Method and system for safety certificate

A technology of security authentication and identity authentication, applied in transmission systems, electrical components, etc., can solve problems such as user information insecurity, achieve the effect of improving technical difficulty, reducing the risk of user information leakage, and increasing technical difficulty

Active Publication Date: 2014-05-21
ADVANCED NEW TECH CO LTD
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by this application is to provide a security authentication method and system to solve the problem that in the prior art, when users perform identity verification, due to the simple input mode of the target website, the verification information is easily obtained by phishing websites, which easily leads to user Information is insecure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for safety certificate
  • Method and system for safety certificate
  • Method and system for safety certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0059] One of the core ideas of this application is that the verification input page of the target website in the prior art (such as the payment verification page of the payment website) is easy to handle the verification code, which makes it easy to be attacked by phishing websites and seriously endangers user information. In the case of potential safety hazards, this application utilizes a dual-channel format, and the server generates the elements to be selected and the location information of each element to be selected in the display interface according to the verification acquisition request triggered by the client, and generates the same information as the to-be-selected element Select the element a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application provides a method and a system for safety certificate and relates to the field of safety technologies. The method comprises a step of receiving a verification acquisition request triggered by a user; a step of generating elements to be selected and positional information of each element to be selected in a display interface according to the verification acquisition request, generating verification tasks corresponding to the elements to be selected and the positional information of each element to be selected in the display interface, and generating first matching data corresponding to the verification tasks; a step of sending the verification tasks to a mobile terminal corresponding to the verification acquisition request; a step of sending the elements to be selected and the positional information of each element to be selected in the display interface to a user terminal; a step of sending second matching data sent by the user terminal; and a step of comparing the second matching data with the first matching data and carrying out identifier recognition according to a comparison result. The application can completely improve safety during the user identifier recognition process and protect safety of user information.

Description

technical field [0001] The present application relates to the field of security technology, in particular to a security authentication method and system. Background technique [0002] With the development of the network, the information security of network users has become the focus of people's increasing attention. For protecting the security of network user account information, various security measures are taken in the prior art. Among them, there is such a security measure: User A registers as a user on the website W, sets a login password, and leaves his mobile phone number. When user A needs to log in to the website, in order to know whether the user is a real user, in addition to verifying the user name and password, the website will send a 6-digit verification code to the user's mobile phone. The user enters the verification code received on the website and submits it. After the website verification is passed, the user is considered to be the real user holding the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 石为天章建军
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products