[go: up one dir, main page]

CN109104398A - A kind of verification method and device - Google Patents

A kind of verification method and device Download PDF

Info

Publication number
CN109104398A
CN109104398A CN201710477757.3A CN201710477757A CN109104398A CN 109104398 A CN109104398 A CN 109104398A CN 201710477757 A CN201710477757 A CN 201710477757A CN 109104398 A CN109104398 A CN 109104398A
Authority
CN
China
Prior art keywords
network equipment
verifying
network
communication account
verification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710477757.3A
Other languages
Chinese (zh)
Other versions
CN109104398B (en
Inventor
王哲夫
邓志坚
张美超
童道远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201710477757.3A priority Critical patent/CN109104398B/en
Publication of CN109104398A publication Critical patent/CN109104398A/en
Application granted granted Critical
Publication of CN109104398B publication Critical patent/CN109104398B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the present application provides a kind of verification method and device, which comprises the verifying event of monitoring first network equipment, the first network equipment have the first communication account;The second communication account of second network equipment is obtained, and based on the second communication account request verification information;It is verified according to the verification information of second network equipment.According to the embodiment of the present application, verifying can be completed without using the first communication account of first network equipment, avoid revealing userspersonal information in verification process, improve the safety of verification process.

Description

A kind of verification method and device
Technical field
This application involves safety verification fields, more particularly to a kind of verification method and a kind of verifying device.
Background technique
User access public WiFi or shopping, house lease, online about vehicle etc. provide network service using soft On part or transaction platform when login account, it usually needs user using the personal information such as personal phone number, email accounts into Row verifying.
When being verified, phone number, email accounts can be committed to authentication server by user, and authentication server is then Some identifying code can be sent to the phone number or email accounts by accordingly by way of short message or mail, user is from connecing Identifying code is obtained in the short message or mail of receipts and is committed to authentication server to complete to verify.
However, applicant it has been investigated that, in the verification method of the prior art, verification process needs user using personal letter Breath is verified, and personal information may be revealed in verification process, or even by illegal utilization.Therefore, the verifying of the prior art Method has that the safety of verification process is lower.
Summary of the invention
The technical problem to be solved in the embodiments of the present application is that providing a kind of verification method and a kind of verifying device.
To solve the above-mentioned problems, this application provides a kind of verification methods, which comprises
The verifying event of first network equipment is monitored, the first network equipment has the first communication account;
The second communication account of second network equipment is obtained, and based on the second communication account request verification information;
It is verified according to the verification information of second network equipment.
Optionally, the step of verifying event of the monitoring first network equipment includes:
Detect the network connecting request that the first network equipment is initiated;
Determine that the target network of access corresponding requests needs to be implemented verification process.
Optionally, before the network connecting request that the detection first network equipment is initiated the step of, the side Method further include:
Notice is connected in the operating system registered network of the first network equipment;
The step of network connecting request that the detection first network equipment is initiated includes:
It receives the first network equipment and initiates the network connection notice that the operating system is sent when network connecting request.
Optionally, described to determine that the step of target network for accessing corresponding requests needs to be implemented verification process includes:
Judge network connection state of the first network equipment after network connecting request sending;
If the network connection state is to disconnect network, it is determined that the target network for accessing corresponding requests needs to be implemented verifying Process.
Optionally, the method also includes:
Intercept the verifying page that the verifying event is triggered in the first network equipment.
Optionally, the method is executed by verifying auxiliary program, in the verifying event for monitoring first network equipment After step, the method also includes:
The prompt to the verifying event is generated, the prompt includes the calling control for verifying auxiliary program;
According to the triggering for calling control, show that the verifying assists journey in the main screen of the first network equipment Sequence.
Optionally, the step of second communication account for obtaining second network equipment includes:
Communication account acquisition request is sent to second network equipment;
Second network equipment is received from least one the communication account having, is chosen for the first network equipment Second communication account.
Optionally, before the step of described based on the second communication account request verification information, the method is also wrapped It includes:
Account is communicated to the authentication server requests verification page according to described second.
Optionally, the verifying page includes the first input control for communication account, described logical based on described second Interrogate account request verification information the step of include:
The second communication account is written to the relative position of first input control;
It is operated by the transmission for executing for first input control, is sent to the authentication server and carry described the The verification information acquisition request of two communication accounts;Wherein, the verification information feeds back to the second communication account corresponding the Two network equipments.
Optionally, the verifying page includes the second input control for communication account, described according to second net The step of verification information of network equipment is verified include:
The verification information is written to the relative position of second input control;
By executing the transmission operation for second input control.It is sent to the authentication server and carries verifying letter The checking request of breath, to be verified by the authentication server to verification information.
To solve the above-mentioned problems, present invention also provides a kind of verification methods, which comprises
The second communication account is provided to first network equipment, to be based on the second communication account by the first network equipment Family requests verification information;
Receive the verification information sent based on the second communication account, and be supplied to the first network equipment, with by The first network equipment is verified according to the verification information.
To solve the above-mentioned problems, present invention also provides a kind of verification methods, which comprises
Determine first network equipment occur verifying event, wherein the first network equipment have the first device identification or The first user identifier of person, the verifying event include the verifying event between authentication server and the first network equipment;
Obtain the second device identification or second user mark from second network equipment;
Verifying event is completed based on second device identification or second user mark.
Optionally, the device identification includes the physical address and/or identification code of communication apparatus, and the user identifier includes Communicate account.
To solve the above-mentioned problems, present invention also provides a kind of verifying device, described device includes:
Event-monitoring module is verified, for monitoring the verifying event of first network equipment, the first network equipment has First communication account;
It communicates account and obtains module, for obtaining the second communication account of second network equipment, and it is logical based on described second Interrogate account request verification information;
Authentication module, for being verified according to the verification information of second network equipment.
To solve the above-mentioned problems, present invention also provides a kind of verifying device, described device includes:
It communicates account and module is provided, for providing the second communication account to first network equipment, by the first network Equipment is based on the second communication account request verification information;
Verification information provides module, for receiving the verification information sent based on the second communication account, and is supplied to The first network equipment, to be verified by the first network equipment according to the verification information.
To solve the above-mentioned problems, present invention also provides a kind of verifying device, described device includes:
Event determination module is verified, for determining that verifying event occurs for first network equipment, wherein the first network is set Standby to have the first device identification or the first user identifier, the verifying event includes that authentication server is set with the first network Verifying event between standby;
Identifier acquisition module, for obtaining the second device identification or second user mark from second network equipment;
Verifying event completes module, for completing verifying based on second device identification or second user mark Event.
Compared with prior art, the embodiment of the present application includes the following advantages:
According to the embodiment of the present application, the second of second network equipment is obtained by the verifying event for first network equipment Account is communicated, and based on the second communication account request verification information, is verified using the verification information of the second communication account, from And executed in verification process in first network equipment, it can be completed and test without the first communication account using first network equipment Card, avoids revealing userspersonal information in verification process, improves the safety of verification process.
Further, it is logical to execute write-in first without user in first network equipment for the verification method of the embodiment of the present application News account checks multiple operations such as verification information, write verification information, to save user's operation.
Further, determining that trigger second network equipment of acquisition when needing the verifying event of verification process again second is logical Account is interrogated, is avoided there is no in the case where verifying event, first network equipment communicates account to the second network device requests second Family, second network equipment return to process resource spent by second communication account treatment process, save first network equipment With the process resource of second network equipment.
Further, verifying auxiliary program intercepts verifying event and touches in first network equipment when monitoring verifying event The verifying page of hair avoids the verifying page from showing in first network equipment, while verifying auxiliary program execution verification process, Save the process resource that first network equipment shows the verifying page.
When the verification method of the application is applied to the verification process of mobile phone access Wi-Fi hotspot, verifying auxiliary program is being supervised It controls after mobile phone access Wi-Fi hotspot needs verification process, by requesting shared phone number to verifying secondary server, and adopts Verification process is completed with shared phone number, to be verified without user using the personal mobile phone number of user, is avoided Userspersonal information is revealed in verification process, improves the safety of verification process.Moreover, authentication compared with the existing technology Method, the verification method of the embodiment of the present application carry out input handset number respectively without user, check that short message, input identifying code etc. are more A operation, to save user's operation.
Detailed description of the invention
Fig. 1 is a kind of application scenario diagram of access Wi-Fi hotspot verifying of the embodiment of the present application one;
Fig. 2 is a kind of step flow chart of verification method of the embodiment of the present application two;
Fig. 3 is a kind of step flow chart of verification method of the embodiment of the present application three;
Fig. 4 is a kind of step flow chart of verification method of the embodiment of the present application four;
Fig. 5 is a kind of step flow chart of verification method of the embodiment of the present application five;
Fig. 6 is a kind of structural block diagram of verifying device of the embodiment of the present application six;
Fig. 7 is a kind of structural block diagram of verifying device of the embodiment of the present application seven;
Fig. 8 is a kind of structural block diagram of verifying device of the embodiment of the present application eight;
Fig. 9 is a kind of structural block diagram of verifying device of the embodiment of the present application nine;
Figure 10 is a kind of exemplary system of the embodiment of the present application;
Figure 11 is the schematic diagram one that a kind of verification process of the application is shown;
Figure 12 is the schematic diagram two that a kind of verification process of the application is shown;
Figure 13 is the schematic diagram three that a kind of verification process of the application is shown;
Figure 14 is the schematic diagram four that a kind of verification process of the application is shown.
Specific embodiment
In order to make the above objects, features, and advantages of the present application more apparent, with reference to the accompanying drawing and it is specific real Applying mode, the present application will be further described in detail.
The application is deeply understood for the ease of those skilled in the art, will introduce profession involved in the application first below The definition of term.
The network equipment includes the physical entity being connected in network.The network equipment can be classified as client according to service object End and server-side.Client may include the mobile terminal that the users such as mobile phone, tablet computer use.Server-side may include service Device etc. provides the terminal of service to client.First network equipment in the application includes the network equipment for belonging to client, the Two network equipments include the network equipment for belonging to server-side.
Network service includes the service that the network equipment is obtained by accessing network data.For example, access Wi-Fi hotspot, online Ticket booking, shopping at network, registration of website account, online about vehicle etc. service.
Verifying event needs to be implemented verification process when including the service of network device requests network to obtain the event of authorization.Example Such as, when accessing Wi-Fi hotspot, Wi-Fi hotspot returns to the verifying page, and user's input handset number and identifying code is requested to be verified Event.In another example the page is verified in about vehicle application software pop-up when carrying out online about vehicle by about vehicle application software, user is requested The event that input e-mailbox count and identifying code are verified.
Communication account includes the account for interactive information between the network equipment.For example, phone number, E-mail address account Family, instant message applications account etc..Communication account can with according to whether be specific to specific user be classified as person-to-person communication account and Shared communication account.The first communication account of the application includes person-to-person communication account, and the second communication account includes shared communication account Family.
Verification information includes information generate for communication account, for verifying user's correctness, also referred to as identifying code. Identifying code can be number, such as " 123456 ";It may be character, such as " user's checking ".
Embodiment one
Fig. 1 shows a kind of application scenario diagram of access Wi-Fi hotspot verifying of the embodiment of the present application one.It can be seen that It include WiFi authentication server, Wi-Fi hotspot, user/mobile phone, verifying auxiliary journey in the verifying scene of the embodiment of the present application Sequence and verifying secondary server.User accesses Wi-Fi hotspot by mobile phone to enjoy free public WiFi.
In the verification method of the prior art, when accessing Wi-Fi hotspot, need user using the hand of access Wi-Fi hotspot The phone number of machine is verified.Specifically, when user initiates the request of access Wi-Fi hotspot by mobile phone, Wi-Fi hotspot meeting The verifying page of WiFi access is returned to, mobile phone can then trigger after receiving the verifying page and show the verifying page on the home screen Face.User can be written personal mobile phone number and be submitted on the verifying page shown, and WiFi authentication server is receiving After people's phone number, the short message comprising identifying code can be sent for the personal mobile phone number, user is testing after receiving short message It demonstrate,proves write verification code on the page and submits, whether the identifying code that WiFi authentication server judges that user submits is matched with personal mobile phone Number, if then passing through verifying.
In verification method provided by the embodiments of the present application, the verifying auxiliary program being mounted on mobile phone can be in advance in hand Registered network connection notice in the operating system of machine, to operate when user initiates the request of access Wi-Fi hotspot by mobile phone System sends notice to verifying auxiliary program, and verifying auxiliary program can trigger after receiving notice carries out subsequent network company Connect state judgement processing.
Verifying auxiliary program may determine that mobile phone after the request for initiating access Wi-Fi hotspot, and network connection state is The no state to disconnect network;If so, can determine that Wi-Fi hotspot needs to carry out proving program and can just access;If it is not, table Bright currently to can access the Wi-Fi hotspot without proving program, verifying auxiliary program can terminate verification processing and exit the program.
When determining that access Wi-Fi hotspot needs proving program, phone number can be sent to verifying secondary server and obtained Request.Verifying secondary server, can be from preset multiple when receiving the phone number acquisition request of verifying auxiliary program In phone number, some phone number is randomly selected, returns to verifying auxiliary program.
Wherein, multiple phone numbers can be preset by verifying in secondary server, and verifying secondary server can be according to asking It asks, distributes wherein one or more phone numbers and verified to user, complete verifying or user in user and use WiFi heat After point, which can be distributed to other users again and used by verifying secondary server.Therefore, in order to be different from The phone number for verifying secondary server distribution can be named as shared cell-phone number by the personal mobile phone number on the mobile phone of user Code.
The shared phone number received can be committed to Wi-Fi hotspot by verifying auxiliary program, be total to this by Wi-Fi hotspot It enjoys phone number and is back to WiFi authentication server.WiFi authentication server generates identifying code for the shared phone number, and The short message comprising identifying code is sent to the shared phone number for being placed in verifying secondary server.
Verifying secondary server extracts identifying code after receiving short message from short message, and is back to verifying auxiliary program.
The identifying code received can be committed to Wi-Fi hotspot by verifying auxiliary program, be returned the identifying code by Wi-Fi hotspot It is back to WiFi authentication server.WiFi authentication server is verified for received identifying code;If being verified, notify Wi-Fi hotspot allows mobile phone to access;If authentication failed, Wi-Fi hotspot refusal mobile phone access is notified.
According to the embodiment of the present application, auxiliary program is verified after monitoring mobile phone access Wi-Fi hotspot and needing verification process, By requesting shared phone number to verifying secondary server, and verification process is completed using shared phone number, thus need not User is verified using the personal mobile phone number of user, is avoided revealing userspersonal information in verification process, is improved and test The safety of card process.
Further, the verification method of verification method compared with the existing technology, the embodiment of the present application is distinguished without user It carries out input handset number, check multiple operations such as short message, input identifying code, to save user's operation.
Embodiment two
Fig. 2 shows a kind of step flow charts of verification method of the embodiment of the present application two, mainly from first network equipment Angle a kind of verification method is provided, the method can specifically comprise the following steps:
Step 201, the verifying event of first network equipment is monitored, the first network equipment has the first communication account.
User can obtain various network services by first network equipment.When obtaining network service, user needs head Verification process is first carried out, obtains network service by being just allowed to after verifying.It is directed to different network services, can have more The different verifying scene of kind.
For example, when user accesses some free public Wi-Fi hotspot, Wi-Fi hotspot needs to use in Wi-Fi hotspot verifying scene Family is verified using phone number, just allows to access Wi-Fi hotspot after being verified.
In another example in social platform registered members' account, social platform needs to use user in website registration verifying scene Family is verified using email accounts, just allows to be registered as the member of social platform after being verified.
In another example about vehicle is verified in scene online, user, which initiates about vehicle in about vehicle platform by about vehicle application software, to be requested When, about vehicle platform needs user to verify using instant message applications account, just allows to send out in about vehicle platform after being verified About vehicle is played to request.
Verification method according to prior art needs user to set using first network in above-mentioned a variety of verifying scenes Standby possessed first communication account is verified.
For example, user the phone number of mobile phone can be written when user accesses Wi-Fi hotspot by the mobile phone of oneself It clicks and submits to the verifying page, phone number is sent to WiFi authentication server, WiFi authentication server can be according to mobile phone Number generates verification information and sends the mobile phone of short message to user, and user reads verification information in short message and is written to verifying The page again taps on submission and sends verification information to WiFi authentication server.
In another example social platform prompt user mentions when user registers member's account of social platform on tablet computer The e-mailbox count for handing over individual subscriber, after user submits e-mailbox count, social platform is sent out to the e-mailbox count The mail comprising verification information is sent, user enters the e-mailbox count, verification information read in the mail received, and mention Verification information is given to social platform.
According to the verification method of the embodiment of the present application, can be supervised by the verifying auxiliary program being mounted in first network equipment Control the verifying event in first network equipment.
Monitoring verifying event may include processing and the verifying auxiliary program verified auxiliary program triggering and judge verifying event Judge whether there is the processing of verifying event two treatment processes.
In practical application, verifying event can be judged using various ways triggering verifying auxiliary program.
For example, verifying auxiliary program can be in advance in the operation system of first network equipment in Wi-Fi hotspot verifying scene Registered network connection notice on system, when first network equipment currently initiates network connecting request to access Wi-Fi hotspot, operation System then notifies verifying auxiliary program, and the triggering of verifying auxiliary program handles the judgement of verifying event.
In another example registering in verifying scene or online about vehicle verifying scene in website, verifying auxiliary program can exist in advance Notice is logged in for multiple social platform login accounts on the browser of first network equipment, or in advance in first network equipment Operating system on for multiple about vehicle application software registration starting notice, access some social platform in browser and carry out account When family logs in or os starting some about vehicle application software when, browser or operating system then notify verifying auxiliary journey Sequence, the triggering of verifying auxiliary program handle the judgement of verifying event.
In another example verifying auxiliary program can be installed in first network equipment and monitor plug-in unit, monitoring plug-in unit can be monitored Wi-Fi hotspot is connected in first network equipment, Web account registration, application software initiated etc. the possibility newly installed need to be implemented The characteristic event of verification process, after listening to characteristic event, verifying auxiliary program, verifying auxiliary journey can be notified by monitoring plug-in unit Sequence triggering handles the judgement of verifying event.In practice, can also directly be judged by monitoring plug-in unit currently with the presence or absence of verifying thing Part, if then notifying verifying auxiliary program, to execute subsequent verification process by verifying auxiliary program.
After the triggering of verifying auxiliary program is to the judgement processing of verifying event, can using various ways judgement it is current whether In the presence of the verifying event for needing to be implemented verification process.
For example, verifying auxiliary program may determine that the network connection of first network equipment in Wi-Fi hotspot verifying scene State shows that accessing the Wi-Fi hotspot needs to be implemented verification process if its network state is to disconnect network, it can determines first There is currently verifying events for the network equipment.Verifying auxiliary program also can detecte whether first network equipment receives verifying page Face shows that accessing the Wi-Fi hotspot needs to be implemented verification process if receiving the verifying page, it can determines first network equipment There is currently verifying events.
In another example registering in verifying scene in website, verifying auxiliary program may determine that user in request registration of website account When family, user whether is required to submit communication account and verification information on the enrollment page that website is shown, if then showing to register net Account of standing needs to be implemented verification process, it can determining first network equipment, there is currently verifying events.
It should be noted that the processing that above-mentioned example is only used for illustrating the monitoring verifying event of the embodiment of the present application is suitable For a variety of different verifying scenes, not the specific embodiment of monitoring verifying event is defined.Those skilled in the art Member can monitor the verifying event of first network equipment, using various different modes according to specific application scenarios to supervise When controlling verifying event, triggering obtains the second communication account of second network equipment, and based on the second communication account request verifying Information.
Step 202, the second communication account of second network equipment is obtained, and based on the second communication account request verifying Information.
In the specific implementation, the verifying auxiliary program available after monitoring verifying event, in first network equipment Second communication account of two network equipments.More specifically, verifying auxiliary program can send communication account to second network equipment Its second communication account can be sent to verifying auxiliary program by acquisition request, second network equipment.
After verifying auxiliary program gets the second communication account, the second communication account request verification information can use.More Specifically, the second communication account can be committed to authentication server by verifying auxiliary program, authentication server can for this Two communication accounts generate a verification information, the second communication account being then sent to the verification information on second network equipment Family.
Step 203, it is verified according to the verification information of second network equipment.
In the specific implementation, verifying auxiliary program can be verified using the verification information of second network equipment.More specifically Ground, second network equipment can be back to verifying auxiliary program, verifying auxiliary after receiving the verification information of authentication server The verification information can be committed to authentication server by program, be judged whether according to verification information by testing by authentication server Card.
For example, in Wi-Fi hotspot verifying scene, if current verifying event needs user to test using phone number Card, verifying auxiliary program can request phone number, verifying auxiliary clothes to the verifying secondary server as the second equipment of network Business device randomly selects a phone number as the second communication account, is sent to verifying auxiliary program, verifying auxiliary program receives WiFi authentication server can be committed to after phone number, WiFi authentication server can generate string number " 123456 " at random As verification information, short message is generated using the verification information, and be sent to verifying secondary server.Verifying secondary server can be with Verification information " 123456 " is extracted from short message and is back to verifying auxiliary program, and verifying auxiliary program can believe the verifying Breath " 123456 " is committed to WiFi authentication server can notify Wi-Fi hotspot to allow after WiFi authentication server is by verifying The access of first network equipment.
In another example being registered in verifying scene in website, if current verifying event needs user to utilize e-mailbox count It is verified, verifying auxiliary program can request e-mailbox count to the verifying secondary server as the second equipment of network, Verifying secondary server randomly selects an e-mailbox count as the second communication account, is sent to verifying auxiliary program, tests Card auxiliary program can be committed to Account Registration authentication server after receiving e-mailbox count, and Account Registration authentication server can Mail is generated using the verification information as verification information to generate a string of characters " user's checking " at random, and is sent to verifying Secondary server.Verifying secondary server can extract verification information " user's checking " from mail and be back to verifying auxiliary The verification information " user's checking " can be committed to Account Registration authentication server, Account Registration by program, verifying auxiliary program After authentication server is by verifying, website can be notified to allow user in website login account.
According to the embodiment of the present application, the second of second network equipment is obtained by the verifying event for first network equipment Account is communicated, and based on the second communication account request verification information, is verified using the verification information of the second communication account, from And executed in verification process in first network equipment, it can be completed and test without the first communication account using first network equipment Card, avoids revealing userspersonal information in verification process, improves the safety of verification process.
Further, it is logical to execute write-in first without user in first network equipment for the verification method of the embodiment of the present application News account checks multiple operations such as verification information, write verification information, to save user's operation.
Embodiment three
Fig. 3 shows a kind of step flow chart of verification method of the embodiment of the present application three, mainly from first network equipment Angle a kind of verification method is provided, the method can specifically comprise the following steps:
Step 301, notice is connected in the operating system registered network of the first network equipment.
In the specific implementation, the verifying auxiliary program being mounted in first network equipment, it can be in the behaviour of first network equipment Make registered network connection notice in system, when notifying so as to the network connection for receiving operating system in verifying auxiliary program, touching The judgement to the network connection state of first network equipment is sent out to handle.
Step 302, the verifying event of first network equipment is monitored, the first network equipment has the first communication account.
Optionally, the step 302 includes following sub-step:
Sub-step S11 detects the network connecting request that the first network equipment is initiated;
Sub-step S12 determines that the target network of access corresponding requests needs to be implemented verification process.
In the specific implementation, can detecte the network connecting request that first network equipment is currently initiated, according to the network connection Request judges whether the target network of request needs to be implemented verification process.For example, detecting mobile phone initiation access Wi-Fi hotspot Connection request after, mobile phone receive Wi-Fi hotspot return the verifying page, and needed on the verifying page user submit mobile phone Number and identifying code, it is possible to determine that access the Wi-Fi hotspot and need to be implemented verification process.
Optionally, the sub-step S11 includes:
Sub-step S11-1 receives the first network equipment and initiates what operating system when network connecting request was sent Network connection notice.
In the specific implementation, showing that first network is set if verifying auxiliary program receives the network connection notice of operating system It is standby currently to have initiated network connecting request, therefore the processing of the judgement to the network connection state of first network equipment can be triggered.
Optionally, the sub-step S12 includes:
Sub-step S12-1 judges network connection state of the first network equipment after network connecting request sending;
Sub-step S12-2, if the network connection state is to disconnect network, it is determined that access the target network of corresponding requests Need to be implemented verification process.
In the specific implementation, verifying auxiliary program may determine that whether the network connection state of first network equipment is to disconnect net Network.After first network equipment issues network connecting request, if you do not need to executing verification process, the network of first network equipment Connection status is then to be successfully connected network, and if necessary to execute verification process, the network connection state of first network equipment is then Disconnect network.Therefore, when network connection state is to disconnect network, it is possible to determine that access target network needs to be implemented verification process, That is, there is currently verifying events for first network equipment.
According to the embodiment of the present application, second network equipment is obtained determining to trigger again when needing the verifying event of verification process The second communication account, avoid process resource caused by obtaining the second communication account there is no verifying event Waste, saves the process resource of first network equipment and second network equipment.
Step 303, the verifying page that the verifying event is triggered in the first network equipment is intercepted.
When there are verifying events for first network equipment, displaying verifying page would generally be triggered in first network equipment by verifying event Face, so that write-in communicates account and verification information to user on the verifying page.Therefore, in the verification method of the embodiment of the present application In, in the event of verifying when first network equipment triggers the verifying page, verifying auxiliary program can intercept the verifying page, thus Save the process resource that first network equipment shows the processing verifying page.
Step 304, the second communication account of second network equipment is obtained, and based on the second communication account request verifying Information.
Optionally, the step of second communication account for obtaining second network equipment may include following sub-step:
Sub-step S21 sends communication account acquisition request to second network equipment;
Sub-step S22 receives second network equipment from least one the communication account having, is first net The second communication account that network equipment is chosen.
In the specific implementation, verifying auxiliary program can send communication account acquisition request to second network equipment.Wherein, Two network equipments can have multiple communication accounts, and second network equipment is when receiving communication account acquisition request, Ke Yicong Sequentially or a communication account is randomly selected in multiple communication accounts, as the second communication account, is back to verifying auxiliary program.
Step 305, it is verified according to the verification information of second network equipment.
Optionally, the verifying page includes the first input control for communication account, described logical based on described second Interrogate account request verification information the step of include:
The second communication account is written to the relative position of first input control;
It is operated by the transmission for executing for first input control, is sent to the authentication server and carry described the The verification information acquisition request of two communication accounts;Wherein, the verification information feeds back to the second communication account corresponding the Two network equipments.
In the specific implementation, the verifying page that verifying auxiliary program can call first network equipment to receive, is tested by this It demonstrate,proves the page and submits the second communication account.It may include the first input control having for being written and sending communication account on the verifying page Part.Wherein, a relative position can be arranged for the first input control on the page by verifying, for communication account to be written.It is testing Auxiliary program is demonstrate,proved by after the second communication account write-in relative position, the transmission operation of the first input control can be executed, thus will The verification information acquisition request for carrying the second communication account is sent to authentication server, tests so that authentication server accordingly generates Information is demonstrate,proved, and verification information is back to second network equipment with the second communication account.
For example, verifying the page on be provided with write-in phone number input interface and one for the input interface carry out The submitting button of submission, after phone number is written in input interface, verifying auxiliary program triggering executes submitting button, will carry The verification information acquisition request of phone number is sent to authentication server.
Optionally, the verifying page includes the second input control for communication account, described according to second net The step of verification information of network equipment is verified include:
The verification information is written to the relative position of second input control;
By executing the transmission operation for second input control.It is sent to the authentication server and carries verifying letter The checking request of breath, to be verified by the authentication server to verification information.
Authentication server can extract the second communication account therein, accordingly after receiving verification information acquisition request A verification information is generated, and is back to the second communication account, that is, verification information is back to the second communication account Second network equipment.Second network equipment can return it to testing for first network equipment after receiving verification information Auxiliary program is demonstrate,proved, completes verifying to verify auxiliary program using verification information.
In the specific implementation, verifying can be passed through after the verifying auxiliary program of first network equipment receives verification information The page submits verification information.In addition to the first input control, verifying on the page can also include for being written and sending verifying letter Second input control of breath.A relative position can be arranged for the second input control on the page by verifying, and be used for write verification Information.After relative position is written in verification information by verifying auxiliary program, the transmission operation of the second input control can be executed, from And the checking request for carrying verification information is sent to authentication server, so that authentication server is for testing in checking request Card information is verified.
Optionally, the method is executed by verifying auxiliary program, in the verifying event for monitoring first network equipment After step, the method also includes:
The prompt to the verifying event is generated, the prompt includes the calling control for verifying auxiliary program;
According to the triggering for calling control, show that the verifying assists journey in the main screen of the first network equipment Sequence.
In the specific implementation, verifying auxiliary program can be in the main screen of first network equipment after monitoring verifying event It is upper to generate the prompt for being directed to verifying event, to notify user that there is currently verifying events, and tested by the execution of verifying auxiliary program Card process.For example, popping up prompt window " opening verifying auxiliary program " on the home screen.
In practical applications, prompt can be generated before intercepting the verifying event triggering verifying page, can also intercepted Generate prompt after the verifying event triggering verifying page, can also the prompt when execution verification process finishes, can also be without Prompt.Those skilled in the art can set according to actual needs.
Wherein, which may include the calling control for verifying auxiliary program.When calling control to be triggered by user, Verifying auxiliary program can be triggered to be shown in the main screen of first network equipment, so that the verification process to be executed is complete Site preparation is shown to user.
When the main screen of first network equipment shows verifying auxiliary program, verifying page can be called in verifying auxiliary program Face, and the verification process filled in from the second communication account and verification information to the relative position of the verifying page is shown one by one.
Auxiliary program is verified when showing in main screen, the verifying page intercepted before can showing can also be based on second Account is communicated to the authentication server requests verification page again, the verifying page that authentication server is returned based on the second communication account Face is shown on verifying auxiliary program.
In practical application, verifying auxiliary program can also be when monitoring verifying event, and directly triggering is shown in main screen.Or Person verifies auxiliary program after prompt, does not show in main screen, but executing entire verification process from the background, to save Save the process resource that first network equipment shows verifying auxiliary program.
It should be noted that in practical applications, verifying auxiliary program can determined there are when verifying event, to second The network equipment sends communication account acquisition request.Communication account can also be sent when intercepting the verifying event triggering verifying page Acquisition request.Communication account acquisition request can also be sent after generating the prompt for verifying event.It can also be in prompt It calls control to be triggered, verify auxiliary program when showing in main screen, sends communication account acquisition request.Those skilled in the art It can be set according to actual needs.
Optionally, before the step of described based on the second communication account request verification information, the method is also wrapped It includes:
Account is communicated to the authentication server requests verification page according to described second.
In the specific implementation, first network equipment can use after getting the second communication account of second network equipment Second communicates account to the authentication server requests verification page.
According to the embodiment of the present application, auxiliary program is verified when monitoring verifying event, intercepts verifying event in the first net The verifying page of network equipment triggering, avoids the verifying page from showing in first network equipment, executes in verifying auxiliary program authenticated While journey, the process resource that first network equipment shows the verifying page is saved.
Example IV
Fig. 4 shows a kind of step flow chart of verification method of the embodiment of the present application four, mainly from second network equipment Angle a kind of verification method is provided, the method can specifically comprise the following steps:
Step 401, the second communication account is provided to first network equipment, to be based on described the by the first network equipment Two communication account request verification informations.
Step 402, the verification information sent based on the second communication account is received, and is supplied to the first network and sets It is standby, to be verified by the first network equipment according to the verification information.
According to the embodiment of the present application, after receiving the communication account acquisition request of first network equipment, the second network is set It is standby to return to the second communication account to first network equipment.Wherein, second network equipment can have multiple communication accounts, connect After receiving communication account acquisition request, wherein one or more are chosen from multiple communication accounts, as the second communication account.
First network equipment, can be based on the second communication account request verification information after receiving the second communication account. Processing step of the first network equipment based on the second communication account request verification information is in the above-described embodiments it is stated that herein It repeats no more.
The verification information of first network device request can be sent to second network equipment with the second communication account.The The verification information received can be sent to first network equipment by two network equipments, be believed by first network equipment using the verifying Breath is verified.The processing step that first network equipment is verified using verification information in the above-described embodiments it is stated that Details are not described herein.
According to the embodiment of the present application, first network equipment is tested by the second communication account that second network equipment provides Card, thus first network equipment execute verification process in, without use first network equipment first communicate account can be complete It at verifying, avoids revealing userspersonal information in verification process, improves the safety of verification process.
The embodiment of the present application in order to facilitate understanding by those skilled in the art, below with reference to the specific example of Figure 11 to Figure 14 It is explained.Following example shows the main screen for mainly illustrating first network equipment authenticated performed by verifying auxiliary program Journey.
Figure 11 is the schematic diagram one that a kind of verification process of the application is shown.It can be seen that operation of the user in mobile phone The network connecting request of the access ChinaNet-Starbucks WIFI hot spot is initiated in system.Verifying auxiliary program can receive The network connection notice sent to operating system, so that it is determined that current mobile phone initiates network connecting request.Verify auxiliary program When determining that mobile phone initiates network connecting request, it can trigger and judge whether there is verifying event, when there is currently verifyings for determination Event, the verifying event that verifying auxiliary program can intercept trigger the displaying verifying page in the main screen of mobile phone.
Figure 12 is the schematic diagram two that a kind of verification process of the application is shown.It can be seen that verifying auxiliary program is directed to Verifying event generates prompt, and is shown in the form of pop-up window in main screen.In the prompt include call control, when with When the prompt is clicked at family, verifying auxiliary program can be called to be shown in main screen.
Figure 13 is the schematic diagram three that a kind of verification process of the application is shown.It can be seen that prompt when the user clicks with When triggering the calling control of prompt, verifying auxiliary program is called, and main screen is from the network connection changing interface of operating system to testing Demonstrate,prove the startup interface of auxiliary program.
Figure 14 is the schematic diagram four that a kind of verification process of the application is shown.It can be seen that including on the verifying page The input field of phone number and verification information, the mobile phone that verifying auxiliary program can will be got from verifying secondary server is written Number " 14705191269 " write-in is executed to " password please being issued me to phone number input field!" clicking operation, with Phone number be written is sent to WiFi authentication server, verification information " 24188 " will be included by WiFi authentication server Short message is sent to " 14705191269 " communication account of verifying secondary server, after verifying secondary server receives short message, Extract verification information " 24188 " from short message and be back to verifying auxiliary program, verifying auxiliary program will " 24188 " write-in to testing Information input column is demonstrate,proved, and executes the clicking operation to " connection is surfed the Internet ", verification information is back to authentication server, by verifying Server is verified.
Embodiment five
Fig. 5 shows a kind of step flow chart of verification method of the embodiment of the present application five, mainly from first network equipment Angle a kind of verification method is provided, the method can specifically comprise the following steps:
Step 501, determine that verifying event occurs for first network equipment, wherein the first network equipment has first to set Standby mark or the first user identifier, the verifying event include the verifying between authentication server and the first network equipment Event.
Step 502, the second device identification or second user mark from second network equipment are obtained.
Step 503, verifying event is completed based on second device identification or second user mark.
In the specific implementation, first network equipment can be monitored, the verifying event in first network equipment is determined.Due to preceding The specific embodiment that monitoring first network equipment has been described in detail in embodiment and has determined verifying event is stated, herein no longer It repeats.
In general, verifying event may need to mark using the first device identification of first network equipment or the first user of user Know and completes verifying event.
It in the embodiment of the present application, can be to second the second device identification of network device requests when determining verifying event Or second user mark.
Wherein, second network equipment can have multiple user identifiers, after receiving the request, can choose wherein some use Family mark is identified as second user, is back to first network equipment.
Wherein, multiple network equipments can also be preset, each network equipment has unique device identification, asks receiving After asking, can choose wherein some network equipment as second network equipment, using the device identification of second network equipment as Second device identification is back to first network equipment.
In first network equipment, the second device identification or second user that can use second network equipment have been identified At verifying.
Optionally, the user identifier may include communication account.
The specific embodiment that verifying event is completed using communication account, has been described in detail in the aforementioned embodiment, This is repeated no more.
Optionally, device identification may include the physical address and/or identification code of communication apparatus.
In practical application, such as mobile phone, tablet computer communication apparatus can have unique MAC Address (Media Access Control, media access control) or IMEI identification code (International Mobile Equipment Identity, International Mobile Station Equipment Identification code).When verifying event needs to complete using above-mentioned MAC Address or IMEI identification code Verifying event then can complete verifying event using the MAC Address or IMEI identification code of second network equipment.
According to the embodiment of the present application, first network equipment is used using the second device identification of second network equipment or second Family mark completes verifying event, and the first device identification of first network equipment or the first user identifier need not be used to be tested Card, avoids revealing userspersonal information in verification process, improves the safety of verification process.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method It closes, but those skilled in the art should understand that, the embodiment of the present application is not limited by the described action sequence, because according to According to the embodiment of the present application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should Know, the embodiments described in the specification are all preferred embodiments, and related movement not necessarily the application is implemented Necessary to example.
Embodiment six
Corresponding with embodiment two, the embodiment of the present application six additionally provides a kind of verifying device.Fig. 6 shows the application implementation A kind of structural block diagram of verifying device of example six, mainly provides a kind of verifying device, the dress from the angle of first network equipment It sets and comprises the following modules:
Event-monitoring module 601 is verified, for monitoring the verifying event of first network equipment, the first network equipment tool There is the first communication account.
It communicates account and obtains module 602, for obtaining the second communication account of second network equipment, and be based on described second Communicate account request verification information.
Authentication module 603, for being verified according to the verification information of second network equipment.
According to the embodiment of the present application, the second of second network equipment is obtained by the verifying event for first network equipment Account is communicated, and based on the second communication account request verification information, is verified using the verification information of the second communication account, from And executed in verification process in first network equipment, it can be completed and test without the first communication account using first network equipment Card, avoids revealing userspersonal information in verification process, improves the safety of verification process.
Further, it is logical to execute write-in first without user in first network equipment for the verification method of the embodiment of the present application News account checks multiple operations such as verification information, write verification information, to save user's operation.
Embodiment seven
Corresponding with embodiment three, the embodiment of the present application six additionally provides a kind of verifying device.Fig. 7 shows the application implementation A kind of structural block diagram of verifying device of example seven, mainly provides a kind of verifying device, the dress from the angle of first network equipment It sets and comprises the following modules:
Network connection notice registration module 701, for the operating system registered network connection in the first network equipment Notice.
Event-monitoring module 702 is verified, for monitoring the verifying event of first network equipment, the first network equipment tool There is the first communication account.
Verify page blocking module 703, the verifying triggered for intercepting the verifying event in the first network equipment The page.
It communicates account and obtains module 704, for obtaining the second communication account of second network equipment, and be based on described second Communicate account request verification information.
Authentication module 705, for being verified according to the verification information of second network equipment.
Optionally, the verifying event-monitoring module 702 includes:
Network connecting request detection sub-module, the network connecting request initiated for detecting the first network equipment;
Verification process decision sub-module, for determining that the target network for accessing corresponding requests needs to be implemented verification process.
Optionally, the network connecting request detection sub-module includes:
It is connected to the network notification receiving unit, behaviour when for receiving the first network equipment initiation network connecting request Make the network connection notice of system transmission.
Optionally, the verification process decision sub-module includes:
Network connection state judging unit, for judging net of the first network equipment after network connecting request sending Network connection status;
Verification process determination unit, if being to disconnect network for the network connection state, it is determined that access corresponding requests Target network need to be implemented verification process.
Optionally, described device further include:
Verification tip module, for generating the prompt to the verifying event, the prompt includes for verifying auxiliary journey The calling control of sequence;
Program displays module, for basis to the triggering for calling control, in the main screen exhibition of the first network equipment Show the verifying auxiliary program.
Optionally, the communication account acquisition module 704 includes:
Acquisition request sending submodule, for sending communication account acquisition request to second network equipment;
Second communication account receiving submodule, for receiving second network equipment from least one the communication account having In family, account is communicated for the first network equipment is chosen second.
Optionally, described device further include:
Page request module is verified, for communicating account to the authentication server requests verification page according to described second.
Optionally, the verifying page includes the first input control for communication account, and the communication account obtains mould Block 704 includes:
Submodule is written in second communication account, for the second communication account to be written to the pass of first input control Join position;
First input control sending submodule, for being directed to the transmission operation of first input control by executing, to The authentication server sends the verification information acquisition request for carrying the second communication account;Wherein, the verification information is anti- It is fed to corresponding second network equipment of the second communication account.
Optionally, the verifying page includes the second input control for communication account, and the communication account obtains mould Block 704 includes:
Submodule is written in verification information, for the verification information to be written to the relative position of second input control;
Second input control sending submodule, for by executing the transmission operation for second input control.To The authentication server sends the checking request for carrying verification information, to be tested by the authentication server verification information Card.
According to the embodiment of the present application, auxiliary program is verified when monitoring verifying event, intercepts verifying event in the first net The verifying page of network equipment triggering, avoids the verifying page from showing in first network equipment, executes in verifying auxiliary program authenticated While journey, the process resource that first network equipment shows the verifying page is saved.
Embodiment eight
Corresponding with example IV, the embodiment of the present application eight additionally provides a kind of verifying device.Fig. 8 shows the application implementation A kind of structural block diagram of verifying device of example eight, mainly provides a kind of verifying device, the dress from the angle of second network equipment It sets and comprises the following modules:
It communicates account and module 801 is provided, for providing the second communication account to first network equipment, by first net Network equipment is based on the second communication account request verification information.
Verification information provides module 802, for receiving the verification information sent based on the second communication account, and provides To the first network equipment, to be verified by the first network equipment according to the verification information.
According to the embodiment of the present application, first network equipment is tested by the second communication account that second network equipment provides Card, thus first network equipment execute verification process in, without use first network equipment first communicate account can be complete It at verifying, avoids revealing userspersonal information in verification process, improves the safety of verification process.
Embodiment nine
Corresponding with embodiment five, the embodiment of the present application nine additionally provides a kind of verifying device.Fig. 9 shows the application implementation A kind of structural block diagram of verifying device of example nine, mainly provides a kind of verifying device, the dress from the angle of first network equipment It sets and comprises the following modules:
Event determination module 901 is verified, for determining that verifying event occurs for first network equipment, wherein first net Network equipment has the first device identification or the first user identifier, and the verifying event includes authentication server and first net Verifying event between network equipment.
Identifier acquisition module 902, for obtaining the second device identification or second user mark from second network equipment Know.
Verifying event completes module 903, for being completed based on second device identification or second user mark Verifying event.
Optionally, the device identification includes the physical address and/or identification code of communication apparatus, and the user identifier includes Communicate account.
According to the embodiment of the present application, first network equipment is used using the second device identification of second network equipment or second Family mark completes verifying event, and the first device identification of first network equipment or the first user identifier need not be used to be tested Card, avoids revealing userspersonal information in verification process, improves the safety of verification process.
For device embodiment, since it is basically similar to the method embodiment, related so being described relatively simple Place illustrates referring to the part of embodiment of the method.
Embodiment of the disclosure can be implemented as using any suitable hardware, firmware, software, or and any combination thereof into The system of the desired configuration of row.Figure 10, which is schematically shown, can be used for realizing showing for each embodiment described in the disclosure Example property system 1000.
For one embodiment, Figure 10 shows exemplary system 1000, which has one or more processors 1002, it is coupled to the system control module (chipset) 1004 of at least one of one or more processors 1002, by coupling It closes the system storage 1006 of system control module 1004, be coupled to the nonvolatile memory of system control module 1004 (NVM)/storage equipment 1008, the one or more input-output apparatus 1010 for being coupled to system control module 1004, and It is coupled to the network interface 1012 of system control module 1006.
Processor 1002 may include one or more single or multiple core processors, and processor 1002 may include general processor Or any combination of application specific processor (such as graphics processor, application processor, Baseband processor etc.).In some embodiments In, system 1000 can be as the browser described in the embodiment of the present application.
In some embodiments, system 1000 may include with instruction one or more computer-readable mediums (for example, System storage 1006 or NVM/ store equipment 1008) and mutually merge with the one or more computer-readable medium and be configured To execute instruction the one or more processors 1002 to realize module thereby executing movement described in the disclosure.
For one embodiment, system control module 1004 may include any suitable interface controller, with to one or At least one of multiple processors 1002 and/or any suitable equipment communicated with system control module 1004 or component mention For any suitable interface.
System control module 1004 may include Memory Controller module, to provide interface to system storage 1006.It deposits Memory controller module can be hardware module, software module and/or firmware module.
System storage 1006 can be used for for example, load of system 1000 and storing data and/or instruction.For one Embodiment, system storage 1006 may include any suitable volatile memory, for example, DRAM appropriate.In some implementations In example, system storage 1006 may include four Synchronous Dynamic Random Access Memory of Double Data Rate type (DDR4SDRAM).
For one embodiment, system control module 1004 may include one or more i/o controllers, with to NVM/ stores equipment 1008 and one or more input-output apparatus 1010 provide interface.
For example, NVM/ storage equipment 1008 can be used for storing data and/or instruction.NVM/ stores equipment 1008 Any suitable nonvolatile memory (for example, flash memory) and/or may include that any suitable (one or more) is non-volatile Equipment is stored (for example, one or more hard disk drives (HDD), one or more CD (CD) drivers and/or one or more A digital versatile disc (DVD) driver).
NVM/ storage equipment 1008 may include a part for the equipment being physically mounted on as system 1000 Storage resource or its can by the equipment access without a part as the equipment.For example, NVM/ stores equipment 1008 It can be accessed by network via (one or more) input-output apparatus 1010.
(one or more) input-output apparatus 1010 can provide interface for system 1000 appropriate to set with any other Standby communication, input-output apparatus 1010 may include communication component, audio component, sensor module etc..Network interface 1012 can Interface is provided for system 1000 with by one or more network communications, system 1000 can be according to one or more wireless network marks The quasi- and/or arbitrary standards in agreement and/or agreement are carried out wireless communication with the one or more components of wireless network, such as The wireless network based on communication standard is accessed, such as WiFi, 2G or 3G or their combination are carried out wireless communication.
For one embodiment, at least one of one or more processors 1002 can be with system control module 1004 The logic of one or more controllers (for example, Memory Controller module) is packaged together.For one embodiment, (one Or multiple) at least one of processor 1002 can encapsulate with the logic of one or more controllers of system control module 1004 Together to form system in package (SiP).For one embodiment, at least one of one or more processors 1002 can It is integrated on same mold with the logic of one or more controllers of system control module 1004.For one embodiment, (one It is a or multiple) at least one of processor 1002 can be with the logical set of one or more controllers of system control module 1004 At on same mold to form system on chip (SoC).
In various embodiments, system 1000 can be, but not limited to be: browser, work station, desk-top calculating equipment or shifting It is dynamic to calculate equipment (for example, lap-top computing devices, handheld computing device, tablet computer, net book etc.).In each embodiment In, system 1000 can have more or fewer components and/or different frameworks.For example, in some embodiments, system 1000 Including one or more video cameras, keyboard, liquid crystal display (LCD) screen (including touch screen displays), nonvolatile memory Port, mutiple antennas, graphic chips, specific integrated circuit (ASIC) and loudspeaker.
Wherein, if display includes touch panel, display screen may be implemented as touch screen displays, be used by oneself with receiving The input signal at family.Touch panel includes one or more touch sensors to sense the hand on touch, slide, and touch panel Gesture.The touch sensor can not only sense the boundary of a touch or slide action, but also detect and the touch or sliding Operate relevant duration and pressure.
The embodiment of the present application also provides a kind of non-volatile readable storage medium, be stored in the storage medium one or Multiple modules (programs) when the one or more module is used in terminal device, can make the terminal device execute The instruction (instructions) of various method steps in the embodiment of the present application.
Provide a kind of computer equipment in one example, including memory, processor and storage are on a memory simultaneously The computer program that can be run on a processor, which is characterized in that the processor is realized such as when executing the computer program The method of the embodiment of the present application.
A kind of computer readable storage medium is additionally provided in one example, is stored thereon with computer program, it is special Sign is, one or more methods such as the embodiment of the present application are realized when which is executed by processor.
The embodiment of the present application discloses a kind of verification method and device, and example 1 includes a kind of verification method, comprising: monitoring The verifying event of first network equipment, the first network equipment have the first communication account;Obtain the of second network equipment Two communication accounts, and based on the second communication account request verification information;According to the verification information of second network equipment It is verified.
Example 2 may include method described in example 1, wherein it is described monitoring first network equipment verifying event the step of It include: the network connecting request that the detection first network equipment is initiated;Determine that the target network needs of access corresponding requests are held Row verification process.
Example 3 may include method described in example 2, wherein in the network that the detection first network equipment is initiated Before the step of connection request, the method also includes: it is logical in the operating system registered network connection of the first network equipment Know;The step of network connecting request that the detection first network equipment is initiated includes: to receive the first network equipment Initiate the network connection notice that the operating system is sent when network connecting request.
Example 4 may include method described in example 2, wherein the target network needs for determining access corresponding requests are held The step of row verification process includes: the network connection state for judging the first network equipment after network connecting request sending; If the network connection state is to disconnect network, it is determined that the target network for accessing corresponding requests needs to be implemented verification process.
Example 5 may include method described in example 1, wherein the method also includes: the verifying event is intercepted described The verifying page of first network equipment triggering.
Example 6 may include method described in example 1, wherein the method is executed by verifying auxiliary program, in the monitoring After the step of verifying event of first network equipment, the method also includes: the prompt to the verifying event is generated, it is described Prompt includes the calling control for verifying auxiliary program;According to the triggering for calling control, set in the first network Standby main screen shows the verifying auxiliary program.
Example 7 may include method described in example 1, wherein the second communication account for obtaining second network equipment Step includes: to send communication account acquisition request to second network equipment;Second network equipment is received from having In at least one communication account, account is communicated for the first network equipment is chosen second.
Example 8 may include method described in example 1, wherein described based on the second communication account request verifying letter Before the step of breath, the method also includes: account is communicated to the authentication server requests verification page according to described second.
Example 9 may include method described in example 8, wherein the verifying page includes defeated for communicate account first Enter control, described the step of communicating account request verification information based on described second includes: by the second communication account write-in The relative position of first input control;By executing the transmission operation for first input control, to the verifying Server sends the verification information acquisition request for carrying the second communication account;Wherein, the verification information feeds back to described Corresponding second network equipment of second communication account.
Example 10 may include method described in example 8, wherein the verifying page includes defeated for communicate account second Enter control, the step of verification information according to second network equipment is verified includes: to write the verification information Enter the relative position of second input control;By executing the transmission operation for second input control.It is tested to described It demonstrate,proves server and sends the checking request for carrying verification information, to be verified by the authentication server to verification information.
Example 11 may include a kind of verification method, wherein the described method includes: providing the second communication to first network equipment Account, to be based on the second communication account request verification information by the first network equipment;It receives logical based on described second The verification information that account is sent is interrogated, and is supplied to the first network equipment, to be tested according to as the first network equipment Card information is verified.
Example 12 may include a kind of verifying device, wherein described device includes:
Event-monitoring module is verified, for monitoring the verifying event of first network equipment, the first network equipment has First communication account;
It communicates account and obtains module, for obtaining the second communication account of second network equipment, and it is logical based on described second Interrogate account request verification information;
Authentication module, for being verified according to the verification information of second network equipment.
Example 13 may include device described in example 12, wherein the verifying event-monitoring module includes:
Network connecting request detection sub-module, the network connecting request initiated for detecting the first network equipment;
Verification process decision sub-module, for determining that the target network for accessing corresponding requests needs to be implemented verification process.
Example 14 may include device described in example 13, wherein described device further include:
Network connection notice registration module is logical for the operating system registered network connection in the first network equipment Know;
The network connecting request detection sub-module includes:
It is connected to the network notification receiving unit, behaviour when for receiving the first network equipment initiation network connecting request Make the network connection notice of system transmission.
Example 15 may include device described in example 13, wherein the verification process decision sub-module includes:
Network connection state judging unit, for judging net of the first network equipment after network connecting request sending Network connection status;
Verification process determination unit, if being to disconnect network for the network connection state, it is determined that access corresponding requests Target network need to be implemented verification process.
Example 16 may include device described in example 12, wherein described device further include:
Verify page blocking module, the verifying page triggered for intercepting the verifying event in the first network equipment Face.
Example 17 may include device described in example 12, wherein described device further include:
Verification tip module, for generating the prompt to the verifying event, the prompt includes for verifying auxiliary journey The calling control of sequence;
Program displays module, for basis to the triggering for calling control, in the main screen exhibition of the first network equipment Show the verifying auxiliary program.
Example 18 may include device described in example 12, wherein the communication account obtains module and includes:
Acquisition request sending submodule, for sending communication account acquisition request to second network equipment;
Second communication account receiving submodule, for receiving second network equipment from least one the communication account having In family, account is communicated for the first network equipment is chosen second.
Example 19 may include device described in example 12, wherein described device further include:
Page request module is verified, for communicating account to the authentication server requests verification page according to described second.
Example 20 may include device described in example 19, wherein the verifying page includes first for communication account Input control, the communication account obtain module and include:
Submodule is written in second communication account, for the second communication account to be written to the pass of first input control Join position;
First input control sending submodule, for being directed to the transmission operation of first input control by executing, to The authentication server sends the verification information acquisition request for carrying the second communication account;Wherein, the verification information is anti- It is fed to corresponding second network equipment of the second communication account.
Example 21 may include device described in example 19, wherein the verifying page includes second for communication account Input control, the communication account obtain module and include:
Submodule is written in verification information, for the verification information to be written to the relative position of second input control;
Second input control sending submodule, for by executing the transmission operation for second input control.To The authentication server sends the checking request for carrying verification information, to be tested by the authentication server verification information Card.
Example 22 may include a kind of verification method, wherein the described method includes: determining that verifying thing occurs for first network equipment Part, wherein the first network equipment has the first device identification or the first user identifier, and the verifying event includes verifying Verifying event between server and the first network equipment;Obtain the second device identification from second network equipment or Second user mark;Verifying event is completed based on second device identification or second user mark.
Example 23 may include method described in example 22, wherein the device identification includes the physical address of communication apparatus And/or identification code, the user identifier include communication account.
Example 24 may include a kind of verifying device, wherein described device includes:
Event determination module is verified, for determining that verifying event occurs for first network equipment, wherein the first network is set Standby to have the first device identification or the first user identifier, the verifying event includes that authentication server is set with the first network Verifying event between standby.
Identifier acquisition module, for obtaining the second device identification or second user mark from second network equipment.
Verifying event completes module, for completing verifying based on second device identification or second user mark Event.
Example 25 may include device described in example 24, wherein the device identification includes the physical address of communication apparatus And/or identification code, the user identifier include communication account.
Example 26, a kind of computer equipment, including memory, processor and storage are on a memory and can be on a processor The computer program of operation, which is characterized in that the processor realized when executing the computer program as claim 1-11, The method of 16-17 one or more.
Example 27, a kind of computer readable storage medium, are stored thereon with computer program, which is characterized in that the program The method such as claim 1-11,16-17 one or more is realized when being executed by processor.
Although some embodiments are various substitutions, and/or equivalent implementation for the purpose of illustrating and describing Scheme calculates to reach same purpose and implement the realization for exemplifying and describing, and does not depart from the practical range of the application.This Shen It please be intended to cover any modification or variation of the embodiment being discussed herein.It is, therefore, apparent that embodiment described herein only by right It is required that being limited with their equivalent.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.

Claims (18)

1. a kind of verification method, which comprises
The verifying event of first network equipment is monitored, the first network equipment has the first communication account;
The second communication account of second network equipment is obtained, and based on the second communication account request verification information;
It is verified according to the verification information of second network equipment.
2. according to the method described in claim 1, the step of verifying event of the monitoring first network equipment, includes:
Detect the network connecting request that the first network equipment is initiated;
Determine that the target network of access corresponding requests needs to be implemented verification process.
3. according to the method described in claim 2, in the network connecting request for detecting the first network equipment initiation Before step, the method also includes:
Notice is connected in the operating system registered network of the first network equipment;
The step of network connecting request that the detection first network equipment is initiated includes:
It receives the first network equipment and initiates the network connection notice that the operating system is sent when network connecting request.
4. according to the method described in claim 2, the target network for determining access corresponding requests needs to be implemented verification process The step of include:
Judge network connection state of the first network equipment after network connecting request sending;
If the network connection state be disconnect network, it is determined that access corresponding requests target network need to be implemented it is authenticated Journey.
5. according to the method described in claim 1, the method also includes:
Intercept the verifying page that the verifying event is triggered in the first network equipment.
6. being set according to the method described in claim 1, the method is executed by verifying auxiliary program in the monitoring first network After the step of standby verifying event, the method also includes:
The prompt to the verifying event is generated, the prompt includes the calling control for verifying auxiliary program;
According to the triggering for calling control, the verifying auxiliary program is shown in the main screen of the first network equipment.
7. according to the method described in claim 1, the step of second communication account for obtaining second network equipment, includes:
Communication account acquisition request is sent to second network equipment;
Second network equipment is received from least one the communication account having, the chosen for the first network equipment Two communication accounts.
8. according to the method described in claim 1, it is described based on it is described second communication account request verification information the step of it Before, the method also includes:
Account is communicated to the authentication server requests verification page according to described second.
9. according to the method described in claim 8, it is described verifying the page include for communication account the first input control, it is described Include: based on the step of the second communication account request verification information
The second communication account is written to the relative position of first input control;
By executing the transmission operation for first input control, it is logical that carrying described second is sent to the authentication server Interrogate the verification information acquisition request of account;Wherein, the verification information feeds back to corresponding second net of the second communication account Network equipment.
10. according to the method described in claim 8, the verifying page includes the second input control for communication account, institute Stating the step of being verified according to the verification information of second network equipment includes:
The verification information is written to the relative position of second input control;
By executing the transmission operation for second input control.It is sent to the authentication server and carries verification information Checking request, to be verified by the authentication server to verification information.
11. a kind of verification method, which comprises
The second communication account is provided to first network equipment, is asked with being based on the second communication account by the first network equipment Seek verification information;
The verification information sent based on the second communication account is received, and is supplied to the first network equipment, by described First network equipment is verified according to the verification information.
12. a kind of verifying device, described device include:
Event-monitoring module is verified, for monitoring the verifying event of first network equipment, the first network equipment has first Communicate account;
It communicates account and obtains module, for obtaining the second communication account of second network equipment, and based on the second communication account Family requests verification information;
Authentication module, for being verified according to the verification information of second network equipment.
13. a kind of verifying device, described device include:
It communicates account and module is provided, for providing the second communication account to first network equipment, by the first network equipment Based on the second communication account request verification information;
Verification information provides module, for receiving the verification information sent based on the second communication account, and is supplied to described First network equipment, to be verified by the first network equipment according to the verification information.
14. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, which is characterized in that the processor realizes such as claim 1-11 mono- or more when executing the computer program A method.
15. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The method such as claim 1-11 one or more is realized when execution.
16. a kind of verification method, which comprises
Determine that verifying event occurs for first network equipment, wherein the first network equipment has the first device identification or the One user identifier, the verifying event include the verifying event between authentication server and the first network equipment;
Obtain the second device identification or second user mark from second network equipment;
Verifying event is completed based on second device identification or second user mark.
17. according to the method for claim 16, the device identification includes physical address and/or the identification of communication apparatus Code, the user identifier include communication account.
18. a kind of verifying device, described device include:
Event determination module is verified, for determining that verifying event occurs for first network equipment, wherein the first network equipment tool Have the first device identification or the first user identifier, the verifying event include authentication server and the first network equipment it Between verifying event;
Identifier acquisition module, for obtaining the second device identification or second user mark from second network equipment;
Verifying event completes module, for completing verifying thing based on second device identification or second user mark Part.
CN201710477757.3A 2017-06-20 2017-06-20 Verification method and device Active CN109104398B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710477757.3A CN109104398B (en) 2017-06-20 2017-06-20 Verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710477757.3A CN109104398B (en) 2017-06-20 2017-06-20 Verification method and device

Publications (2)

Publication Number Publication Date
CN109104398A true CN109104398A (en) 2018-12-28
CN109104398B CN109104398B (en) 2021-07-20

Family

ID=64796270

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710477757.3A Active CN109104398B (en) 2017-06-20 2017-06-20 Verification method and device

Country Status (1)

Country Link
CN (1) CN109104398B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997824A (en) * 2009-08-20 2011-03-30 中国移动通信集团公司 Identity authentication method based on mobile terminal as well as device and system thereof
CN104836812A (en) * 2015-05-26 2015-08-12 杭州华三通信技术有限公司 Portal authentication method, device and system
US20160065558A1 (en) * 2013-01-08 2016-03-03 Coursera, Inc. Identity verification for online education
CN105592458A (en) * 2014-10-22 2016-05-18 中国电信股份有限公司 Authentication method and system for service of wireless local area network, and server
CN105657781A (en) * 2014-11-14 2016-06-08 深圳市腾讯计算机系统有限公司 Method and device for accessing WiFi network
CN105764056A (en) * 2016-04-13 2016-07-13 北京国创富盛通信股份有限公司 web certification system and method for public wifi access
CN106850401A (en) * 2017-01-11 2017-06-13 上海斐讯数据通信技术有限公司 A kind of wireless authentication device, system and its authentication method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997824A (en) * 2009-08-20 2011-03-30 中国移动通信集团公司 Identity authentication method based on mobile terminal as well as device and system thereof
US20160065558A1 (en) * 2013-01-08 2016-03-03 Coursera, Inc. Identity verification for online education
CN105592458A (en) * 2014-10-22 2016-05-18 中国电信股份有限公司 Authentication method and system for service of wireless local area network, and server
CN105657781A (en) * 2014-11-14 2016-06-08 深圳市腾讯计算机系统有限公司 Method and device for accessing WiFi network
CN104836812A (en) * 2015-05-26 2015-08-12 杭州华三通信技术有限公司 Portal authentication method, device and system
CN105764056A (en) * 2016-04-13 2016-07-13 北京国创富盛通信股份有限公司 web certification system and method for public wifi access
CN106850401A (en) * 2017-01-11 2017-06-13 上海斐讯数据通信技术有限公司 A kind of wireless authentication device, system and its authentication method

Also Published As

Publication number Publication date
CN109104398B (en) 2021-07-20

Similar Documents

Publication Publication Date Title
US11665200B2 (en) System and method for second factor authentication to perform services
US10861000B2 (en) Method, system, and apparatus for application loading
EP2783319B1 (en) Providing verification of user identification information
US20100099380A1 (en) Communication server and method for generating a one-time password using a mobile phone
US20170116596A1 (en) Mobile Communication Device with Proximity Based Communication Circuitry
CN104580125B (en) A kind of payment verification methods, devices and systems
WO2015135399A1 (en) Device, system, and method for creating virtual credit card
CN105119722B (en) A kind of auth method, equipment and system
CN108200089A (en) Implementation method, device, system and the storage medium of information security
CN104579671B (en) Auth method and system
CN104348612A (en) Third-party website login method based on mobile terminal and mobile terminal
KR20160006185A (en) Two factor authentication
CN104796436B (en) User login method, system, the first Platform Server and related platform server
US20160277381A1 (en) Security check method and system, terminal, verification server
CN105989485B (en) Service management method and device
CN105933331A (en) Method and device for operating accounts
CN112685719A (en) Single sign-on method, device, system, computer equipment and storage medium
CN105792167B (en) A kind of method and device initializing credible performing environment, equipment
CN109426961B (en) Card binding risk control method and device
CN112291183B (en) Account login method, system and related equipment
CN111756703A (en) Debug interface management method, device and electronic device
CN108769059B (en) Verification method, device, medium and computing equipment
CN110113346A (en) A kind of network verification method, user terminal and server
CN109688109A (en) The verification method and device of identifying code based on client-side information identification
CN109104398A (en) A kind of verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant