CN108182355A - A kind of Sign-On authentication method, server and computer readable storage medium - Google Patents

A kind of Sign-On authentication method, server and computer readable storage medium Download PDF

Info

Publication number
CN108182355A
CN108182355A CN201711177908.XA CN201711177908A CN108182355A CN 108182355 A CN108182355 A CN 108182355A CN 201711177908 A CN201711177908 A CN 201711177908A CN 108182355 A CN108182355 A CN 108182355A
Authority
CN
China
Prior art keywords
animation
authentication
sign
verification
current authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711177908.XA
Other languages
Chinese (zh)
Other versions
CN108182355B (en
Inventor
徐少鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Pocket Network Technology Co Ltd
Original Assignee
Shenzhen Pocket Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Pocket Network Technology Co Ltd filed Critical Shenzhen Pocket Network Technology Co Ltd
Priority to CN201711177908.XA priority Critical patent/CN108182355B/en
Publication of CN108182355A publication Critical patent/CN108182355A/en
Application granted granted Critical
Publication of CN108182355B publication Critical patent/CN108182355B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Processing Or Creating Images (AREA)

Abstract

The invention discloses a kind of Sign-On authentication method, server and computer readable storage mediums, the server of the present invention is receiving when logging in access request of client transmission, access request generation can be logged according to and is used for the current authentication animation shown on the client, man-machine difference verification is carried out based on the verification operation instruction that the current authentication animation inputs further according to user, it is simple and efficient to handle;The present invention is to verify animation as identifying code simultaneously, in this way so that the verification operation that third party's machine or program are difficult analog subscriber instructs the verification for cracking the present invention to log in, so the safety of this Sign-On authentication mode of the present invention is very high, the demand that user experience meets user is improved.

Description

A kind of Sign-On authentication method, server and computer readable storage medium
Technical field
The present invention relates to a kind of identifying code processing technology field more particularly to Sign-On authentication method, server and calculating Machine readable storage medium storing program for executing.
Background technology
Full-automatic turing test (the Completely Automated Public Turing for distinguishing computer and user class Test to tell Computers and Humans Apart, CAPTCHA) be also known as identifying code, be it is a kind of differentiation user be meter Calculation machine or the public full auto-programs of user.It can prevent:Malice decryption, brush ticket, forum pour water, and effectively prevent some Hacker is constantly logged in trial to some particular registered user with specific program Brute Force mode.
Current existing login authentication technology includes:
The first:Character type identifying code, character type identifying code is current most mainstream identifying code, by providing static figure Piece user inputs corresponding character and can be proved to be successful.It is that current most character type identifying codes can be by OCR (Optical Character Recognition, optical character identification) software identification, it is not safe enough;And user sometimes recognizes character type Character in identifying code is also relatively more painstaking, then inputs operation, and experience is poor.
Second:Mobile phone identifying code.It is by sending identifying code to mobile phone, relatively more accurate safety, is most effective verification Code system.But as the login user behavior of frequent operation, mobile phone identifying code is closed with respect to the operation significant discomfort of high request.It is similar Mode also have mobile phone speech identifying code, be equally unfavorable for user experience.
The third:User's face identifies that the mobile phone terminals such as Alipay are done at present, and experience is fine.But webpage end subscriber is pre- When storing some user's face finger print datas, including subsequently using, it is very high to build system cost for learning cost.
4th kind:" mobile sliding block verification ", and " mobile sliding block verification " can be divided into two classes:1st class is " dragging sliding block Test, complete picture mosaic verification ", i.e., carry out verification login simply by picture splicing result, but it is this at present can be by image Identification cracks, and safety is not very high.2nd class is a kind of complicated, can record the user behavior of dragging process on backstage, with The mass data recorded before is compared, and difference user's work and machine simulation behavior, this comparison is difficult to be cracked, safety compared with Height, but development cost is also higher.
Or above common Sign-On authentication mode easily can be cracked by bad user or can prevent bad user crack but It has been that user experience is poor or development cost is high.
The above is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that the above is existing skill Art.
Invention content
It is a primary object of the present invention to provide a kind of Sign-On authentication method, server and computer readable storage medium, Or aim to solve the problem that although verification login mode can easily be cracked by third equation or can prevent from being cracked still at present User experience is poor or the problem of development cost is high.
To achieve the above object, the present invention provides a kind of Sign-On authentication method, the method includes:
Server is receiving when logging in access request of client transmission, and access request generation is logged in currently according to described Verify animation;
The current authentication animation is sent to the client so that the client to the current authentication animation into Row displaying receives simultaneously feedback validation operational order;
Judge whether the verification operation instruction of the client feedback meets the preset rules item of the current authentication animation Part realizes login authentication according to judging result.
Preferably, the current authentication animation includes movable body and preset target position, and the verification operation instruction is pair The operational order that the movement final position of movable body is determined in the current authentication animation;
Correspondingly, whether the verification operation instruction for judging the client feedback meets the current authentication animation Preset rules condition is realized login authentication according to judging result, is specifically included:
The verification operation instruction of the client feedback is parsed, the fortune of the movable body is judged according to analysis result Whether dynamic final position is located at the preset target position, if the determination result is YES, then assert login authentication success.
Correspondingly, the verification operation instruction to the client feedback parses, and judges institute according to analysis result Whether the movement final position for stating movable body is located at after the preset target position, further includes:
If judging result is no, preset target position in the current authentication animation is updated.
Preferably, the movable body in the current authentication animation is the movable body along desired guiding trajectory repeating motion.
Preferably, access request generation current authentication animation is logged in described in the basis, is specifically included:
According to it is described log in access request from prestore verification animation library in randomly select a verification animation as current authentication Animation.
Preferably, whether the verification operation instruction for judging the client feedback meets the current authentication animation Preset rules condition, after realizing login authentication according to judging result, the method further includes:
Verification animation in the verification animation library that prestores is updated according to prefixed time interval.
Preferably, the verification operation instruction to the client feedback parses, and judges institute according to analysis result Whether the movement final position for stating movable body is located at after the preset target position, further includes:
If judging result is no, the step of access request generation current authentication animation is logged in described in the basis is returned.
Preferably, it if the judging result is no, returns and access request generation current authentication is logged in described in the basis The step of animation, specifically includes:
If judging result is no, access request is logged according to and is chosen from the verification animation library that prestores except current Verify the verification animation other than animation as new current authentication animation.
In addition, to achieve the above object, the present invention also proposes a kind of server, and the server includes:Memory, processing Device and the Sign-On authentication program that can be run on the memory and on the processor is stored in, the Sign-On authentication program is matched It is set to the step of realizing the as above method of any one of them Sign-On authentication.
In addition, to achieve the above object, the present invention also proposes a kind of computer readable storage medium, which is characterized in that institute It states and Sign-On authentication program is stored on computer readable storage medium, realized such as when the Sign-On authentication program is executed by processor The step of method of upper any one of them Sign-On authentication.
The server of the present invention is receiving when logging in access request of client transmission, and access can be logged according to please The current authentication animation for showing on the client is sought survival into, is tested further according to user based on what the current authentication animation inputted It demonstrate,proves operational order and carries out man-machine difference verification, it is simple and efficient to handle;The present invention is to verify animation as identifying code, so simultaneously So that the verification operation that third party's machine or program are difficult analog subscriber instructs the verification for cracking the present invention to log in, so this hair The safety of bright this Sign-On authentication mode is very high, improves the demand that user experience meets user.
Description of the drawings
Fig. 1 is the structure diagram of the server for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is a kind of flow diagram of Sign-On authentication method first embodiment of the present invention;
Fig. 3 is the schematic diagram of current authentication animation in one embodiment of the invention;
Fig. 4 is a kind of flow diagram of Sign-On authentication method second embodiment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
With reference to Fig. 1, Fig. 1 is the server architecture schematic diagram of hardware running environment that the embodiment of the present invention is related to.
As shown in Figure 1, the server can include:Processor 1001, such as CPU, communication bus 1002, network interface 1003, memory 1004.Wherein, communication bus 1002 is used to implement the connection communication between these components.Network interface 1003 Standard wireline interface and wireless interface (such as WI-FI interfaces) can optionally be included.Memory 1004 can be that high-speed RAM is deposited Reservoir or the memory of stabilization (non-volatile memory), such as magnetic disk storage.Memory 1004 is optional The storage device that can also be independently of aforementioned processor 1001.
Art technology technical staff is appreciated that the server architecture shown in Fig. 1 does not form the limit to server It is fixed, it can include either combining certain components or different components arrangement than illustrating more or fewer components.
As shown in Figure 1, it can lead to as in a kind of memory 1004 of computer storage media including operating system, network Believe module and Sign-On authentication program.
In server shown in Fig. 1, processor 1001, memory 1004 in server of the present invention can be arranged on clothes It is engaged in device, the server calls the Sign-On authentication program stored in memory 1004 by processor 1001, and performs following Operation:
Server is receiving when logging in access request of client transmission, and access request generation is logged in currently according to described Verify animation;
The current authentication animation is sent to the client so that the client to the current authentication animation into Row displaying receives simultaneously feedback validation operational order;
Judge whether the verification operation instruction of the client feedback meets the preset rules item of the current authentication animation Part realizes login authentication according to judging result.
Further, processor 1001 can call the Sign-On authentication program stored in memory 1005, also perform following Operation:
The verification operation instruction of the client feedback is parsed, the fortune of the movable body is judged according to analysis result Whether dynamic final position is located at the preset target position, if the determination result is YES, then assert login authentication success.
Correspondingly, processor 1001 can call the Sign-On authentication program stored in memory 1005, also perform following grasp Make:
If judging result is no, preset target position in the current authentication animation is updated.
Correspondingly, processor 1001 can call the Sign-On authentication program stored in memory 1005, also perform following grasp Make:
If judging result is no, access request is logged according to and is chosen from the verification animation library that prestores except current Verify the verification animation other than animation as new current authentication animation.
Further, processor 1001 can call the Sign-On authentication program stored in memory 1005, also perform following Operation:
According to it is described log in access request from prestore verification animation library in randomly select a verification animation as current authentication Animation.
Further, processor 1001 can call the Sign-On authentication program stored in memory 1005, also perform following Operation:
Verification animation in the verification animation library that prestores is updated according to prefixed time interval.
The server of the present embodiment is receiving when logging in access request of client transmission, can log in access according to The current authentication animation for showing on the client is requested to generate, is inputted further according to user based on the current authentication animation Verification operation instruction carries out man-machine difference verification, simple and efficient to handle;Simultaneously the present embodiment be to verify animation as identifying code, In this way so that the verification operation that third party's machine or program are difficult analog subscriber instructs the verification for cracking the present embodiment to log in, therefore And the safety of this Sign-On authentication mode of the present embodiment is very high, improves the need that user experience meets user It asks.
Based on above-mentioned hardware configuration, a kind of embodiment of the method for Sign-On authentication of the present invention is proposed.
With reference to Fig. 2, Fig. 2 is a kind of flow diagram of the method first embodiment of Sign-On authentication of the present invention.
In the present embodiment, it the described method comprises the following steps:
S10:Server is receiving when logging in access request of client transmission, and access request generation is logged according to described Current authentication animation;
It should be noted that the executive agent of the present embodiment is illustrated by taking above-mentioned server as an example.The client can To be the web browser used such as WWW, email client when posting Email and the visitor of instant messaging are received Family end software etc..The present embodiment is illustrated by taking web browser as an example.
In the concrete realization, when user will log in some websites using web browser, user, which has, corresponding logs in behaviour Make to be to send one to the website to log in access request.
And server is receiving when logging in access request of web browser transmission, server can pass through WebSocket Agreement (the full-duplex communication agreement i.e. based on TCP, it realizes browser and server full-duplex communication) actively generates one For current authentication animation to web browser, the current authentication animation includes movable body and preset target position, with reference to Fig. 3, with Bead in Fig. 3 is movable body, and to be said to the present embodiment for using the shadow region in Fig. 3 as preset target position It is bright.
S20:The current authentication animation is sent to the client, so that the client moves the current authentication Picture is shown, and receives simultaneously feedback validation operational order;
It will be appreciated that the current authentication animation that server is generated is sent to web browser, web browser meeting Show the current authentication animation, when user sees the current authentication animation, meeting is worked as in this end group of web browser in described Preceding verification animation inputs corresponding verification operation instruction, and then verification operation described in server feedback is instructed to server;Wherein With reference to Fig. 3, the verification operation instruction is that the movement final position of bead movable body in the current authentication animation is carried out really When fixed operational order, the i.e. bead in current authentication animation move to the dash area region in Fig. 3, user clicks Fig. 3 In Button Login carry out after logging in confirmation, web browser can to server feedback this log in confirmation operation instruction (i.e. institute State verification operation instruction).
Specifically, in the present embodiment, the movable body in the current authentication animation is along desired guiding trajectory repeating motion Bead in movable body, i.e. Fig. 3 circumferentially ceaselessly circularly does uniform circular motion.Being arranged in this way can prevent While standby third equation cracks, also allow for user's identification and make corresponding operation, it is easy and quick.
S30:Judge whether the verification operation instruction of the client feedback meets the default rule of the current authentication animation Then condition realizes login authentication according to judging result.
It will be appreciated that above-mentioned steps S20 is met, the verification that server can feed back the web browser in step S30 Operational order is parsed, and whether the movement final position for judging the movable body according to analysis result is located at the goal-selling Login authentication success if the determination result is YES, is then assert in position;If judging result is no, in the current authentication animation Preset target position is updated.I.e. if server judges the bead of current authentication animation in described Fig. 3 according to analysis result Movement final position when being located at shadow region, then assert login authentication success.If server judges institute according to analysis result The movement final position of the bead of current authentication animation in Fig. 3 is stated not at shadow region, then directly assert login authentication failure, And preset target position in the current authentication animation is updated (i.e. current authentication animation in Fig. 3 does not change, only change Position of the dash area region in current authentication animation), while can also show Sign-On authentication failure or user's misjudgment Etc. information to inform user;Then user will continue to the motion state of the bead in observation current animation, and user can make and step on Land confirmation operation instruction is verified again, even if so authentication failed user need not also go the image in understanding animation, user again It operates convenient and efficient.
The server of the present embodiment is receiving when logging in access request of client transmission, can log in access according to The current authentication animation for showing on the client is requested to generate, is inputted further according to user based on the current authentication animation Verification operation instruction carries out man-machine difference verification, simple and efficient to handle;Simultaneously the present embodiment be to verify animation as identifying code, In this way so that the verification operation that third party's machine or program are difficult analog subscriber instructs the verification for cracking the present embodiment to log in, therefore And the safety of this Sign-On authentication mode of the present embodiment is very high, improves the need that user experience meets user It asks.
Fig. 4 is a kind of flow diagram of the method second embodiment of Sign-On authentication of the present invention.
Further, with reference to Fig. 4, a kind of flow diagram of the method second embodiment of Sign-On authentication of the present invention is based on Above-mentioned embodiment shown in Fig. 2 proposes a kind of method second embodiment of Sign-On authentication of the present invention.
In the present embodiment, the step S10 is specifically included:
S101:Server receiving client transmission when logging in access request, according to it is described log in access request from Prestore verification animation library in randomly select a verification animation as current authentication animation.
It will be appreciated that this end of the present embodiment server can prestore multiple verification animations in the verification animation library that prestores In, server randomly selects a verification animation as current authentication animation from the verification animation library that prestores, i.e., random by taking The mode of selection can further prevent unique user to be cracked using third equation or machine.
Correspondingly, step S30 described in the present embodiment can also include with being sentenced described in a upper embodiment according to analysis result Whether the movement final position of the movable body of breaking is located at the preset target position, when the judgment result is No the step of it is different Scheme:Even judging result is no, then access request is logged according to and chooses to remove from the verification animation library that prestores and is worked as A verification animation other than preceding verification animation is as new current authentication animation.Although this mode is so that user needs to go again The mode of verification animation is reloaded when recognizing the image in animation, but failing using this Sign-On authentication again, is further made The Sign-On authentication mode cost obtained in the present embodiment increases and then is difficult to be cracked.
Correspondingly, after the step S30, the method further includes:
S40:Verification animation in the verification animation library that prestores is updated according to prefixed time interval.
In the concrete realization, such as server can update the primary verification animation verified in animation library that prestores daily Picture can prevent the user to hatch a sinister plot from remaining subsequently to crack by the verification animation occurred before, further Increase the Sign-On authentication mode of the present embodiment cracks cost so that the Sign-On authentication mode in the present embodiment is difficult to by third Side cracks.
In addition, the embodiment of the present invention also proposes a kind of computer readable storage medium, the computer readable storage medium On be stored with Sign-On authentication program, following operation is realized when the Sign-On authentication program is executed by processor:
Server is receiving when logging in access request of client transmission, and access request generation is logged in currently according to described Verify animation;
The current authentication animation is sent to the client so that the client to the current authentication animation into Row displaying receives simultaneously feedback validation operational order;
Judge whether the verification operation instruction of the client feedback meets the preset rules item of the current authentication animation Part realizes login authentication according to judging result.
Further, following operation is also realized when Sign-On authentication program is executed by processor:
The verification operation instruction of the client feedback is parsed, the fortune of the movable body is judged according to analysis result Whether dynamic final position is located at the preset target position, if the determination result is YES, then assert login authentication success.
Correspondingly, following operation is also realized when Sign-On authentication program is executed by processor:
If judging result is no, preset target position in the current authentication animation is updated.
Correspondingly, following operation is also realized when Sign-On authentication program is executed by processor:
If judging result is no, access request is logged according to and is chosen from the verification animation library that prestores except current Verify the verification animation other than animation as new current authentication animation.
Further, following operation is also realized when Sign-On authentication program is executed by processor:
According to it is described log in access request from prestore verification animation library in randomly select a verification animation as current authentication Animation.
Further, following operation is also realized when Sign-On authentication program is executed by processor:
Verification animation in the verification animation library that prestores is updated according to prefixed time interval.
The server of the present embodiment is receiving when logging in access request of client transmission, can log in access according to The current authentication animation for showing on the client is requested to generate, is inputted further according to user based on the current authentication animation Verification operation instruction carries out man-machine difference verification, simple and efficient to handle;Simultaneously the present embodiment be to verify animation as identifying code, In this way so that the verification operation that third party's machine or program are difficult analog subscriber instructs the verification for cracking the present embodiment to log in, therefore And the safety of this Sign-On authentication mode of the present embodiment is very high, improves the need that user experience meets user It asks.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or system including a series of elements not only include those elements, and And it further includes other elements that are not explicitly listed or further includes intrinsic for this process, method, article or system institute Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this Also there are other identical elements in the process of element, method, article or system.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, the technical user person of this field can be understood that above-described embodiment Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but many situations It is lower the former be more preferably embodiment.Based on such understanding, technical scheme of the present invention is substantially in other words to the prior art The part to contribute can be embodied in the form of software product, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), used including some instructions so that a station terminal equipment (can be mobile phone, computer takes Be engaged in device, air conditioner or the network equipment etc.) perform method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow shift that bright specification and accompanying drawing content are made directly or indirectly is used in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

  1. A kind of 1. Sign-On authentication method, which is characterized in that the method includes:
    Server is receiving when logging in access request of client transmission, and access request generation current authentication is logged according to described Animation;
    The current authentication animation is sent to the client, so that the client opens up the current authentication animation Show, receive simultaneously feedback validation operational order;
    Judge whether the verification operation instruction of the client feedback meets the preset rules condition of the current authentication animation, root It is judged that result realizes login authentication.
  2. 2. Sign-On authentication method as described in claim 1, which is characterized in that the current authentication animation is including movable body and in advance If target location, the verification operation instruction is is determined the movement final position of movable body in the current authentication animation Operational order;
    Correspondingly, whether the verification operation instruction for judging the client feedback meets the default of the current authentication animation Rule condition is realized login authentication according to judging result, is specifically included:
    The verification operation instruction of the client feedback is parsed, judges that the movement of the movable body is whole according to analysis result Whether stop bit is put is located at the preset target position, if the determination result is YES, then assert login authentication success.
  3. 3. Sign-On authentication method as claimed in claim 2, which is characterized in that the verification operation to the client feedback Instruction is parsed, and whether the movement final position for judging the movable body according to analysis result is located at the preset target position Later, it further includes:
    If judging result is no, preset target position in the current authentication animation is updated.
  4. 4. Sign-On authentication method as claimed in claim 2, which is characterized in that the movable body in the current authentication animation is edge The movable body of desired guiding trajectory repeating motion.
  5. 5. Sign-On authentication method as claimed in claim 2, which is characterized in that access request generation is logged in described in the basis and is worked as Preceding verification animation, specifically includes:
    According to it is described log in access request from prestore verification animation library in randomly select a verification animation as current authentication animation.
  6. 6. Sign-On authentication method as claimed in claim 5, which is characterized in that the verification behaviour for judging the client feedback The preset rules condition for whether meeting the current authentication animation is instructed, after realizing login authentication according to judging result, institute The method of stating further includes:
    Verification animation in the verification animation library that prestores is updated according to prefixed time interval.
  7. 7. Sign-On authentication method as claimed in claim 5, which is characterized in that the verification operation to the client feedback Instruction is parsed, and whether the movement final position for judging the movable body according to analysis result is located at the preset target position Later, it further includes:
    If judging result is no, the step of access request generation current authentication animation is logged in described in the basis is returned.
  8. 8. Sign-On authentication method as claimed in claim 7, which is characterized in that if the judging result is no, described in return According to described the step of logging in access request generation current authentication animation, specifically include:
    If judging result is no, access request is logged according to and is chosen from the verification animation library that prestores except current authentication A verification animation other than animation is as new current authentication animation.
  9. 9. a kind of server, which is characterized in that the server includes:It memory, processor and is stored on the memory And the Sign-On authentication program that can be run on the processor, the Sign-On authentication program are arranged for carrying out such as claim 1 to 8 Any one of described in Sign-On authentication method the step of.
  10. 10. a kind of computer readable storage medium, which is characterized in that be stored with to log on the computer readable storage medium and test Program is demonstrate,proved, such as Sign-On authentication described in any item of the claim 1 to 8 is realized when the Sign-On authentication program is executed by processor Method the step of.
CN201711177908.XA 2017-11-21 2017-11-21 Login verification method, server and computer readable storage medium Active CN108182355B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711177908.XA CN108182355B (en) 2017-11-21 2017-11-21 Login verification method, server and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711177908.XA CN108182355B (en) 2017-11-21 2017-11-21 Login verification method, server and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN108182355A true CN108182355A (en) 2018-06-19
CN108182355B CN108182355B (en) 2021-10-22

Family

ID=62545133

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711177908.XA Active CN108182355B (en) 2017-11-21 2017-11-21 Login verification method, server and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108182355B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109214162A (en) * 2018-08-15 2019-01-15 深圳点猫科技有限公司 A kind of verification method and system based on education resource platform
CN112612398A (en) * 2020-12-25 2021-04-06 珠海金山网络游戏科技有限公司 Data processing method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101178813A (en) * 2007-12-19 2008-05-14 腾讯科技(深圳)有限公司 Method and apparatus for generating photograph identifying code
US20120246008A1 (en) * 2011-03-23 2012-09-27 International Business Machines Corporation Implementing computer interaction response tests
US20130312070A1 (en) * 2011-02-01 2013-11-21 Nokia Corporation Method and apparatus for a multi-party captcha
CN104036164A (en) * 2014-05-19 2014-09-10 乔治 Click type video verification code
CN106161388A (en) * 2015-04-16 2016-11-23 深圳市腾讯计算机***有限公司 Information Authentication method, server and system
CN107342995A (en) * 2017-07-03 2017-11-10 深圳市全民合伙人科技有限公司 A kind of user profile processing method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101178813A (en) * 2007-12-19 2008-05-14 腾讯科技(深圳)有限公司 Method and apparatus for generating photograph identifying code
US20130312070A1 (en) * 2011-02-01 2013-11-21 Nokia Corporation Method and apparatus for a multi-party captcha
US20120246008A1 (en) * 2011-03-23 2012-09-27 International Business Machines Corporation Implementing computer interaction response tests
CN104036164A (en) * 2014-05-19 2014-09-10 乔治 Click type video verification code
CN106161388A (en) * 2015-04-16 2016-11-23 深圳市腾讯计算机***有限公司 Information Authentication method, server and system
CN107342995A (en) * 2017-07-03 2017-11-10 深圳市全民合伙人科技有限公司 A kind of user profile processing method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109214162A (en) * 2018-08-15 2019-01-15 深圳点猫科技有限公司 A kind of verification method and system based on education resource platform
CN112612398A (en) * 2020-12-25 2021-04-06 珠海金山网络游戏科技有限公司 Data processing method and device

Also Published As

Publication number Publication date
CN108182355B (en) 2021-10-22

Similar Documents

Publication Publication Date Title
CN106797371B (en) Method and system for user authentication
CN111241517B (en) Method and device for constructing biological feature verification question-answer library
CN108650226B (en) A kind of login validation method, device, terminal device and storage medium
US11258810B2 (en) Identity authentication method, apparatus, and system
CN106453205B (en) identity verification method and device
CN106656944B (en) Method and device for sliding verification of handheld mobile equipment
CN103368913A (en) Account login method, apparatus and system, and network server
CN108011868A (en) One kind slides verification method and mobile terminal
CN111295673B (en) Neural response detector
US11563727B2 (en) Multi-factor authentication for non-internet applications
CN109600336A (en) Store equipment, identifying code application method and device
CN112187702A (en) Method and device for verifying client
CN109547426B (en) Service response method and server
CN103917979A (en) Method and apparatus for inputting password using game
CN108319865A (en) A kind of method for secret protection, storage medium and terminal device based on polygonal color
WO2015032281A1 (en) Method and system for generating and processing challenge-response tests
CN110120928A (en) A kind of identity authentication method, device, server and computer-readable medium
CN109902459A (en) Man-machine identification verification method, system, equipment and the storage medium of WEB page
CN105245489A (en) Verification method and verification device
CN112717417A (en) Man-machine recognition method and device
CN106559386B (en) A kind of authentication method and device
CN108182355A (en) A kind of Sign-On authentication method, server and computer readable storage medium
CN104468486A (en) Information processing method and system and electronic device
CN108335191A (en) Account-opening method, financial services system end and the computer storage media of finance account
CN107231358B (en) Questionnaire data acquisition method, server and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant