Unlock instant, AI-driven research and patent intelligence for your innovation.

Password verification method, device and system

A password verification and password technology, applied in the transmission system, user identity/authority verification, electrical components, etc., can solve security problems and other issues

Active Publication Date: 2018-06-22
SHENZHEN TENCENT COMP SYST CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the security problems caused by multiple services sharing a set of user names and passwords, the embodiment of the present invention provides a password verification method, device and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password verification method, device and system
  • Password verification method, device and system
  • Password verification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0100] Please refer to figure 2 , which shows a method flow chart of the password verification method provided in Embodiment 1 of the present invention. This password authentication method can be used as figure 1 In the shown password verification device, the password verification method includes:

[0101] Step 202, receiving a verification ticket, the verification ticket includes a user ID, a service ID, and a password corresponding to a combination of the user ID and the service ID;

[0102] Wherein, the service identifier is an identifier corresponding to the service system.

[0103] Step 204, querying the pre-stored password according to the user ID and service ID;

[0104] Step 206, detecting whether the password in the verification ticket is the same as the queried password;

[0105] Step 208, if it is detected that the two passwords are the same, then the verification is passed.

[0106] To sum up, the password verification method provided by this embodiment compl...

Embodiment 2

[0108] Please refer to image 3 , which shows a method flow chart of the password verification method provided in Embodiment 2 of the present invention. This password authentication method can be used as figure 1 In the implementation environment shown, the password verification method includes:

[0109] Step 301, the password verification device stores the correspondence between the user ID, the service ID, and the password corresponding to the combination of the user ID and the service ID;

[0110] The password verification device may pre-store the corresponding relationship between the user ID, the service ID, and the password corresponding to the combination of the user ID and the service ID, wherein one user ID corresponds to one or more service IDs, and the user ID and the service ID are two The number of passwords corresponding to the latter combination is the same as the number of service IDs. The storage process can be performed during the user registration process...

Embodiment 3

[0171] Please refer to Figure 4 , which shows a structural block diagram of the password verification system provided by Embodiment 3 of the present invention. The password verification system includes a service system 400 and a password verification device 500 . in:

[0172] In one aspect, the service system 400 includes a password acquisition module 420 and a verification sending module 440 .

[0173] A password acquisition module 420, configured to acquire the user ID and password of the user under the current service system;

[0174] The verification sending module 440 is configured to send a verification ticket to the password verification device 500, the verification ticket includes the user identification obtained by the password acquisition module 420, the service identification used to identify the current service system, and the user identification and service The password corresponding to the combination of the two is identified, so that the password verificatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a password authentication method, device and system and belongs to the internet terminal system. The password authentication method comprises receiving an authentication bill which comprises user identification, service identification and a password which is corresponding to a combination of the user identification and the service identification; inquiring a pre-stored password according to the user identification and the service identification; detecting whether the password in the authentication bill is identical with the inquired password or not; passing the authentication if the two passwords are identical. The password authentication method has the advantages of solving the safety problem caused by the fact that multiple services share a group of user names and passwords and achieving the effect that if one password of a user is exposed, potential safety hazards are brought to only one service but not brought to other services due to the fact that the password authentication process is achieved through a plurality of passwords which are corresponding to the user identification and different service systems.

Description

technical field [0001] The invention relates to the field of Internet terminals, in particular to a password verification method, device and system. Background technique [0002] Most of the Internet provides services for users. Username and password are one of the most widely used means when users need to be authenticated. [0003] Due to the diversification of Internet applications, the same Internet service provider may provide many different Internet services at the same time, such as: email, search, instant messaging, notes, cloud synchronization and other services. In order to simplify user operations and improve user experience, existing Internet service providers only require users to use a set of identical user names and passwords to use all services when providing multiple services. That is to say, after a user registers with an Internet service provider, he can use the registered user name and password to log in and use all the services provided by the Internet ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 向坤秦雷郭计伟袁丽娜
Owner SHENZHEN TENCENT COMP SYST CO LTD