CN109104398A - A kind of verification method and device - Google Patents
A kind of verification method and device Download PDFInfo
- Publication number
- CN109104398A CN109104398A CN201710477757.3A CN201710477757A CN109104398A CN 109104398 A CN109104398 A CN 109104398A CN 201710477757 A CN201710477757 A CN 201710477757A CN 109104398 A CN109104398 A CN 109104398A
- Authority
- CN
- China
- Prior art keywords
- network equipment
- verifying
- network
- communication account
- verification information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the present application provides a kind of verification method and device, which comprises the verifying event of monitoring first network equipment, the first network equipment have the first communication account;The second communication account of second network equipment is obtained, and based on the second communication account request verification information;It is verified according to the verification information of second network equipment.According to the embodiment of the present application, verifying can be completed without using the first communication account of first network equipment, avoid revealing userspersonal information in verification process, improve the safety of verification process.
Description
Technical field
This application involves safety verification fields, more particularly to a kind of verification method and a kind of verifying device.
Background technique
User access public WiFi or shopping, house lease, online about vehicle etc. provide network service using soft
On part or transaction platform when login account, it usually needs user using the personal information such as personal phone number, email accounts into
Row verifying.
When being verified, phone number, email accounts can be committed to authentication server by user, and authentication server is then
Some identifying code can be sent to the phone number or email accounts by accordingly by way of short message or mail, user is from connecing
Identifying code is obtained in the short message or mail of receipts and is committed to authentication server to complete to verify.
However, applicant it has been investigated that, in the verification method of the prior art, verification process needs user using personal letter
Breath is verified, and personal information may be revealed in verification process, or even by illegal utilization.Therefore, the verifying of the prior art
Method has that the safety of verification process is lower.
Summary of the invention
The technical problem to be solved in the embodiments of the present application is that providing a kind of verification method and a kind of verifying device.
To solve the above-mentioned problems, this application provides a kind of verification methods, which comprises
The verifying event of first network equipment is monitored, the first network equipment has the first communication account;
The second communication account of second network equipment is obtained, and based on the second communication account request verification information;
It is verified according to the verification information of second network equipment.
Optionally, the step of verifying event of the monitoring first network equipment includes:
Detect the network connecting request that the first network equipment is initiated;
Determine that the target network of access corresponding requests needs to be implemented verification process.
Optionally, before the network connecting request that the detection first network equipment is initiated the step of, the side
Method further include:
Notice is connected in the operating system registered network of the first network equipment;
The step of network connecting request that the detection first network equipment is initiated includes:
It receives the first network equipment and initiates the network connection notice that the operating system is sent when network connecting request.
Optionally, described to determine that the step of target network for accessing corresponding requests needs to be implemented verification process includes:
Judge network connection state of the first network equipment after network connecting request sending;
If the network connection state is to disconnect network, it is determined that the target network for accessing corresponding requests needs to be implemented verifying
Process.
Optionally, the method also includes:
Intercept the verifying page that the verifying event is triggered in the first network equipment.
Optionally, the method is executed by verifying auxiliary program, in the verifying event for monitoring first network equipment
After step, the method also includes:
The prompt to the verifying event is generated, the prompt includes the calling control for verifying auxiliary program;
According to the triggering for calling control, show that the verifying assists journey in the main screen of the first network equipment
Sequence.
Optionally, the step of second communication account for obtaining second network equipment includes:
Communication account acquisition request is sent to second network equipment;
Second network equipment is received from least one the communication account having, is chosen for the first network equipment
Second communication account.
Optionally, before the step of described based on the second communication account request verification information, the method is also wrapped
It includes:
Account is communicated to the authentication server requests verification page according to described second.
Optionally, the verifying page includes the first input control for communication account, described logical based on described second
Interrogate account request verification information the step of include:
The second communication account is written to the relative position of first input control;
It is operated by the transmission for executing for first input control, is sent to the authentication server and carry described the
The verification information acquisition request of two communication accounts;Wherein, the verification information feeds back to the second communication account corresponding the
Two network equipments.
Optionally, the verifying page includes the second input control for communication account, described according to second net
The step of verification information of network equipment is verified include:
The verification information is written to the relative position of second input control;
By executing the transmission operation for second input control.It is sent to the authentication server and carries verifying letter
The checking request of breath, to be verified by the authentication server to verification information.
To solve the above-mentioned problems, present invention also provides a kind of verification methods, which comprises
The second communication account is provided to first network equipment, to be based on the second communication account by the first network equipment
Family requests verification information;
Receive the verification information sent based on the second communication account, and be supplied to the first network equipment, with by
The first network equipment is verified according to the verification information.
To solve the above-mentioned problems, present invention also provides a kind of verification methods, which comprises
Determine first network equipment occur verifying event, wherein the first network equipment have the first device identification or
The first user identifier of person, the verifying event include the verifying event between authentication server and the first network equipment;
Obtain the second device identification or second user mark from second network equipment;
Verifying event is completed based on second device identification or second user mark.
Optionally, the device identification includes the physical address and/or identification code of communication apparatus, and the user identifier includes
Communicate account.
To solve the above-mentioned problems, present invention also provides a kind of verifying device, described device includes:
Event-monitoring module is verified, for monitoring the verifying event of first network equipment, the first network equipment has
First communication account;
It communicates account and obtains module, for obtaining the second communication account of second network equipment, and it is logical based on described second
Interrogate account request verification information;
Authentication module, for being verified according to the verification information of second network equipment.
To solve the above-mentioned problems, present invention also provides a kind of verifying device, described device includes:
It communicates account and module is provided, for providing the second communication account to first network equipment, by the first network
Equipment is based on the second communication account request verification information;
Verification information provides module, for receiving the verification information sent based on the second communication account, and is supplied to
The first network equipment, to be verified by the first network equipment according to the verification information.
To solve the above-mentioned problems, present invention also provides a kind of verifying device, described device includes:
Event determination module is verified, for determining that verifying event occurs for first network equipment, wherein the first network is set
Standby to have the first device identification or the first user identifier, the verifying event includes that authentication server is set with the first network
Verifying event between standby;
Identifier acquisition module, for obtaining the second device identification or second user mark from second network equipment;
Verifying event completes module, for completing verifying based on second device identification or second user mark
Event.
Compared with prior art, the embodiment of the present application includes the following advantages:
According to the embodiment of the present application, the second of second network equipment is obtained by the verifying event for first network equipment
Account is communicated, and based on the second communication account request verification information, is verified using the verification information of the second communication account, from
And executed in verification process in first network equipment, it can be completed and test without the first communication account using first network equipment
Card, avoids revealing userspersonal information in verification process, improves the safety of verification process.
Further, it is logical to execute write-in first without user in first network equipment for the verification method of the embodiment of the present application
News account checks multiple operations such as verification information, write verification information, to save user's operation.
Further, determining that trigger second network equipment of acquisition when needing the verifying event of verification process again second is logical
Account is interrogated, is avoided there is no in the case where verifying event, first network equipment communicates account to the second network device requests second
Family, second network equipment return to process resource spent by second communication account treatment process, save first network equipment
With the process resource of second network equipment.
Further, verifying auxiliary program intercepts verifying event and touches in first network equipment when monitoring verifying event
The verifying page of hair avoids the verifying page from showing in first network equipment, while verifying auxiliary program execution verification process,
Save the process resource that first network equipment shows the verifying page.
When the verification method of the application is applied to the verification process of mobile phone access Wi-Fi hotspot, verifying auxiliary program is being supervised
It controls after mobile phone access Wi-Fi hotspot needs verification process, by requesting shared phone number to verifying secondary server, and adopts
Verification process is completed with shared phone number, to be verified without user using the personal mobile phone number of user, is avoided
Userspersonal information is revealed in verification process, improves the safety of verification process.Moreover, authentication compared with the existing technology
Method, the verification method of the embodiment of the present application carry out input handset number respectively without user, check that short message, input identifying code etc. are more
A operation, to save user's operation.
Detailed description of the invention
Fig. 1 is a kind of application scenario diagram of access Wi-Fi hotspot verifying of the embodiment of the present application one;
Fig. 2 is a kind of step flow chart of verification method of the embodiment of the present application two;
Fig. 3 is a kind of step flow chart of verification method of the embodiment of the present application three;
Fig. 4 is a kind of step flow chart of verification method of the embodiment of the present application four;
Fig. 5 is a kind of step flow chart of verification method of the embodiment of the present application five;
Fig. 6 is a kind of structural block diagram of verifying device of the embodiment of the present application six;
Fig. 7 is a kind of structural block diagram of verifying device of the embodiment of the present application seven;
Fig. 8 is a kind of structural block diagram of verifying device of the embodiment of the present application eight;
Fig. 9 is a kind of structural block diagram of verifying device of the embodiment of the present application nine;
Figure 10 is a kind of exemplary system of the embodiment of the present application;
Figure 11 is the schematic diagram one that a kind of verification process of the application is shown;
Figure 12 is the schematic diagram two that a kind of verification process of the application is shown;
Figure 13 is the schematic diagram three that a kind of verification process of the application is shown;
Figure 14 is the schematic diagram four that a kind of verification process of the application is shown.
Specific embodiment
In order to make the above objects, features, and advantages of the present application more apparent, with reference to the accompanying drawing and it is specific real
Applying mode, the present application will be further described in detail.
The application is deeply understood for the ease of those skilled in the art, will introduce profession involved in the application first below
The definition of term.
The network equipment includes the physical entity being connected in network.The network equipment can be classified as client according to service object
End and server-side.Client may include the mobile terminal that the users such as mobile phone, tablet computer use.Server-side may include service
Device etc. provides the terminal of service to client.First network equipment in the application includes the network equipment for belonging to client, the
Two network equipments include the network equipment for belonging to server-side.
Network service includes the service that the network equipment is obtained by accessing network data.For example, access Wi-Fi hotspot, online
Ticket booking, shopping at network, registration of website account, online about vehicle etc. service.
Verifying event needs to be implemented verification process when including the service of network device requests network to obtain the event of authorization.Example
Such as, when accessing Wi-Fi hotspot, Wi-Fi hotspot returns to the verifying page, and user's input handset number and identifying code is requested to be verified
Event.In another example the page is verified in about vehicle application software pop-up when carrying out online about vehicle by about vehicle application software, user is requested
The event that input e-mailbox count and identifying code are verified.
Communication account includes the account for interactive information between the network equipment.For example, phone number, E-mail address account
Family, instant message applications account etc..Communication account can with according to whether be specific to specific user be classified as person-to-person communication account and
Shared communication account.The first communication account of the application includes person-to-person communication account, and the second communication account includes shared communication account
Family.
Verification information includes information generate for communication account, for verifying user's correctness, also referred to as identifying code.
Identifying code can be number, such as " 123456 ";It may be character, such as " user's checking ".
Embodiment one
Fig. 1 shows a kind of application scenario diagram of access Wi-Fi hotspot verifying of the embodiment of the present application one.It can be seen that
It include WiFi authentication server, Wi-Fi hotspot, user/mobile phone, verifying auxiliary journey in the verifying scene of the embodiment of the present application
Sequence and verifying secondary server.User accesses Wi-Fi hotspot by mobile phone to enjoy free public WiFi.
In the verification method of the prior art, when accessing Wi-Fi hotspot, need user using the hand of access Wi-Fi hotspot
The phone number of machine is verified.Specifically, when user initiates the request of access Wi-Fi hotspot by mobile phone, Wi-Fi hotspot meeting
The verifying page of WiFi access is returned to, mobile phone can then trigger after receiving the verifying page and show the verifying page on the home screen
Face.User can be written personal mobile phone number and be submitted on the verifying page shown, and WiFi authentication server is receiving
After people's phone number, the short message comprising identifying code can be sent for the personal mobile phone number, user is testing after receiving short message
It demonstrate,proves write verification code on the page and submits, whether the identifying code that WiFi authentication server judges that user submits is matched with personal mobile phone
Number, if then passing through verifying.
In verification method provided by the embodiments of the present application, the verifying auxiliary program being mounted on mobile phone can be in advance in hand
Registered network connection notice in the operating system of machine, to operate when user initiates the request of access Wi-Fi hotspot by mobile phone
System sends notice to verifying auxiliary program, and verifying auxiliary program can trigger after receiving notice carries out subsequent network company
Connect state judgement processing.
Verifying auxiliary program may determine that mobile phone after the request for initiating access Wi-Fi hotspot, and network connection state is
The no state to disconnect network;If so, can determine that Wi-Fi hotspot needs to carry out proving program and can just access;If it is not, table
Bright currently to can access the Wi-Fi hotspot without proving program, verifying auxiliary program can terminate verification processing and exit the program.
When determining that access Wi-Fi hotspot needs proving program, phone number can be sent to verifying secondary server and obtained
Request.Verifying secondary server, can be from preset multiple when receiving the phone number acquisition request of verifying auxiliary program
In phone number, some phone number is randomly selected, returns to verifying auxiliary program.
Wherein, multiple phone numbers can be preset by verifying in secondary server, and verifying secondary server can be according to asking
It asks, distributes wherein one or more phone numbers and verified to user, complete verifying or user in user and use WiFi heat
After point, which can be distributed to other users again and used by verifying secondary server.Therefore, in order to be different from
The phone number for verifying secondary server distribution can be named as shared cell-phone number by the personal mobile phone number on the mobile phone of user
Code.
The shared phone number received can be committed to Wi-Fi hotspot by verifying auxiliary program, be total to this by Wi-Fi hotspot
It enjoys phone number and is back to WiFi authentication server.WiFi authentication server generates identifying code for the shared phone number, and
The short message comprising identifying code is sent to the shared phone number for being placed in verifying secondary server.
Verifying secondary server extracts identifying code after receiving short message from short message, and is back to verifying auxiliary program.
The identifying code received can be committed to Wi-Fi hotspot by verifying auxiliary program, be returned the identifying code by Wi-Fi hotspot
It is back to WiFi authentication server.WiFi authentication server is verified for received identifying code;If being verified, notify
Wi-Fi hotspot allows mobile phone to access;If authentication failed, Wi-Fi hotspot refusal mobile phone access is notified.
According to the embodiment of the present application, auxiliary program is verified after monitoring mobile phone access Wi-Fi hotspot and needing verification process,
By requesting shared phone number to verifying secondary server, and verification process is completed using shared phone number, thus need not
User is verified using the personal mobile phone number of user, is avoided revealing userspersonal information in verification process, is improved and test
The safety of card process.
Further, the verification method of verification method compared with the existing technology, the embodiment of the present application is distinguished without user
It carries out input handset number, check multiple operations such as short message, input identifying code, to save user's operation.
Embodiment two
Fig. 2 shows a kind of step flow charts of verification method of the embodiment of the present application two, mainly from first network equipment
Angle a kind of verification method is provided, the method can specifically comprise the following steps:
Step 201, the verifying event of first network equipment is monitored, the first network equipment has the first communication account.
User can obtain various network services by first network equipment.When obtaining network service, user needs head
Verification process is first carried out, obtains network service by being just allowed to after verifying.It is directed to different network services, can have more
The different verifying scene of kind.
For example, when user accesses some free public Wi-Fi hotspot, Wi-Fi hotspot needs to use in Wi-Fi hotspot verifying scene
Family is verified using phone number, just allows to access Wi-Fi hotspot after being verified.
In another example in social platform registered members' account, social platform needs to use user in website registration verifying scene
Family is verified using email accounts, just allows to be registered as the member of social platform after being verified.
In another example about vehicle is verified in scene online, user, which initiates about vehicle in about vehicle platform by about vehicle application software, to be requested
When, about vehicle platform needs user to verify using instant message applications account, just allows to send out in about vehicle platform after being verified
About vehicle is played to request.
Verification method according to prior art needs user to set using first network in above-mentioned a variety of verifying scenes
Standby possessed first communication account is verified.
For example, user the phone number of mobile phone can be written when user accesses Wi-Fi hotspot by the mobile phone of oneself
It clicks and submits to the verifying page, phone number is sent to WiFi authentication server, WiFi authentication server can be according to mobile phone
Number generates verification information and sends the mobile phone of short message to user, and user reads verification information in short message and is written to verifying
The page again taps on submission and sends verification information to WiFi authentication server.
In another example social platform prompt user mentions when user registers member's account of social platform on tablet computer
The e-mailbox count for handing over individual subscriber, after user submits e-mailbox count, social platform is sent out to the e-mailbox count
The mail comprising verification information is sent, user enters the e-mailbox count, verification information read in the mail received, and mention
Verification information is given to social platform.
According to the verification method of the embodiment of the present application, can be supervised by the verifying auxiliary program being mounted in first network equipment
Control the verifying event in first network equipment.
Monitoring verifying event may include processing and the verifying auxiliary program verified auxiliary program triggering and judge verifying event
Judge whether there is the processing of verifying event two treatment processes.
In practical application, verifying event can be judged using various ways triggering verifying auxiliary program.
For example, verifying auxiliary program can be in advance in the operation system of first network equipment in Wi-Fi hotspot verifying scene
Registered network connection notice on system, when first network equipment currently initiates network connecting request to access Wi-Fi hotspot, operation
System then notifies verifying auxiliary program, and the triggering of verifying auxiliary program handles the judgement of verifying event.
In another example registering in verifying scene or online about vehicle verifying scene in website, verifying auxiliary program can exist in advance
Notice is logged in for multiple social platform login accounts on the browser of first network equipment, or in advance in first network equipment
Operating system on for multiple about vehicle application software registration starting notice, access some social platform in browser and carry out account
When family logs in or os starting some about vehicle application software when, browser or operating system then notify verifying auxiliary journey
Sequence, the triggering of verifying auxiliary program handle the judgement of verifying event.
In another example verifying auxiliary program can be installed in first network equipment and monitor plug-in unit, monitoring plug-in unit can be monitored
Wi-Fi hotspot is connected in first network equipment, Web account registration, application software initiated etc. the possibility newly installed need to be implemented
The characteristic event of verification process, after listening to characteristic event, verifying auxiliary program, verifying auxiliary journey can be notified by monitoring plug-in unit
Sequence triggering handles the judgement of verifying event.In practice, can also directly be judged by monitoring plug-in unit currently with the presence or absence of verifying thing
Part, if then notifying verifying auxiliary program, to execute subsequent verification process by verifying auxiliary program.
After the triggering of verifying auxiliary program is to the judgement processing of verifying event, can using various ways judgement it is current whether
In the presence of the verifying event for needing to be implemented verification process.
For example, verifying auxiliary program may determine that the network connection of first network equipment in Wi-Fi hotspot verifying scene
State shows that accessing the Wi-Fi hotspot needs to be implemented verification process if its network state is to disconnect network, it can determines first
There is currently verifying events for the network equipment.Verifying auxiliary program also can detecte whether first network equipment receives verifying page
Face shows that accessing the Wi-Fi hotspot needs to be implemented verification process if receiving the verifying page, it can determines first network equipment
There is currently verifying events.
In another example registering in verifying scene in website, verifying auxiliary program may determine that user in request registration of website account
When family, user whether is required to submit communication account and verification information on the enrollment page that website is shown, if then showing to register net
Account of standing needs to be implemented verification process, it can determining first network equipment, there is currently verifying events.
It should be noted that the processing that above-mentioned example is only used for illustrating the monitoring verifying event of the embodiment of the present application is suitable
For a variety of different verifying scenes, not the specific embodiment of monitoring verifying event is defined.Those skilled in the art
Member can monitor the verifying event of first network equipment, using various different modes according to specific application scenarios to supervise
When controlling verifying event, triggering obtains the second communication account of second network equipment, and based on the second communication account request verifying
Information.
Step 202, the second communication account of second network equipment is obtained, and based on the second communication account request verifying
Information.
In the specific implementation, the verifying auxiliary program available after monitoring verifying event, in first network equipment
Second communication account of two network equipments.More specifically, verifying auxiliary program can send communication account to second network equipment
Its second communication account can be sent to verifying auxiliary program by acquisition request, second network equipment.
After verifying auxiliary program gets the second communication account, the second communication account request verification information can use.More
Specifically, the second communication account can be committed to authentication server by verifying auxiliary program, authentication server can for this
Two communication accounts generate a verification information, the second communication account being then sent to the verification information on second network equipment
Family.
Step 203, it is verified according to the verification information of second network equipment.
In the specific implementation, verifying auxiliary program can be verified using the verification information of second network equipment.More specifically
Ground, second network equipment can be back to verifying auxiliary program, verifying auxiliary after receiving the verification information of authentication server
The verification information can be committed to authentication server by program, be judged whether according to verification information by testing by authentication server
Card.
For example, in Wi-Fi hotspot verifying scene, if current verifying event needs user to test using phone number
Card, verifying auxiliary program can request phone number, verifying auxiliary clothes to the verifying secondary server as the second equipment of network
Business device randomly selects a phone number as the second communication account, is sent to verifying auxiliary program, verifying auxiliary program receives
WiFi authentication server can be committed to after phone number, WiFi authentication server can generate string number " 123456 " at random
As verification information, short message is generated using the verification information, and be sent to verifying secondary server.Verifying secondary server can be with
Verification information " 123456 " is extracted from short message and is back to verifying auxiliary program, and verifying auxiliary program can believe the verifying
Breath " 123456 " is committed to WiFi authentication server can notify Wi-Fi hotspot to allow after WiFi authentication server is by verifying
The access of first network equipment.
In another example being registered in verifying scene in website, if current verifying event needs user to utilize e-mailbox count
It is verified, verifying auxiliary program can request e-mailbox count to the verifying secondary server as the second equipment of network,
Verifying secondary server randomly selects an e-mailbox count as the second communication account, is sent to verifying auxiliary program, tests
Card auxiliary program can be committed to Account Registration authentication server after receiving e-mailbox count, and Account Registration authentication server can
Mail is generated using the verification information as verification information to generate a string of characters " user's checking " at random, and is sent to verifying
Secondary server.Verifying secondary server can extract verification information " user's checking " from mail and be back to verifying auxiliary
The verification information " user's checking " can be committed to Account Registration authentication server, Account Registration by program, verifying auxiliary program
After authentication server is by verifying, website can be notified to allow user in website login account.
According to the embodiment of the present application, the second of second network equipment is obtained by the verifying event for first network equipment
Account is communicated, and based on the second communication account request verification information, is verified using the verification information of the second communication account, from
And executed in verification process in first network equipment, it can be completed and test without the first communication account using first network equipment
Card, avoids revealing userspersonal information in verification process, improves the safety of verification process.
Further, it is logical to execute write-in first without user in first network equipment for the verification method of the embodiment of the present application
News account checks multiple operations such as verification information, write verification information, to save user's operation.
Embodiment three
Fig. 3 shows a kind of step flow chart of verification method of the embodiment of the present application three, mainly from first network equipment
Angle a kind of verification method is provided, the method can specifically comprise the following steps:
Step 301, notice is connected in the operating system registered network of the first network equipment.
In the specific implementation, the verifying auxiliary program being mounted in first network equipment, it can be in the behaviour of first network equipment
Make registered network connection notice in system, when notifying so as to the network connection for receiving operating system in verifying auxiliary program, touching
The judgement to the network connection state of first network equipment is sent out to handle.
Step 302, the verifying event of first network equipment is monitored, the first network equipment has the first communication account.
Optionally, the step 302 includes following sub-step:
Sub-step S11 detects the network connecting request that the first network equipment is initiated;
Sub-step S12 determines that the target network of access corresponding requests needs to be implemented verification process.
In the specific implementation, can detecte the network connecting request that first network equipment is currently initiated, according to the network connection
Request judges whether the target network of request needs to be implemented verification process.For example, detecting mobile phone initiation access Wi-Fi hotspot
Connection request after, mobile phone receive Wi-Fi hotspot return the verifying page, and needed on the verifying page user submit mobile phone
Number and identifying code, it is possible to determine that access the Wi-Fi hotspot and need to be implemented verification process.
Optionally, the sub-step S11 includes:
Sub-step S11-1 receives the first network equipment and initiates what operating system when network connecting request was sent
Network connection notice.
In the specific implementation, showing that first network is set if verifying auxiliary program receives the network connection notice of operating system
It is standby currently to have initiated network connecting request, therefore the processing of the judgement to the network connection state of first network equipment can be triggered.
Optionally, the sub-step S12 includes:
Sub-step S12-1 judges network connection state of the first network equipment after network connecting request sending;
Sub-step S12-2, if the network connection state is to disconnect network, it is determined that access the target network of corresponding requests
Need to be implemented verification process.
In the specific implementation, verifying auxiliary program may determine that whether the network connection state of first network equipment is to disconnect net
Network.After first network equipment issues network connecting request, if you do not need to executing verification process, the network of first network equipment
Connection status is then to be successfully connected network, and if necessary to execute verification process, the network connection state of first network equipment is then
Disconnect network.Therefore, when network connection state is to disconnect network, it is possible to determine that access target network needs to be implemented verification process,
That is, there is currently verifying events for first network equipment.
According to the embodiment of the present application, second network equipment is obtained determining to trigger again when needing the verifying event of verification process
The second communication account, avoid process resource caused by obtaining the second communication account there is no verifying event
Waste, saves the process resource of first network equipment and second network equipment.
Step 303, the verifying page that the verifying event is triggered in the first network equipment is intercepted.
When there are verifying events for first network equipment, displaying verifying page would generally be triggered in first network equipment by verifying event
Face, so that write-in communicates account and verification information to user on the verifying page.Therefore, in the verification method of the embodiment of the present application
In, in the event of verifying when first network equipment triggers the verifying page, verifying auxiliary program can intercept the verifying page, thus
Save the process resource that first network equipment shows the processing verifying page.
Step 304, the second communication account of second network equipment is obtained, and based on the second communication account request verifying
Information.
Optionally, the step of second communication account for obtaining second network equipment may include following sub-step:
Sub-step S21 sends communication account acquisition request to second network equipment;
Sub-step S22 receives second network equipment from least one the communication account having, is first net
The second communication account that network equipment is chosen.
In the specific implementation, verifying auxiliary program can send communication account acquisition request to second network equipment.Wherein,
Two network equipments can have multiple communication accounts, and second network equipment is when receiving communication account acquisition request, Ke Yicong
Sequentially or a communication account is randomly selected in multiple communication accounts, as the second communication account, is back to verifying auxiliary program.
Step 305, it is verified according to the verification information of second network equipment.
Optionally, the verifying page includes the first input control for communication account, described logical based on described second
Interrogate account request verification information the step of include:
The second communication account is written to the relative position of first input control;
It is operated by the transmission for executing for first input control, is sent to the authentication server and carry described the
The verification information acquisition request of two communication accounts;Wherein, the verification information feeds back to the second communication account corresponding the
Two network equipments.
In the specific implementation, the verifying page that verifying auxiliary program can call first network equipment to receive, is tested by this
It demonstrate,proves the page and submits the second communication account.It may include the first input control having for being written and sending communication account on the verifying page
Part.Wherein, a relative position can be arranged for the first input control on the page by verifying, for communication account to be written.It is testing
Auxiliary program is demonstrate,proved by after the second communication account write-in relative position, the transmission operation of the first input control can be executed, thus will
The verification information acquisition request for carrying the second communication account is sent to authentication server, tests so that authentication server accordingly generates
Information is demonstrate,proved, and verification information is back to second network equipment with the second communication account.
For example, verifying the page on be provided with write-in phone number input interface and one for the input interface carry out
The submitting button of submission, after phone number is written in input interface, verifying auxiliary program triggering executes submitting button, will carry
The verification information acquisition request of phone number is sent to authentication server.
Optionally, the verifying page includes the second input control for communication account, described according to second net
The step of verification information of network equipment is verified include:
The verification information is written to the relative position of second input control;
By executing the transmission operation for second input control.It is sent to the authentication server and carries verifying letter
The checking request of breath, to be verified by the authentication server to verification information.
Authentication server can extract the second communication account therein, accordingly after receiving verification information acquisition request
A verification information is generated, and is back to the second communication account, that is, verification information is back to the second communication account
Second network equipment.Second network equipment can return it to testing for first network equipment after receiving verification information
Auxiliary program is demonstrate,proved, completes verifying to verify auxiliary program using verification information.
In the specific implementation, verifying can be passed through after the verifying auxiliary program of first network equipment receives verification information
The page submits verification information.In addition to the first input control, verifying on the page can also include for being written and sending verifying letter
Second input control of breath.A relative position can be arranged for the second input control on the page by verifying, and be used for write verification
Information.After relative position is written in verification information by verifying auxiliary program, the transmission operation of the second input control can be executed, from
And the checking request for carrying verification information is sent to authentication server, so that authentication server is for testing in checking request
Card information is verified.
Optionally, the method is executed by verifying auxiliary program, in the verifying event for monitoring first network equipment
After step, the method also includes:
The prompt to the verifying event is generated, the prompt includes the calling control for verifying auxiliary program;
According to the triggering for calling control, show that the verifying assists journey in the main screen of the first network equipment
Sequence.
In the specific implementation, verifying auxiliary program can be in the main screen of first network equipment after monitoring verifying event
It is upper to generate the prompt for being directed to verifying event, to notify user that there is currently verifying events, and tested by the execution of verifying auxiliary program
Card process.For example, popping up prompt window " opening verifying auxiliary program " on the home screen.
In practical applications, prompt can be generated before intercepting the verifying event triggering verifying page, can also intercepted
Generate prompt after the verifying event triggering verifying page, can also the prompt when execution verification process finishes, can also be without
Prompt.Those skilled in the art can set according to actual needs.
Wherein, which may include the calling control for verifying auxiliary program.When calling control to be triggered by user,
Verifying auxiliary program can be triggered to be shown in the main screen of first network equipment, so that the verification process to be executed is complete
Site preparation is shown to user.
When the main screen of first network equipment shows verifying auxiliary program, verifying page can be called in verifying auxiliary program
Face, and the verification process filled in from the second communication account and verification information to the relative position of the verifying page is shown one by one.
Auxiliary program is verified when showing in main screen, the verifying page intercepted before can showing can also be based on second
Account is communicated to the authentication server requests verification page again, the verifying page that authentication server is returned based on the second communication account
Face is shown on verifying auxiliary program.
In practical application, verifying auxiliary program can also be when monitoring verifying event, and directly triggering is shown in main screen.Or
Person verifies auxiliary program after prompt, does not show in main screen, but executing entire verification process from the background, to save
Save the process resource that first network equipment shows verifying auxiliary program.
It should be noted that in practical applications, verifying auxiliary program can determined there are when verifying event, to second
The network equipment sends communication account acquisition request.Communication account can also be sent when intercepting the verifying event triggering verifying page
Acquisition request.Communication account acquisition request can also be sent after generating the prompt for verifying event.It can also be in prompt
It calls control to be triggered, verify auxiliary program when showing in main screen, sends communication account acquisition request.Those skilled in the art
It can be set according to actual needs.
Optionally, before the step of described based on the second communication account request verification information, the method is also wrapped
It includes:
Account is communicated to the authentication server requests verification page according to described second.
In the specific implementation, first network equipment can use after getting the second communication account of second network equipment
Second communicates account to the authentication server requests verification page.
According to the embodiment of the present application, auxiliary program is verified when monitoring verifying event, intercepts verifying event in the first net
The verifying page of network equipment triggering, avoids the verifying page from showing in first network equipment, executes in verifying auxiliary program authenticated
While journey, the process resource that first network equipment shows the verifying page is saved.
Example IV
Fig. 4 shows a kind of step flow chart of verification method of the embodiment of the present application four, mainly from second network equipment
Angle a kind of verification method is provided, the method can specifically comprise the following steps:
Step 401, the second communication account is provided to first network equipment, to be based on described the by the first network equipment
Two communication account request verification informations.
Step 402, the verification information sent based on the second communication account is received, and is supplied to the first network and sets
It is standby, to be verified by the first network equipment according to the verification information.
According to the embodiment of the present application, after receiving the communication account acquisition request of first network equipment, the second network is set
It is standby to return to the second communication account to first network equipment.Wherein, second network equipment can have multiple communication accounts, connect
After receiving communication account acquisition request, wherein one or more are chosen from multiple communication accounts, as the second communication account.
First network equipment, can be based on the second communication account request verification information after receiving the second communication account.
Processing step of the first network equipment based on the second communication account request verification information is in the above-described embodiments it is stated that herein
It repeats no more.
The verification information of first network device request can be sent to second network equipment with the second communication account.The
The verification information received can be sent to first network equipment by two network equipments, be believed by first network equipment using the verifying
Breath is verified.The processing step that first network equipment is verified using verification information in the above-described embodiments it is stated that
Details are not described herein.
According to the embodiment of the present application, first network equipment is tested by the second communication account that second network equipment provides
Card, thus first network equipment execute verification process in, without use first network equipment first communicate account can be complete
It at verifying, avoids revealing userspersonal information in verification process, improves the safety of verification process.
The embodiment of the present application in order to facilitate understanding by those skilled in the art, below with reference to the specific example of Figure 11 to Figure 14
It is explained.Following example shows the main screen for mainly illustrating first network equipment authenticated performed by verifying auxiliary program
Journey.
Figure 11 is the schematic diagram one that a kind of verification process of the application is shown.It can be seen that operation of the user in mobile phone
The network connecting request of the access ChinaNet-Starbucks WIFI hot spot is initiated in system.Verifying auxiliary program can receive
The network connection notice sent to operating system, so that it is determined that current mobile phone initiates network connecting request.Verify auxiliary program
When determining that mobile phone initiates network connecting request, it can trigger and judge whether there is verifying event, when there is currently verifyings for determination
Event, the verifying event that verifying auxiliary program can intercept trigger the displaying verifying page in the main screen of mobile phone.
Figure 12 is the schematic diagram two that a kind of verification process of the application is shown.It can be seen that verifying auxiliary program is directed to
Verifying event generates prompt, and is shown in the form of pop-up window in main screen.In the prompt include call control, when with
When the prompt is clicked at family, verifying auxiliary program can be called to be shown in main screen.
Figure 13 is the schematic diagram three that a kind of verification process of the application is shown.It can be seen that prompt when the user clicks with
When triggering the calling control of prompt, verifying auxiliary program is called, and main screen is from the network connection changing interface of operating system to testing
Demonstrate,prove the startup interface of auxiliary program.
Figure 14 is the schematic diagram four that a kind of verification process of the application is shown.It can be seen that including on the verifying page
The input field of phone number and verification information, the mobile phone that verifying auxiliary program can will be got from verifying secondary server is written
Number " 14705191269 " write-in is executed to " password please being issued me to phone number input field!" clicking operation, with
Phone number be written is sent to WiFi authentication server, verification information " 24188 " will be included by WiFi authentication server
Short message is sent to " 14705191269 " communication account of verifying secondary server, after verifying secondary server receives short message,
Extract verification information " 24188 " from short message and be back to verifying auxiliary program, verifying auxiliary program will " 24188 " write-in to testing
Information input column is demonstrate,proved, and executes the clicking operation to " connection is surfed the Internet ", verification information is back to authentication server, by verifying
Server is verified.
Embodiment five
Fig. 5 shows a kind of step flow chart of verification method of the embodiment of the present application five, mainly from first network equipment
Angle a kind of verification method is provided, the method can specifically comprise the following steps:
Step 501, determine that verifying event occurs for first network equipment, wherein the first network equipment has first to set
Standby mark or the first user identifier, the verifying event include the verifying between authentication server and the first network equipment
Event.
Step 502, the second device identification or second user mark from second network equipment are obtained.
Step 503, verifying event is completed based on second device identification or second user mark.
In the specific implementation, first network equipment can be monitored, the verifying event in first network equipment is determined.Due to preceding
The specific embodiment that monitoring first network equipment has been described in detail in embodiment and has determined verifying event is stated, herein no longer
It repeats.
In general, verifying event may need to mark using the first device identification of first network equipment or the first user of user
Know and completes verifying event.
It in the embodiment of the present application, can be to second the second device identification of network device requests when determining verifying event
Or second user mark.
Wherein, second network equipment can have multiple user identifiers, after receiving the request, can choose wherein some use
Family mark is identified as second user, is back to first network equipment.
Wherein, multiple network equipments can also be preset, each network equipment has unique device identification, asks receiving
After asking, can choose wherein some network equipment as second network equipment, using the device identification of second network equipment as
Second device identification is back to first network equipment.
In first network equipment, the second device identification or second user that can use second network equipment have been identified
At verifying.
Optionally, the user identifier may include communication account.
The specific embodiment that verifying event is completed using communication account, has been described in detail in the aforementioned embodiment,
This is repeated no more.
Optionally, device identification may include the physical address and/or identification code of communication apparatus.
In practical application, such as mobile phone, tablet computer communication apparatus can have unique MAC Address (Media
Access Control, media access control) or IMEI identification code (International Mobile Equipment
Identity, International Mobile Station Equipment Identification code).When verifying event needs to complete using above-mentioned MAC Address or IMEI identification code
Verifying event then can complete verifying event using the MAC Address or IMEI identification code of second network equipment.
According to the embodiment of the present application, first network equipment is used using the second device identification of second network equipment or second
Family mark completes verifying event, and the first device identification of first network equipment or the first user identifier need not be used to be tested
Card, avoids revealing userspersonal information in verification process, improves the safety of verification process.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method
It closes, but those skilled in the art should understand that, the embodiment of the present application is not limited by the described action sequence, because according to
According to the embodiment of the present application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should
Know, the embodiments described in the specification are all preferred embodiments, and related movement not necessarily the application is implemented
Necessary to example.
Embodiment six
Corresponding with embodiment two, the embodiment of the present application six additionally provides a kind of verifying device.Fig. 6 shows the application implementation
A kind of structural block diagram of verifying device of example six, mainly provides a kind of verifying device, the dress from the angle of first network equipment
It sets and comprises the following modules:
Event-monitoring module 601 is verified, for monitoring the verifying event of first network equipment, the first network equipment tool
There is the first communication account.
It communicates account and obtains module 602, for obtaining the second communication account of second network equipment, and be based on described second
Communicate account request verification information.
Authentication module 603, for being verified according to the verification information of second network equipment.
According to the embodiment of the present application, the second of second network equipment is obtained by the verifying event for first network equipment
Account is communicated, and based on the second communication account request verification information, is verified using the verification information of the second communication account, from
And executed in verification process in first network equipment, it can be completed and test without the first communication account using first network equipment
Card, avoids revealing userspersonal information in verification process, improves the safety of verification process.
Further, it is logical to execute write-in first without user in first network equipment for the verification method of the embodiment of the present application
News account checks multiple operations such as verification information, write verification information, to save user's operation.
Embodiment seven
Corresponding with embodiment three, the embodiment of the present application six additionally provides a kind of verifying device.Fig. 7 shows the application implementation
A kind of structural block diagram of verifying device of example seven, mainly provides a kind of verifying device, the dress from the angle of first network equipment
It sets and comprises the following modules:
Network connection notice registration module 701, for the operating system registered network connection in the first network equipment
Notice.
Event-monitoring module 702 is verified, for monitoring the verifying event of first network equipment, the first network equipment tool
There is the first communication account.
Verify page blocking module 703, the verifying triggered for intercepting the verifying event in the first network equipment
The page.
It communicates account and obtains module 704, for obtaining the second communication account of second network equipment, and be based on described second
Communicate account request verification information.
Authentication module 705, for being verified according to the verification information of second network equipment.
Optionally, the verifying event-monitoring module 702 includes:
Network connecting request detection sub-module, the network connecting request initiated for detecting the first network equipment;
Verification process decision sub-module, for determining that the target network for accessing corresponding requests needs to be implemented verification process.
Optionally, the network connecting request detection sub-module includes:
It is connected to the network notification receiving unit, behaviour when for receiving the first network equipment initiation network connecting request
Make the network connection notice of system transmission.
Optionally, the verification process decision sub-module includes:
Network connection state judging unit, for judging net of the first network equipment after network connecting request sending
Network connection status;
Verification process determination unit, if being to disconnect network for the network connection state, it is determined that access corresponding requests
Target network need to be implemented verification process.
Optionally, described device further include:
Verification tip module, for generating the prompt to the verifying event, the prompt includes for verifying auxiliary journey
The calling control of sequence;
Program displays module, for basis to the triggering for calling control, in the main screen exhibition of the first network equipment
Show the verifying auxiliary program.
Optionally, the communication account acquisition module 704 includes:
Acquisition request sending submodule, for sending communication account acquisition request to second network equipment;
Second communication account receiving submodule, for receiving second network equipment from least one the communication account having
In family, account is communicated for the first network equipment is chosen second.
Optionally, described device further include:
Page request module is verified, for communicating account to the authentication server requests verification page according to described second.
Optionally, the verifying page includes the first input control for communication account, and the communication account obtains mould
Block 704 includes:
Submodule is written in second communication account, for the second communication account to be written to the pass of first input control
Join position;
First input control sending submodule, for being directed to the transmission operation of first input control by executing, to
The authentication server sends the verification information acquisition request for carrying the second communication account;Wherein, the verification information is anti-
It is fed to corresponding second network equipment of the second communication account.
Optionally, the verifying page includes the second input control for communication account, and the communication account obtains mould
Block 704 includes:
Submodule is written in verification information, for the verification information to be written to the relative position of second input control;
Second input control sending submodule, for by executing the transmission operation for second input control.To
The authentication server sends the checking request for carrying verification information, to be tested by the authentication server verification information
Card.
According to the embodiment of the present application, auxiliary program is verified when monitoring verifying event, intercepts verifying event in the first net
The verifying page of network equipment triggering, avoids the verifying page from showing in first network equipment, executes in verifying auxiliary program authenticated
While journey, the process resource that first network equipment shows the verifying page is saved.
Embodiment eight
Corresponding with example IV, the embodiment of the present application eight additionally provides a kind of verifying device.Fig. 8 shows the application implementation
A kind of structural block diagram of verifying device of example eight, mainly provides a kind of verifying device, the dress from the angle of second network equipment
It sets and comprises the following modules:
It communicates account and module 801 is provided, for providing the second communication account to first network equipment, by first net
Network equipment is based on the second communication account request verification information.
Verification information provides module 802, for receiving the verification information sent based on the second communication account, and provides
To the first network equipment, to be verified by the first network equipment according to the verification information.
According to the embodiment of the present application, first network equipment is tested by the second communication account that second network equipment provides
Card, thus first network equipment execute verification process in, without use first network equipment first communicate account can be complete
It at verifying, avoids revealing userspersonal information in verification process, improves the safety of verification process.
Embodiment nine
Corresponding with embodiment five, the embodiment of the present application nine additionally provides a kind of verifying device.Fig. 9 shows the application implementation
A kind of structural block diagram of verifying device of example nine, mainly provides a kind of verifying device, the dress from the angle of first network equipment
It sets and comprises the following modules:
Event determination module 901 is verified, for determining that verifying event occurs for first network equipment, wherein first net
Network equipment has the first device identification or the first user identifier, and the verifying event includes authentication server and first net
Verifying event between network equipment.
Identifier acquisition module 902, for obtaining the second device identification or second user mark from second network equipment
Know.
Verifying event completes module 903, for being completed based on second device identification or second user mark
Verifying event.
Optionally, the device identification includes the physical address and/or identification code of communication apparatus, and the user identifier includes
Communicate account.
According to the embodiment of the present application, first network equipment is used using the second device identification of second network equipment or second
Family mark completes verifying event, and the first device identification of first network equipment or the first user identifier need not be used to be tested
Card, avoids revealing userspersonal information in verification process, improves the safety of verification process.
For device embodiment, since it is basically similar to the method embodiment, related so being described relatively simple
Place illustrates referring to the part of embodiment of the method.
Embodiment of the disclosure can be implemented as using any suitable hardware, firmware, software, or and any combination thereof into
The system of the desired configuration of row.Figure 10, which is schematically shown, can be used for realizing showing for each embodiment described in the disclosure
Example property system 1000.
For one embodiment, Figure 10 shows exemplary system 1000, which has one or more processors
1002, it is coupled to the system control module (chipset) 1004 of at least one of one or more processors 1002, by coupling
It closes the system storage 1006 of system control module 1004, be coupled to the nonvolatile memory of system control module 1004
(NVM)/storage equipment 1008, the one or more input-output apparatus 1010 for being coupled to system control module 1004, and
It is coupled to the network interface 1012 of system control module 1006.
Processor 1002 may include one or more single or multiple core processors, and processor 1002 may include general processor
Or any combination of application specific processor (such as graphics processor, application processor, Baseband processor etc.).In some embodiments
In, system 1000 can be as the browser described in the embodiment of the present application.
In some embodiments, system 1000 may include with instruction one or more computer-readable mediums (for example,
System storage 1006 or NVM/ store equipment 1008) and mutually merge with the one or more computer-readable medium and be configured
To execute instruction the one or more processors 1002 to realize module thereby executing movement described in the disclosure.
For one embodiment, system control module 1004 may include any suitable interface controller, with to one or
At least one of multiple processors 1002 and/or any suitable equipment communicated with system control module 1004 or component mention
For any suitable interface.
System control module 1004 may include Memory Controller module, to provide interface to system storage 1006.It deposits
Memory controller module can be hardware module, software module and/or firmware module.
System storage 1006 can be used for for example, load of system 1000 and storing data and/or instruction.For one
Embodiment, system storage 1006 may include any suitable volatile memory, for example, DRAM appropriate.In some implementations
In example, system storage 1006 may include four Synchronous Dynamic Random Access Memory of Double Data Rate type (DDR4SDRAM).
For one embodiment, system control module 1004 may include one or more i/o controllers, with to
NVM/ stores equipment 1008 and one or more input-output apparatus 1010 provide interface.
For example, NVM/ storage equipment 1008 can be used for storing data and/or instruction.NVM/ stores equipment 1008
Any suitable nonvolatile memory (for example, flash memory) and/or may include that any suitable (one or more) is non-volatile
Equipment is stored (for example, one or more hard disk drives (HDD), one or more CD (CD) drivers and/or one or more
A digital versatile disc (DVD) driver).
NVM/ storage equipment 1008 may include a part for the equipment being physically mounted on as system 1000
Storage resource or its can by the equipment access without a part as the equipment.For example, NVM/ stores equipment 1008
It can be accessed by network via (one or more) input-output apparatus 1010.
(one or more) input-output apparatus 1010 can provide interface for system 1000 appropriate to set with any other
Standby communication, input-output apparatus 1010 may include communication component, audio component, sensor module etc..Network interface 1012 can
Interface is provided for system 1000 with by one or more network communications, system 1000 can be according to one or more wireless network marks
The quasi- and/or arbitrary standards in agreement and/or agreement are carried out wireless communication with the one or more components of wireless network, such as
The wireless network based on communication standard is accessed, such as WiFi, 2G or 3G or their combination are carried out wireless communication.
For one embodiment, at least one of one or more processors 1002 can be with system control module 1004
The logic of one or more controllers (for example, Memory Controller module) is packaged together.For one embodiment, (one
Or multiple) at least one of processor 1002 can encapsulate with the logic of one or more controllers of system control module 1004
Together to form system in package (SiP).For one embodiment, at least one of one or more processors 1002 can
It is integrated on same mold with the logic of one or more controllers of system control module 1004.For one embodiment, (one
It is a or multiple) at least one of processor 1002 can be with the logical set of one or more controllers of system control module 1004
At on same mold to form system on chip (SoC).
In various embodiments, system 1000 can be, but not limited to be: browser, work station, desk-top calculating equipment or shifting
It is dynamic to calculate equipment (for example, lap-top computing devices, handheld computing device, tablet computer, net book etc.).In each embodiment
In, system 1000 can have more or fewer components and/or different frameworks.For example, in some embodiments, system 1000
Including one or more video cameras, keyboard, liquid crystal display (LCD) screen (including touch screen displays), nonvolatile memory
Port, mutiple antennas, graphic chips, specific integrated circuit (ASIC) and loudspeaker.
Wherein, if display includes touch panel, display screen may be implemented as touch screen displays, be used by oneself with receiving
The input signal at family.Touch panel includes one or more touch sensors to sense the hand on touch, slide, and touch panel
Gesture.The touch sensor can not only sense the boundary of a touch or slide action, but also detect and the touch or sliding
Operate relevant duration and pressure.
The embodiment of the present application also provides a kind of non-volatile readable storage medium, be stored in the storage medium one or
Multiple modules (programs) when the one or more module is used in terminal device, can make the terminal device execute
The instruction (instructions) of various method steps in the embodiment of the present application.
Provide a kind of computer equipment in one example, including memory, processor and storage are on a memory simultaneously
The computer program that can be run on a processor, which is characterized in that the processor is realized such as when executing the computer program
The method of the embodiment of the present application.
A kind of computer readable storage medium is additionally provided in one example, is stored thereon with computer program, it is special
Sign is, one or more methods such as the embodiment of the present application are realized when which is executed by processor.
The embodiment of the present application discloses a kind of verification method and device, and example 1 includes a kind of verification method, comprising: monitoring
The verifying event of first network equipment, the first network equipment have the first communication account;Obtain the of second network equipment
Two communication accounts, and based on the second communication account request verification information;According to the verification information of second network equipment
It is verified.
Example 2 may include method described in example 1, wherein it is described monitoring first network equipment verifying event the step of
It include: the network connecting request that the detection first network equipment is initiated;Determine that the target network needs of access corresponding requests are held
Row verification process.
Example 3 may include method described in example 2, wherein in the network that the detection first network equipment is initiated
Before the step of connection request, the method also includes: it is logical in the operating system registered network connection of the first network equipment
Know;The step of network connecting request that the detection first network equipment is initiated includes: to receive the first network equipment
Initiate the network connection notice that the operating system is sent when network connecting request.
Example 4 may include method described in example 2, wherein the target network needs for determining access corresponding requests are held
The step of row verification process includes: the network connection state for judging the first network equipment after network connecting request sending;
If the network connection state is to disconnect network, it is determined that the target network for accessing corresponding requests needs to be implemented verification process.
Example 5 may include method described in example 1, wherein the method also includes: the verifying event is intercepted described
The verifying page of first network equipment triggering.
Example 6 may include method described in example 1, wherein the method is executed by verifying auxiliary program, in the monitoring
After the step of verifying event of first network equipment, the method also includes: the prompt to the verifying event is generated, it is described
Prompt includes the calling control for verifying auxiliary program;According to the triggering for calling control, set in the first network
Standby main screen shows the verifying auxiliary program.
Example 7 may include method described in example 1, wherein the second communication account for obtaining second network equipment
Step includes: to send communication account acquisition request to second network equipment;Second network equipment is received from having
In at least one communication account, account is communicated for the first network equipment is chosen second.
Example 8 may include method described in example 1, wherein described based on the second communication account request verifying letter
Before the step of breath, the method also includes: account is communicated to the authentication server requests verification page according to described second.
Example 9 may include method described in example 8, wherein the verifying page includes defeated for communicate account first
Enter control, described the step of communicating account request verification information based on described second includes: by the second communication account write-in
The relative position of first input control;By executing the transmission operation for first input control, to the verifying
Server sends the verification information acquisition request for carrying the second communication account;Wherein, the verification information feeds back to described
Corresponding second network equipment of second communication account.
Example 10 may include method described in example 8, wherein the verifying page includes defeated for communicate account second
Enter control, the step of verification information according to second network equipment is verified includes: to write the verification information
Enter the relative position of second input control;By executing the transmission operation for second input control.It is tested to described
It demonstrate,proves server and sends the checking request for carrying verification information, to be verified by the authentication server to verification information.
Example 11 may include a kind of verification method, wherein the described method includes: providing the second communication to first network equipment
Account, to be based on the second communication account request verification information by the first network equipment;It receives logical based on described second
The verification information that account is sent is interrogated, and is supplied to the first network equipment, to be tested according to as the first network equipment
Card information is verified.
Example 12 may include a kind of verifying device, wherein described device includes:
Event-monitoring module is verified, for monitoring the verifying event of first network equipment, the first network equipment has
First communication account;
It communicates account and obtains module, for obtaining the second communication account of second network equipment, and it is logical based on described second
Interrogate account request verification information;
Authentication module, for being verified according to the verification information of second network equipment.
Example 13 may include device described in example 12, wherein the verifying event-monitoring module includes:
Network connecting request detection sub-module, the network connecting request initiated for detecting the first network equipment;
Verification process decision sub-module, for determining that the target network for accessing corresponding requests needs to be implemented verification process.
Example 14 may include device described in example 13, wherein described device further include:
Network connection notice registration module is logical for the operating system registered network connection in the first network equipment
Know;
The network connecting request detection sub-module includes:
It is connected to the network notification receiving unit, behaviour when for receiving the first network equipment initiation network connecting request
Make the network connection notice of system transmission.
Example 15 may include device described in example 13, wherein the verification process decision sub-module includes:
Network connection state judging unit, for judging net of the first network equipment after network connecting request sending
Network connection status;
Verification process determination unit, if being to disconnect network for the network connection state, it is determined that access corresponding requests
Target network need to be implemented verification process.
Example 16 may include device described in example 12, wherein described device further include:
Verify page blocking module, the verifying page triggered for intercepting the verifying event in the first network equipment
Face.
Example 17 may include device described in example 12, wherein described device further include:
Verification tip module, for generating the prompt to the verifying event, the prompt includes for verifying auxiliary journey
The calling control of sequence;
Program displays module, for basis to the triggering for calling control, in the main screen exhibition of the first network equipment
Show the verifying auxiliary program.
Example 18 may include device described in example 12, wherein the communication account obtains module and includes:
Acquisition request sending submodule, for sending communication account acquisition request to second network equipment;
Second communication account receiving submodule, for receiving second network equipment from least one the communication account having
In family, account is communicated for the first network equipment is chosen second.
Example 19 may include device described in example 12, wherein described device further include:
Page request module is verified, for communicating account to the authentication server requests verification page according to described second.
Example 20 may include device described in example 19, wherein the verifying page includes first for communication account
Input control, the communication account obtain module and include:
Submodule is written in second communication account, for the second communication account to be written to the pass of first input control
Join position;
First input control sending submodule, for being directed to the transmission operation of first input control by executing, to
The authentication server sends the verification information acquisition request for carrying the second communication account;Wherein, the verification information is anti-
It is fed to corresponding second network equipment of the second communication account.
Example 21 may include device described in example 19, wherein the verifying page includes second for communication account
Input control, the communication account obtain module and include:
Submodule is written in verification information, for the verification information to be written to the relative position of second input control;
Second input control sending submodule, for by executing the transmission operation for second input control.To
The authentication server sends the checking request for carrying verification information, to be tested by the authentication server verification information
Card.
Example 22 may include a kind of verification method, wherein the described method includes: determining that verifying thing occurs for first network equipment
Part, wherein the first network equipment has the first device identification or the first user identifier, and the verifying event includes verifying
Verifying event between server and the first network equipment;Obtain the second device identification from second network equipment or
Second user mark;Verifying event is completed based on second device identification or second user mark.
Example 23 may include method described in example 22, wherein the device identification includes the physical address of communication apparatus
And/or identification code, the user identifier include communication account.
Example 24 may include a kind of verifying device, wherein described device includes:
Event determination module is verified, for determining that verifying event occurs for first network equipment, wherein the first network is set
Standby to have the first device identification or the first user identifier, the verifying event includes that authentication server is set with the first network
Verifying event between standby.
Identifier acquisition module, for obtaining the second device identification or second user mark from second network equipment.
Verifying event completes module, for completing verifying based on second device identification or second user mark
Event.
Example 25 may include device described in example 24, wherein the device identification includes the physical address of communication apparatus
And/or identification code, the user identifier include communication account.
Example 26, a kind of computer equipment, including memory, processor and storage are on a memory and can be on a processor
The computer program of operation, which is characterized in that the processor realized when executing the computer program as claim 1-11,
The method of 16-17 one or more.
Example 27, a kind of computer readable storage medium, are stored thereon with computer program, which is characterized in that the program
The method such as claim 1-11,16-17 one or more is realized when being executed by processor.
Although some embodiments are various substitutions, and/or equivalent implementation for the purpose of illustrating and describing
Scheme calculates to reach same purpose and implement the realization for exemplifying and describing, and does not depart from the practical range of the application.This Shen
It please be intended to cover any modification or variation of the embodiment being discussed herein.It is, therefore, apparent that embodiment described herein only by right
It is required that being limited with their equivalent.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
Claims (18)
1. a kind of verification method, which comprises
The verifying event of first network equipment is monitored, the first network equipment has the first communication account;
The second communication account of second network equipment is obtained, and based on the second communication account request verification information;
It is verified according to the verification information of second network equipment.
2. according to the method described in claim 1, the step of verifying event of the monitoring first network equipment, includes:
Detect the network connecting request that the first network equipment is initiated;
Determine that the target network of access corresponding requests needs to be implemented verification process.
3. according to the method described in claim 2, in the network connecting request for detecting the first network equipment initiation
Before step, the method also includes:
Notice is connected in the operating system registered network of the first network equipment;
The step of network connecting request that the detection first network equipment is initiated includes:
It receives the first network equipment and initiates the network connection notice that the operating system is sent when network connecting request.
4. according to the method described in claim 2, the target network for determining access corresponding requests needs to be implemented verification process
The step of include:
Judge network connection state of the first network equipment after network connecting request sending;
If the network connection state be disconnect network, it is determined that access corresponding requests target network need to be implemented it is authenticated
Journey.
5. according to the method described in claim 1, the method also includes:
Intercept the verifying page that the verifying event is triggered in the first network equipment.
6. being set according to the method described in claim 1, the method is executed by verifying auxiliary program in the monitoring first network
After the step of standby verifying event, the method also includes:
The prompt to the verifying event is generated, the prompt includes the calling control for verifying auxiliary program;
According to the triggering for calling control, the verifying auxiliary program is shown in the main screen of the first network equipment.
7. according to the method described in claim 1, the step of second communication account for obtaining second network equipment, includes:
Communication account acquisition request is sent to second network equipment;
Second network equipment is received from least one the communication account having, the chosen for the first network equipment
Two communication accounts.
8. according to the method described in claim 1, it is described based on it is described second communication account request verification information the step of it
Before, the method also includes:
Account is communicated to the authentication server requests verification page according to described second.
9. according to the method described in claim 8, it is described verifying the page include for communication account the first input control, it is described
Include: based on the step of the second communication account request verification information
The second communication account is written to the relative position of first input control;
By executing the transmission operation for first input control, it is logical that carrying described second is sent to the authentication server
Interrogate the verification information acquisition request of account;Wherein, the verification information feeds back to corresponding second net of the second communication account
Network equipment.
10. according to the method described in claim 8, the verifying page includes the second input control for communication account, institute
Stating the step of being verified according to the verification information of second network equipment includes:
The verification information is written to the relative position of second input control;
By executing the transmission operation for second input control.It is sent to the authentication server and carries verification information
Checking request, to be verified by the authentication server to verification information.
11. a kind of verification method, which comprises
The second communication account is provided to first network equipment, is asked with being based on the second communication account by the first network equipment
Seek verification information;
The verification information sent based on the second communication account is received, and is supplied to the first network equipment, by described
First network equipment is verified according to the verification information.
12. a kind of verifying device, described device include:
Event-monitoring module is verified, for monitoring the verifying event of first network equipment, the first network equipment has first
Communicate account;
It communicates account and obtains module, for obtaining the second communication account of second network equipment, and based on the second communication account
Family requests verification information;
Authentication module, for being verified according to the verification information of second network equipment.
13. a kind of verifying device, described device include:
It communicates account and module is provided, for providing the second communication account to first network equipment, by the first network equipment
Based on the second communication account request verification information;
Verification information provides module, for receiving the verification information sent based on the second communication account, and is supplied to described
First network equipment, to be verified by the first network equipment according to the verification information.
14. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor
Calculation machine program, which is characterized in that the processor realizes such as claim 1-11 mono- or more when executing the computer program
A method.
15. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor
The method such as claim 1-11 one or more is realized when execution.
16. a kind of verification method, which comprises
Determine that verifying event occurs for first network equipment, wherein the first network equipment has the first device identification or the
One user identifier, the verifying event include the verifying event between authentication server and the first network equipment;
Obtain the second device identification or second user mark from second network equipment;
Verifying event is completed based on second device identification or second user mark.
17. according to the method for claim 16, the device identification includes physical address and/or the identification of communication apparatus
Code, the user identifier include communication account.
18. a kind of verifying device, described device include:
Event determination module is verified, for determining that verifying event occurs for first network equipment, wherein the first network equipment tool
Have the first device identification or the first user identifier, the verifying event include authentication server and the first network equipment it
Between verifying event;
Identifier acquisition module, for obtaining the second device identification or second user mark from second network equipment;
Verifying event completes module, for completing verifying thing based on second device identification or second user mark
Part.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710477757.3A CN109104398B (en) | 2017-06-20 | 2017-06-20 | Verification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710477757.3A CN109104398B (en) | 2017-06-20 | 2017-06-20 | Verification method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109104398A true CN109104398A (en) | 2018-12-28 |
CN109104398B CN109104398B (en) | 2021-07-20 |
Family
ID=64796270
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710477757.3A Active CN109104398B (en) | 2017-06-20 | 2017-06-20 | Verification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109104398B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101997824A (en) * | 2009-08-20 | 2011-03-30 | 中国移动通信集团公司 | Identity authentication method based on mobile terminal as well as device and system thereof |
CN104836812A (en) * | 2015-05-26 | 2015-08-12 | 杭州华三通信技术有限公司 | Portal authentication method, device and system |
US20160065558A1 (en) * | 2013-01-08 | 2016-03-03 | Coursera, Inc. | Identity verification for online education |
CN105592458A (en) * | 2014-10-22 | 2016-05-18 | 中国电信股份有限公司 | Authentication method and system for service of wireless local area network, and server |
CN105657781A (en) * | 2014-11-14 | 2016-06-08 | 深圳市腾讯计算机系统有限公司 | Method and device for accessing WiFi network |
CN105764056A (en) * | 2016-04-13 | 2016-07-13 | 北京国创富盛通信股份有限公司 | web certification system and method for public wifi access |
CN106850401A (en) * | 2017-01-11 | 2017-06-13 | 上海斐讯数据通信技术有限公司 | A kind of wireless authentication device, system and its authentication method |
-
2017
- 2017-06-20 CN CN201710477757.3A patent/CN109104398B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101997824A (en) * | 2009-08-20 | 2011-03-30 | 中国移动通信集团公司 | Identity authentication method based on mobile terminal as well as device and system thereof |
US20160065558A1 (en) * | 2013-01-08 | 2016-03-03 | Coursera, Inc. | Identity verification for online education |
CN105592458A (en) * | 2014-10-22 | 2016-05-18 | 中国电信股份有限公司 | Authentication method and system for service of wireless local area network, and server |
CN105657781A (en) * | 2014-11-14 | 2016-06-08 | 深圳市腾讯计算机系统有限公司 | Method and device for accessing WiFi network |
CN104836812A (en) * | 2015-05-26 | 2015-08-12 | 杭州华三通信技术有限公司 | Portal authentication method, device and system |
CN105764056A (en) * | 2016-04-13 | 2016-07-13 | 北京国创富盛通信股份有限公司 | web certification system and method for public wifi access |
CN106850401A (en) * | 2017-01-11 | 2017-06-13 | 上海斐讯数据通信技术有限公司 | A kind of wireless authentication device, system and its authentication method |
Also Published As
Publication number | Publication date |
---|---|
CN109104398B (en) | 2021-07-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11665200B2 (en) | System and method for second factor authentication to perform services | |
US10861000B2 (en) | Method, system, and apparatus for application loading | |
EP2783319B1 (en) | Providing verification of user identification information | |
US20100099380A1 (en) | Communication server and method for generating a one-time password using a mobile phone | |
US20170116596A1 (en) | Mobile Communication Device with Proximity Based Communication Circuitry | |
CN104580125B (en) | A kind of payment verification methods, devices and systems | |
WO2015135399A1 (en) | Device, system, and method for creating virtual credit card | |
CN105119722B (en) | A kind of auth method, equipment and system | |
CN108200089A (en) | Implementation method, device, system and the storage medium of information security | |
CN104579671B (en) | Auth method and system | |
CN104348612A (en) | Third-party website login method based on mobile terminal and mobile terminal | |
KR20160006185A (en) | Two factor authentication | |
CN104796436B (en) | User login method, system, the first Platform Server and related platform server | |
US20160277381A1 (en) | Security check method and system, terminal, verification server | |
CN105989485B (en) | Service management method and device | |
CN105933331A (en) | Method and device for operating accounts | |
CN112685719A (en) | Single sign-on method, device, system, computer equipment and storage medium | |
CN105792167B (en) | A kind of method and device initializing credible performing environment, equipment | |
CN109426961B (en) | Card binding risk control method and device | |
CN112291183B (en) | Account login method, system and related equipment | |
CN111756703A (en) | Debug interface management method, device and electronic device | |
CN108769059B (en) | Verification method, device, medium and computing equipment | |
CN110113346A (en) | A kind of network verification method, user terminal and server | |
CN109688109A (en) | The verification method and device of identifying code based on client-side information identification | |
CN109104398A (en) | A kind of verification method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |