Open knowledge bases method and equipment for user authentication
A user equipment and user verification technology, applied in the information field, can solve problems such as poor anti-automatic machine identification mechanism and verification code cracking, and achieve the effects of avoiding machine brute force cracking, alleviating cost pressure, and high security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] The present invention will be described in further detail below in conjunction with the accompanying drawings.
[0025] figure 1 A topological diagram of a system for user authentication based on an open knowledge base is shown according to one aspect of the present invention, which includes a network device 1 and multiple user devices 2 . Among them, the network device 1 can be connected to multiple user devices 2 via the network, the network device 1 selects a question from the open knowledge base 101, and performs user verification according to the user response corresponding to the question sent by the user from the user device 2 . Here, the network includes but is not limited to Internet, wide area network, metropolitan area network, local area network, VPN network, wireless self-organizing network (Ad Hoc network); User equipment 2 includes wired user equipment 21 and wireless user equipment 22, wherein, wired user equipment 21 is directly connected to the netwo...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com