The content of the invention
The purpose of the embodiment of the present application is to provide a kind of Information Authentication processing method, device, system, client and service
Device, can improve the efficiency and convenience of Information Authentication, it is ensured that user's uses safety, improvement Consumer's Experience.
What the embodiment of the present application was realized in:
A kind of Information Authentication processing method, including:
First client, which is provided, includes the operation interface in default trigger action region, and the default trigger action region is used for
Trigger the checking request that Information Authentication is carried out using default application;
First client receives checking request of the user in the default trigger action area triggering, by the checking request
Send to first server;
The first server sends the checking request to the second server corresponding with the default application;
The second server by the checking information corresponding to the checking request received send to the checking
The second associated client of the corresponding user identity information of request;
The checking information is pushed to the user by second client;
Second client determines the result based on the user to the verification process operation of the checking information, will
The result is sent to the second server;
The second server sends the result to the first server;
Checking request of the first server based on the result processing user.
A kind of Information Authentication processing method, including:
There is provided includes the operation interface in default trigger action region, and the default trigger action region is used to trigger using pre-
If application carries out the checking request of Information Authentication;
Receive checking request of the user in the triggering in the default trigger action region;
The checking request is sent to first server.
A kind of Information Authentication processing method, including:
Receive the checking request that first server is sent;
Checking information corresponding to the checking request is sent to the user corresponding to the checking request and identifies letter
Second client of manner of breathing association;
Receive the verification process operation determination based on the user to the checking information that second client is sent
The result;
The result is sent to the first server.
A kind of Information Authentication processing method, including:
The user for receiving the transmission of the first client is carrying out the default trigger action region of Information Authentication using default application
The checking request of triggering;
The checking request is sent to second server;
Receive the result corresponding with the checking request that the second server is sent;
Checking request based on the result processing user.
A kind of Information Authentication processing method, including:
Receive the checking information that second server is sent;
The checking information is pushed to corresponding user;
The result is determined to the verification process operation of the checking information based on the user, the result is sent out
Deliver to the second server.
A kind of Information Authentication processing method, including:
The user for receiving the transmission of the first client is carrying out the default trigger action region of Information Authentication using default application
The checking request of triggering;
Checking information corresponding to the checking request is sent to the user corresponding to the checking request and identifies letter
Second client of manner of breathing association;
Receive the verification process operation determination based on the user to the checking information that second client is sent
The result;
Checking request based on the result processing user.
A kind of Information Authentication processing unit, including:
Operation interface provides module, includes the operation interface in default trigger action region, the default triggering for providing
Operating area is used to trigger the checking request for carrying out Information Authentication using default application;
First checking request receiving module, please in the checking of the triggering in the default trigger action region for receiving user
Ask;
First checking request sending module, for the checking request to be sent to first server.
A kind of Information Authentication processing unit, including:
Second checking request receiving module, is believed for receiving the user that the first client is sent using default application
Cease the checking request of the default trigger action area triggering of checking;
Second checking request sending module, for the checking request to be sent to second server;
First the result receiving module, for receiving the corresponding with the checking request of the second server transmission
The result;
First checking request processing module, for the checking request based on the result processing user.
A kind of Information Authentication processing unit, including:
3rd checking request receiving module, the checking request for receiving first server transmission;
First checking information sending module, is tested for the checking information corresponding to the checking request to be sent to described
Demonstrate,prove the second client that the user identity information corresponding to request is associated;
Second the result receiving module, for receiving being tested based on the user described for the second client transmission
Demonstrate,prove the result that the verification process operation of information is determined;
First the result sending module, for the result to be sent to the first server.
A kind of Information Authentication processing unit, including:
Checking information receiving module, the checking information for receiving second server transmission;
Checking information pushing module, for the checking information to be pushed into corresponding user;
The result determining module, for determining checking to the verification process operation of the checking information based on the user
As a result;
Second the result sending module, for the result to be sent to the second server.
A kind of Information Authentication processing unit, including:
4th checking request receiving module, is believed for receiving the user that the first client is sent using default application
Cease the checking request of the default trigger action area triggering of checking;
Second checking information sending module, is tested for the checking information corresponding to the checking request to be sent to described
Demonstrate,prove the second client that the user identity information corresponding to request is associated;
3rd the result receiving module, for receiving being tested based on the user described for the second client transmission
Demonstrate,prove the result that the verification process operation of information is determined;
Second checking request processing module, for the checking request based on the result processing user.
A kind of Information Authentication handles client, including processor and memory, and the memory storage is by the processor
The computer program instructions of execution, the computer program instructions include:
There is provided includes the operation interface in default trigger action region, and the default trigger action region is used to trigger using pre-
If application carries out the checking request of Information Authentication;
Checking request of the user in the triggering in the default trigger action region is received, the checking request is sent to the
One server.
A kind of Information Authentication processing server, including processor and memory, the memory storage is by the processor
The computer program instructions of execution, the computer program instructions include:
The user for receiving the transmission of the first client is carrying out the default trigger action region of Information Authentication using default application
The checking request of triggering;
The checking request is sent to second server;
Receive the result corresponding with the checking request that the second server is sent;
Checking request based on the result processing user.
A kind of Information Authentication processing server, including processor and memory, the memory storage is by the processor
The computer program instructions of execution, the computer program instructions include:
Receive the checking request that first server is sent;
Checking information corresponding to the checking request is sent to the user corresponding to the checking request and identifies letter
Second client of manner of breathing association;
Receive the verification process operation determination based on the user to the checking information that second client is sent
The result;
The result is sent to the first server.
A kind of Information Authentication handles client, including processor and memory, and the memory storage is by the processor
The computer program instructions of execution, the computer program instructions include:
Receive the checking information that second server is sent;
The checking information is pushed to corresponding user;
The result is determined to the verification process operation of the checking information based on the user, the result is sent out
Deliver to the second server.
A kind of Information Authentication processing server, including processor and memory, the memory storage is by the processor
The computer program instructions of execution, the computer program instructions include:
The user for receiving the transmission of the first client is carrying out the default trigger action region of Information Authentication using default application
The checking request of triggering;
Checking information corresponding to the checking request is sent to the user corresponding to the checking request and identifies letter
Second client of manner of breathing association;
Receive the verification process operation determination based on the user to the checking information that second client is sent
The result;
Checking request based on the result processing user.
A kind of Information Authentication processing system, including:
First client, includes the operation interface in default trigger action region, the default trigger action area for providing
Domain is used to trigger the checking request for carrying out Information Authentication using default application;And for receiving user in the default triggering behaviour
Make the checking request of area triggering, the checking request is sent to first server;
First server, for the checking request to be sent to the second server corresponding with the default application,
And the result for being sent based on the second server handles the checking request of the user;
Second server, for by the checking information corresponding to the checking request received send to the checking
The second associated client of the corresponding user identity information of request, and for by the result of the second client feedback
Send to the first server;
Second client, for the checking information to be pushed into the user;And for based on the user to institute
The verification process operation for stating checking information determines the result, and the result is sent to the second server.
A kind of Information Authentication processing system, including:
First client, includes the operation interface in default trigger action region, the default trigger action area for providing
Domain is used to trigger the checking request for carrying out Information Authentication using default application;And for receiving user in the default triggering behaviour
Make the checking request of area triggering, the checking request is sent to server;
Server, for by the checking information corresponding to the checking request received send to the checking request
The second associated client of corresponding user identity information, and at the result that is sent based on the second client
Manage the checking request of the user;
Second client, for the checking information to be pushed into the user;And for based on the user to institute
The verification process operation for stating checking information determines the result, and the result is sent to the server.
The technical scheme provided from above the embodiment of the present application, the embodiment of the present application in operation interface by providing use
In predetermined registration operation region of the triggering using default application progress Information Authentication, it can make user just can be by shirtsleeve operation
Second client completes the Information Authentication to first client, without recognizing and inputting complicated checking character string.With showing
There is technology to compare, the technical scheme provided using the embodiment of the present application can solve the rubbish note that Internet service website runs into
Volume, the transaction of malice decryption, brush ticket, hostile network place an order, issue the problem of malice such as advertising message of pouring water is used, and are ensureing
First client improves the efficiency and convenience of Information Authentication, improves Consumer's Experience using under the basis of safety.
Embodiment
The embodiment of the present application provides a kind of Information Authentication processing method, device, system, client and server.
In order that those skilled in the art more fully understand the technical scheme in the application, it is real below in conjunction with the application
The accompanying drawing in example is applied, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described implementation
Example only some embodiments of the present application, rather than whole embodiments.Based on the embodiment in the application, this area is common
The every other embodiment that technical staff is obtained under the premise of creative work is not made, should all belong to the application protection
Scope.
Hereinafter implementing for the embodiment of the present application is described in detail with several specific examples.
Introduce a kind of embodiment of Information Authentication processing method of the application first below.Fig. 1 is the information that the application is provided
A kind of schematic flow sheet of embodiment of authentication processing method, this application provides the behaviour of the method as described in embodiment or flow chart
Make step, but can include more or less operating procedures based on routine or without performing creative labour.Arranged in embodiment
The step of act is sequentially only a kind of mode in numerous step execution sequences, and unique execution sequence is not represented.In practice
System or during client production execution, can perform or parallel perform according to embodiment or method shown in the drawings order
(environment of such as parallel processor or multiple threads).Specifically as shown in figure 1, methods described can include:
S1:First client, which is provided, includes the operation interface in default trigger action region, the default trigger action region
The checking request of Information Authentication is carried out using default application for triggering.
First client described in the embodiment of the present application, which can include any one, can provide the user certain service
Client.
In actual applications, when user is needed before certain client carries out associative operation, generally require first to be logged in,
In login process, in order to ensure that (what is currently logged in is normal users to the safety that uses of user, rather than has malicious purposes
Computer), the first client in the embodiment of the present application, which can be provided, includes the operation interface in default trigger action region, institute
State default trigger action region be used for trigger utilize the default checking request for applying progress Information Authentication.So user can be in institute
State the subsequent operation that default trigger action area triggering carries out Information Authentication using default application.
Specifically, the checking request that the triggering carries out Information Authentication using default application can be by clicking on, sliding institute
The modes such as default trigger action region are stated to trigger, but the embodiment of the present application is not limited with modes such as above-mentioned click, slips.
In a specific embodiment, provided as shown in Fig. 2 Fig. 2 is the first client described in the embodiment of the present application
A kind of schematic diagram of embodiment of operation interface including presetting trigger action region.It can be seen in fig. 2 that the operation interface can be with
It is a kind of to include the login interface in default trigger action region, including user name input frame, Password Input frame and default triggering
Operating area (presets button of the trigger action region for " being verified with application A ") described in Fig. 2.When user is needed by user name
During with the first client of password login, user input username and password after, can click directly on application A verify by
Button can just carry out the checking request of Information Authentication in triggering using application A;Certainly here while checking request is triggered,
The checking request of username and password can be triggered, when the result of two checking requests is all successfully, user can be straight
Connect login first client.
Furthermore, it is necessary to which explanation, includes the operation interface in default trigger action region simultaneously described in the embodiment of the present application
Above-mentioned login interface is not limited only to, in actual applications, the interface of other forms can also be included, it may for example comprise Yong Hubiao
Know the interface in information input frame and the default trigger action region etc., the embodiment of the present application is not limited with above-mentioned.
It is not limited in addition, presetting trigger action region described in the embodiment of the present application certainly in the form of above-mentioned button, example
It such as can directly be the Password Input frame in Fig. 2, i.e., can just trigger and be believed with using A after username and password is inputted
Cease the checking request of checking.
S2:First client receives checking request of the user in the default trigger action area triggering, by the checking
Request is sent to first server.
In actual applications, checking is triggered when user is operated in the default trigger action region by click slip etc.
After request, first client is received after the checking request, can be sent the checking request to first service
Device.Specifically, the first server, can be the server corresponding with first client.For example, when described first
Client is to apply A clients, and the first server can be to apply A servers.
Specifically, the embodiment of the present application can be believed using default application in the default trigger action area triggering
The information such as user identity information, the default application, first client can be included by ceasing the checking request of checking.
Specifically, passing through the default application message in the checking request, it may be determined that need to be used for carrying out Information Authentication
Application.
Specifically, the user identity information is used as between first client and second client
Association identification.Subsequently, it can determine that needs are used for into row information by the user identity information in the checking request
The corresponding specific client end of the application of checking.In actual applications, the user identity information can be user name, cell-phone number
The information that code etc. can be identified as user.Application of first client described here with being used for carrying out Information Authentication is corresponding
Client (the second client) can include identical user identity information.
Specifically, the first client-side information in the checking request can need to be verified for helping user to understand
Application message.
S3:The first server sends the checking request to the second service corresponding with the default application
Device.
Specifically, in the embodiment of the present application, after the first server receives checking request, can be tested described
Card request is sent to the second server corresponding with the default application.Specifically, the second server can be described
The server of default application, such as described default application is applies B, accordingly, and the second server can be application B services
Device.
S4:Checking information corresponding to the checking request received is sent to described and tested by the second server
Demonstrate,prove the second client that the user identity information corresponding to request is associated.
Further, after the second server receives checking request, by the checking request institute received
Corresponding checking information is sent to second client associated with the user identity information corresponding to the checking request.
Specifically, the second client described in the embodiment of the present application can be corresponding with the second server, and can be with
For the client of the default application.Second client can be that the information that meets beyond any first client is tested
The client of card condition.It can enter specifically, a certain client meets described information verification condition including the client with needs
Row information checking client (first client) have incidence relation (incidence relation can include the client with
Need the client for carrying out Information Authentication that there are one or more identical user identity informations);It is preferred that, a certain client symbol
Default standard can also be reached including the use safety of the client in itself by closing described information verification condition.
Specifically, the checking information can determine to need to the described first visitor according to the relevant information of the checking request
The information that the relevant information at family end is verified.In a specific embodiment, the checking information can be:Your application
A clients are logged in, and it is that you operate yourself that may I ask
In actual applications, second server is after checking request is received, it may appear that the second client is not online
Situation, accordingly, in certain embodiments, is asked the checking information corresponding to the checking request is sent to the checking
Ask before the second client that corresponding user identity information is associated, methods described can also include:
Whether inquiry second client associated with the user identity information corresponding to the checking request be online.
Second client specifically can be determined by the user identity information corresponding to the checking request here
End, and then determine whether second client is online.
Further, when the result of above-mentioned inquiry is is, i.e., described second client is online, accordingly, can be direct
Checking information corresponding to the checking request is sent to the user corresponding to the checking request and identified by execution step S4
The operation of the second associated client of information.
Further, when the result of above-mentioned inquiry is no, i.e., described second client is not online, accordingly, can obtain
The logging device information of the second associated client is taken, is pushed and carried to corresponding equipment based on the logging device information
Show information.
Specifically, the facility information when logging device information can be including the second client of User logs in.For example with
Family last time logs in facility information during the second client, or user logs in the second client institute in nearest one month
Information using most equipment etc..The physical address that can include equipment, the MDN corresponding to equipment of the information of the equipment
(Mobile Directory Number, Mobile Directory Number) etc. can as device identification information.
Further, the prompt message that the equipment corresponding to the logging device information is pushed can include described second
The login prompt information of client and/or the verification tip information of the checking information.The login prompt of second client
Information can point out the information of the client of User logs in second;The verification tip information of the checking information can include will checking
Information is prompted to user in certain form, and such as verified link (URL) adds the form of text prompt, specifically
, for example:You have information to need checking, please click on following link and carry out Information Authentication https://yanzheng.com.Here
User is clicked on after verified link, can directly be logged in corresponding second client and carried out Information Authentication, can also directly arrive
Up to the details page of Information Authentication, Information Authentication is directly carried out.
Furthermore, it is necessary to explanation, above-mentioned logging device information and prompt message are only merely a kind of example, the application
Example is not limited with above-mentioned.
S5:The checking information is pushed to the user by second client.
Further, after second client obtains checking information, the checking information can be pushed to user.
As shown in figure 3, by by checking information exemplified by cell-phone customer terminal is pushed to user, Fig. 3 be the application provide by the checking
Information is pushed to a kind of interface schematic diagram of embodiment of user.It is visible in Fig. 3, checking information is showed in the form of word
User, and "Yes", two buttons of "No" are provided so that user confirms to checking information.
Furthermore, it is necessary to which a kind of explanation, the example in interface that the checking information is only pushed to user by Fig. 3 is described
Checking information is not limited in above-mentioned written form, the mode that checking information confirms is also not limited to for user above-mentioned
The mode of button, the embodiment of the present application is not limited above.
S6:Second client determines checking knot based on the user to the verification process operation of the checking information
Really, the result is sent to the second server.
Specifically, after user is obtaining checking information, corresponding verification process can be carried out to checking information, it is described
Second client can determine the result based on the user to the verification process operation of the checking information, and be tested described
Card result is sent to the second server.
In a specific embodiment, the checking information can be pushed to the user's with reference to the second client
Form, it is assumed that the checking information is pushed to the form of the user to need user by clicking on preset areas by the second client
Domain to carry out checking information exemplified by verification process, described that the verification process of the checking information is operated really based on the user
Determining the result can include:
Record clicking operation of the user in predeterminable area;
The result is determined based on the identification to the verification process result corresponding to the predeterminable area.
So that the predeterminable area is button as an example, the operation that default ACK button can be clicked on based on user determines to verify into
The result of work(;And the result being proved to be successful is determined based on the operation that user clicks on default refusal button.
In another specific embodiment, it is assumed that the checking information is pushed to the shape of the user by the second client
Formula for need user by record voice come to checking information carry out verification process exemplified by, it is described to be tested based on the user described
The verification process operation of card information determines that the result can include:
Record voice messaging of the user to the verification process result of the checking information;
The result is determined based on the identification to the voice messaging.
By taking the checking information in Fig. 3 as an example, accordingly, when the voice messaging of user record is is, it may be determined that checking
Successful the result;Conversely, when the voice messaging of user record is no, it may be determined that the result being proved to be successful
As can be seen here, the operation that user can be by simply clicking on or recording voice can just complete the checking of information,
Without identification and the complicated checking character string of input, the efficiency and convenience of Information Authentication are substantially increased, user's body is improved
Test.
S7:The second server sends the result to the first server.
Further, it is determined that after the result, the second server can send the result to institute
First server is stated, so that first server carries out follow-up verification process.
S8:Checking request of the first server based on the result processing user.
In the embodiment of the present application, after the first server is verified result, the result can be based on
Handle the checking request of the user.Specifically, the checking when the result when being proved to be successful, to determine the user please
Hope for success work(;Conversely, when the result is authentication failed, determining the checking request authentication failed.
Further, exemplified by carrying out Information Authentication in login process, after checking request success, the first service
Device can carry out the checking of username and password;Conversely, after checking request authentication failed, can refuse corresponding log in please
Ask.
Furthermore, it is necessary to which explanation, first server described in the embodiment of the present application can be for not with the second server
Same server, and it is corresponding with first client and second client respectively.In another embodiment, it is described
First server can be same server with the second server, and can be with first client and second visitor
Family end is corresponding.Accordingly, when the first server and the second server are same server, above- mentioned information checking
The step S3 and S7 interacted between first server and second server, i.e., the first visitor can be omitted in the embodiment of processing method
Family end directly can send checking request to server;Then, server can be right by the checking request received institute
The checking information answered is sent to second client associated with the user identity information corresponding to the checking request, subsequently,
Server can directly receive the result of the second client transmission, and based on the checking of the result processing user
Request.
As can be seen here, a kind of embodiment of Information Authentication processing method of the application in operation interface by providing for triggering
The predetermined registration operation region of Information Authentication is carried out using default application, can make user just can be in the second visitor by shirtsleeve operation
Family end completes the Information Authentication to first client, without recognizing and inputting complicated checking character string.With prior art
Compare, the technical scheme provided using the embodiment of the present application can solve rubbish registration, the malice that Internet service website runs into
Decryption, brush ticket, hostile network transaction place an order, issue the problem of malice such as advertising message of pouring water is used, and are ensureing the first visitor
The efficiency and convenience of Information Authentication are improved, improves Consumer's Experience using under the basis of safety in family end.
It is executive agent to consider first client, and the application provides another implementation of Information Authentication processing method
Example, Fig. 4 is the schematic flow sheet of another embodiment for the Information Authentication processing method that the application is provided, and this application provides such as
Method operating procedure described in embodiment or flow chart, but based on it is conventional or without performing creative labour can include it is more or
Less operating procedure.The step of being enumerated in embodiment order is only a kind of mode in numerous step execution sequences, not generation
The unique execution sequence of table., can be according to shown in embodiment or accompanying drawing when system or client production in practice is performed
Method order perform or parallel perform (environment of such as parallel processor or multiple threads).Specifically such as Fig. 4 institutes
Show, methods described can include:
S410:There is provided includes the operation interface in default trigger action region, and the default trigger action region is used to trigger
The checking request of Information Authentication is carried out using default application.
S420:Receive checking request of the user in the triggering in the default trigger action region.
S430:The checking request is sent to first server.
As can be seen here, a kind of embodiment of Information Authentication processing method of the application in operation interface by providing for triggering
The predetermined registration operation region of Information Authentication is carried out using default application, user can be made just to complete information by shirtsleeve operation
Checking, without recognizing and inputting complicated checking character string.Compared with prior art, the technology provided using the embodiment of the present application
Scheme can improve the efficiency and convenience of Information Authentication, improve user in the case where ensureing basis of first client using safety
Experience.
It is executive agent to consider the first server, and the application provides another implementation of Information Authentication processing method
Example, Fig. 5 is the schematic flow sheet of another embodiment for the Information Authentication processing method that the application is provided, and this application provides such as
Method operating procedure described in embodiment or flow chart, but based on it is conventional or without performing creative labour can include it is more or
Less operating procedure.The step of being enumerated in embodiment order is only a kind of mode in numerous step execution sequences, not generation
The unique execution sequence of table., can be according to embodiment or side shown in the drawings when system or server in practice is performed
Method order is performed or parallel execution (environment of such as parallel processor or multiple threads).Specifically as shown in figure 5, institute
The method of stating can include:
S510:The user for receiving the transmission of the first client is carrying out the default trigger action of Information Authentication using default application
The checking request of area triggering.
S520:The checking request is sent to second server.
S530:Receive the result corresponding with the checking request that the second server is sent.
S540:Checking request based on the result processing user.
Specifically, the checking request based on the result processing user can include:
When the result is to be proved to be successful, the checking request success of the user is determined.
When the result is authentication failed, the checking request authentication failed is determined.
As can be seen here, a kind of embodiment of Information Authentication processing method of the application by the user received by utilizing pre-
If the checking request that application carries out the predetermined registration operation area triggering of Information Authentication is sent to second server, so that user is second
The second client corresponding to server can just complete the Information Authentication to first client, nothing by shirtsleeve operation
It need to recognize and input the checking character string of complexity.Compared with prior art, the technical scheme provided using the embodiment of the present application can
In the case where ensureing basis of first client using safety, to improve the efficiency and convenience of Information Authentication, improve Consumer's Experience.
It is executive agent to consider the second server, and the application provides another implementation of Information Authentication processing method
Example, Fig. 6 is the schematic flow sheet of another embodiment for the Information Authentication processing method that the application is provided, and this application provides such as
Method operating procedure described in embodiment or flow chart, but based on it is conventional or without performing creative labour can include it is more or
Less operating procedure.The step of being enumerated in embodiment order is only a kind of mode in numerous step execution sequences, not generation
The unique execution sequence of table., can be according to embodiment or side shown in the drawings when system or server in practice is performed
Method order is performed or parallel execution (environment of such as parallel processor or multiple threads).Specifically as shown in fig. 6, institute
The method of stating can include:
S610:Receive the checking request that first server is sent.
S620:Checking information corresponding to the checking request is sent to the user corresponding to the checking request and marked
Know the second associated client of information.
In actual applications, after checking request is received, it may appear that the not online situation of the second client, accordingly
, in certain embodiments, by the checking information corresponding to the checking request send to corresponding to the checking request
Associated the second client of user identity information before, methods described can also include:
Whether inquiry second client associated with the user identity information corresponding to the checking request be online.
Second client specifically can be determined by the user identity information corresponding to the checking request here
End, and then determine whether second client is online.
Further, when the result of above-mentioned inquiry is is, i.e., described second client is online, accordingly, can be direct
Checking information corresponding to the checking request is sent to the user corresponding to the checking request and marked by execution step S620
Know the operation of the second associated client of information.
Further, when the result of above-mentioned inquiry is no, i.e., described second client is not online, accordingly, can obtain
The logging device information of the second associated client is taken, is pushed and carried to corresponding equipment based on the logging device information
Show information.
Wherein, the login prompt information of the prompt message including second client and/or the checking information
Verification tip information.
S630:Receive the verification process operation based on the user to the checking information that second client is sent
The result of determination.
S640:The result is sent to the first server.
As can be seen here, a kind of embodiment of Information Authentication processing method of the application is by by the checking corresponding to checking request
Information is sent to the second client, so that user can just be completed to the described first visitor in the second client by shirtsleeve operation
The Information Authentication at family end, without recognizing and inputting complicated checking character string.Compared with prior art, the embodiment of the present application is utilized
The technical scheme of offer can improve the efficiency and facility of Information Authentication in the case where ensureing basis of first client using safety
Property, improve Consumer's Experience.
It is executive agent to consider second client, and the application provides another implementation of Information Authentication processing method
Example, Fig. 7 is the schematic flow sheet of another embodiment for the Information Authentication processing method that the application is provided, and this application provides such as
Method operating procedure described in embodiment or flow chart, but based on it is conventional or without performing creative labour can include it is more or
Less operating procedure.The step of being enumerated in embodiment order is only a kind of mode in numerous step execution sequences, not generation
The unique execution sequence of table., can be according to embodiment or side shown in the drawings when system or server in practice is performed
Method order is performed or parallel execution (environment of such as parallel processor or multiple threads).Specifically as shown in fig. 7, institute
The method of stating can include:
S710:Receive the checking information that second server is sent.
S720:The checking information is pushed to corresponding user.
S730:The result is determined to the verification process operation of the checking information based on the user.
It is described that the verification process operation determination of the checking information is tested based on the user in a specific embodiment
Card result can include:
Record clicking operation of the user in predeterminable area;
The result is determined based on the identification to the verification process result corresponding to the predeterminable area.
It is described that the verification process of the checking information is operated really based on the user in another specific embodiment
Determining the result includes:
Record voice messaging of the user to the verification process result of the checking information;
The result is determined based on the identification to the voice messaging.
S740:The result is sent to the second server.
As can be seen here, a kind of embodiment of Information Authentication processing method of the application is by the way that the checking letter of the first client is pushed away
Give user, user is just completed the Information Authentication to first client by shirtsleeve operation, without identification and
Input complicated checking character string.Compared with prior art, the technical scheme provided using the embodiment of the present application can ensure
First client improves the efficiency and convenience of Information Authentication, improves Consumer's Experience using under the basis of safety.
In the case that the first server and the second server are same server, it is considered to which server is execution
Main body, the application provides another embodiment of Information Authentication processing method, and Fig. 8 is the Information Authentication processing side that the application is provided
The schematic flow sheet of another embodiment of method, this application provides the method operating procedure as described in embodiment or flow chart,
But it can include more or less operating procedures based on routine or without performing creative labour.The step of being enumerated in embodiment
Order is only a kind of mode in numerous step execution sequences, and unique execution sequence is not represented.System in practice or
When server is performed, it can be performed according to embodiment or method shown in the drawings order or parallel execution (such as parallel place
Manage the environment of device or multiple threads).Specifically as shown in figure 8, methods described can include:
S810:The user for receiving the transmission of the first client is carrying out the default trigger action of Information Authentication using default application
The checking request of area triggering.
S820:Checking information corresponding to the checking request is sent to the user corresponding to the checking request and marked
Know the second associated client of information.
In actual applications, after checking request is received, it may appear that the not online situation of the second client, accordingly
, in certain embodiments, by the checking information corresponding to the checking request send to corresponding to the checking request
Associated the second client of user identity information before, methods described can also include:
Whether inquiry second client associated with the user identity information corresponding to the checking request be online.
Second client specifically can be determined by the user identity information corresponding to the checking request here
End, and then determine whether second client is online.
Further, when the result of above-mentioned inquiry is is, i.e., described second client is online, accordingly, can be direct
Checking information corresponding to the checking request is sent to the user corresponding to the checking request and marked by execution step S820
Know the operation of the second associated client of information.
Further, when the result of above-mentioned inquiry is no, i.e., described second client is not online, accordingly, can obtain
The logging device information of the second associated client is taken, is pushed and carried to corresponding equipment based on the logging device information
Show information.
Wherein, the login prompt information of the prompt message including second client and/or the checking information
Verification tip information.
S830:Receive the verification process operation based on the user to the checking information that second client is sent
The result of determination.
S840:Checking request based on the result processing user.
Specifically, the checking request based on the result processing user can include:
When the result is to be proved to be successful, the checking request success of the user is determined.
When the result is authentication failed, the checking request authentication failed is determined.
As can be seen here, a kind of embodiment of Information Authentication processing method of the application by the user received by utilizing pre-
If the checking request that application carries out the predetermined registration operation area triggering of Information Authentication is sent to the second client, so that user is second
Client can just complete the Information Authentication to first client by shirtsleeve operation, complicated without recognizing and inputting
Verify character string.Compared with prior art, the technical scheme provided using the embodiment of the present application can ensure the first client
Using under the basis of safety, the efficiency and convenience of Information Authentication are improved, improves Consumer's Experience.
On the other hand the application also provides a kind of Information Authentication processing unit, and Fig. 9 is at the Information Authentication that the application is provided
A kind of structural representation of embodiment of device is managed, as shown in figure 9, described device 900 can include:
Operation interface provides module 910, may be used to provide the operation interface including presetting trigger action region, described pre-
If trigger action region is used to trigger the checking request for carrying out Information Authentication using default application;
First checking request receiving module 920, can be used for receiving triggering of the user in the default trigger action region
Checking request;
First checking request sending module 930, can be used for sending the checking request to first server.
On the other hand the application also provides a kind of another embodiment of Information Authentication processing unit, and Figure 10 is that the application is provided
The structural representation of another embodiment of Information Authentication processing unit, as shown in Figure 10, described device 1000 can include:
Second checking request receiving module 1010, the user that can be used for receiving the transmission of the first client is answered using default
With the checking request for the default trigger action area triggering for carrying out Information Authentication;
Second checking request sending module 1020, can be used for sending the checking request to second server;
First the result receiving module 1030, can be used for receiving asking with the checking for the second server transmission
Seek corresponding the result;
First checking request processing module 1040, can be used for the checking based on the result processing user please
Ask.
In another embodiment, the first checking request processing module 1040 can include:
First checking request processing unit, can be used for, when the result is to be proved to be successful, determining the user
Checking request success.
In another embodiment, the first checking request processing module 1040 can include:
Second checking request processing unit, can be used for, when the result is authentication failed, determining the checking
Requests verification fails.
On the other hand the application also provides a kind of another embodiment of Information Authentication processing unit, and Figure 11 is that the application is provided
The structural representation of another embodiment of Information Authentication processing unit, as shown in figure 11, described device 1100 can include:
3rd checking request receiving module 1110, can be used for receiving the checking request that first server is sent;
First checking information sending module 1120, can be used for by the checking information corresponding to the checking request send to
Second client associated with the user identity information corresponding to the checking request;
Second the result receiving module 1130, can be used for receiving that second client sends based on the user
The result that verification process operation to the checking information is determined;
First the result sending module 1140, can be used for sending the result to the first server.
In another embodiment, by the checking information corresponding to the checking request send to the checking request institute
Before the second associated client of corresponding user identity information, described device 1100 can also include:
First enquiry module, can be used for inquiry associated with the user identity information corresponding to the checking request the
Whether two clients are online;
First performs jump module, can be used for when the result that first enquiry module is inquired about is to be, described first
Checking information sending module perform by the checking information corresponding to the checking request send to corresponding to the checking request
Associated the second client of user identity information operation.
In another embodiment, described device 1100 can also include:
First logging device data obtaining module, can be used for when the result that first enquiry module is inquired about is no,
Obtain the logging device information of the second associated client;
First prompt message pushing module, can be used for being pushed to corresponding equipment based on the logging device information and points out
Information;
Wherein, the login prompt information of the prompt message including second client and/or the checking information
Verification tip information.
On the other hand the application also provides a kind of another embodiment of Information Authentication processing unit, and Figure 12 is that the application is provided
The structural representation of another embodiment of Information Authentication processing unit, as shown in figure 12, described device 1200 can include:
Checking information receiving module 1210, can be used for receiving the checking information that second server is sent;
Checking information pushing module 1220, can be used for the checking information being pushed to corresponding user;
The result determining module 1230, can be used for operating the verification process of the checking information based on the user
Determine the result;
Second the result sending module 1240, can be used for sending the result to the second server.
In another embodiment, the result determining module 1230 can include:
First recording unit, can be used for recording clicking operation of the user in predeterminable area;
First the result determining unit, can be used for based on to the verification process result corresponding to the predeterminable area
Identification determines the result.
The result determining module 1230 can include:
Second recording unit, can be used for recording voice letter of the user to the verification process result of the checking information
Breath;
Second the result determining unit, can be used for determining the result based on the identification to the voice messaging.
On the other hand the application also provides a kind of another embodiment of Information Authentication processing unit, and Figure 13 is that the application is provided
The structural representation of another embodiment of Information Authentication processing unit, as shown in figure 13, described device 1300 can include:
4th checking request receiving module 1310, the user that can be used for receiving the transmission of the first client is answered using default
With the checking request for the default trigger action area triggering for carrying out Information Authentication;
Second checking information sending module 1320, can be used for by the checking information corresponding to the checking request send to
Second client associated with the user identity information corresponding to the checking request;
3rd the result receiving module 1330, can be used for receiving that second client sends based on the user
The result that verification process operation to the checking information is determined;
Second checking request processing module 1340, can be used for the checking based on the result processing user please
Ask.
In another embodiment, by the checking information corresponding to the checking request send to the checking request institute
Before the second associated client of corresponding user identity information, described device 1300 can also include:
Second enquiry module, can be used for inquiry associated with the user identity information corresponding to the checking request the
Whether two clients are online;
Second performs jump module, can be used for when the result that second enquiry module is inquired about is to be, described second
Checking information sending module perform by the checking information corresponding to the checking request send to corresponding to the checking request
Associated the second client of user identity information operation.
In another embodiment, described device 1300 can also include:
Second logging device data obtaining module, can be used for when the result that second enquiry module is inquired about is no,
Obtain the logging device information of the second associated client;
Second prompt message pushing module, can be used for being pushed to corresponding equipment based on the logging device information and points out
Information;
Wherein, the login prompt information of the prompt message including second client and/or the checking information
Verification tip information.
In another embodiment, the second checking request processing module 1340 can include:
3rd checking request processing unit, can be used for, when the result is to be proved to be successful, determining the user
Checking request success.
In another embodiment, the second checking request processing module 1340 can include:
4th checking request processing unit, can be used for, when the result is authentication failed, determining the checking
Requests verification fails.
On the other hand the application also provides a kind of Information Authentication processing client, including processor and memory, described to deposit
Reservoir stores the computer program instructions by the computing device, and the computer program instructions can include:
There is provided includes the operation interface in default trigger action region, and the default trigger action region is used to trigger using pre-
If application carries out the checking request of Information Authentication;
Checking request of the user in the triggering in the default trigger action region is received, the checking request is sent to the
One server.
On the other hand the application also provides a kind of Information Authentication processing server, including processor and memory, described to deposit
Reservoir stores the computer program instructions by the computing device, and the computer program instructions can include:
The user for receiving the transmission of the first client is carrying out the default trigger action region of Information Authentication using default application
The checking request of triggering;
The checking request is sent to second server;
Receive the result corresponding with the checking request that the second server is sent;
Checking request based on the result processing user.
In another embodiment, the checking request based on the result processing user can include:
When the result is to be proved to be successful, the checking request success of the user is determined.
In another embodiment, the checking request based on the result processing user can include:
When the result is authentication failed, the checking request authentication failed is determined.
The application also provides a kind of another embodiment of Information Authentication processing server, including processor and memory, described
Memory storage is by the computer program instructions of the computing device, and the computer program instructions can include:
Receive the checking request that first server is sent;
Checking information corresponding to the checking request is sent to the user corresponding to the checking request and identifies letter
Second client of manner of breathing association;
Receive the verification process operation determination based on the user to the checking information that second client is sent
The result;
The result is sent to the first server.
In another embodiment, by the checking information corresponding to the checking request send to the checking request institute
Before the second associated client of corresponding user identity information, the computer program instructions can also include:
Whether inquiry second client associated with the user identity information corresponding to the checking request be online;
When inquiry result for be when, perform by the checking information corresponding to the checking request send to the checking
The operation of the second associated client of the corresponding user identity information of request.
In another embodiment, the computer program instructions can also include:
When the result of inquiry is no, the logging device information of the second associated client is obtained, based on described
Logging device information pushes prompt message to corresponding equipment;
Wherein, the login prompt information of the prompt message including second client and/or the checking information
Verification tip information.
On the other hand the application also provides a kind of Information Authentication processing another embodiment of client, including processor and storage
Device, the memory storage is by the computer program instructions of the computing device, and the computer program instructions can include:
Receive the checking information that second server is sent;
The checking information is pushed to corresponding user;
The result is determined to the verification process operation of the checking information based on the user, the result is sent out
Deliver to the second server.
It is described that checking knot is determined to the verification process operation of the checking information based on the user in another embodiment
Fruit can include:
Record clicking operation of the user in predeterminable area;
The result is determined based on the identification to the verification process result corresponding to the predeterminable area.
It is described that checking knot is determined to the verification process operation of the checking information based on the user in another embodiment
Fruit can include:
Record voice messaging of the user to the verification process result of the checking information;
The result is determined based on the identification to the voice messaging.
The application also provides a kind of another embodiment of Information Authentication processing server, including processor and memory, described
Memory storage is by the computer program instructions of the computing device, and the computer program instructions include:
The user for receiving the transmission of the first client is carrying out the default trigger action region of Information Authentication using default application
The checking request of triggering;
Checking information corresponding to the checking request is sent to the user corresponding to the checking request and identifies letter
Second client of manner of breathing association;
Receive the verification process operation determination based on the user to the checking information that second client is sent
The result;
Checking request based on the result processing user.
In another embodiment, by the checking information corresponding to the checking request send to the checking request institute
Before the second associated client of corresponding user identity information, the computer program instructions can also include:
Whether inquiry second client associated with the user identity information corresponding to the checking request be online;
When inquiry result for be when, perform by the checking information corresponding to the checking request send to the checking
The operation of the second associated client of the corresponding user identity information of request.
In another embodiment, the computer program instructions can also include:
When the result of inquiry is no, the logging device information of the second associated client is obtained, based on described
Logging device information pushes prompt message to corresponding equipment;
Wherein, the login prompt information of the prompt message including second client and/or the checking information
Verification tip information.
In another embodiment, the checking request based on the result processing user can include:
When the result is to be proved to be successful, the checking request success of the user is determined.
In another embodiment, the checking request based on the result processing user can include:
When the result is authentication failed, the checking request authentication failed is determined.
Specifically, in the embodiment of the present application, described processor can include central processing unit (CPU), naturally it is also possible to
Including other single-chip microcomputer, logic gates, integrated circuits with logic processing capability etc., or its is appropriately combined.It is described to deposit
Reservoir can be including nonvolatile memory etc..
On the other hand the application also provides a kind of Information Authentication processing system, including:
First client, includes the operation interface in default trigger action region, the default trigger action area for providing
Domain is used to trigger the checking request for carrying out Information Authentication using default application;And for receiving user in the default triggering behaviour
Make the checking request of area triggering, the checking request is sent to first server;
First server, for the checking request to be sent to the second server corresponding with the default application,
And the result for being sent based on the second server handles the checking request of the user.
Second server, for by the checking information corresponding to the checking request received send to the checking
The second associated client of the corresponding user identity information of request, and for by the result of the second client feedback
Send to the first server;
Second client, for the checking information to be pushed into the user;And for based on the user to institute
The verification process operation for stating checking information determines the result, and the result is sent to the second server.
The application also provides a kind of another embodiment of Information Authentication processing system, including:
First client, includes the operation interface in default trigger action region, the default trigger action area for providing
Domain is used to trigger the checking request for carrying out Information Authentication using default application;And for receiving user in the default triggering behaviour
Make the checking request of area triggering, the checking request is sent to server;
Server, for by the checking information corresponding to the checking request received send to the checking request
The second associated client of corresponding user identity information, and at the result that is sent based on the second client
Manage the checking request of the user.
Second client, for the checking information to be pushed into the user;And for based on the user to institute
The verification process operation for stating checking information determines the result, and the result is sent to the server.
As can be seen here, the embodiment of a kind of Information Authentication processing method of the application, device, system, client or server
The predetermined registration operation region for being carried out Information Authentication using default application for triggering is provided in operation interface, user can be made to pass through letter
Single operation can just complete the Information Authentication to first client in the second client, complicated without recognizing and inputting
Verify character string.Compared with prior art, the technical scheme provided using the embodiment of the present application can solve Internet service net
Rubbish registration that station runs into, the transaction of malice decryption, brush ticket, hostile network, which place an order, issue advertising message of pouring water etc. maliciously makes
With the problem of, ensure the first client using safety basis under, improve Information Authentication efficiency and convenience, improve user
Experience.
In the 1990s, for a technology improvement can clearly distinguish be on hardware improvement (for example,
Improvement to circuit structures such as diode, transistor, switches) or software on improvement (for the improvement of method flow).So
And, with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit.
Designer nearly all obtains corresponding hardware circuit by the way that improved method flow is programmed into hardware circuit.Cause
This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, PLD
(Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate
Array, FPGA)) it is exactly such a integrated circuit, its logic function is determined by user to device programming.By designer
Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, without asking chip maker to design and make
Special IC chip.Moreover, nowadays, substitution manually makes IC chip, and this programming is also used instead mostly " patrols
Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development,
And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language
(Hardware Description Language, HDL), and HDL is also not only a kind of, but have many kinds, such as ABEL
(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description
Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL
(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby
Hardware Description Language) etc., VHDL (Very-High-Speed are most generally used at present
Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also should
This understands, it is only necessary to slightly programming in logic and be programmed into method flow in integrated circuit with above-mentioned several hardware description languages,
The hardware circuit for realizing the logical method flow can be just readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing
Device and storage can by the computer of the computer readable program code (such as software or firmware) of (micro-) computing device
Read medium, gate, switch, application specific integrated circuit (Application Specific Integrated Circuit,
ASIC), the form of programmable logic controller (PLC) and embedded microcontroller, the example of controller includes but is not limited to following microcontroller
Device:ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, are deposited
Memory controller is also implemented as a part for the control logic of memory.It is also known in the art that except with
Pure computer readable program code mode is realized beyond controller, can be made completely by the way that method and step is carried out into programming in logic
Obtain controller and come real in the form of gate, switch, application specific integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc.
Existing identical function.Therefore this controller is considered a kind of hardware component, and various for realizing to including in it
The device of function can also be considered as the structure in hardware component.Or even, can be by for realizing that the device of various functions is regarded
For that not only can be the software module of implementation method but also can be the structure in hardware component.
Device, module or unit that above-described embodiment is illustrated, can specifically be realized, Huo Zheyou by computer chip or entity
Product with certain function is realized.It is a kind of typically to realize that equipment is computer.Specifically, computer for example can be individual
People's computer, laptop computer, cell phone, camera phone, smart phone, personal digital assistant, media player, navigation
Any equipment in equipment, electronic mail equipment, game console, tablet PC, wearable device or these equipment
Combination.
For convenience of description, it is divided into various units during description apparatus above with function to describe respectively.Certainly, this is being implemented
The function of each unit can be realized in same or multiple softwares and/or hardware during application.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, device or computer program
Product.Therefore, the present invention can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the present invention can be used in one or more computers for wherein including computer usable program code
The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (device) and computer program product
Figure and/or block diagram are described.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which is produced, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved
State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus
Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein
Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability
Comprising so that process, method, commodity or equipment including a series of key elements are not only including those key elements, but also wrap
Include other key elements being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described
Also there is other identical element in process, method, commodity or the equipment of element.
It will be understood by those skilled in the art that embodiments herein can be provided as method, device or computer program product.
Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Form.Deposited moreover, the application can use to can use in one or more computers for wherein including computer usable program code
The shape for the computer program product that storage media is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The application can be described in the general context of computer executable instructions, such as program
Module.Usually, program module includes performing particular task or realizes routine, program, object, the group of particular abstract data type
Part, data structure etc..The application can also be put into practice in a distributed computing environment, in these DCEs, by
Remote processing devices connected by communication network perform task.In a distributed computing environment, program module can be with
Positioned at including in the local and remote computer-readable storage medium including storage device.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment
Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.Especially for device and
For client, server and system embodiment, because it is substantially similar to embodiment of the method, so the comparison of description is simple
Single, the relevent part can refer to the partial explaination of embodiments of method.
Embodiments herein is the foregoing is only, the application is not limited to.For those skilled in the art
For, the application can have various modifications and variations.It is all any modifications made within spirit herein and principle, equivalent
Replace, improve etc., it should be included within the scope of claims hereof.