Nothing Special   »   [go: up one dir, main page]

CN110098921A - Verification code generation method, device, application service end and system - Google Patents

Verification code generation method, device, application service end and system Download PDF

Info

Publication number
CN110098921A
CN110098921A CN201810088412.3A CN201810088412A CN110098921A CN 110098921 A CN110098921 A CN 110098921A CN 201810088412 A CN201810088412 A CN 201810088412A CN 110098921 A CN110098921 A CN 110098921A
Authority
CN
China
Prior art keywords
identifying code
generating means
application service
service end
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810088412.3A
Other languages
Chinese (zh)
Inventor
吴迪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201810088412.3A priority Critical patent/CN110098921A/en
Publication of CN110098921A publication Critical patent/CN110098921A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of verification code generation method, device, application service end and systems, are related to field of computer technology.Wherein, this method comprises: application service end is after receiving the identifying code demand information of applications client, identifying code acquisition request is sent to identifying code generating means;Identifying code generating means generate identifying code after receiving the identifying code acquisition request, and the identifying code is sent to the application service end.By above step, identifying code not only it had been able to satisfy and has generated demand, but also without realizing a set of logic for generating identifying code at each application service end, saved a large amount of manpower and material resources cost, improve the maintenance efficiency of verifying logic.

Description

Verification code generation method, device, application service end and system
Technical field
The present invention relates to field of computer technology more particularly to a kind of verification code generation method, device, application service end and System.
Background technique
Currently, many application scenarios of APP (application software) can all be related to subscriber authentication.For example it logging in APP, looking into It askes under the scenes such as bill, Modify password, needs to obtain identifying code to complete the verifying of user identity.
In the prior art, identifying code is often generated by application service end, then by application service end by the identifying code User is issued in a manner of short message or Email (Email).
In realizing process of the present invention, at least there are the following problems in the prior art for inventor's discovery: in view of to mobile phone Or Email sends identifying code can be related to problem of data safety, therefore current most of application service ends oneself can all realize it is a set of Generate, send the function logic of identifying code.If logic a set of in this way is realized at each application service end, repeated work will lead to Very much, safeguard that manpower and material resources cost consumed by verifying logic is big and maintenance efficiency is not high.
Summary of the invention
In view of this, the present invention provides a kind of verification code generation method, device, application service end and system, both it was able to satisfy Identifying code generates demand, and without realizing a set of logic for generating identifying code at each application service end, saves a large amount of people Power material resources cost, improves the maintenance efficiency of verifying logic.
To achieve the above object, according to the first aspect of the invention, a kind of verification code generation method is provided.
Verification code generation method of the invention includes: application service end in the verifying code requirement letter for receiving applications client After breath, identifying code acquisition request is sent to identifying code generating means;Identifying code generating means are receiving the identifying code After acquisition request, identifying code is generated, and the identifying code is sent to the application service end.
Optionally, the method also includes: identifying code generating means after receiving the identifying code acquisition request, also Current operation mark is generated, and current operation mark is sent to application service end.
Optionally, the identifying code acquisition request includes: cell-phone number or email address and applications client address;Institute State method further include: after the step of generation identifying code and the generation current operation identify, identifying code generating means The identifying code is sent to user according to the cell-phone number or the email address, identifying code generating means are according to the application Current operation mark is sent to the applications client by client address.
Optionally, the method also includes: before the generation identifying code the step of, identifying code generating means are to described Identifying code acquisition request is verified, and confirms that verification passes through.
Optionally, the current operation mark includes token;And identifying code generating means generate institute according to such as under type It states token: generating timestamp and random number;The entirety being made of timestamp and random number is encrypted, and encrypted result is made For the token.
To achieve the above object, according to the second aspect of the invention, a kind of identifying code generating means are provided.
Identifying code generating means of the invention include: receiving module, and the identifying code for receiving application service end, which obtains, asks It asks;Generation module, for generating identifying code;Sending module, for the identifying code to be sent to the application service end;Its In, the identifying code acquisition request be the application service end the identifying code demand information for receiving applications client it is rear to What identifying code generating means were sent.
Optionally, the generation module is also used to generate current operation mark;The sending module is also used to work as described Preceding operation mark is sent to the application service end.
Optionally, the identifying code acquisition request includes: cell-phone number or email address and applications client address;Institute It states sending module to be also used to that the identifying code is sent to user according to the cell-phone number or the email address, and according to institute It states applications client address and current operation mark is sent to the applications client.
Optionally, described device further include: correction verification module is used for before the generation module generates identifying code, to institute It states identifying code acquisition request to be verified, and confirms that verification passes through.
Optionally, the current operation mark includes token;The generation module is also used to generate institute according to such as under type State token: the generation module generates timestamp and random number;The generation module is whole to being made of timestamp and random number Body is encrypted, and using encrypted result as the token.
To achieve the above object, according to the third aspect of the invention we, a kind of application service end is provided.
Application service end of the invention includes: sending module, in the verifying code requirement letter for receiving applications client After breath, identifying code acquisition request is sent to identifying code generating means;Receiving module is returned for receiving identifying code generating means The identifying code returned;Wherein, the identifying code is identifying code generating means after passing through to identifying code acquisition request verification It generates.
Optionally, the receiving module is also used to receive the current operation mark of identifying code generating means return.
Optionally, the receiving module is also used to receive the identifying code and current operation mark of applications client transmission;Institute State application service end further include: correction verification module, for requesting it in the verifying code check for receiving the applications client transmission Afterwards, identifying code and the current operation mark returned according to the identifying code generating means verifies it.
To achieve the above object, according to the fourth aspect of the invention, a kind of verifying system is provided.
Verifying system of the invention includes: application service end, in the verifying code requirement letter for receiving applications client After breath, identifying code acquisition request is sent to identifying code generating means;Identifying code generating means, for receiving described test After demonstrate,proving code acquisition request, identifying code is generated, and the identifying code is sent to the application service end.
Optionally, the identifying code generating means are also used to after receiving the identifying code acquisition request, and generation is worked as Preceding operation mark, and current operation mark is sent to the application service end.
Optionally, the identifying code acquisition request includes: cell-phone number or email address and applications client address;Institute Identifying code generating means are stated to be also used to that identifying code is sent to user according to the cell-phone number or the email address, and according to Current operation mark is sent to applications client by the applications client address;The application service end is also used to receiving To the applications client send verifying code check request after, according to the identifying code generating means send identifying code and Current operation mark verifies it.
To achieve the above object, according to the fifth aspect of the invention, a kind of electronic equipment is provided.
Electronic equipment of the invention, comprising: one or more processors;And storage device, for storing one or more A program;When one or more of programs are executed by one or more of processors, so that one or more of processing Device realizes verification code generation method of the invention.
To achieve the above object, according to the sixth aspect of the invention, a kind of computer-readable medium is provided.
Computer-readable medium of the invention is stored thereon with computer program, real when described program is executed by processor Existing verification code generation method of the invention.
One embodiment in foregoing invention has the following advantages that or the utility model has the advantages that is answered by application service end receiving After the identifying code demand information of client, identifying code acquisition request is sent to identifying code generating means;Pass through identifying code Generating means generate identifying code after receiving the identifying code acquisition request, and the identifying code is sent to the application Server-side and etc., it had not only been able to satisfy identifying code and has generated demand, but also without realizing a set of generation identifying code at each application service end Logic, save a large amount of manpower and material resources cost, improve the maintenance efficiency of verifying logic.
Further effect possessed by above-mentioned non-usual optional way adds hereinafter in conjunction with specific embodiment With explanation.
Detailed description of the invention
Attached drawing for a better understanding of the present invention, does not constitute an undue limitation on the present invention.Wherein:
Fig. 1 is the key step schematic diagram of verification code generation method according to an embodiment of the invention;
Fig. 2 is the key step schematic diagram of verification code generation method according to another embodiment of the present invention;
Fig. 3 is the main modular schematic diagram of identifying code generating means according to an embodiment of the invention;
Fig. 4 is the main modular schematic diagram of identifying code generating means according to another embodiment of the present invention;
Fig. 5 is the main composition schematic diagram of verifying system according to an embodiment of the invention;
Fig. 6 is that the embodiment of the present invention can be applied to exemplary system architecture figure therein;
Fig. 7 is adapted for the structural schematic diagram for the computer system for realizing the electronic equipment of the embodiment of the present invention.
Specific embodiment
Below in conjunction with attached drawing, an exemplary embodiment of the present invention will be described, including the various of the embodiment of the present invention Details should think them only exemplary to help understanding.Therefore, those of ordinary skill in the art should recognize It arrives, it can be with various changes and modifications are made to the embodiments described herein, without departing from scope and spirit of the present invention.Together Sample, for clarity and conciseness, descriptions of well-known functions and structures are omitted from the following description.
It should be pointed out that in the absence of conflict, the feature in embodiment and embodiment in the present invention can be with It is combined with each other.
Fig. 1 is the key step schematic diagram of verification code generation method according to an embodiment of the invention.As shown in Figure 1, The verification code generation method of the embodiment of the present invention includes:
Step S101, identifying code is obtained after receiving the identifying code demand information of applications client in application service end Request is taken to be sent to identifying code generating means.
Wherein, the applications client can be APP, or the Web application based on browser.When it is implemented, It includes verifying code requirement that applications client, which can be sent after the verifying code requirement event for monitoring user's triggering to application service end, The request of information.Application service end produces identifying code acquisition and asks after receiving the request including identifying code demand information It asks, and the identifying code acquisition request is sent to identifying code generating means.
Step S102, identifying code generating means generate identifying code after receiving the identifying code acquisition request, and will The identifying code is sent to the application service end.
Wherein, the identifying code can be the random number that identifying code generating means are generated by random function.
In embodiments of the present invention, it had not only been able to satisfy identifying code by above step and has generated demand, but also without in each application Server-side realizes a set of logic for generating identifying code, saves a large amount of manpower and material resources cost, improves the maintenance of verifying logic Efficiency.
Fig. 2 is the key step schematic diagram of verification code generation method according to another embodiment of the present invention.As shown in Fig. 2, The verification code generation method of the embodiment of the present invention includes:
Step S201, identifying code is obtained after receiving the identifying code demand information of applications client in application service end Request is taken to be sent to identifying code generating means.
Wherein, the applications client can be APP.When it is implemented, applications client can be triggered monitoring user Verifying code requirement event after to application service end send request.The request includes: identifying code demand information.Application service end exists After receiving the identifying code demand information, the identifying code acquisition request of generation is sent to identifying code generating means.
Step S202, identifying code generating means verify the identifying code acquisition request.If verification passes through, step is executed Rapid S204;Otherwise, step S203 is executed.
Wherein, the identifying code acquisition request may include application service end registration code.In addition, the identifying code acquisition request It may also include that cell-phone number or email address and the applications client address of user.
Specifically, step S202 can include: identifying code generating means take according to the application in the identifying code acquisition request Business end registration code inquires Registry;If the application service end registration code in the identifying code acquisition request is present in the note In volume information table, then the identifying code acquisition request verification passes through, and then executes step S204;Otherwise, step S204 is executed.
When it is implemented, identifying code generating means can generate application service end previously according to the registration information at application service end Registration code, and the application service end registration code of generation is summarized into Registry, in order to according to the Registry pair Identifying code acquisition request is verified.Wherein, the registration information may include application service end title, domain name, calling frequency etc. Information;The random number that application service end registration code can be stored in the form of key assignments for one.
Step S203, identifying code generating means refuse the identifying code acquisition request.
Step S204, identifying code generating means generate identifying code and current operation mark.
Wherein, the current operation mark is for indicating current operation event.Illustratively, the current operation mark can Think token (Token).Token be it is a kind of can control site occupy the special frames of media, with distinguishes data frame and other controls Frame.
In embodiments of the present invention, identifying code generating means can be according to the token as described in generating under type: generating timestamp And random number;Whole progress md5 encryption to being made of timestamp and random number, and using encrypted result as the token.Tool When body is implemented, identifying code generating means can generate the timestamp by " System.currentTimeMillis " method.Separately Outside, the identifying code can also be the random number that identifying code generating means are generated by random function.
Step S205, the identifying code and current operation mark are sent to application service end by identifying code generating means;It tests It demonstrate,proves code generating means and identifying code is sent to by user according to cell-phone number or email address, will be worked as according to the applications client address Preceding operation mark is sent to applications client.
In embodiments of the present invention, the function of sending identifying code to user mobile phone number is realized by step S205, is not necessarily to The participation at application service end considerably reduces the construction amount and maintenance of Short Message Service Gateway.
In embodiments of the present invention, identifying code generation, transmission demand can be met by above step safe and efficiently, again Without realizing a set of logic for generating, sending identifying code at each application service end, so that application service end is without being concerned about verifying The generation and transmission work of code, save a large amount of workload.In addition, being sent by identifying code generating means to applications client The short message for carrying identifying code greatly reduces the construction amount and maintenance of Short Message Service Gateway without the participation at application service end.
Further, on the basis of embodiment shown in Fig. 2, the present invention also provides a kind of verification methods.The present invention is implemented The verification method of example includes: step S201 to step S205, and the following steps after step S205:
Step S206, applications client will verify code check request and be sent to application service end.
Wherein, the verifying code check request packet includes: the identifying code and applications client of user's input are generated from identifying code The current operation mark that device receives.
Step S207, receive applications client transmission verifying code check request after, application service end according to from Identifying code and the current operation mark that identifying code generating means receive verify it.
For the ease of distinguishing, application service can be terminated to identifying code receive and from identifying code sending device and worked as Preceding operation mark is known as: application service is terminated receiving and carrys out self-application visitor by the first identifying code and the first current operation mark Identifying code and the current operation mark at family end are known as: the second identifying code and the second current operation mark.
Specifically, in step S207, the second current operation mark and the first current operation mark are compared in application service end It is whether consistent.If the second current operation mark and the first current operation mark are inconsistent, code check request is verified illegally, verification Do not pass through.If the second current operation mark is consistent with the first current operation mark, then compares the second identifying code and the first identifying code It is whether consistent.If the second identifying code and the first identifying code are consistent, verify code check and pass through;Otherwise, verifying code check does not pass through.
Verification method through the embodiment of the present invention can meet identifying code safe and efficiently and generate, sends, verify need It asks, and without realizing a set of logic for generating, sending identifying code at each application service end, so that application service end is without being concerned about The generation and transmission work of identifying code, save a large amount of workload.
Fig. 3 is the main modular schematic diagram of identifying code generating means according to an embodiment of the invention.As shown in figure 3, The identifying code generating means 300 of the embodiment of the present invention include: receiving module 301, generation module 302, sending module 303.
Receiving module 301, for receiving the identifying code acquisition request of application service end transmission.
Wherein, the identifying code acquisition request is the application service end in the verifying code requirement for receiving applications client After information, sent to identifying code generating means.The applications client can be APP, or based on browser Web application.When it is implemented, applications client can be after the verifying code requirement event for monitoring user's triggering to application service end Send the request including identifying code demand information.Application service end after receiving the request including identifying code demand information, Identifying code acquisition request is produced, and the identifying code acquisition request is sent to identifying code generating means 300.
Generation module 302, for generating identifying code.Wherein, the identifying code can be generation module 302 by random letter The random number that number generates.
Sending module 303, for the identifying code to be sent to application service end.
In embodiments of the present invention, demand is generated and in each application by the way that identifying code can be met with upper module Server-side realizes a set of logic for generating identifying code, saves a large amount of manpower and material resources cost, improves the maintenance of verifying logic Efficiency.
Fig. 4 is the main modular schematic diagram of identifying code generating means according to another embodiment of the present invention.As shown in figure 4, The identifying code generating means 400 of the embodiment of the present invention include: receiving module 401, correction verification module 402, generation module 403, send Module 404.
Receiving module 401, for receiving the identifying code acquisition request of application service end transmission.
Wherein, the identifying code acquisition request is the application service end in the verifying code requirement for receiving applications client After information, sent to identifying code generating means.The applications client can be APP.When it is implemented, applications client It can send and request to application service end after the verifying code requirement event for monitoring user's triggering.The request includes: that identifying code needs Seek information.The identifying code acquisition request of generation is sent to and tests after receiving the identifying code demand information by application service end Demonstrate,prove code generating means.
Correction verification module 402, for being verified to the identifying code acquisition request.
Wherein, the identifying code acquisition request can include: application service end registration code.Illustratively, correction verification module 402 is right The identifying code acquisition request is verified can include: correction verification module 402 takes according to the application in the identifying code acquisition request Business end registration code inquires Registry;If application service end registration code is present in the Registry, verify Module 402 confirms that the identifying code acquisition request verification passes through, and then calls generation module 403;If the application service end note Volume code is not present in the Registry, then correction verification module 402 confirms that the identifying code acquisition request verification does not pass through, into And it is rejected by the identifying code acquisition request.
Generation module 403, in the case where identifying code acquisition request verification passes through, generating identifying code and current Operation mark.
Wherein, the current operation mark is for indicating current operation event.Illustratively, the current operation mark can Think token (Token).Token be it is a kind of can control site occupy the special frames of media, with distinguishes data frame and other controls Frame.When it is implemented, in view of the timeliness of identifying code and the diversity of APP type, by generating current operation mark, It can preferably identify certain primary verifying code requirement, the verification event of some APP.
Illustratively, generation module 403 can be according to the token as described in generating under type: generation module 403 generates timestamp And random number;Generation module 403 encrypts the entirety being made of timestamp and random number, and described in encrypted result is used as Token.When it is implemented, MD5 (Message Digest Algorithm 5) encryption or other cipher modes can be used in generation module 403 The entirety being made of timestamp and random number is encrypted.In addition, the identifying code can also pass through at random for generation module 403 The random number that function generates.
Sending module 404, for the identifying code and current operation mark to be sent to the application service end.
Wherein, the identifying code acquisition request may also include that the cell-phone number or email address and applications client of user Address.Further, sending module 404 can also be used to be sent to the identifying code according to the cell-phone number or the email address User, and the current operation is identified by (such as token) according to the applications client address and is sent to applications client.
The identifying code generating means 400 of the embodiment of the present invention can meet identifying code safe and efficiently and generate demand.Into one Step saves a large amount of manpower and material resources cost due to the logic without realizing a set of generation identifying code at each application service end, Improve the maintenance efficiency of verifying logic.In addition, by correction verification module to application server-side send identifying code acquisition request into Row verification, can be improved the safety of identifying code generating means.
In addition, the present invention also provides a kind of application service ends.The application service end of the embodiment of the present invention includes: transmission mould Block, receiving module.
Sending module, for after receiving the identifying code demand information of applications client, by identifying code acquisition request It is sent to identifying code generating means.
Receiving module, for receiving the identifying code and current operation mark of the return of identifying code generating means.Wherein, described to test Card code is that identifying code generating means generate after to identifying code acquisition request verification.And the reception mould Block is also used to receive the identifying code and current operation mark of applications client transmission.
Further, the application service end of the embodiment of the present invention further include: correction verification module, for receiving the application visitor After the verifying code check request that family end is sent, the identifying code and current operation returned according to the identifying code generating means is identified It is verified.
In embodiments of the present invention, the identifying code generating means general by flexible configuration, so that application service end is not necessarily to It is concerned about the generation of identifying code and sends work, saves a large amount of workload.
Fig. 5 is the main composition schematic diagram of verifying system according to an embodiment of the invention.As shown in figure 5, of the invention The verifying system 500 of embodiment includes: application service end 501, identifying code generating means 502.
Application service end 501, for after receiving the identifying code demand information of applications client, identifying code to be obtained Request is sent to identifying code generating means 502.
Wherein, applications client can be APP.When it is implemented, applications client can monitor testing for user's triggering It is requested after demonstrate,proving code requirement event to the transmission of application service end 501.The request includes: identifying code demand information.Application service end 501 After receiving the identifying code demand information, the identifying code acquisition request of generation is sent to identifying code generating means 502.
Identifying code generating means 502, for being verified to the identifying code acquisition request.
Wherein, the identifying code acquisition request can include: application service end registration code, applications client address and user hand Machine number.In addition, the user mobile phone number can also be substituted for subscriber mailbox address.
Specifically, it includes: that identifying code generates dress that identifying code generating means 502, which carry out verification to the identifying code acquisition request, It sets 502 and Registry is inquired according to the application service end registration code in the identifying code acquisition request;If the identifying code obtains The application service end registration code in request is taken to be present in the Registry, then identifying code generating means 502 confirm described The verification of identifying code acquisition request passes through;Otherwise, identifying code generating means 502 confirm that the identifying code acquisition request verification is not led to It crosses.
Identifying code generating means 502 are also used to generate verifying in the case where the identifying code acquisition request verifies and passes through Code and current operation mark, and identifying code and current operation mark are sent to application service end 501.
Wherein, the current operation mark can be token.In embodiments of the present invention, identifying code generating means 502 can According to the token as described in generating under type: generating timestamp and random number;The entirety being made of timestamp and random number is carried out Md5 encryption, and using encrypted result as the token.In addition, the identifying code can also be random to be generated by random function Number.
Further, identifying code generating means 502 are also used to that identifying code is sent to user according to the cell-phone number, according to institute It states applications client address and current operation mark is sent to applications client.
Application service end 501 be also used to receive applications client transmission verifying code check request after, according to from Identifying code and the current operation mark that identifying code generating means receive verify it.
Wherein, the verifying code check request packet includes: the identifying code and applications client of user's input are generated from identifying code The current operation mark that device receives.For the ease of distinguish, it is application service end 501 being received and from identifying code send out The identifying code and current operation mark for sending device are known as: the first identifying code and the first current operation mark, by application service end 501 Identifying code receive and from applications client and current operation mark are known as: the second identifying code and the second current operation Mark.
Specifically, application service end 501 is according to identifying code and the current operation mark pair received from identifying code generating means It carries out verification include: application service end 501 compare the second current operation mark identified whether with the first current operation it is consistent.If Second current operation mark and the first current operation mark are inconsistent, then the confirmation of application service end 501 verifies code check request not Legal, verification does not pass through.If the second current operation mark is consistent with the first current operation mark, application service end 501 is compared again It is whether consistent compared with the second identifying code and the first identifying code.If the second identifying code and the first identifying code are consistent, application service end 501 Confirmation verifying code check passes through;Otherwise, the confirmation of application service end 501 verifying code check does not pass through.
The verifying system of the embodiment of the present invention, can meet safe and efficiently identifying code generate, transmission demand and A set of logic for generating, sending identifying code is realized at each application service end, so that application service end is without being concerned about identifying code Work is generated and sent, a large amount of workload is saved.In addition, voluntarily configuring short message sending function by identifying code generating means Or e-mail transmitting function greatly reduces the construction amount and maintenance of Short Message Service Gateway without the participation at application service end.In addition, It is generated since identifying code generating means are only used as an identifying code, the middleware system of forwarding, it is relevant to business without saving Data had not only met demand of the business to identifying code is obtained, but also avoided the problem that leaking data occurs as far as possible.
Fig. 6 shows the exemplary of the verification code generation method or identifying code generating means that can apply the embodiment of the present invention System architecture 600.
As shown in fig. 6, system architecture 600 may include terminal device 601,602,603, network 604, application server 605 and identifying code generate server 606.Network 604 is in terminal device 601,602,603 and application server 605, verifying Code, which generates, provides the medium of communication link between server 606.Network 604 may include various connection types, such as wired, nothing Line communication link or fiber optic cables etc..
User can be used terminal device 601,602,603 and be interacted by network 604 with application server 605, to receive Or send message etc..Various telecommunication customer end applications can be installed, such as shopping class is answered on terminal device 601,602,603 With, web browser applications, searching class application, instant messaging tools, mailbox client, social platform software etc..
Terminal device 601,602,603 can be the various electronic equipments with display screen and supported web page browsing, packet Include but be not limited to smart phone, tablet computer, pocket computer on knee and desktop computer etc..
Application server 605 can be to provide the server of various services, for example, to user using terminal device 601, 602, the 603 shopping class websites browsed provide the back-stage management server supported.Back-stage management server can with terminal device, Identifying code generates the interaction of server 606.Illustratively, back-stage management server can be in the verifying for receiving terminal device transmission After code requirement information, identifying code acquisition request is sent to identifying code and generates server 606, and receives identifying code and generates clothes The identifying code and current operation mark that business device 606 is sent.Back-stage management server can also receive terminal device transmission After identifying code and current operation mark, the identifying code and current operation mark pair that server 606 is sent are generated according to identifying code It is verified, and check results are fed back to terminal device.
Identifying code, which generates server 606, can be to provide the server that identifying code generates service, can be with application server 605 interactions.Further, identifying code, which generates server, can also send data to terminal device.
It is held it should be noted that verification code generation method provided by the present invention generally generates server 606 by identifying code Row.Correspondingly, identifying code generating means are generally positioned at identifying code and generate in server 606.
It should be understood that the terminal device, network and application server, identifying code in Fig. 6 generate the number of server only It is schematical.According to needs are realized, it is raw to can have any number of terminal device, network, application server and identifying code At server.
Fig. 7 shows the structural representation for being suitable for the computer system 700 for the electronic equipment for being used to realize the embodiment of the present invention Figure.Computer system shown in Fig. 7 is only an example, should not function to the embodiment of the present invention and use scope bring and appoint What is limited.
As shown in fig. 7, computer system 700 includes central processing unit (CPU) 701, it can be read-only according to being stored in Program in memory (ROM) 702 or be loaded into the program in random access storage device (RAM) 703 from storage section 708 and Execute various movements appropriate and processing.In RAM 703, also it is stored with system 700 and operates required various programs and data. CPU 701, ROM 702 and RAM 703 are connected with each other by bus 704.Input/output (I/O) interface 705 is also connected to always Line 704.
I/O interface 705 is connected to lower component: the importation 706 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 707 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 708 including hard disk etc.; And the communications portion 709 of the network interface card including LAN card, modem etc..Communications portion 709 via such as because The network of spy's net executes communication process.Driver 710 is also connected to I/O interface 705 as needed.Detachable media 711, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 710, in order to read from thereon Computer program be mounted into storage section 708 as needed.
Particularly, disclosed embodiment, the process described above with reference to flow chart may be implemented as counting according to the present invention Calculation machine software program.For example, embodiment disclosed by the invention includes a kind of computer program product comprising be carried on computer Computer program on readable medium, the computer program include the program code for method shown in execution flow chart.? In such embodiment, which can be downloaded and installed from network by communications portion 709, and/or from can Medium 711 is dismantled to be mounted.When the computer program is executed by central processing unit (CPU) 701, system of the invention is executed The above-mentioned function of middle restriction.
It should be noted that computer-readable medium shown in the present invention can be computer-readable signal media or meter Calculation machine readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but not Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Meter The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, just of one or more conducting wires Taking formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only storage Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device, Or above-mentioned any appropriate combination.In the present invention, computer readable storage medium can be it is any include or storage journey The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.And at this In invention, computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By the use of instruction execution system, device or device or program in connection.Include on computer-readable medium Program code can transmit with any suitable medium, including but not limited to: wireless, electric wire, optical cable, RF etc. are above-mentioned Any appropriate combination.
Flow chart and block diagram in attached drawing are illustrated according to the system of various embodiments of the invention, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
Being described in module involved in the embodiment of the present invention can be realized by way of software, can also be by hard The mode of part is realized.Described module also can be set in the processor, for example, can be described as: a kind of processor packet Include receiving module, generation module, sending module.Wherein, the title of these modules is not constituted under certain conditions to the module The restriction of itself, for example, receiving module is also described as " receiving the module of identifying code acquisition request ".
As on the other hand, the present invention also provides a kind of computer-readable medium, which be can be Included in equipment described in above-described embodiment;It is also possible to individualism, and without in the supplying equipment.Above-mentioned calculating Machine readable medium carries one or more program, when said one or multiple programs are executed by the equipment, makes Obtain the equipment and execute following below scheme: application service end will be verified after receiving the identifying code demand information of applications client Code acquisition request is sent to identifying code generating means;Identifying code generating means after receiving the identifying code acquisition request, Identifying code is generated, and the identifying code is sent to the application service end.
Above-mentioned specific embodiment, does not constitute a limitation on the scope of protection of the present invention.Those skilled in the art should be bright It is white, design requirement and other factors are depended on, various modifications, combination, sub-portfolio and substitution can occur.It is any Made modifications, equivalent substitutions and improvements etc. within the spirit and principles in the present invention, should be included in the scope of the present invention Within.

Claims (18)

1. a kind of verification code generation method, which is characterized in that the described method includes:
Identifying code acquisition request is sent to and tests after receiving the identifying code demand information of applications client by application service end Demonstrate,prove code generating means;
Identifying code generating means generate identifying code after receiving the identifying code acquisition request, and the identifying code is sent out It send to the application service end.
2. the method according to claim 1, wherein the method also includes:
After receiving the identifying code acquisition request, also generation current operation identifies identifying code generating means, and will be described Current operation mark is sent to application service end.
3. according to the method described in claim 2, it is characterized in that, the identifying code acquisition request includes: cell-phone number or mailbox Address and applications client address;The method also includes: it is identified in the generation identifying code and the generation current operation The step of after, the identifying code is sent to user according to the cell-phone number or the email address by identifying code generating means, Current operation mark is sent to the applications client according to the applications client address by identifying code generating means.
4. the method according to claim 1, wherein the method also includes:
Before the generation identifying code the step of, identifying code generating means verify the identifying code acquisition request, and Confirmation verification passes through.
5. according to the method described in claim 2, it is characterized in that, current operation mark includes token;And identifying code Generating means are according to the token as described in generating under type: generating timestamp and random number;To what is be made of timestamp and random number Entirety is encrypted, and using encrypted result as the token.
6. a kind of identifying code generating means, which is characterized in that described device includes:
Receiving module, for receiving the identifying code acquisition request at application service end;
Generation module, for generating identifying code;
Sending module, for the identifying code to be sent to the application service end;
Wherein, the identifying code acquisition request is the application service end in the identifying code demand information for receiving applications client It is rear to identifying code generating means send.
7. device according to claim 6, which is characterized in that the generation module is also used to generate current operation mark; The sending module, which is also used to identify the current operation, is sent to the application service end.
8. device according to claim 7, which is characterized in that the identifying code acquisition request includes: cell-phone number or mailbox Address and applications client address;The sending module is also used to will be described according to the cell-phone number or the email address Identifying code is sent to user, and current operation mark is sent to the application visitor according to the applications client address Family end.
9. device according to claim 6, which is characterized in that described device further include:
Correction verification module, for being verified to the identifying code acquisition request before the generation module generates identifying code, and Confirmation verification passes through.
10. device according to claim 7, which is characterized in that the current operation mark includes token;The generation mould Block is also used to according to the token as described in generating under type: the generation module generates timestamp and random number;The generation module The entirety being made of timestamp and random number is encrypted, and using encrypted result as the token.
11. a kind of application service end characterized by comprising
Sending module, for after receiving the identifying code demand information of applications client, identifying code acquisition request to be sent To identifying code generating means;
Receiving module, for receiving the identifying code of identifying code generating means return;
Wherein, the identifying code is that identifying code generating means generate after to identifying code acquisition request verification.
12. application service end according to claim 11, which is characterized in that the receiving module is also used to receive identifying code The current operation mark that generating means return.
13. application service end according to claim 12, which is characterized in that the receiving module is also used to receive using visitor Identifying code and the current operation mark that family end is sent;
The application service end further include:
Correction verification module, after being requested in the verifying code check for receiving the applications client transmission, according to the verifying The identifying code and current operation mark that code generating means return verify it.
14. a kind of verifying system, which is characterized in that the system comprises:
Application service end, for after receiving the identifying code demand information of applications client, identifying code acquisition request to be sent out It send to identifying code generating means;
Identifying code generating means generate identifying code for after receiving the identifying code acquisition request, and by the verifying Code is sent to the application service end.
15. system according to claim 14, which is characterized in that the identifying code generating means are also used to receiving After stating identifying code acquisition request, current operation mark is generated, and current operation mark is sent to the application service End.
16. system according to claim 15, which is characterized in that the identifying code acquisition request includes: cell-phone number or postal Case address and applications client address;
The identifying code generating means are also used to that identifying code is sent to user according to the cell-phone number or the email address, with And current operation mark is sent to by applications client according to the applications client address;
The application service end is also used to after receiving the verifying code check request that the applications client is sent, according to Identifying code and the current operation mark that the identifying code generating means are sent verify it.
17. a kind of electronic equipment characterized by comprising
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real The now method as described in any in claim 1 to 5.
18. a kind of computer-readable medium, is stored thereon with computer program, which is characterized in that described program is held by processor The method as described in any in claim 1 to 5 is realized when row.
CN201810088412.3A 2018-01-30 2018-01-30 Verification code generation method, device, application service end and system Pending CN110098921A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810088412.3A CN110098921A (en) 2018-01-30 2018-01-30 Verification code generation method, device, application service end and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810088412.3A CN110098921A (en) 2018-01-30 2018-01-30 Verification code generation method, device, application service end and system

Publications (1)

Publication Number Publication Date
CN110098921A true CN110098921A (en) 2019-08-06

Family

ID=67442562

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810088412.3A Pending CN110098921A (en) 2018-01-30 2018-01-30 Verification code generation method, device, application service end and system

Country Status (1)

Country Link
CN (1) CN110098921A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110704855A (en) * 2019-10-08 2020-01-17 深圳市云桥科技服务有限公司 Request identifier generation method, request identifier verification method and computer equipment
CN113742611A (en) * 2021-01-06 2021-12-03 北京沃东天骏信息技术有限公司 Data request processing method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350720A (en) * 2007-07-18 2009-01-21 中国移动通信集团公司 Dynamic cipher authentication system and method
CN101977194A (en) * 2010-10-29 2011-02-16 赵俊平 Third-party verification code system and third-party verification code provision method
US20150312236A1 (en) * 2014-04-29 2015-10-29 Twitter, Inc. Authentication mechanism
CN105450641A (en) * 2015-11-13 2016-03-30 中国建设银行股份有限公司 Verification method, verification device and verification system
CN105635043A (en) * 2014-10-29 2016-06-01 绍兴水滴网络科技有限公司 System and method of validate code safety on the basis of cloud calculation

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350720A (en) * 2007-07-18 2009-01-21 中国移动通信集团公司 Dynamic cipher authentication system and method
CN101977194A (en) * 2010-10-29 2011-02-16 赵俊平 Third-party verification code system and third-party verification code provision method
US20150312236A1 (en) * 2014-04-29 2015-10-29 Twitter, Inc. Authentication mechanism
CN105635043A (en) * 2014-10-29 2016-06-01 绍兴水滴网络科技有限公司 System and method of validate code safety on the basis of cloud calculation
CN105450641A (en) * 2015-11-13 2016-03-30 中国建设银行股份有限公司 Verification method, verification device and verification system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110704855A (en) * 2019-10-08 2020-01-17 深圳市云桥科技服务有限公司 Request identifier generation method, request identifier verification method and computer equipment
CN110704855B (en) * 2019-10-08 2021-07-23 深圳市云桥科技服务有限公司 Request identifier generation method, request identifier verification method and computer equipment
CN113742611A (en) * 2021-01-06 2021-12-03 北京沃东天骏信息技术有限公司 Data request processing method and device

Similar Documents

Publication Publication Date Title
CN107249004B (en) Identity authentication method, device and client
CN108881108A (en) The method and apparatus of rights management
CN109756337A (en) A kind of safety access method and device of service interface
CN109769240A (en) Bluetooth connecting method, device and system
CN112883435B (en) Method and equipment for realizing safe communication with intelligent contract
CN113271311B (en) Digital identity management method and system in cross-link network
CN109726545B (en) Information display method, equipment, computer readable storage medium and device
CN111163052B (en) Method, device, medium and electronic equipment for connecting Internet of things platform
CN111784887A (en) Authorization releasing method, device and system for user access
US20240259203A1 (en) Information Verification Method and Apparatus
CN110263581A (en) Contract signs method, system, terminal device and storage medium
CN108805476A (en) Electronics signs for method and apparatus
CN110493239A (en) The method and apparatus of authentication
CN109767208A (en) A kind of method of payment and payment mechanism
CN110134427A (en) A kind of method and apparatus generating code file
CN110247758A (en) The method, apparatus and code management device of Password Management
CN109005208A (en) Method and apparatus for pushed information
CN110247917A (en) Method and apparatus for authenticating identity
CN112202744A (en) Multi-system data communication method and device
CN104281272A (en) Password input processing method and device
CN108880923A (en) The method and apparatus that policer operation applied to application server is requested
CN108305071A (en) A kind of method and apparatus of enquiring digital currency managing detailed catalogue
CN110098921A (en) Verification code generation method, device, application service end and system
CN108881122A (en) The method and apparatus of APP Information Authentication
CN108875355A (en) A kind of control method and device of access authority

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190806

RJ01 Rejection of invention patent application after publication