Verification information pushing method and device, and identity authentication method and device

A technology for verifying information and identity authentication, which is applied in the fields of methods and devices for pushing verification information, methods and systems for identity authentication, and can solve the problems of easy eavesdropping of short message interfaces and security loopholes.

Inactive Publication Date: 2014-06-04
SHENZHEN TENCENT COMP SYST CO LTD
View PDF5 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the digital verification code in the traditional technology is pushed by the authentication server through SMS, and the SMS interface provided by the telecom operator is easy to be eavesdropped, which makes the traditional authentication method have loopholes in security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification information pushing method and device, and identity authentication method and device
  • Verification information pushing method and device, and identity authentication method and device
  • Verification information pushing method and device, and identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In one embodiment, such as figure 1 As shown, a verification information push method includes:

[0055] Step S102, acquiring a data access request, and extracting a user identifier corresponding to the data access request.

[0056] A data access request is a request initiated by a terminal device to perform data read and write operations on data on the server. For example, if a user wants to modify their personal information, they can initiate a data access request and add the modified personal information to the request; if a user wants to transfer money through online banking, the data request can include the transfer amount, transfer account number, etc. and other information.

[0057] The terminal device that initiates the data access request may be a personal computer, a smart terminal, a mobile terminal, and the like. User IDs are included in data access requests to distinguish different users.

[0058] Step S104, generating and caching verification informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A verification information pushing method comprises the steps of acquiring a data access request, extracting a user identifier corresponding to the data access request, generating and caching verification information corresponding to the user identifier, acquiring a terminal identifier corresponding to the user identifier, and pushing the verification information to a mobile terminal corresponding to the terminal identifier through a data service channel. In addition, a verification information pushing device is provided. By adopting the verification information pushing method and the verification information pushing device, the safety can be improved.

Description

technical field [0001] The present invention relates to the technical field of mobile Internet, in particular to a method and device for pushing verification information, and an identity authentication method and system. Background technique [0002] With the development of Internet technology, more and more commercial transactions rely on e-commerce, which makes the security of e-commerce more and more aroused people's attention. [0003] In the traditional technology, when a user applies for an account, logs in to online banking, modifies personal information or makes a payment, the authentication server will first verify the user's identity, so it will push a text message containing a digital verification code to the user, and then complete the payment through the digital verification code. Authentication of users. [0004] However, the digital verification code in the traditional technology is pushed by the authentication server through SMS, and the SMS interface provid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 胡帅
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products