CN115150186A - Verification code verification method, system, electronic equipment and storage medium - Google Patents

Verification code verification method, system, electronic equipment and storage medium Download PDF

Info

Publication number
CN115150186A
CN115150186A CN202210890694.5A CN202210890694A CN115150186A CN 115150186 A CN115150186 A CN 115150186A CN 202210890694 A CN202210890694 A CN 202210890694A CN 115150186 A CN115150186 A CN 115150186A
Authority
CN
China
Prior art keywords
verification
code
client
rule information
interference
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210890694.5A
Other languages
Chinese (zh)
Inventor
张瑜
齐红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202210890694.5A priority Critical patent/CN115150186A/en
Publication of CN115150186A publication Critical patent/CN115150186A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a verification code checking method, a verification code checking system, electronic equipment and a storage medium, wherein the method comprises the following steps: acquiring a verification request of a client, and generating a verification picture and rule information, wherein the verification picture comprises a check code and an interference code; the rule information is used for distinguishing the check code and the interference code. Sending the rule information to a mobile device by outputting the verification picture to a client; therefore, the check code and the interference code cannot be distinguished on one side of the client, the verification picture is timely sent to other users through malicious programs under the condition that the rule information is not acquired, the verification code cannot be correctly identified by other users, and therefore the problem that the verification code in the prior art is easy to maliciously crack is at least partially solved.

Description

Verification code verification method, system, electronic equipment and storage medium
Technical Field
The present invention relates to the field of verification code technologies, and in particular, to a verification code checking method and system, an electronic device, and a storage medium.
Background
The verification code is used for distinguishing the robot from a real person. Early verification codes generally reduce the robot recognition rate through distorted words. However, the progress of image recognition technology, simple distortion and other interference modes, cannot effectively distinguish a robot or a real person. In order to defeat the authentication code that is difficult for AI to identify, some people send the authentication code to other websites through malicious programs, requiring the user to enter the authentication code before seeing the details of the website. The user can help others 'crack' the verification code under the unknowing condition.
Disclosure of Invention
In view of this, embodiments of the present invention provide a verification method, a verification system, an electronic device, and a storage medium for solving the technical drawbacks of the foregoing embodiments.
In order to achieve the purpose of the invention, the following technical scheme is adopted:
in a first aspect, a verification code verification method is provided, where the method includes:
acquiring a verification request of a client, and generating a verification picture and rule information; the verification picture comprises a check code and an interference code; the rule information is used for distinguishing a check code and an interference code;
outputting the verification picture to a client; sending the rule information to a mobile device;
acquiring a first verification code returned by a client, and comparing the first verification code with the check code;
if the two are consistent, the verification is successful.
Optionally, before the obtaining of the first verification code transmitted back by the client,
acquiring a second verification code sent by the mobile equipment;
comparing the second verification code with the interference code;
if the verification codes are consistent with the verification codes, executing a first verification code returned by the client, and comparing the first verification code with the verification codes;
and if the two are not consistent, the verification fails.
Optionally, before the comparing the second verification code with the interference code, the method further includes:
and acquiring the MAC address of the mobile equipment, and if the MAC address of the mobile equipment is different from the reserved MAC address, failing to verify.
Optionally, the constituent elements of the check code and the scrambling code include one or more of characters, letters and numbers;
the interference code includes an identification tag.
Optionally, the rule information is voice information; and the voice information broadcast identification mark is used for distinguishing the check code from the interference code.
Optionally, the check code and the interference code have different constituent elements, and the rule information is text information.
In a second aspect, an embodiment of the present invention further provides a verification code verification system, including a client, a user center, and a mobile device;
the mobile center is used for acquiring a verification request of a client and generating a verification picture and rule information; the verification picture comprises a check code and an interference code; the rule information is used for distinguishing a check code and an interference code;
the client is used for receiving the verification picture and transmitting a first verification code back to the user;
the mobile device is used for receiving the rule information;
when the user center obtains a first verification code returned by the client, comparing the first verification code with the check code;
if the two are consistent, the verification is successful.
In a third aspect, an embodiment of the present invention provides an electronic device, including: one or more processors; a memory; the memory stores one or more executable programs, and the one or more processors read the executable program codes stored in the memory and run a password management application program corresponding to the executable program codes, so as to execute the verification code verification method according to any one of the first aspect.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, where one or more programs are stored, and the one or more programs are executable by one or more processors to implement the verification method for an authentication code according to any one of the first aspect.
According to the verification code verification method, the verification code verification system, the electronic device and the storage medium provided by the embodiment of the invention, after the verification request of the client is obtained, the verification picture and the rule information are generated, and the rule information is used for distinguishing the verification code and the interference code in the verification picture. Sending the rule information to a mobile device by outputting the verification picture to a client; therefore, the check code and the interference code cannot be distinguished on one side of the client, the verification picture is timely sent to other users through malicious programs under the condition that the rule information is not acquired, the verification code cannot be correctly identified by other users, and therefore the problem that the verification code in the prior art is easy to maliciously crack is at least partially solved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic flow chart of a verification method for an authentication code;
FIG. 2 is a schematic diagram of a verification system;
fig. 3 is a schematic structural diagram of an embodiment of an electronic device according to the present invention.
Detailed Description
Embodiments of the present invention are described in detail below with reference to the accompanying drawings.
It should be understood that the described embodiments are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
According to the verification code verification method provided by the embodiment of the invention, the rule information for distinguishing the verification code and the interference code is added, and the rule information is sent to the mobile equipment, so that the difficulty of maliciously cracking the verification code is increased, and the problem that in the prior art, part of people send verification pictures to other users through malicious programs and cheat another person to replace a robot to crack the malicious behaviors of the verification code is at least partially solved.
It should be noted that the methods provided in the embodiments of the present invention may be solidified in a certain manufactured physical product in the form of software, and when a user uses the product, the method flow of the present application may be reproduced.
As shown in fig. 1, the verification method for an authentication code according to an embodiment of the present invention includes:
s101: acquiring a verification request of a client, and generating a verification picture and rule information; verifying that the picture comprises a check code and an interference code; the rule information is used for distinguishing the check code and the interference code;
s201: outputting the verification picture to a client; sending the rule information to the mobile device;
s301: acquiring a first verification code returned by the client, and comparing the first verification code with the check code;
s401: if the two are consistent, the verification is successful; and if the two are not consistent, the verification fails.
According to the obtained verification request of the client, a verification picture with a verification code and an interference code is generated, and rule information used for assisting a user in distinguishing the verification code and the interference code in the verification picture is generated. The rule information and the verification picture are respectively sent to the client and the mobile device, so that the client cannot effectively identify which part of the verification picture is the check code and which part of the verification picture is the interference code through a malicious program, and correct verification codes cannot be input through the prior art such as picture identification. And the problem that a real user is utilized to help a malicious program to input a correct verification code by sending the verification picture to other websites is at least partially solved.
In an embodiment, before step S130, step S300 may be further included: acquiring a second verification code sent by the mobile equipment;
comparing the second verification code with the interference code; if the verification codes are consistent with the verification codes, executing a first verification code returned by the client, and comparing the first verification code with the verification codes; and if the two are not consistent, the verification fails.
To further increase the security of the verification code, a verification step for the second verification code sent by the mobile device may be added before verifying the first verification code returned by the client. If the mobile equipment identifies the interference code and inputs the correct second verification code, the verification stage of the first verification code can be executed, if the comparison is inconsistent, the verification is judged to be failed, the next verification of the first verification code is not needed, the verification process can be saved, and the verification safety can be improved.
In order to further improve the security of the verification, in an embodiment, before comparing the second verification code with the interference code, the following may be further verified: and acquiring the MAC address of the mobile equipment, and if the MAC address of the mobile equipment is different from the reserved MAC address, failing to verify. And then determines that the mobile device is a bound mobile device.
The constituent elements of the check code and the interference code comprise one or more of characters, letters and numbers;
the interference code includes an identification tag. The rule information is voice information; and the voice information broadcast identification mark is used for distinguishing the check code from the interference code.
For example, the check code is ABCD and the interference code isABCDThe underline is an identification mark of the interference code, the rule information is voice information, and the voice information is used for broadcasting the identification mark, so that a user can distinguish the interference code from the check code. For example, it can be set that the voice content is: the method comprises the steps that interference codes are underlined, or letters without underlines are selected, the underlines are identification marks, and the like, after a user obtains rule information through mobile equipment, a verification code ABCD is input at a user side, the verification code ABCD is compared with a verification code ABCD, and if the verification code ABCD is consistent with the verification code ABCD, verification success can be judged.
In another embodiment, the check code and the interference code have different constituent elements, and the rule information is text information. For example, the constituent element of the check code is the letter efgh, and the constituent element of the scrambling code is the number 1234, or the constituent element of the check code is the letter and the number a1b2, and the constituent element of the scrambling code is the word "strict horse". The rule information is character information and is used for recording different points of the constituent elements of the check code and the interference code. For example, the rule information is "check code is letter", "scrambling code is number", "check code is letter and number", "scrambling code is character", and the like. Therefore, the user can effectively distinguish the interference code and the check code through the rule information, and a robot or other people who do not acquire the rule information cannot correctly distinguish the check code from the interference code.
As shown in fig. 2, the present invention further provides a verification code verification system, which includes a client, a user center and a mobile device;
the mobile center is used for acquiring a verification request of the client and generating a verification picture and rule information; the verification picture comprises a check code and an interference code; the rule information is used for distinguishing the check code and the interference code;
the client is used for receiving the verification picture and transmitting a first verification code back to the user;
the mobile equipment is used for receiving the rule information;
when the user center obtains the first verification code returned by the client, comparing the first verification code with the check code;
if the two are consistent, the verification is successful.
As shown in fig. 3, as an alternative embodiment, the electronic device may include: a housing 41, a processor 42, a memory 43, a circuit board 44 and a power circuit 45, wherein the circuit board 44 is disposed inside a space enclosed by the housing 41, and the processor 42 and the memory 43 are disposed on the circuit board 44; a power supply circuit 45 for supplying power to each circuit or device of the electronic apparatus; the memory 43 is used for storing executable program code; the processor 42 reads the executable program code stored in the memory 43 to execute a program corresponding to the executable program code, so as to execute the verification method of the embodiment.
For the specific execution process of the above steps by the processor 42 and the steps further executed by the processor 42 by running the executable program code, reference may be made to the description of the verification code checking method embodiment of the present invention, which is not described herein again.
The electronic device exists in a variety of forms, including but not limited to: (1) a mobile communication device: such devices are characterized by mobile communications capabilities and are primarily targeted at providing voice, data communications. Such terminals include: smart phones (e.g., iPhoie), multimedia phones, functional phones, and low-end phones, among others. (2) ultra mobile personal computer device: the equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include: PDA, MID, and UMPC devices, etc., such as ipads. (3) portable entertainment device: such devices can display and play multimedia content. This type of device comprises: audio and video playing modules (such as an iPod), handheld game consoles, electronic books, and intelligent toys and portable car navigation devices. (4) the server: the device for providing the computing service comprises a processor, a hard disk, a memory, a system bus and the like, and the server is similar to a general computer architecture, but has higher requirements on processing capacity, stability, reliability, safety, expandability, manageability and the like because of the need of providing high-reliability service. And (5) other electronic equipment with a data interaction function.
Yet another embodiment of the present invention provides a computer-readable storage medium storing one or more programs, which are executable by one or more processors to implement the captcha verification method of the foregoing embodiments.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may also be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (9)

1. The verification method of the verification code is characterized by comprising the following steps:
acquiring a verification request of a client, and generating a verification picture and rule information; the verification picture comprises a check code and an interference code; the rule information is used for distinguishing a check code and an interference code;
outputting the verification picture to a client; sending the rule information to a mobile device;
acquiring a first verification code returned by a client, and comparing the first verification code with the check code;
if the two are consistent, the verification is successful.
2. The verification method of authentication code according to claim 1, further comprising before said obtaining the first authentication code transmitted back by the client,
acquiring a second verification code sent by the mobile equipment;
comparing the second verification code with the interference code;
if the verification codes are consistent with the verification codes, executing a first verification code returned by the client, and comparing the first verification code with the verification codes;
if not, the verification fails.
3. The method for verifying the verification code according to claim 2, wherein before the comparing the second verification code with the scrambling code, the method further comprises:
and acquiring the MAC address of the mobile equipment, and if the MAC address of the mobile equipment is different from the reserved MAC address, failing to verify.
4. The verification method of claim 1, wherein the constituent elements of the verification code and the scrambling code include one or more of characters, letters, and numbers;
the interference code includes an identification tag.
5. The verification method of claim 4, wherein the rule information is voice information; and the voice information broadcast identification mark is used for distinguishing the check code from the interference code.
6. The captcha verification method of claim 1, wherein the verification code is different from the constituent elements of the scrambling code, and the rule information is text information.
7. The verification code verification system comprises a client and a user center, and is characterized by also comprising mobile equipment;
the mobile center is used for acquiring a verification request of a client and generating a verification picture and rule information; the verification picture comprises a check code and an interference code; the rule information is used for distinguishing a check code and an interference code;
the client is used for receiving the verification picture and transmitting a first verification code back to the user;
the mobile device is used for receiving the rule information;
when the user center obtains a first verification code returned by the client, comparing the first verification code with the check code;
if the two are consistent, the verification is successful.
8. An electronic device, comprising: one or more processors; a memory; the memory stores one or more executable programs, and the one or more processors read the executable program codes stored in the memory and execute programs corresponding to the executable program codes so as to execute the verification method of the verification code according to any one of claims 1 to 6.
9. A computer-readable storage medium, wherein the computer-readable storage medium stores one or more programs, the one or more programs being executable by one or more processors to implement the captcha verification method of any preceding claim 1 to 6.
CN202210890694.5A 2022-07-27 2022-07-27 Verification code verification method, system, electronic equipment and storage medium Pending CN115150186A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210890694.5A CN115150186A (en) 2022-07-27 2022-07-27 Verification code verification method, system, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210890694.5A CN115150186A (en) 2022-07-27 2022-07-27 Verification code verification method, system, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115150186A true CN115150186A (en) 2022-10-04

Family

ID=83413200

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210890694.5A Pending CN115150186A (en) 2022-07-27 2022-07-27 Verification code verification method, system, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115150186A (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006002586A1 (en) * 2004-07-01 2006-01-12 Zichen Tan A verification mode of the interactive dynamic key instructed by integrating a formula key with graphics
WO2014166362A1 (en) * 2013-04-11 2014-10-16 Tencent Technology (Shenzhen) Company Limited Method, server, client and system for verifying verification codes
CN104283682A (en) * 2013-07-08 2015-01-14 深圳市腾讯计算机***有限公司 Method, device and system conducting verification through verification codes
CN104580117A (en) * 2013-10-28 2015-04-29 深圳市腾讯计算机***有限公司 Authentication method, device and system
WO2015179640A1 (en) * 2014-05-22 2015-11-26 Alibaba Group Holding Limited Method, apparatus, and system for providing a security check
CN105450641A (en) * 2015-11-13 2016-03-30 中国建设银行股份有限公司 Verification method, verification device and verification system
WO2016146007A1 (en) * 2015-03-17 2016-09-22 阿里巴巴集团控股有限公司 Method and device for checking verification code
CN107846412A (en) * 2017-11-28 2018-03-27 五八有限公司 Identifying code request processing method, device and identifying code processing system
CN107844696A (en) * 2016-09-20 2018-03-27 腾讯科技(深圳)有限公司 A kind of identifying code interference method and server
WO2019237549A1 (en) * 2018-06-11 2019-12-19 平安科技(深圳)有限公司 Verification code recognition method and apparatus, computer device, and storage medium
CN112287324A (en) * 2020-11-18 2021-01-29 深圳源中瑞科技有限公司 Picture verification method, server, terminal device and storage medium
EP3933625A1 (en) * 2020-07-03 2022-01-05 Alipay (Hangzhou) Information Technology Co., Ltd. Information verification method, apparatus, and device
CN114499981A (en) * 2021-12-29 2022-05-13 中国电信股份有限公司 Video access method and device
CN114640480A (en) * 2020-12-01 2022-06-17 上海擎感智能科技有限公司 Method for information processing, in-vehicle terminal, and computer storage medium

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006002586A1 (en) * 2004-07-01 2006-01-12 Zichen Tan A verification mode of the interactive dynamic key instructed by integrating a formula key with graphics
WO2014166362A1 (en) * 2013-04-11 2014-10-16 Tencent Technology (Shenzhen) Company Limited Method, server, client and system for verifying verification codes
CN104283682A (en) * 2013-07-08 2015-01-14 深圳市腾讯计算机***有限公司 Method, device and system conducting verification through verification codes
WO2015003599A1 (en) * 2013-07-08 2015-01-15 Tencent Technology (Shenzhen) Company Limited Method, apparatus and system for verification using verification code
CN104580117A (en) * 2013-10-28 2015-04-29 深圳市腾讯计算机***有限公司 Authentication method, device and system
WO2015179640A1 (en) * 2014-05-22 2015-11-26 Alibaba Group Holding Limited Method, apparatus, and system for providing a security check
WO2016146007A1 (en) * 2015-03-17 2016-09-22 阿里巴巴集团控股有限公司 Method and device for checking verification code
CN105450641A (en) * 2015-11-13 2016-03-30 中国建设银行股份有限公司 Verification method, verification device and verification system
CN107844696A (en) * 2016-09-20 2018-03-27 腾讯科技(深圳)有限公司 A kind of identifying code interference method and server
CN107846412A (en) * 2017-11-28 2018-03-27 五八有限公司 Identifying code request processing method, device and identifying code processing system
WO2019237549A1 (en) * 2018-06-11 2019-12-19 平安科技(深圳)有限公司 Verification code recognition method and apparatus, computer device, and storage medium
EP3933625A1 (en) * 2020-07-03 2022-01-05 Alipay (Hangzhou) Information Technology Co., Ltd. Information verification method, apparatus, and device
CN112287324A (en) * 2020-11-18 2021-01-29 深圳源中瑞科技有限公司 Picture verification method, server, terminal device and storage medium
CN114640480A (en) * 2020-12-01 2022-06-17 上海擎感智能科技有限公司 Method for information processing, in-vehicle terminal, and computer storage medium
CN114499981A (en) * 2021-12-29 2022-05-13 中国电信股份有限公司 Video access method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张艳;彭华熹;何申;: "基于行为的安全验证码生成及验证方案研究", 信息安全研究, no. 02, 5 February 2020 (2020-02-05) *

Similar Documents

Publication Publication Date Title
RU2406163C2 (en) User authentication by combining speaker verification and reverse turing test
KR101337447B1 (en) Method and server for authenticatiing user in onlie game
CN111241517B (en) Method and device for constructing biological feature verification question-answer library
US9183362B2 (en) Method and system for verification of human presence at a mobile device
US8681642B2 (en) Equipment-information transmitting apparatus, service control apparatus, equipment-information transmitting method, and computer products
CN108683667B (en) Account protection method, device, system and storage medium
CN106453205B (en) identity verification method and device
CN103975615A (en) Login via near field communication with automatically generated login information
CN104184709A (en) Verification method, device, server, service data center and system
CN110691085A (en) Login method, login device, password management system and computer readable medium
CN111062027A (en) Method and device for preventing bad HID equipment from invading, electronic equipment and storage medium
CN114339755A (en) Registration verification method and device, electronic equipment and computer readable storage medium
TW202042136A (en) Mobile payment self-service signing method, device and system
CN114139135B (en) Equipment login management method, device and storage medium
WO2021244471A1 (en) Real-name authentication method and device
CN105100005B (en) Identity verification method and device
CN111027065B (en) Leucavirus identification method and device, electronic equipment and storage medium
CN115150186A (en) Verification code verification method, system, electronic equipment and storage medium
CN109302422B (en) Method for logging in mobile application, mobile terminal, electronic equipment, system and storage medium
CN110875921B (en) Printer network access security detection method and device and electronic equipment
CN113099453A (en) Authentication method, device and equipment for access server and readable storage medium
CN115001751B (en) Dynamic verification method and device, electronic equipment and storage medium
CN112054997B (en) Voiceprint login authentication method and related product thereof
CN112257051B (en) WeChat-based selective data processing method, device and medium
US20230418914A1 (en) Method, device and system for generating passwords

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination