CN107294999A - Information Authentication processing method, device, system, client and server - Google Patents

Information Authentication processing method, device, system, client and server Download PDF

Info

Publication number
CN107294999A
CN107294999A CN201710561365.5A CN201710561365A CN107294999A CN 107294999 A CN107294999 A CN 107294999A CN 201710561365 A CN201710561365 A CN 201710561365A CN 107294999 A CN107294999 A CN 107294999A
Authority
CN
China
Prior art keywords
checking
information
result
checking request
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710561365.5A
Other languages
Chinese (zh)
Other versions
CN107294999B (en
Inventor
贺三元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201710561365.5A priority Critical patent/CN107294999B/en
Priority to CN202010492879.1A priority patent/CN111835714A/en
Publication of CN107294999A publication Critical patent/CN107294999A/en
Priority to TW107116265A priority patent/TWI752228B/en
Priority to PCT/CN2018/094784 priority patent/WO2019011186A1/en
Application granted granted Critical
Publication of CN107294999B publication Critical patent/CN107294999B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the present application discloses a kind of Information Authentication processing method, device, system, client and server.This method includes:First client, which is provided, includes the operation interface in default trigger action region, receives checking request of the user in default trigger action area triggering, and send to first server;First server by checking request send to second server;Second server sends the checking information corresponding to checking request to second client associated with the user identity information corresponding to checking request;Checking information is pushed to user by the second client, determines the result to the verification process operation of checking information based on user, the result is sent to second server;Second server sends the result to first server;First server handles the checking request of user based on the result.Using the embodiment of the present application, the efficiency and convenience of Information Authentication can be improved, it is ensured that user's uses safety, improvement Consumer's Experience.

Description

Information Authentication processing method, device, system, client and server
Technical field
The application is related to Internet technical field, more particularly to a kind of Information Authentication processing method, device, system, client End and server.
Background technology
With the high speed development of Internet technology, what internet also faced while the every field of people's life is come into Safety problem, the Internet service website that the people such as some social network sites, electric business, the Internet bank commonly use is often except reply people Outside normal use, in addition it is also necessary to tackle some as rubbish registration, the transaction of malice decryption, brush ticket, hostile network place an order, sent out Cloth is poured water the uses of the malicious purposes such as advertising message.Therefore, if effective safety can not be taken Internet service website to arrange Apply, the user that normally uses will be had a strong impact on, huge loss is brought to the user normally used.
In the prior art in order to ensure that Internet service website user's uses safety, often adopted at User logs in website Current user is distinguished with the mode for issuing identifying code to be normal users or has the computer of malicious purposes.Specifically, logical Often an identifying code picture is issued from server to client (in order to improve the identification difficulty of identifying code picture, in the prior art The checking character string in identifying code picture is generally handled using the mode such as word deformation and Various Complex combinations of patterns), visitor Family end, which is shown, to be verified character string and inputs client, only user just in the identifying code picture, the user discrimination identifying code picture True input validation character string could pass through checking.
But in the prior art using in the method for identifying code, due to the development of various image recognition technologys, even if complicated Identifying code still can be cracked automatically, still there is larger safety problem;And because identifying code character string complexity is various, cause User is difficult to recognize identifying code character string, and user is frequently necessary to repeat to verify or change identifying code picture, causes use The inconvenience at family.
The content of the invention
The purpose of the embodiment of the present application is to provide a kind of Information Authentication processing method, device, system, client and service Device, can improve the efficiency and convenience of Information Authentication, it is ensured that user's uses safety, improvement Consumer's Experience.
What the embodiment of the present application was realized in:
A kind of Information Authentication processing method, including:
First client, which is provided, includes the operation interface in default trigger action region, and the default trigger action region is used for Trigger the checking request that Information Authentication is carried out using default application;
First client receives checking request of the user in the default trigger action area triggering, by the checking request Send to first server;
The first server sends the checking request to the second server corresponding with the default application;
The second server by the checking information corresponding to the checking request received send to the checking The second associated client of the corresponding user identity information of request;
The checking information is pushed to the user by second client;
Second client determines the result based on the user to the verification process operation of the checking information, will The result is sent to the second server;
The second server sends the result to the first server;
Checking request of the first server based on the result processing user.
A kind of Information Authentication processing method, including:
There is provided includes the operation interface in default trigger action region, and the default trigger action region is used to trigger using pre- If application carries out the checking request of Information Authentication;
Receive checking request of the user in the triggering in the default trigger action region;
The checking request is sent to first server.
A kind of Information Authentication processing method, including:
Receive the checking request that first server is sent;
Checking information corresponding to the checking request is sent to the user corresponding to the checking request and identifies letter Second client of manner of breathing association;
Receive the verification process operation determination based on the user to the checking information that second client is sent The result;
The result is sent to the first server.
A kind of Information Authentication processing method, including:
The user for receiving the transmission of the first client is carrying out the default trigger action region of Information Authentication using default application The checking request of triggering;
The checking request is sent to second server;
Receive the result corresponding with the checking request that the second server is sent;
Checking request based on the result processing user.
A kind of Information Authentication processing method, including:
Receive the checking information that second server is sent;
The checking information is pushed to corresponding user;
The result is determined to the verification process operation of the checking information based on the user, the result is sent out Deliver to the second server.
A kind of Information Authentication processing method, including:
The user for receiving the transmission of the first client is carrying out the default trigger action region of Information Authentication using default application The checking request of triggering;
Checking information corresponding to the checking request is sent to the user corresponding to the checking request and identifies letter Second client of manner of breathing association;
Receive the verification process operation determination based on the user to the checking information that second client is sent The result;
Checking request based on the result processing user.
A kind of Information Authentication processing unit, including:
Operation interface provides module, includes the operation interface in default trigger action region, the default triggering for providing Operating area is used to trigger the checking request for carrying out Information Authentication using default application;
First checking request receiving module, please in the checking of the triggering in the default trigger action region for receiving user Ask;
First checking request sending module, for the checking request to be sent to first server.
A kind of Information Authentication processing unit, including:
Second checking request receiving module, is believed for receiving the user that the first client is sent using default application Cease the checking request of the default trigger action area triggering of checking;
Second checking request sending module, for the checking request to be sent to second server;
First the result receiving module, for receiving the corresponding with the checking request of the second server transmission The result;
First checking request processing module, for the checking request based on the result processing user.
A kind of Information Authentication processing unit, including:
3rd checking request receiving module, the checking request for receiving first server transmission;
First checking information sending module, is tested for the checking information corresponding to the checking request to be sent to described Demonstrate,prove the second client that the user identity information corresponding to request is associated;
Second the result receiving module, for receiving being tested based on the user described for the second client transmission Demonstrate,prove the result that the verification process operation of information is determined;
First the result sending module, for the result to be sent to the first server.
A kind of Information Authentication processing unit, including:
Checking information receiving module, the checking information for receiving second server transmission;
Checking information pushing module, for the checking information to be pushed into corresponding user;
The result determining module, for determining checking to the verification process operation of the checking information based on the user As a result;
Second the result sending module, for the result to be sent to the second server.
A kind of Information Authentication processing unit, including:
4th checking request receiving module, is believed for receiving the user that the first client is sent using default application Cease the checking request of the default trigger action area triggering of checking;
Second checking information sending module, is tested for the checking information corresponding to the checking request to be sent to described Demonstrate,prove the second client that the user identity information corresponding to request is associated;
3rd the result receiving module, for receiving being tested based on the user described for the second client transmission Demonstrate,prove the result that the verification process operation of information is determined;
Second checking request processing module, for the checking request based on the result processing user.
A kind of Information Authentication handles client, including processor and memory, and the memory storage is by the processor The computer program instructions of execution, the computer program instructions include:
There is provided includes the operation interface in default trigger action region, and the default trigger action region is used to trigger using pre- If application carries out the checking request of Information Authentication;
Checking request of the user in the triggering in the default trigger action region is received, the checking request is sent to the One server.
A kind of Information Authentication processing server, including processor and memory, the memory storage is by the processor The computer program instructions of execution, the computer program instructions include:
The user for receiving the transmission of the first client is carrying out the default trigger action region of Information Authentication using default application The checking request of triggering;
The checking request is sent to second server;
Receive the result corresponding with the checking request that the second server is sent;
Checking request based on the result processing user.
A kind of Information Authentication processing server, including processor and memory, the memory storage is by the processor The computer program instructions of execution, the computer program instructions include:
Receive the checking request that first server is sent;
Checking information corresponding to the checking request is sent to the user corresponding to the checking request and identifies letter Second client of manner of breathing association;
Receive the verification process operation determination based on the user to the checking information that second client is sent The result;
The result is sent to the first server.
A kind of Information Authentication handles client, including processor and memory, and the memory storage is by the processor The computer program instructions of execution, the computer program instructions include:
Receive the checking information that second server is sent;
The checking information is pushed to corresponding user;
The result is determined to the verification process operation of the checking information based on the user, the result is sent out Deliver to the second server.
A kind of Information Authentication processing server, including processor and memory, the memory storage is by the processor The computer program instructions of execution, the computer program instructions include:
The user for receiving the transmission of the first client is carrying out the default trigger action region of Information Authentication using default application The checking request of triggering;
Checking information corresponding to the checking request is sent to the user corresponding to the checking request and identifies letter Second client of manner of breathing association;
Receive the verification process operation determination based on the user to the checking information that second client is sent The result;
Checking request based on the result processing user.
A kind of Information Authentication processing system, including:
First client, includes the operation interface in default trigger action region, the default trigger action area for providing Domain is used to trigger the checking request for carrying out Information Authentication using default application;And for receiving user in the default triggering behaviour Make the checking request of area triggering, the checking request is sent to first server;
First server, for the checking request to be sent to the second server corresponding with the default application, And the result for being sent based on the second server handles the checking request of the user;
Second server, for by the checking information corresponding to the checking request received send to the checking The second associated client of the corresponding user identity information of request, and for by the result of the second client feedback Send to the first server;
Second client, for the checking information to be pushed into the user;And for based on the user to institute The verification process operation for stating checking information determines the result, and the result is sent to the second server.
A kind of Information Authentication processing system, including:
First client, includes the operation interface in default trigger action region, the default trigger action area for providing Domain is used to trigger the checking request for carrying out Information Authentication using default application;And for receiving user in the default triggering behaviour Make the checking request of area triggering, the checking request is sent to server;
Server, for by the checking information corresponding to the checking request received send to the checking request The second associated client of corresponding user identity information, and at the result that is sent based on the second client Manage the checking request of the user;
Second client, for the checking information to be pushed into the user;And for based on the user to institute The verification process operation for stating checking information determines the result, and the result is sent to the server.
The technical scheme provided from above the embodiment of the present application, the embodiment of the present application in operation interface by providing use In predetermined registration operation region of the triggering using default application progress Information Authentication, it can make user just can be by shirtsleeve operation Second client completes the Information Authentication to first client, without recognizing and inputting complicated checking character string.With showing There is technology to compare, the technical scheme provided using the embodiment of the present application can solve the rubbish note that Internet service website runs into Volume, the transaction of malice decryption, brush ticket, hostile network place an order, issue the problem of malice such as advertising message of pouring water is used, and are ensureing First client improves the efficiency and convenience of Information Authentication, improves Consumer's Experience using under the basis of safety.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments described in application, for those of ordinary skill in the art, on the premise of not paying creative work, Other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the embodiment for the Information Authentication processing method that the application is provided;
Fig. 2 is the operation interface one including presetting trigger action region that the first client described in the embodiment of the present application is provided Plant the schematic diagram of embodiment;
Fig. 3 is a kind of interface schematic diagram for embodiment that the checking information is pushed to user that the application is provided;
Fig. 4 is the schematic flow sheet of another embodiment for the Information Authentication processing method that the application is provided;
Fig. 5 is the schematic flow sheet of another embodiment for the Information Authentication processing method that the application is provided;
Fig. 6 is the schematic flow sheet of another embodiment for the Information Authentication processing method that the application is provided;
Fig. 7 is the schematic flow sheet of another embodiment for the Information Authentication processing method that the application is provided;
Fig. 8 is the schematic flow sheet of another embodiment for the Information Authentication processing method that the application is provided;
Fig. 9 is a kind of structural representation of the embodiment for the Information Authentication processing unit that the application is provided;
Figure 10 is the structural representation of another embodiment for the Information Authentication processing unit that the application is provided;
Figure 11 is the structural representation of another embodiment for the Information Authentication processing unit that the application is provided;
Figure 12 is the structural representation of another embodiment for the Information Authentication processing unit that the application is provided;
Figure 13 is the structural representation of another embodiment for the Information Authentication processing unit that the application is provided.
Embodiment
The embodiment of the present application provides a kind of Information Authentication processing method, device, system, client and server.
In order that those skilled in the art more fully understand the technical scheme in the application, it is real below in conjunction with the application The accompanying drawing in example is applied, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described implementation Example only some embodiments of the present application, rather than whole embodiments.Based on the embodiment in the application, this area is common The every other embodiment that technical staff is obtained under the premise of creative work is not made, should all belong to the application protection Scope.
Hereinafter implementing for the embodiment of the present application is described in detail with several specific examples.
Introduce a kind of embodiment of Information Authentication processing method of the application first below.Fig. 1 is the information that the application is provided A kind of schematic flow sheet of embodiment of authentication processing method, this application provides the behaviour of the method as described in embodiment or flow chart Make step, but can include more or less operating procedures based on routine or without performing creative labour.Arranged in embodiment The step of act is sequentially only a kind of mode in numerous step execution sequences, and unique execution sequence is not represented.In practice System or during client production execution, can perform or parallel perform according to embodiment or method shown in the drawings order (environment of such as parallel processor or multiple threads).Specifically as shown in figure 1, methods described can include:
S1:First client, which is provided, includes the operation interface in default trigger action region, the default trigger action region The checking request of Information Authentication is carried out using default application for triggering.
First client described in the embodiment of the present application, which can include any one, can provide the user certain service Client.
In actual applications, when user is needed before certain client carries out associative operation, generally require first to be logged in, In login process, in order to ensure that (what is currently logged in is normal users to the safety that uses of user, rather than has malicious purposes Computer), the first client in the embodiment of the present application, which can be provided, includes the operation interface in default trigger action region, institute State default trigger action region be used for trigger utilize the default checking request for applying progress Information Authentication.So user can be in institute State the subsequent operation that default trigger action area triggering carries out Information Authentication using default application.
Specifically, the checking request that the triggering carries out Information Authentication using default application can be by clicking on, sliding institute The modes such as default trigger action region are stated to trigger, but the embodiment of the present application is not limited with modes such as above-mentioned click, slips.
In a specific embodiment, provided as shown in Fig. 2 Fig. 2 is the first client described in the embodiment of the present application A kind of schematic diagram of embodiment of operation interface including presetting trigger action region.It can be seen in fig. 2 that the operation interface can be with It is a kind of to include the login interface in default trigger action region, including user name input frame, Password Input frame and default triggering Operating area (presets button of the trigger action region for " being verified with application A ") described in Fig. 2.When user is needed by user name During with the first client of password login, user input username and password after, can click directly on application A verify by Button can just carry out the checking request of Information Authentication in triggering using application A;Certainly here while checking request is triggered, The checking request of username and password can be triggered, when the result of two checking requests is all successfully, user can be straight Connect login first client.
Furthermore, it is necessary to which explanation, includes the operation interface in default trigger action region simultaneously described in the embodiment of the present application Above-mentioned login interface is not limited only to, in actual applications, the interface of other forms can also be included, it may for example comprise Yong Hubiao Know the interface in information input frame and the default trigger action region etc., the embodiment of the present application is not limited with above-mentioned.
It is not limited in addition, presetting trigger action region described in the embodiment of the present application certainly in the form of above-mentioned button, example It such as can directly be the Password Input frame in Fig. 2, i.e., can just trigger and be believed with using A after username and password is inputted Cease the checking request of checking.
S2:First client receives checking request of the user in the default trigger action area triggering, by the checking Request is sent to first server.
In actual applications, checking is triggered when user is operated in the default trigger action region by click slip etc. After request, first client is received after the checking request, can be sent the checking request to first service Device.Specifically, the first server, can be the server corresponding with first client.For example, when described first Client is to apply A clients, and the first server can be to apply A servers.
Specifically, the embodiment of the present application can be believed using default application in the default trigger action area triggering The information such as user identity information, the default application, first client can be included by ceasing the checking request of checking.
Specifically, passing through the default application message in the checking request, it may be determined that need to be used for carrying out Information Authentication Application.
Specifically, the user identity information is used as between first client and second client Association identification.Subsequently, it can determine that needs are used for into row information by the user identity information in the checking request The corresponding specific client end of the application of checking.In actual applications, the user identity information can be user name, cell-phone number The information that code etc. can be identified as user.Application of first client described here with being used for carrying out Information Authentication is corresponding Client (the second client) can include identical user identity information.
Specifically, the first client-side information in the checking request can need to be verified for helping user to understand Application message.
S3:The first server sends the checking request to the second service corresponding with the default application Device.
Specifically, in the embodiment of the present application, after the first server receives checking request, can be tested described Card request is sent to the second server corresponding with the default application.Specifically, the second server can be described The server of default application, such as described default application is applies B, accordingly, and the second server can be application B services Device.
S4:Checking information corresponding to the checking request received is sent to described and tested by the second server Demonstrate,prove the second client that the user identity information corresponding to request is associated.
Further, after the second server receives checking request, by the checking request institute received Corresponding checking information is sent to second client associated with the user identity information corresponding to the checking request.
Specifically, the second client described in the embodiment of the present application can be corresponding with the second server, and can be with For the client of the default application.Second client can be that the information that meets beyond any first client is tested The client of card condition.It can enter specifically, a certain client meets described information verification condition including the client with needs Row information checking client (first client) have incidence relation (incidence relation can include the client with Need the client for carrying out Information Authentication that there are one or more identical user identity informations);It is preferred that, a certain client symbol Default standard can also be reached including the use safety of the client in itself by closing described information verification condition.
Specifically, the checking information can determine to need to the described first visitor according to the relevant information of the checking request The information that the relevant information at family end is verified.In a specific embodiment, the checking information can be:Your application A clients are logged in, and it is that you operate yourself that may I ask
In actual applications, second server is after checking request is received, it may appear that the second client is not online Situation, accordingly, in certain embodiments, is asked the checking information corresponding to the checking request is sent to the checking Ask before the second client that corresponding user identity information is associated, methods described can also include:
Whether inquiry second client associated with the user identity information corresponding to the checking request be online.
Second client specifically can be determined by the user identity information corresponding to the checking request here End, and then determine whether second client is online.
Further, when the result of above-mentioned inquiry is is, i.e., described second client is online, accordingly, can be direct Checking information corresponding to the checking request is sent to the user corresponding to the checking request and identified by execution step S4 The operation of the second associated client of information.
Further, when the result of above-mentioned inquiry is no, i.e., described second client is not online, accordingly, can obtain The logging device information of the second associated client is taken, is pushed and carried to corresponding equipment based on the logging device information Show information.
Specifically, the facility information when logging device information can be including the second client of User logs in.For example with Family last time logs in facility information during the second client, or user logs in the second client institute in nearest one month Information using most equipment etc..The physical address that can include equipment, the MDN corresponding to equipment of the information of the equipment (Mobile Directory Number, Mobile Directory Number) etc. can as device identification information.
Further, the prompt message that the equipment corresponding to the logging device information is pushed can include described second The login prompt information of client and/or the verification tip information of the checking information.The login prompt of second client Information can point out the information of the client of User logs in second;The verification tip information of the checking information can include will checking Information is prompted to user in certain form, and such as verified link (URL) adds the form of text prompt, specifically , for example:You have information to need checking, please click on following link and carry out Information Authentication https://yanzheng.com.Here User is clicked on after verified link, can directly be logged in corresponding second client and carried out Information Authentication, can also directly arrive Up to the details page of Information Authentication, Information Authentication is directly carried out.
Furthermore, it is necessary to explanation, above-mentioned logging device information and prompt message are only merely a kind of example, the application Example is not limited with above-mentioned.
S5:The checking information is pushed to the user by second client.
Further, after second client obtains checking information, the checking information can be pushed to user. As shown in figure 3, by by checking information exemplified by cell-phone customer terminal is pushed to user, Fig. 3 be the application provide by the checking Information is pushed to a kind of interface schematic diagram of embodiment of user.It is visible in Fig. 3, checking information is showed in the form of word User, and "Yes", two buttons of "No" are provided so that user confirms to checking information.
Furthermore, it is necessary to which a kind of explanation, the example in interface that the checking information is only pushed to user by Fig. 3 is described Checking information is not limited in above-mentioned written form, the mode that checking information confirms is also not limited to for user above-mentioned The mode of button, the embodiment of the present application is not limited above.
S6:Second client determines checking knot based on the user to the verification process operation of the checking information Really, the result is sent to the second server.
Specifically, after user is obtaining checking information, corresponding verification process can be carried out to checking information, it is described Second client can determine the result based on the user to the verification process operation of the checking information, and be tested described Card result is sent to the second server.
In a specific embodiment, the checking information can be pushed to the user's with reference to the second client Form, it is assumed that the checking information is pushed to the form of the user to need user by clicking on preset areas by the second client Domain to carry out checking information exemplified by verification process, described that the verification process of the checking information is operated really based on the user Determining the result can include:
Record clicking operation of the user in predeterminable area;
The result is determined based on the identification to the verification process result corresponding to the predeterminable area.
So that the predeterminable area is button as an example, the operation that default ACK button can be clicked on based on user determines to verify into The result of work(;And the result being proved to be successful is determined based on the operation that user clicks on default refusal button.
In another specific embodiment, it is assumed that the checking information is pushed to the shape of the user by the second client Formula for need user by record voice come to checking information carry out verification process exemplified by, it is described to be tested based on the user described The verification process operation of card information determines that the result can include:
Record voice messaging of the user to the verification process result of the checking information;
The result is determined based on the identification to the voice messaging.
By taking the checking information in Fig. 3 as an example, accordingly, when the voice messaging of user record is is, it may be determined that checking Successful the result;Conversely, when the voice messaging of user record is no, it may be determined that the result being proved to be successful
As can be seen here, the operation that user can be by simply clicking on or recording voice can just complete the checking of information, Without identification and the complicated checking character string of input, the efficiency and convenience of Information Authentication are substantially increased, user's body is improved Test.
S7:The second server sends the result to the first server.
Further, it is determined that after the result, the second server can send the result to institute First server is stated, so that first server carries out follow-up verification process.
S8:Checking request of the first server based on the result processing user.
In the embodiment of the present application, after the first server is verified result, the result can be based on Handle the checking request of the user.Specifically, the checking when the result when being proved to be successful, to determine the user please Hope for success work(;Conversely, when the result is authentication failed, determining the checking request authentication failed.
Further, exemplified by carrying out Information Authentication in login process, after checking request success, the first service Device can carry out the checking of username and password;Conversely, after checking request authentication failed, can refuse corresponding log in please Ask.
Furthermore, it is necessary to which explanation, first server described in the embodiment of the present application can be for not with the second server Same server, and it is corresponding with first client and second client respectively.In another embodiment, it is described First server can be same server with the second server, and can be with first client and second visitor Family end is corresponding.Accordingly, when the first server and the second server are same server, above- mentioned information checking The step S3 and S7 interacted between first server and second server, i.e., the first visitor can be omitted in the embodiment of processing method Family end directly can send checking request to server;Then, server can be right by the checking request received institute The checking information answered is sent to second client associated with the user identity information corresponding to the checking request, subsequently, Server can directly receive the result of the second client transmission, and based on the checking of the result processing user Request.
As can be seen here, a kind of embodiment of Information Authentication processing method of the application in operation interface by providing for triggering The predetermined registration operation region of Information Authentication is carried out using default application, can make user just can be in the second visitor by shirtsleeve operation Family end completes the Information Authentication to first client, without recognizing and inputting complicated checking character string.With prior art Compare, the technical scheme provided using the embodiment of the present application can solve rubbish registration, the malice that Internet service website runs into Decryption, brush ticket, hostile network transaction place an order, issue the problem of malice such as advertising message of pouring water is used, and are ensureing the first visitor The efficiency and convenience of Information Authentication are improved, improves Consumer's Experience using under the basis of safety in family end.
It is executive agent to consider first client, and the application provides another implementation of Information Authentication processing method Example, Fig. 4 is the schematic flow sheet of another embodiment for the Information Authentication processing method that the application is provided, and this application provides such as Method operating procedure described in embodiment or flow chart, but based on it is conventional or without performing creative labour can include it is more or Less operating procedure.The step of being enumerated in embodiment order is only a kind of mode in numerous step execution sequences, not generation The unique execution sequence of table., can be according to shown in embodiment or accompanying drawing when system or client production in practice is performed Method order perform or parallel perform (environment of such as parallel processor or multiple threads).Specifically such as Fig. 4 institutes Show, methods described can include:
S410:There is provided includes the operation interface in default trigger action region, and the default trigger action region is used to trigger The checking request of Information Authentication is carried out using default application.
S420:Receive checking request of the user in the triggering in the default trigger action region.
S430:The checking request is sent to first server.
As can be seen here, a kind of embodiment of Information Authentication processing method of the application in operation interface by providing for triggering The predetermined registration operation region of Information Authentication is carried out using default application, user can be made just to complete information by shirtsleeve operation Checking, without recognizing and inputting complicated checking character string.Compared with prior art, the technology provided using the embodiment of the present application Scheme can improve the efficiency and convenience of Information Authentication, improve user in the case where ensureing basis of first client using safety Experience.
It is executive agent to consider the first server, and the application provides another implementation of Information Authentication processing method Example, Fig. 5 is the schematic flow sheet of another embodiment for the Information Authentication processing method that the application is provided, and this application provides such as Method operating procedure described in embodiment or flow chart, but based on it is conventional or without performing creative labour can include it is more or Less operating procedure.The step of being enumerated in embodiment order is only a kind of mode in numerous step execution sequences, not generation The unique execution sequence of table., can be according to embodiment or side shown in the drawings when system or server in practice is performed Method order is performed or parallel execution (environment of such as parallel processor or multiple threads).Specifically as shown in figure 5, institute The method of stating can include:
S510:The user for receiving the transmission of the first client is carrying out the default trigger action of Information Authentication using default application The checking request of area triggering.
S520:The checking request is sent to second server.
S530:Receive the result corresponding with the checking request that the second server is sent.
S540:Checking request based on the result processing user.
Specifically, the checking request based on the result processing user can include:
When the result is to be proved to be successful, the checking request success of the user is determined.
When the result is authentication failed, the checking request authentication failed is determined.
As can be seen here, a kind of embodiment of Information Authentication processing method of the application by the user received by utilizing pre- If the checking request that application carries out the predetermined registration operation area triggering of Information Authentication is sent to second server, so that user is second The second client corresponding to server can just complete the Information Authentication to first client, nothing by shirtsleeve operation It need to recognize and input the checking character string of complexity.Compared with prior art, the technical scheme provided using the embodiment of the present application can In the case where ensureing basis of first client using safety, to improve the efficiency and convenience of Information Authentication, improve Consumer's Experience.
It is executive agent to consider the second server, and the application provides another implementation of Information Authentication processing method Example, Fig. 6 is the schematic flow sheet of another embodiment for the Information Authentication processing method that the application is provided, and this application provides such as Method operating procedure described in embodiment or flow chart, but based on it is conventional or without performing creative labour can include it is more or Less operating procedure.The step of being enumerated in embodiment order is only a kind of mode in numerous step execution sequences, not generation The unique execution sequence of table., can be according to embodiment or side shown in the drawings when system or server in practice is performed Method order is performed or parallel execution (environment of such as parallel processor or multiple threads).Specifically as shown in fig. 6, institute The method of stating can include:
S610:Receive the checking request that first server is sent.
S620:Checking information corresponding to the checking request is sent to the user corresponding to the checking request and marked Know the second associated client of information.
In actual applications, after checking request is received, it may appear that the not online situation of the second client, accordingly , in certain embodiments, by the checking information corresponding to the checking request send to corresponding to the checking request Associated the second client of user identity information before, methods described can also include:
Whether inquiry second client associated with the user identity information corresponding to the checking request be online.
Second client specifically can be determined by the user identity information corresponding to the checking request here End, and then determine whether second client is online.
Further, when the result of above-mentioned inquiry is is, i.e., described second client is online, accordingly, can be direct Checking information corresponding to the checking request is sent to the user corresponding to the checking request and marked by execution step S620 Know the operation of the second associated client of information.
Further, when the result of above-mentioned inquiry is no, i.e., described second client is not online, accordingly, can obtain The logging device information of the second associated client is taken, is pushed and carried to corresponding equipment based on the logging device information Show information.
Wherein, the login prompt information of the prompt message including second client and/or the checking information Verification tip information.
S630:Receive the verification process operation based on the user to the checking information that second client is sent The result of determination.
S640:The result is sent to the first server.
As can be seen here, a kind of embodiment of Information Authentication processing method of the application is by by the checking corresponding to checking request Information is sent to the second client, so that user can just be completed to the described first visitor in the second client by shirtsleeve operation The Information Authentication at family end, without recognizing and inputting complicated checking character string.Compared with prior art, the embodiment of the present application is utilized The technical scheme of offer can improve the efficiency and facility of Information Authentication in the case where ensureing basis of first client using safety Property, improve Consumer's Experience.
It is executive agent to consider second client, and the application provides another implementation of Information Authentication processing method Example, Fig. 7 is the schematic flow sheet of another embodiment for the Information Authentication processing method that the application is provided, and this application provides such as Method operating procedure described in embodiment or flow chart, but based on it is conventional or without performing creative labour can include it is more or Less operating procedure.The step of being enumerated in embodiment order is only a kind of mode in numerous step execution sequences, not generation The unique execution sequence of table., can be according to embodiment or side shown in the drawings when system or server in practice is performed Method order is performed or parallel execution (environment of such as parallel processor or multiple threads).Specifically as shown in fig. 7, institute The method of stating can include:
S710:Receive the checking information that second server is sent.
S720:The checking information is pushed to corresponding user.
S730:The result is determined to the verification process operation of the checking information based on the user.
It is described that the verification process operation determination of the checking information is tested based on the user in a specific embodiment Card result can include:
Record clicking operation of the user in predeterminable area;
The result is determined based on the identification to the verification process result corresponding to the predeterminable area.
It is described that the verification process of the checking information is operated really based on the user in another specific embodiment Determining the result includes:
Record voice messaging of the user to the verification process result of the checking information;
The result is determined based on the identification to the voice messaging.
S740:The result is sent to the second server.
As can be seen here, a kind of embodiment of Information Authentication processing method of the application is by the way that the checking letter of the first client is pushed away Give user, user is just completed the Information Authentication to first client by shirtsleeve operation, without identification and Input complicated checking character string.Compared with prior art, the technical scheme provided using the embodiment of the present application can ensure First client improves the efficiency and convenience of Information Authentication, improves Consumer's Experience using under the basis of safety.
In the case that the first server and the second server are same server, it is considered to which server is execution Main body, the application provides another embodiment of Information Authentication processing method, and Fig. 8 is the Information Authentication processing side that the application is provided The schematic flow sheet of another embodiment of method, this application provides the method operating procedure as described in embodiment or flow chart, But it can include more or less operating procedures based on routine or without performing creative labour.The step of being enumerated in embodiment Order is only a kind of mode in numerous step execution sequences, and unique execution sequence is not represented.System in practice or When server is performed, it can be performed according to embodiment or method shown in the drawings order or parallel execution (such as parallel place Manage the environment of device or multiple threads).Specifically as shown in figure 8, methods described can include:
S810:The user for receiving the transmission of the first client is carrying out the default trigger action of Information Authentication using default application The checking request of area triggering.
S820:Checking information corresponding to the checking request is sent to the user corresponding to the checking request and marked Know the second associated client of information.
In actual applications, after checking request is received, it may appear that the not online situation of the second client, accordingly , in certain embodiments, by the checking information corresponding to the checking request send to corresponding to the checking request Associated the second client of user identity information before, methods described can also include:
Whether inquiry second client associated with the user identity information corresponding to the checking request be online.
Second client specifically can be determined by the user identity information corresponding to the checking request here End, and then determine whether second client is online.
Further, when the result of above-mentioned inquiry is is, i.e., described second client is online, accordingly, can be direct Checking information corresponding to the checking request is sent to the user corresponding to the checking request and marked by execution step S820 Know the operation of the second associated client of information.
Further, when the result of above-mentioned inquiry is no, i.e., described second client is not online, accordingly, can obtain The logging device information of the second associated client is taken, is pushed and carried to corresponding equipment based on the logging device information Show information.
Wherein, the login prompt information of the prompt message including second client and/or the checking information Verification tip information.
S830:Receive the verification process operation based on the user to the checking information that second client is sent The result of determination.
S840:Checking request based on the result processing user.
Specifically, the checking request based on the result processing user can include:
When the result is to be proved to be successful, the checking request success of the user is determined.
When the result is authentication failed, the checking request authentication failed is determined.
As can be seen here, a kind of embodiment of Information Authentication processing method of the application by the user received by utilizing pre- If the checking request that application carries out the predetermined registration operation area triggering of Information Authentication is sent to the second client, so that user is second Client can just complete the Information Authentication to first client by shirtsleeve operation, complicated without recognizing and inputting Verify character string.Compared with prior art, the technical scheme provided using the embodiment of the present application can ensure the first client Using under the basis of safety, the efficiency and convenience of Information Authentication are improved, improves Consumer's Experience.
On the other hand the application also provides a kind of Information Authentication processing unit, and Fig. 9 is at the Information Authentication that the application is provided A kind of structural representation of embodiment of device is managed, as shown in figure 9, described device 900 can include:
Operation interface provides module 910, may be used to provide the operation interface including presetting trigger action region, described pre- If trigger action region is used to trigger the checking request for carrying out Information Authentication using default application;
First checking request receiving module 920, can be used for receiving triggering of the user in the default trigger action region Checking request;
First checking request sending module 930, can be used for sending the checking request to first server.
On the other hand the application also provides a kind of another embodiment of Information Authentication processing unit, and Figure 10 is that the application is provided The structural representation of another embodiment of Information Authentication processing unit, as shown in Figure 10, described device 1000 can include:
Second checking request receiving module 1010, the user that can be used for receiving the transmission of the first client is answered using default With the checking request for the default trigger action area triggering for carrying out Information Authentication;
Second checking request sending module 1020, can be used for sending the checking request to second server;
First the result receiving module 1030, can be used for receiving asking with the checking for the second server transmission Seek corresponding the result;
First checking request processing module 1040, can be used for the checking based on the result processing user please Ask.
In another embodiment, the first checking request processing module 1040 can include:
First checking request processing unit, can be used for, when the result is to be proved to be successful, determining the user Checking request success.
In another embodiment, the first checking request processing module 1040 can include:
Second checking request processing unit, can be used for, when the result is authentication failed, determining the checking Requests verification fails.
On the other hand the application also provides a kind of another embodiment of Information Authentication processing unit, and Figure 11 is that the application is provided The structural representation of another embodiment of Information Authentication processing unit, as shown in figure 11, described device 1100 can include:
3rd checking request receiving module 1110, can be used for receiving the checking request that first server is sent;
First checking information sending module 1120, can be used for by the checking information corresponding to the checking request send to Second client associated with the user identity information corresponding to the checking request;
Second the result receiving module 1130, can be used for receiving that second client sends based on the user The result that verification process operation to the checking information is determined;
First the result sending module 1140, can be used for sending the result to the first server.
In another embodiment, by the checking information corresponding to the checking request send to the checking request institute Before the second associated client of corresponding user identity information, described device 1100 can also include:
First enquiry module, can be used for inquiry associated with the user identity information corresponding to the checking request the Whether two clients are online;
First performs jump module, can be used for when the result that first enquiry module is inquired about is to be, described first Checking information sending module perform by the checking information corresponding to the checking request send to corresponding to the checking request Associated the second client of user identity information operation.
In another embodiment, described device 1100 can also include:
First logging device data obtaining module, can be used for when the result that first enquiry module is inquired about is no, Obtain the logging device information of the second associated client;
First prompt message pushing module, can be used for being pushed to corresponding equipment based on the logging device information and points out Information;
Wherein, the login prompt information of the prompt message including second client and/or the checking information Verification tip information.
On the other hand the application also provides a kind of another embodiment of Information Authentication processing unit, and Figure 12 is that the application is provided The structural representation of another embodiment of Information Authentication processing unit, as shown in figure 12, described device 1200 can include:
Checking information receiving module 1210, can be used for receiving the checking information that second server is sent;
Checking information pushing module 1220, can be used for the checking information being pushed to corresponding user;
The result determining module 1230, can be used for operating the verification process of the checking information based on the user Determine the result;
Second the result sending module 1240, can be used for sending the result to the second server.
In another embodiment, the result determining module 1230 can include:
First recording unit, can be used for recording clicking operation of the user in predeterminable area;
First the result determining unit, can be used for based on to the verification process result corresponding to the predeterminable area Identification determines the result.
The result determining module 1230 can include:
Second recording unit, can be used for recording voice letter of the user to the verification process result of the checking information Breath;
Second the result determining unit, can be used for determining the result based on the identification to the voice messaging.
On the other hand the application also provides a kind of another embodiment of Information Authentication processing unit, and Figure 13 is that the application is provided The structural representation of another embodiment of Information Authentication processing unit, as shown in figure 13, described device 1300 can include:
4th checking request receiving module 1310, the user that can be used for receiving the transmission of the first client is answered using default With the checking request for the default trigger action area triggering for carrying out Information Authentication;
Second checking information sending module 1320, can be used for by the checking information corresponding to the checking request send to Second client associated with the user identity information corresponding to the checking request;
3rd the result receiving module 1330, can be used for receiving that second client sends based on the user The result that verification process operation to the checking information is determined;
Second checking request processing module 1340, can be used for the checking based on the result processing user please Ask.
In another embodiment, by the checking information corresponding to the checking request send to the checking request institute Before the second associated client of corresponding user identity information, described device 1300 can also include:
Second enquiry module, can be used for inquiry associated with the user identity information corresponding to the checking request the Whether two clients are online;
Second performs jump module, can be used for when the result that second enquiry module is inquired about is to be, described second Checking information sending module perform by the checking information corresponding to the checking request send to corresponding to the checking request Associated the second client of user identity information operation.
In another embodiment, described device 1300 can also include:
Second logging device data obtaining module, can be used for when the result that second enquiry module is inquired about is no, Obtain the logging device information of the second associated client;
Second prompt message pushing module, can be used for being pushed to corresponding equipment based on the logging device information and points out Information;
Wherein, the login prompt information of the prompt message including second client and/or the checking information Verification tip information.
In another embodiment, the second checking request processing module 1340 can include:
3rd checking request processing unit, can be used for, when the result is to be proved to be successful, determining the user Checking request success.
In another embodiment, the second checking request processing module 1340 can include:
4th checking request processing unit, can be used for, when the result is authentication failed, determining the checking Requests verification fails.
On the other hand the application also provides a kind of Information Authentication processing client, including processor and memory, described to deposit Reservoir stores the computer program instructions by the computing device, and the computer program instructions can include:
There is provided includes the operation interface in default trigger action region, and the default trigger action region is used to trigger using pre- If application carries out the checking request of Information Authentication;
Checking request of the user in the triggering in the default trigger action region is received, the checking request is sent to the One server.
On the other hand the application also provides a kind of Information Authentication processing server, including processor and memory, described to deposit Reservoir stores the computer program instructions by the computing device, and the computer program instructions can include:
The user for receiving the transmission of the first client is carrying out the default trigger action region of Information Authentication using default application The checking request of triggering;
The checking request is sent to second server;
Receive the result corresponding with the checking request that the second server is sent;
Checking request based on the result processing user.
In another embodiment, the checking request based on the result processing user can include:
When the result is to be proved to be successful, the checking request success of the user is determined.
In another embodiment, the checking request based on the result processing user can include:
When the result is authentication failed, the checking request authentication failed is determined.
The application also provides a kind of another embodiment of Information Authentication processing server, including processor and memory, described Memory storage is by the computer program instructions of the computing device, and the computer program instructions can include:
Receive the checking request that first server is sent;
Checking information corresponding to the checking request is sent to the user corresponding to the checking request and identifies letter Second client of manner of breathing association;
Receive the verification process operation determination based on the user to the checking information that second client is sent The result;
The result is sent to the first server.
In another embodiment, by the checking information corresponding to the checking request send to the checking request institute Before the second associated client of corresponding user identity information, the computer program instructions can also include:
Whether inquiry second client associated with the user identity information corresponding to the checking request be online;
When inquiry result for be when, perform by the checking information corresponding to the checking request send to the checking The operation of the second associated client of the corresponding user identity information of request.
In another embodiment, the computer program instructions can also include:
When the result of inquiry is no, the logging device information of the second associated client is obtained, based on described Logging device information pushes prompt message to corresponding equipment;
Wherein, the login prompt information of the prompt message including second client and/or the checking information Verification tip information.
On the other hand the application also provides a kind of Information Authentication processing another embodiment of client, including processor and storage Device, the memory storage is by the computer program instructions of the computing device, and the computer program instructions can include:
Receive the checking information that second server is sent;
The checking information is pushed to corresponding user;
The result is determined to the verification process operation of the checking information based on the user, the result is sent out Deliver to the second server.
It is described that checking knot is determined to the verification process operation of the checking information based on the user in another embodiment Fruit can include:
Record clicking operation of the user in predeterminable area;
The result is determined based on the identification to the verification process result corresponding to the predeterminable area.
It is described that checking knot is determined to the verification process operation of the checking information based on the user in another embodiment Fruit can include:
Record voice messaging of the user to the verification process result of the checking information;
The result is determined based on the identification to the voice messaging.
The application also provides a kind of another embodiment of Information Authentication processing server, including processor and memory, described Memory storage is by the computer program instructions of the computing device, and the computer program instructions include:
The user for receiving the transmission of the first client is carrying out the default trigger action region of Information Authentication using default application The checking request of triggering;
Checking information corresponding to the checking request is sent to the user corresponding to the checking request and identifies letter Second client of manner of breathing association;
Receive the verification process operation determination based on the user to the checking information that second client is sent The result;
Checking request based on the result processing user.
In another embodiment, by the checking information corresponding to the checking request send to the checking request institute Before the second associated client of corresponding user identity information, the computer program instructions can also include:
Whether inquiry second client associated with the user identity information corresponding to the checking request be online;
When inquiry result for be when, perform by the checking information corresponding to the checking request send to the checking The operation of the second associated client of the corresponding user identity information of request.
In another embodiment, the computer program instructions can also include:
When the result of inquiry is no, the logging device information of the second associated client is obtained, based on described Logging device information pushes prompt message to corresponding equipment;
Wherein, the login prompt information of the prompt message including second client and/or the checking information Verification tip information.
In another embodiment, the checking request based on the result processing user can include:
When the result is to be proved to be successful, the checking request success of the user is determined.
In another embodiment, the checking request based on the result processing user can include:
When the result is authentication failed, the checking request authentication failed is determined.
Specifically, in the embodiment of the present application, described processor can include central processing unit (CPU), naturally it is also possible to Including other single-chip microcomputer, logic gates, integrated circuits with logic processing capability etc., or its is appropriately combined.It is described to deposit Reservoir can be including nonvolatile memory etc..
On the other hand the application also provides a kind of Information Authentication processing system, including:
First client, includes the operation interface in default trigger action region, the default trigger action area for providing Domain is used to trigger the checking request for carrying out Information Authentication using default application;And for receiving user in the default triggering behaviour Make the checking request of area triggering, the checking request is sent to first server;
First server, for the checking request to be sent to the second server corresponding with the default application, And the result for being sent based on the second server handles the checking request of the user.
Second server, for by the checking information corresponding to the checking request received send to the checking The second associated client of the corresponding user identity information of request, and for by the result of the second client feedback Send to the first server;
Second client, for the checking information to be pushed into the user;And for based on the user to institute The verification process operation for stating checking information determines the result, and the result is sent to the second server.
The application also provides a kind of another embodiment of Information Authentication processing system, including:
First client, includes the operation interface in default trigger action region, the default trigger action area for providing Domain is used to trigger the checking request for carrying out Information Authentication using default application;And for receiving user in the default triggering behaviour Make the checking request of area triggering, the checking request is sent to server;
Server, for by the checking information corresponding to the checking request received send to the checking request The second associated client of corresponding user identity information, and at the result that is sent based on the second client Manage the checking request of the user.
Second client, for the checking information to be pushed into the user;And for based on the user to institute The verification process operation for stating checking information determines the result, and the result is sent to the server.
As can be seen here, the embodiment of a kind of Information Authentication processing method of the application, device, system, client or server The predetermined registration operation region for being carried out Information Authentication using default application for triggering is provided in operation interface, user can be made to pass through letter Single operation can just complete the Information Authentication to first client in the second client, complicated without recognizing and inputting Verify character string.Compared with prior art, the technical scheme provided using the embodiment of the present application can solve Internet service net Rubbish registration that station runs into, the transaction of malice decryption, brush ticket, hostile network, which place an order, issue advertising message of pouring water etc. maliciously makes With the problem of, ensure the first client using safety basis under, improve Information Authentication efficiency and convenience, improve user Experience.
In the 1990s, for a technology improvement can clearly distinguish be on hardware improvement (for example, Improvement to circuit structures such as diode, transistor, switches) or software on improvement (for the improvement of method flow).So And, with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit. Designer nearly all obtains corresponding hardware circuit by the way that improved method flow is programmed into hardware circuit.Cause This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, PLD (Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate Array, FPGA)) it is exactly such a integrated circuit, its logic function is determined by user to device programming.By designer Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, without asking chip maker to design and make Special IC chip.Moreover, nowadays, substitution manually makes IC chip, and this programming is also used instead mostly " patrols Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development, And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language (Hardware Description Language, HDL), and HDL is also not only a kind of, but have many kinds, such as ABEL (Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL (Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language) etc., VHDL (Very-High-Speed are most generally used at present Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also should This understands, it is only necessary to slightly programming in logic and be programmed into method flow in integrated circuit with above-mentioned several hardware description languages, The hardware circuit for realizing the logical method flow can be just readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing Device and storage can by the computer of the computer readable program code (such as software or firmware) of (micro-) computing device Read medium, gate, switch, application specific integrated circuit (Application Specific Integrated Circuit, ASIC), the form of programmable logic controller (PLC) and embedded microcontroller, the example of controller includes but is not limited to following microcontroller Device:ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, are deposited Memory controller is also implemented as a part for the control logic of memory.It is also known in the art that except with Pure computer readable program code mode is realized beyond controller, can be made completely by the way that method and step is carried out into programming in logic Obtain controller and come real in the form of gate, switch, application specific integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc. Existing identical function.Therefore this controller is considered a kind of hardware component, and various for realizing to including in it The device of function can also be considered as the structure in hardware component.Or even, can be by for realizing that the device of various functions is regarded For that not only can be the software module of implementation method but also can be the structure in hardware component.
Device, module or unit that above-described embodiment is illustrated, can specifically be realized, Huo Zheyou by computer chip or entity Product with certain function is realized.It is a kind of typically to realize that equipment is computer.Specifically, computer for example can be individual People's computer, laptop computer, cell phone, camera phone, smart phone, personal digital assistant, media player, navigation Any equipment in equipment, electronic mail equipment, game console, tablet PC, wearable device or these equipment Combination.
For convenience of description, it is divided into various units during description apparatus above with function to describe respectively.Certainly, this is being implemented The function of each unit can be realized in same or multiple softwares and/or hardware during application.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, device or computer program Product.Therefore, the present invention can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can be used in one or more computers for wherein including computer usable program code The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (device) and computer program product Figure and/or block diagram are described.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which is produced, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Comprising so that process, method, commodity or equipment including a series of key elements are not only including those key elements, but also wrap Include other key elements being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described Also there is other identical element in process, method, commodity or the equipment of element.
It will be understood by those skilled in the art that embodiments herein can be provided as method, device or computer program product. Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Form.Deposited moreover, the application can use to can use in one or more computers for wherein including computer usable program code The shape for the computer program product that storage media is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The application can be described in the general context of computer executable instructions, such as program Module.Usually, program module includes performing particular task or realizes routine, program, object, the group of particular abstract data type Part, data structure etc..The application can also be put into practice in a distributed computing environment, in these DCEs, by Remote processing devices connected by communication network perform task.In a distributed computing environment, program module can be with Positioned at including in the local and remote computer-readable storage medium including storage device.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.Especially for device and For client, server and system embodiment, because it is substantially similar to embodiment of the method, so the comparison of description is simple Single, the relevent part can refer to the partial explaination of embodiments of method.
Embodiments herein is the foregoing is only, the application is not limited to.For those skilled in the art For, the application can have various modifications and variations.It is all any modifications made within spirit herein and principle, equivalent Replace, improve etc., it should be included within the scope of claims hereof.

Claims (48)

1. a kind of Information Authentication processing method, including:
First client, which is provided, includes the operation interface in default trigger action region, and the default trigger action region is used to trigger The checking request of Information Authentication is carried out using default application;
First client receives user in the checking request of the default trigger action area triggering, and the checking request is sent To first server;
The first server sends the checking request to the second server corresponding with the default application;
The second server by the checking information corresponding to the checking request received send to the checking request The second associated client of corresponding user identity information;
The checking information is pushed to the user by second client;
Second client determines the result based on the user to the verification process operation of the checking information, will be described The result is sent to the second server;
The second server sends the result to the first server;
Checking request of the first server based on the result processing user.
2. a kind of Information Authentication processing method, including:
The operation interface for including presetting trigger action region is provided, the default trigger action region is used to trigger is answered using default With the checking request for carrying out Information Authentication;
Receive checking request of the user in the triggering in the default trigger action region;
The checking request is sent to first server.
3. a kind of Information Authentication processing method, including:
Receive the checking request that first server is sent;
By the checking information corresponding to the checking request send to the user identity information phase corresponding to the checking request Second client of association;
Receive the second client transmission operates what is determined to test the verification process of the checking information based on the user Demonstrate,prove result;
The result is sent to the first server.
4. method according to claim 3, wherein, by the checking information corresponding to the checking request send to institute State before the second client that the user identity information corresponding to checking request is associated, methods described also includes:
Whether inquiry second client associated with the user identity information corresponding to the checking request be online;
When inquiry result for be when, perform by the checking information corresponding to the checking request send to the checking request The operation of the second associated client of corresponding user identity information.
5. method according to claim 4, wherein, methods described also includes:
When the result of inquiry is no, the logging device information of the second associated client is obtained, is logged in based on described Facility information pushes prompt message to corresponding equipment;
Wherein, the prompt message includes the checking of the login prompt information and/or the checking information of second client Prompt message.
6. a kind of Information Authentication processing method, including:
The user for receiving the transmission of the first client is carrying out the default trigger action area triggering of Information Authentication using default application Checking request;
The checking request is sent to second server;
Receive the result corresponding with the checking request that the second server is sent;
Checking request based on the result processing user.
7. method according to claim 6, wherein, the checking request based on the result processing user Including:
When the result is to be proved to be successful, the checking request success of the user is determined.
8. method according to claim 6, wherein, the checking request based on the result processing user Including:
When the result is authentication failed, the checking request authentication failed is determined.
9. a kind of Information Authentication processing method, including:
Receive the checking information that second server is sent;
The checking information is pushed to corresponding user;
The result is determined to the verification process of checking information operation based on the user, by the result send to The second server.
10. method according to claim 9, wherein, the verification process based on the user to the checking information Operation determines that the result includes:
Record clicking operation of the user in predeterminable area;
The result is determined based on the identification to the verification process result corresponding to the predeterminable area.
11. method according to claim 9, wherein, the verification process based on the user to the checking information Operation determines that the result includes:
Record voice messaging of the user to the verification process result of the checking information;
The result is determined based on the identification to the voice messaging.
12. a kind of Information Authentication processing method, including:
The user for receiving the transmission of the first client is carrying out the default trigger action area triggering of Information Authentication using default application Checking request;
By the checking information corresponding to the checking request send to the user identity information phase corresponding to the checking request Second client of association;
Receive the second client transmission operates what is determined to test the verification process of the checking information based on the user Demonstrate,prove result;
Checking request based on the result processing user.
13. method according to claim 12, wherein, by the checking information corresponding to the checking request send to Before the second client that user identity information corresponding to the checking request is associated, methods described also includes:
Whether inquiry second client associated with the user identity information corresponding to the checking request be online;
When inquiry result for be when, perform by the checking information corresponding to the checking request send to the checking request The operation of the second associated client of corresponding user identity information.
14. method according to claim 13, wherein, methods described also includes:
When the result of inquiry is no, the logging device information of the second associated client is obtained, is logged in based on described Facility information pushes prompt message to corresponding equipment;
Wherein, the prompt message includes the checking of the login prompt information and/or the checking information of second client Prompt message.
15. the method according to claim 12 to 14 any one, wherein, it is described described based on the result processing The checking request of user includes:
When the result is to be proved to be successful, the checking request success of the user is determined.
16. the method according to claim 12 to 14 any one, wherein, it is described described based on the result processing The checking request of user includes:
When the result is authentication failed, the checking request authentication failed is determined.
17. a kind of Information Authentication processing unit, including:
Operation interface provides module, includes the operation interface in default trigger action region, the default trigger action for providing Region is used to trigger the checking request for carrying out Information Authentication using default application;
First checking request receiving module, for receiving checking request of the user in the triggering in the default trigger action region;
First checking request sending module, for the checking request to be sent to first server.
18. a kind of Information Authentication processing unit, including:
Second checking request receiving module, is tested for receiving the user that the first client is sent using default apply into row information The checking request of the default trigger action area triggering of card;
Second checking request sending module, for the checking request to be sent to second server;
First the result receiving module, corresponding with the checking request the testing for receiving the second server transmission Demonstrate,prove result;
First checking request processing module, for the checking request based on the result processing user.
19. device according to claim 18, wherein, the first checking request processing module includes:
First checking request processing unit, during for being proved to be successful when the result, determines that the checking of the user please Hope for success work(.
20. device according to claim 18, wherein, the first checking request processing module includes:
Second checking request processing unit, for when the result is authentication failed, determining the checking request checking Failure.
21. a kind of Information Authentication processing unit, including:
3rd checking request receiving module, the checking request for receiving first server transmission;
First checking information sending module, is asked for the checking information corresponding to the checking request to be sent to the checking The second client for asking corresponding user identity information associated;
Second the result receiving module, for receiving believing based on the user the checking for the second client transmission The result that the verification process operation of breath is determined;
First the result sending module, for the result to be sent to the first server.
22. device according to claim 21, wherein, by the checking information corresponding to the checking request send to Before the second client that user identity information corresponding to the checking request is associated, described device also includes:
First enquiry module, for inquiring about second client associated with the user identity information corresponding to the checking request It is whether online;
First performs jump module, during for being when the result that first enquiry module is inquired about, first checking information Sending module is performed to send the checking information corresponding to the checking request to the user corresponding to the checking request and marked Know the operation of the second associated client of information.
23. device according to claim 22, wherein, described device also includes:
First logging device data obtaining module, for when the result that first enquiry module is inquired about is no, obtaining described The logging device information of the second associated client;
First prompt message pushing module, for pushing prompt message to corresponding equipment based on the logging device information;
Wherein, the prompt message includes the checking of the login prompt information and/or the checking information of second client Prompt message.
24. a kind of Information Authentication processing unit, including:
Checking information receiving module, the checking information for receiving second server transmission;
Checking information pushing module, for the checking information to be pushed into corresponding user;
The result determining module, for determining checking knot to the verification process operation of the checking information based on the user Really;
Second the result sending module, for the result to be sent to the second server.
25. device according to claim 24, wherein, the result determining module includes:
First recording unit, for recording clicking operation of the user in predeterminable area;
First the result determining unit, for based on the identification determination to the verification process result corresponding to the predeterminable area The result.
26. device according to claim 24, wherein, the result determining module includes:
Second recording unit, for recording voice messaging of the user to the verification process result of the checking information;
Second the result determining unit, for determining the result based on the identification to the voice messaging.
27. a kind of Information Authentication processing unit, including:
4th checking request receiving module, is tested for receiving the user that the first client is sent using default apply into row information The checking request of the default trigger action area triggering of card;
Second checking information sending module, is asked for the checking information corresponding to the checking request to be sent to the checking The second client for asking corresponding user identity information associated;
3rd the result receiving module, for receiving believing based on the user the checking for the second client transmission The result that the verification process operation of breath is determined;
Second checking request processing module, for the checking request based on the result processing user.
28. device according to claim 27, wherein, by the checking information corresponding to the checking request send to Before the second client that user identity information corresponding to the checking request is associated, described device also includes:
Second enquiry module, for inquiring about second client associated with the user identity information corresponding to the checking request It is whether online;
Second performs jump module, during for being when the result that second enquiry module is inquired about, second checking information Sending module is performed to send the checking information corresponding to the checking request to the user corresponding to the checking request and marked Know the operation of the second associated client of information.
29. device according to claim 28, wherein, described device also includes:
Second logging device data obtaining module, for when the result that second enquiry module is inquired about is no, obtaining described The logging device information of the second associated client;
Second prompt message pushing module, for pushing prompt message to corresponding equipment based on the logging device information;
Wherein, the prompt message includes the checking of the login prompt information and/or the checking information of second client Prompt message.
30. the device according to claim 27 to 29 any one, wherein, the second checking request processing module bag Include:
3rd checking request processing unit, during for being proved to be successful when the result, determines that the checking of the user please Hope for success work(.
31. the device according to claim 27 to 29 any one, wherein, the second checking request processing module bag Include:
4th checking request processing unit, for when the result is authentication failed, determining the checking request checking Failure.
32. a kind of Information Authentication handles client, including processor and memory, the memory storage is held by the processor Capable computer program instructions, the computer program instructions include:
The operation interface for including presetting trigger action region is provided, the default trigger action region is used to trigger is answered using default With the checking request for carrying out Information Authentication;
Checking request of the user in the triggering in the default trigger action region is received, the checking request is sent to the first clothes Business device.
33. a kind of Information Authentication processing server, including processor and memory, the memory storage are held by the processor Capable computer program instructions, the computer program instructions include:
The user for receiving the transmission of the first client is carrying out the default trigger action area triggering of Information Authentication using default application Checking request;
The checking request is sent to second server;
Receive the result corresponding with the checking request that the second server is sent;
Checking request based on the result processing user.
34. server according to claim 33, wherein, the checking based on the result processing user Request includes:
When the result is to be proved to be successful, the checking request success of the user is determined.
35. server according to claim 33, wherein, the checking based on the result processing user Request includes:
When the result is authentication failed, the checking request authentication failed is determined.
36. a kind of Information Authentication processing server, including processor and memory, the memory storage are held by the processor Capable computer program instructions, the computer program instructions include:
Receive the checking request that first server is sent;
By the checking information corresponding to the checking request send to the user identity information phase corresponding to the checking request Second client of association;
Receive the second client transmission operates what is determined to test the verification process of the checking information based on the user Demonstrate,prove result;
The result is sent to the first server.
37. server according to claim 36, wherein, by the checking information corresponding to the checking request send to Before the second client associated with the user identity information corresponding to the checking request, the computer program instructions are also Including:
Whether inquiry second client associated with the user identity information corresponding to the checking request be online;
When inquiry result for be when, perform by the checking information corresponding to the checking request send to the checking request The operation of the second associated client of corresponding user identity information.
38. the server according to claim 37, wherein, the computer program instructions also include:
When the result of inquiry is no, the logging device information of the second associated client is obtained, is logged in based on described Facility information pushes prompt message to corresponding equipment;
Wherein, the prompt message includes the checking of the login prompt information and/or the checking information of second client Prompt message.
39. a kind of Information Authentication handles client, including processor and memory, the memory storage is held by the processor Capable computer program instructions, the computer program instructions include:
Receive the checking information that second server is sent;
The checking information is pushed to corresponding user;
The result is determined to the verification process of checking information operation based on the user, by the result send to The second server.
40. the client according to claim 39, wherein, it is described based on the user to the checking of the checking information at Reason operation determines that the result includes:
Record clicking operation of the user in predeterminable area;
The result is determined based on the identification to the verification process result corresponding to the predeterminable area.
41. the client according to claim 39, wherein, it is described based on the user to the checking of the checking information at Reason operation determines that the result includes:
Record voice messaging of the user to the verification process result of the checking information;
The result is determined based on the identification to the voice messaging.
42. a kind of Information Authentication processing server, including processor and memory, the memory storage are held by the processor Capable computer program instructions, the computer program instructions include:
The user for receiving the transmission of the first client is carrying out the default trigger action area triggering of Information Authentication using default application Checking request;
By the checking information corresponding to the checking request send to the user identity information phase corresponding to the checking request Second client of association;
Receive the second client transmission operates what is determined to test the verification process of the checking information based on the user Demonstrate,prove result;
Checking request based on the result processing user.
43. server according to claim 42, wherein, by the checking information corresponding to the checking request send to Before the second client associated with the user identity information corresponding to the checking request, the computer program instructions are also Including:
Whether inquiry second client associated with the user identity information corresponding to the checking request be online;
When inquiry result for be when, perform by the checking information corresponding to the checking request send to the checking request The operation of the second associated client of corresponding user identity information.
44. server according to claim 43, wherein, the computer program instructions also include:
When the result of inquiry is no, the logging device information of the second associated client is obtained, is logged in based on described Facility information pushes prompt message to corresponding equipment;
Wherein, the prompt message includes the checking of the login prompt information and/or the checking information of second client Prompt message.
45. the server according to claim 42 to 44 any one, wherein, it is described that institute is handled based on the result Stating the checking request of user includes:
When the result is to be proved to be successful, the checking request success of the user is determined.
46. the server according to claim 42 to 44 any one, wherein, it is described that institute is handled based on the result Stating the checking request of user includes:
When the result is authentication failed, the checking request authentication failed is determined.
47. a kind of Information Authentication processing system, including:
First client, includes the operation interface in default trigger action region for providing, and the default trigger action region is used The checking request of Information Authentication is carried out using default application in triggering;And for receiving user in the default trigger action area The checking request of domain triggering, the checking request is sent to first server;
First server, for the checking request to be sent to the second server corresponding with the default application, and The result for being sent based on the second server handles the checking request of the user;
Second server, for by the checking information corresponding to the checking request received send to the checking request The second associated client of corresponding user identity information, and for the result of the second client feedback to be sent To the first server;
Second client, for the checking information to be pushed into the user;And for being tested based on the user described The verification process operation for demonstrate,proving information determines the result, and the result is sent to the second server.
48. a kind of Information Authentication processing system, including:
First client, includes the operation interface in default trigger action region for providing, and the default trigger action region is used The checking request of Information Authentication is carried out using default application in triggering;And for receiving user in the default trigger action area The checking request of domain triggering, the checking request is sent to server;
Server, for the checking information corresponding to the checking request received to be sent to right with checking request institute The second client that the user identity information answered is associated, and handle institute for the result sent based on the second client State the checking request of user;
Second client, for the checking information to be pushed into the user;And for being tested based on the user described The verification process operation for demonstrate,proving information determines the result, and the result is sent to the server.
CN201710561365.5A 2017-07-11 2017-07-11 Information verification processing method, device and system, client and server Active CN107294999B (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN201710561365.5A CN107294999B (en) 2017-07-11 2017-07-11 Information verification processing method, device and system, client and server
CN202010492879.1A CN111835714A (en) 2017-07-11 2017-07-11 Information verification processing method, client and server
TW107116265A TWI752228B (en) 2017-07-11 2018-05-14 Information verification processing method, device, system, client and server
PCT/CN2018/094784 WO2019011186A1 (en) 2017-07-11 2018-07-06 Information verification method, device, system, clients and servers

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710561365.5A CN107294999B (en) 2017-07-11 2017-07-11 Information verification processing method, device and system, client and server

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202010492879.1A Division CN111835714A (en) 2017-07-11 2017-07-11 Information verification processing method, client and server

Publications (2)

Publication Number Publication Date
CN107294999A true CN107294999A (en) 2017-10-24
CN107294999B CN107294999B (en) 2020-04-28

Family

ID=60101497

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201710561365.5A Active CN107294999B (en) 2017-07-11 2017-07-11 Information verification processing method, device and system, client and server
CN202010492879.1A Pending CN111835714A (en) 2017-07-11 2017-07-11 Information verification processing method, client and server

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202010492879.1A Pending CN111835714A (en) 2017-07-11 2017-07-11 Information verification processing method, client and server

Country Status (3)

Country Link
CN (2) CN107294999B (en)
TW (1) TWI752228B (en)
WO (1) WO2019011186A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108022102A (en) * 2017-12-04 2018-05-11 阿里巴巴集团控股有限公司 A kind of auth method, device and equipment
CN108449321A (en) * 2018-02-11 2018-08-24 百度在线网络技术(北京)有限公司 Login method, server and client side
WO2019011186A1 (en) * 2017-07-11 2019-01-17 阿里巴巴集团控股有限公司 Information verification method, device, system, clients and servers
CN109547622A (en) * 2018-09-20 2019-03-29 维沃移动通信有限公司 A kind of verification method and terminal device
CN109614844A (en) * 2018-10-16 2019-04-12 阿里巴巴集团控股有限公司 A kind of link verification method, device and equipment
CN113824628A (en) * 2021-09-30 2021-12-21 传仲智能数字科技(上海)有限公司 User identity authentication method, device, server and storage medium based on IM

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111753270B (en) * 2020-06-28 2023-04-07 支付宝(杭州)信息技术有限公司 Application program login verification method, device, equipment and storage medium
CN116155521A (en) * 2021-11-19 2023-05-23 华为技术有限公司 Verification method for secure login and related equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140223185A1 (en) * 2011-07-25 2014-08-07 Emue Holdings Pty Ltd. Action verification methods and systems
CN104580117A (en) * 2013-10-28 2015-04-29 深圳市腾讯计算机***有限公司 Authentication method, device and system
CN105306199A (en) * 2014-05-28 2016-02-03 腾讯科技(深圳)有限公司 Identity verification method, device and system
CN105407074A (en) * 2014-09-11 2016-03-16 腾讯科技(深圳)有限公司 Authentication method, apparatus and system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242404B (en) * 2007-02-08 2011-05-25 联想(北京)有限公司 A validation method and system based on heterogeneous network
CN102769628B (en) * 2012-07-27 2014-03-26 腾讯科技(深圳)有限公司 Page login method and server
CN105471808B (en) * 2014-05-28 2019-08-20 北京搜狗科技发展有限公司 Generate the method for identifying code and the method, apparatus and system of safety verification
CN104378207B (en) * 2014-10-29 2019-05-07 中国建设银行股份有限公司 A kind of Information Authentication processing method and processing device
US11082849B2 (en) * 2015-08-07 2021-08-03 Qualcomm Incorporated Validating authorization for use of a set of features of a device
TW201723931A (en) * 2015-08-18 2017-07-01 科韻動力品牌管理有限公司 An improved messaging system and method
CN111683103B (en) * 2016-12-21 2022-08-30 创新先进技术有限公司 Information interaction method and device
CN107294999B (en) * 2017-07-11 2020-04-28 阿里巴巴集团控股有限公司 Information verification processing method, device and system, client and server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140223185A1 (en) * 2011-07-25 2014-08-07 Emue Holdings Pty Ltd. Action verification methods and systems
CN104580117A (en) * 2013-10-28 2015-04-29 深圳市腾讯计算机***有限公司 Authentication method, device and system
CN105306199A (en) * 2014-05-28 2016-02-03 腾讯科技(深圳)有限公司 Identity verification method, device and system
CN105407074A (en) * 2014-09-11 2016-03-16 腾讯科技(深圳)有限公司 Authentication method, apparatus and system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019011186A1 (en) * 2017-07-11 2019-01-17 阿里巴巴集团控股有限公司 Information verification method, device, system, clients and servers
CN108022102A (en) * 2017-12-04 2018-05-11 阿里巴巴集团控股有限公司 A kind of auth method, device and equipment
CN108449321A (en) * 2018-02-11 2018-08-24 百度在线网络技术(北京)有限公司 Login method, server and client side
CN108449321B (en) * 2018-02-11 2021-02-12 百度在线网络技术(北京)有限公司 Login method, server and client
CN109547622A (en) * 2018-09-20 2019-03-29 维沃移动通信有限公司 A kind of verification method and terminal device
CN109547622B (en) * 2018-09-20 2021-06-29 维沃移动通信有限公司 Verification method and terminal equipment
CN109614844A (en) * 2018-10-16 2019-04-12 阿里巴巴集团控股有限公司 A kind of link verification method, device and equipment
CN109614844B (en) * 2018-10-16 2023-01-24 创新先进技术有限公司 Link verification method, device and equipment
CN113824628A (en) * 2021-09-30 2021-12-21 传仲智能数字科技(上海)有限公司 User identity authentication method, device, server and storage medium based on IM

Also Published As

Publication number Publication date
TW201909012A (en) 2019-03-01
WO2019011186A1 (en) 2019-01-17
TWI752228B (en) 2022-01-11
CN107294999B (en) 2020-04-28
CN111835714A (en) 2020-10-27

Similar Documents

Publication Publication Date Title
CN107294999A (en) Information Authentication processing method, device, system, client and server
US9864852B2 (en) Approaches for providing multi-factor authentication credentials
US10362026B2 (en) Providing multi-factor authentication credentials via device notifications
US20230045378A1 (en) Non-repeatable challenge-response authentication
US20160132866A1 (en) Device, system, and method for creating virtual credit card
US11563727B2 (en) Multi-factor authentication for non-internet applications
US10841297B2 (en) Providing multi-factor authentication credentials via device notifications
US10282537B2 (en) Single prompt multiple-response user authentication method
US20210397682A1 (en) Secure Service Interaction
CN104348617A (en) Verification code processing method and device, and terminal and server
CN107832941A (en) Order processing method and device
CN112154636A (en) Deep link authentication
US11139975B2 (en) Authentication in non-secure communication channels via secure out-of-bands channels
US9886572B2 (en) Lie vault
US20230230096A1 (en) Motion-enabled transaction system using air sign symbols
US10866711B1 (en) Providing account information to applications
CA2991067C (en) Providing multi-factor authentication credentials via device notifications
US11966921B2 (en) Systems and methods for using proxy number tokens with configurable relationship data bindings
US20230099619A1 (en) Multifactor authentication of secure transmission of data
US20230186307A1 (en) Method for enhancing transaction security
BR102020022477A2 (en) APPARATUS, AND METHOD
JP2023119856A (en) Information processing system and information processing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1246040

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201019

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201019

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: Greater Cayman, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.

TR01 Transfer of patent right