, the user terminal refers to that the system foreground of the user terminal is deposited
In the program being currently running.
Alternatively, storage medium is also configured to store the program code for being used to performing following steps:Detect the user
Whether whether the system configuration of terminal allow pop-up and current pop-up occupied;If the system configuration of the user terminal
Allow pop-up and the current pop-up is unoccupied, show that described first disappears in the user terminal by the pop-up
Breath;If the system configuration of the user terminal does not allow pop-up or the current pop-up occupied, simply disappeared by described
Breath prompting frame shows the first message in the user terminal.
Alternatively, storage medium is also configured to store the program code for being used to performing following steps:When the current shape
When state indicates that the user terminal is in non-application state, the first message is not shown in the user terminal;Or
Person, when the current state indicates that the user terminal is in non-application state, by informing at user's end
The first message is shown in end.
Alternatively, storage medium is also configured to store the program code for being used to performing following steps:By the identifying code
The application software installed is sent to terminal, wherein, the listed account of the application software and the client
The current logon account at end is identical, and the identifying code is copied to the stickup of the terminal by the application software
In plate, and the second message is shown in the terminal, second message indicates to replicate the identifying code
To in the pasting boards of the terminal.
Alternatively, storage medium is also configured to store the program code for being used to performing following steps:From the note
Identify whether the keyword comprising the identifying code;If the keyword comprising the identifying code in the note, extracts institute
The character string of preset length in note is stated, wherein, the character string of the preset length includes the keyword;From described
The character string being continuously made up of numeral and/or letter is extracted in the character string of preset length;If the character string for extracting
Quantity is one, and extract character string is defined as the identifying code;If the quantity of the character string for extracting is
It is multiple, the identifying code is determined according to the type of multiple character strings.
Alternatively, storage medium is also configured to store the program code for being used to performing following steps:In multiple character strings
Type differ in the case of, the character string of highest priority is defined as into the identifying code, wherein, by digit groups
Into character string priority higher than the priority of character string being made up of numeral and letter, be made up of numeral and letter
Priority of the priority of character string higher than the character string being made up of letter;In the type identical situation of multiple character strings
Under, the original position apart from the note nearest character string is defined as into the identifying code.
Alternatively, storage medium is also configured to store the program code for being used to performing following steps:Determine whether to open
Identifying code automatic identification function;If open-authentication code automatic identification function, determines whether the client has short message reading
Authority;In the case where the client has the authority of short message reading, perform whether the detection note wraps
Containing the identifying code.
Alternatively, in the present embodiment, above-mentioned storage medium can be including but not limited to:USB flash disk, read-only storage (ROM,
Read-Only Memory), random access memory (RAM, Random Access Memory), portable hard drive, magnetic
Dish or CD etc. are various can be with the medium of store program codes.
Alternatively, the specific example in the present embodiment may be referred to the example described in above-described embodiment 1, this enforcement
Example will not be described here.
Above-mentioned the embodiment of the present application sequence number is for illustration only, does not represent the quality of embodiment.
In above-described embodiment of the application, the description to each embodiment all emphasizes particularly on different fields, and does not have in certain embodiment
The part of detailed description, may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that the processing meanss of disclosed sequence information,
Can realize by another way.Wherein, device embodiment described above is only schematic, such as described
The division of unit, only a kind of division of logic function can have other dividing mode when actually realizing, such as many
Individual unit or component can with reference to or be desirably integrated into another system, or some features can be ignored, or not perform.
It is another, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces,
The INDIRECT COUPLING or communication connection of unit or module, can be electrical or other forms.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit
The part for showing can be or may not be physical location, you can local to be located at one, or can also be distributed to
On multiple NEs.Some or all of unit therein can be selected according to the actual needs to realize the present embodiment
The purpose of scheme.
In addition, each functional unit in the application each embodiment can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.It is above-mentioned integrated
Unit both can be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit realized using in the form of SFU software functional unit and as independent production marketing or use when,
Can be stored in a computer read/write memory medium.Based on such understanding, the technical scheme essence of the application
On all or part of part that in other words prior art is contributed or the technical scheme can be with software product
Form is embodied, and the computer software product is stored in a storage medium, is used so that one including some instructions
Platform computer equipment (can be personal computer, server or network equipment etc.) performs each embodiment institute of the application
State all or part of step of method.And aforesaid storage medium includes:USB flash disk, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), portable hard drive, magnetic disc or CD
Etc. it is various can be with the medium of store program codes.
The above is only the preferred embodiment of the application, it is noted that for the ordinary skill people of the art
For member, on the premise of without departing from the application principle, some improvements and modifications can also be made, these improve and moisten
Decorations also should be regarded as the protection domain of the application.
Claims (19)
1. a kind of processing method of identifying code, it is characterised in that include:
Whether client is being detected in the case that user terminal receives note, detect the note comprising checking
Code;
If the note includes the identifying code, the identifying code is copied in the pasting boards of the user terminal;
By the user terminal displays first message, wherein, the first message is indicated by the identifying code
Copy in the pasting boards of the user terminal.
2. method according to claim 1, it is characterised in that disappeared by the user terminal displays first described
Before breath, methods described also includes:
Detect the current state of the user terminal;
Wherein, it is when the current state indicates that the user terminal is in application state, described by the use
Family terminal shows first message, including:
The first message is shown in the user terminal by pop-up or simple message notifying frame, wherein, institute
State user terminal and refer to that the system foreground of the user terminal has the program being currently running in application state.
3. method according to claim 2, it is characterised in that it is described by pop-up or simple message notifying frame in institute
The first message is shown in stating user terminal, including:
Detect whether the system configuration of the user terminal allows pop-up and current pop-up whether occupied;
If the system configuration of the user terminal allows pop-up and the current pop-up is unoccupied, by the bullet
Window shows the first message in the user terminal;
If the system configuration of the user terminal does not allow pop-up or the current pop-up occupied, by the letter
Easily message notifying frame shows the first message in the user terminal.
4. method according to claim 2, it is characterised in that
When the current state indicates that the user terminal is in non-application state, not in the user terminal
Show the first message;Or,
When the current state indicates that the user terminal is in non-application state, by informing in the use
The first message is shown in the terminal of family.
5. method according to claim 2, it is characterised in that when the current state is indicated at the user terminal
When non-application state, methods described also includes:
The identifying code is sent to terminal the application software installed, wherein, the application software is
The account of login is identical with the current logon account of the client, the identifying code is multiple by the application software
Make in the pasting boards of the terminal, and the second message is shown in the terminal, described
Two message indicate the identifying code to be copied in the pasting boards of the terminal.
6. the method according to claim 4 or 5, it is characterised in that the user terminal is in non-application state bag
Include the user terminal main screen state is in screen lock state or the user terminal.
7. method according to claim 1, it is characterised in that whether the detection note includes identifying code bag
Include:
Identify whether the keyword comprising the identifying code from the note;
If the keyword comprising the identifying code in the note, the character string of preset length in the note is extracted,
Wherein, the character string of the preset length includes the keyword;
The character string being continuously made up of numeral and/or letter is extracted from the character string of the preset length;
If the quantity of the character string for extracting is one, extract character string is defined as into the identifying code;
If the quantity of the character string for extracting is multiple, the identifying code is determined according to the type of multiple character strings.
8. method according to claim 7, it is characterised in that described according to the type of multiple character strings determines
Identifying code includes:
In the case where the type of multiple character strings is differed, the character string of highest priority is defined as into described testing
Card code, wherein, the priority of the character string being made up of numeral is excellent higher than the character string being made up of numeral and letter
First level, priority of the priority of character string being made up of numeral and letter higher than the character string being made up of letter;
In the case of the type identical of multiple character strings, by the original position apart from the note nearest character
String is defined as the identifying code.
9. method according to claim 1, it is characterised in that whether include identifying code in the detection note
Before, methods described also includes:
Determine whether open-authentication code automatic identification function;
If open-authentication code automatic identification function, determines whether the client has the authority of short message reading;
In the case where the client has the authority of short message reading, perform whether the detection note wraps
Containing the identifying code.
10. a kind of client, it is characterised in that include:
First detector unit, for detecting in the case that user terminal receives note, detects the note
Whether identifying code is included;
The identifying code, if including the identifying code for the note, is copied to the user by copied cells
In the pasting boards of terminal;
Processing unit, for by the user terminal displays first message, wherein, the first message is indicated
The identifying code is copied in the pasting boards of the user terminal.
11. clients according to claim 10, it is characterised in that also include:
Second detector unit, for detecting the current state of the user terminal;
Wherein, when the current state indicates that the user terminal is in application state, the processing unit is used
In execution following steps by the user terminal displays first message:
The first message is shown in the user terminal by pop-up or simple message notifying frame, wherein, institute
State user terminal and refer to that the system foreground of the user terminal has the program being currently running in application state.
12. clients according to claim 11, it is characterised in that the processing unit leads to for performing following steps
Cross pop-up or simple message notifying frame shows the first message in the user terminal:
Detect whether the system configuration of the user terminal allows pop-up and current pop-up whether occupied;
If the system configuration of the user terminal allows pop-up and the current pop-up is unoccupied, by the bullet
Window shows the first message in the user terminal;
If the system configuration of the user terminal does not allow pop-up or the current pop-up occupied, by the letter
Easily message notifying frame shows the first message in the user terminal.
13. clients according to claim 11, it is characterised in that the processing unit is used for when the current state
When indicating that the user terminal is in non-application state, the first message is not shown in the user terminal;
Or, when the current state indicates that the user terminal is in non-application state, by informing described
The first message is shown in user terminal.
14. clients according to claim 11, it is characterised in that also include:
Transmitting element, for the identifying code is sent to terminal the application software installed, wherein,
The listed account of the application software is identical with the current logon account of the client, by the application software
The identifying code is copied in the pasting boards of the terminal, and is shown in the terminal
Two message, second message indicate the identifying code to be copied in the pasting boards of the terminal.
15. clients according to claim 13 or 14, it is characterised in that the user terminal is in non-application shape
State includes that the user terminal is in main screen state in screen lock state or the user terminal.
16. clients according to claim 10, it is characterised in that first detector unit is used to perform following step
Suddenly detect the note whether comprising identifying code:
Identify whether the keyword comprising the identifying code from the note;
If the keyword comprising the identifying code in the note, the character string of preset length in the note is extracted,
Wherein, the character string of the preset length includes the keyword;
The character string being continuously made up of numeral and/or letter is extracted from the character string of the preset length;
If the quantity of the character string for extracting is one, extract character string is defined as into the identifying code;
If the quantity of the character string for extracting is multiple, the identifying code is determined according to the type of multiple character strings.
17. clients according to claim 16, it is characterised in that first detector unit is used to perform following step
Suddenly the identifying code is determined according to the type of multiple character strings:
In the case where the type of multiple character strings is differed, the character string of highest priority is defined as into described testing
Card code, wherein, the priority of the character string being made up of numeral is excellent higher than the character string being made up of numeral and letter
First level, priority of the priority of character string being made up of numeral and letter higher than the character string being made up of letter;
In the case of the type identical of multiple character strings, by the original position apart from the note nearest character
String is defined as the identifying code.
18. clients according to claim 10, it is characterised in that also include:
Determining unit, is used to determine whether open-authentication code automatic identification function;If open-authentication code automatic identification
Function, determines whether the client has the authority of short message reading;There is the power of short message reading in the client
In the case of limit, first detector unit performs whether the detection note includes the identifying code.
19. a kind of user terminals, it is characterised in that the user terminal is installed just like any one of claim 10 to 18
Described client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510590465.1A CN106550089B (en) | 2015-09-16 | 2015-09-16 | Verification code processing method, client and user terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510590465.1A CN106550089B (en) | 2015-09-16 | 2015-09-16 | Verification code processing method, client and user terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106550089A true CN106550089A (en) | 2017-03-29 |
CN106550089B CN106550089B (en) | 2019-12-10 |
Family
ID=58362540
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510590465.1A Active CN106550089B (en) | 2015-09-16 | 2015-09-16 | Verification code processing method, client and user terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106550089B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107770155A (en) * | 2017-09-22 | 2018-03-06 | 维沃移动通信有限公司 | A kind of short-message verification method and mobile terminal |
CN108520257A (en) * | 2018-04-02 | 2018-09-11 | 广东欧珀移动通信有限公司 | Information processing method, device, terminal device and storage medium |
CN108702413A (en) * | 2017-05-10 | 2018-10-23 | 华为技术有限公司 | A kind of input method and device of identifying code |
CN111107043A (en) * | 2018-10-26 | 2020-05-05 | 珠海格力电器股份有限公司 | Verification code obtaining method and device |
CN112491802A (en) * | 2020-10-29 | 2021-03-12 | 广西电力职业技术学院 | Identity authentication communication device and identity authentication method |
CN115103055A (en) * | 2022-06-17 | 2022-09-23 | 度小满科技(北京)有限公司 | Loss processing method and device, mobile terminal and readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101350720A (en) * | 2007-07-18 | 2009-01-21 | ***通信集团公司 | Dynamic cipher authentication system and method |
WO2013165317A1 (en) * | 2012-05-03 | 2013-11-07 | C3S Pte. Ltd. | Method and system for protecting a password during an authentication process |
CN103546877A (en) * | 2013-10-30 | 2014-01-29 | 上海斐讯数据通信技术有限公司 | Method and system for obtaining and inputting content code and mobile terminal |
CN104469714A (en) * | 2014-11-28 | 2015-03-25 | 小米科技有限责任公司 | Short message sending method and device |
CN104703151A (en) * | 2013-12-09 | 2015-06-10 | 浙江融创信息产业有限公司 | Client dynamic password authentication method, device and terminal |
-
2015
- 2015-09-16 CN CN201510590465.1A patent/CN106550089B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101350720A (en) * | 2007-07-18 | 2009-01-21 | ***通信集团公司 | Dynamic cipher authentication system and method |
WO2013165317A1 (en) * | 2012-05-03 | 2013-11-07 | C3S Pte. Ltd. | Method and system for protecting a password during an authentication process |
CN103546877A (en) * | 2013-10-30 | 2014-01-29 | 上海斐讯数据通信技术有限公司 | Method and system for obtaining and inputting content code and mobile terminal |
CN104703151A (en) * | 2013-12-09 | 2015-06-10 | 浙江融创信息产业有限公司 | Client dynamic password authentication method, device and terminal |
CN104469714A (en) * | 2014-11-28 | 2015-03-25 | 小米科技有限责任公司 | Short message sending method and device |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108702413A (en) * | 2017-05-10 | 2018-10-23 | 华为技术有限公司 | A kind of input method and device of identifying code |
CN107770155A (en) * | 2017-09-22 | 2018-03-06 | 维沃移动通信有限公司 | A kind of short-message verification method and mobile terminal |
CN108520257A (en) * | 2018-04-02 | 2018-09-11 | 广东欧珀移动通信有限公司 | Information processing method, device, terminal device and storage medium |
CN111107043A (en) * | 2018-10-26 | 2020-05-05 | 珠海格力电器股份有限公司 | Verification code obtaining method and device |
CN111107043B (en) * | 2018-10-26 | 2021-06-11 | 珠海格力电器股份有限公司 | Verification code obtaining method and device |
CN112491802A (en) * | 2020-10-29 | 2021-03-12 | 广西电力职业技术学院 | Identity authentication communication device and identity authentication method |
CN115103055A (en) * | 2022-06-17 | 2022-09-23 | 度小满科技(北京)有限公司 | Loss processing method and device, mobile terminal and readable storage medium |
CN115103055B (en) * | 2022-06-17 | 2023-10-03 | 度小满科技(北京)有限公司 | Loss processing method, loss processing device, mobile terminal and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN106550089B (en) | 2019-12-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106550089A (en) | The processing method of identifying code, client and user terminal | |
CN103425956B (en) | The networking method of wireless network camera | |
CN108427633B (en) | Display interface processing method and device | |
CN109617852B (en) | Method and device for preventing network addiction based on flow analysis | |
CN106096425A (en) | System permission starting method, device and equipment | |
CN109194689B (en) | Abnormal behavior recognition method, device, server and storage medium | |
CN105101122A (en) | Verification code input method and device | |
CN103414815A (en) | Method and terminal for displaying contact information | |
CN104123496B (en) | The hold-up interception method and device of a kind of rogue software, terminal | |
CN105376636B (en) | Fill in method, householder method, smart television and the intelligent mobile terminal of identifying code | |
CN105282163A (en) | Network access method and equipment | |
CN103618786A (en) | Playing error processing method and server | |
CN106453900A (en) | Calling processing method and apparatus, called processing method and apparatus, and terminal | |
CN107872446B (en) | Communication account management method and device and server | |
CN110932960A (en) | Social software-based fraud prevention method, server and system | |
CN107704337A (en) | Method, mobile terminal and the device with store function of factory reset | |
CN104796877B (en) | The method and apparatus that a kind of anti-malice is deducted fees | |
CN102891921A (en) | Automatic updating system of electronic address list | |
CN106293391B (en) | Freezing or unfreezing method and device for application and mobile terminal | |
CN107231358B (en) | Questionnaire data acquisition method, server and mobile terminal | |
CN104703173B (en) | The configuration of terminal applies account and detection method, apparatus and system | |
CN107808106A (en) | A kind of session content methods of exhibiting and device with scene handoff functionality | |
CN110619211A (en) | Malicious software identification method, system and related device based on dynamic characteristics | |
CN108882207A (en) | The implementation method and device of near field Trigger Function | |
CN106971296A (en) | A kind of method, electronic equipment and the storage medium of processing information object |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1235583 Country of ref document: HK |
|
GR01 | Patent grant | ||
GR01 | Patent grant |