Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sensitive operation verification method, terminal equipment, server and verification system

A technology for verifying servers and sensitive operations, applied in the field of terminal equipment, sensitive operation verification methods, servers and verification systems, can solve problems such as increasing user learning costs and operating costs, and achieve the goal of improving security assurance, simplifying user operations, and simplifying processes. Effect

Active Publication Date: 2014-05-28
SHENZHEN TENCENT COMP SYST CO LTD
View PDF4 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Under this verification method, whether it is a static password or a dynamic password, there is a danger that a third party (thief) can deceive the user through a Trojan horse or other means to obtain the password and impersonate the user for authentication. After the user enters the identity credential, the third party can use This credential steals the account; at the same time, this kind of verification method increases the learning cost and operation cost of the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive operation verification method, terminal equipment, server and verification system
  • Sensitive operation verification method, terminal equipment, server and verification system
  • Sensitive operation verification method, terminal equipment, server and verification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Flowchart of the Sensitive Operations Verification Methodology. The terminal device in this embodiment may be a fixed terminal or a mobile terminal. see figure 1 ,include:

[0046]101. The first terminal device scans a two-dimensional code used to initiate a sensitive operation, and acquires information in the two-dimensional code, where the information in the two-dimensional code is at least used to uniquely determine the sensitive operation;

[0047] 102. The first terminal device sends a first verification request to the verification server, and the first verification request carries the verification information of the first terminal device and the information in the two-dimensional code, so that the verification server according to the verification information of the first terminal device The verification information of the device is verified, and the verification information is used to determine the user identity information; when the verification is passed, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sensitive operation verification method, a piece of terminal equipment, a server and a verification system, and belongs to the technical field of networks. The method comprises the following steps: a first piece of terminal equipment scans a two-dimensional code used for initiating a sensitive operation and acquires information in the two-dimensional code, wherein the information in the two-dimensional code is at least used for uniquely determining the sensitive operation; and the first terminal equipment sends a first verification request to a verification server, wherein the first verification request carries verification information of the first terminal equipment and the information in the two-dimensional code. According to the invention, terminal equipment verification and a traditional verification method are combined through a two-dimensional code, the operation by users is greatly simplified, users do not need to log in, input or learn during operation and only needs to scan a two-dimensional code, security assurance is effectively improved, and the process of sensitive operation is simplified.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a sensitive operation verification method, terminal equipment, server and verification system. Background technique [0002] With the development of network applications, such as online shopping, online games, online transactions, etc. are becoming more and more abundant; the value of users' online accounts is also getting higher and higher, and the behavior of stealing user accounts and various virtual properties is becoming more and more rampant. All kinds of account properties of users are severely tested. For this reason, when a user logs in to an online account, pays, or conducts virtual property transactions, it is an indispensable link to verify the user's true identity. [0003] At present, identity verification is mainly performed by users inputting pre-registered static passwords or dynamic passwords on computers or other forms of terminals. Under this verification m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06K7/10
CPCH04L9/3228G06F21/305H04L63/10G06F21/62G06F2221/2149H04W12/77G06F16/9566H04L63/12
Inventor 胡帅
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products