Sensitive operation verification method, terminal device, servers and verification system

A technology for verifying servers and sensitive operations, which is applied in the fields of servers and verification systems, terminal equipment, and sensitive operation verification methods, and can solve problems such as increasing user learning costs and operating costs

Active Publication Date: 2014-07-16
SHENZHEN TENCENT COMP SYST CO LTD
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Under this verification method, whether it is a static password or a dynamic password, there is a danger that a third party (thief) can deceive the user through a Trojan horse or other means to obtain the password and impersonate the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive operation verification method, terminal device, servers and verification system
  • Sensitive operation verification method, terminal device, servers and verification system
  • Sensitive operation verification method, terminal device, servers and verification system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0106] Example 1

[0107] figure 1 It is a flowchart of a sensitive operation verification method provided by an embodiment of the present invention. see figure 1 , this embodiment includes:

[0108] 101: The verification server receives a second verification request sent by the sensitive operation server, where the second verification request carries verification scene information and login information of the user who initiated the sensitive operation;

[0109] 102: The verification server sends a verification code to the two-dimensional code server, so that the two-dimensional code server generates a two-dimensional code according to the verification scene information, the login information of the user who initiated the sensitive operation, and the verification code. The information in the dimensional code is at least used to uniquely determine the sensitive operation and the user who initiated the sensitive operation;

[0110] 103: When the verification server receives ...

Example Embodiment

[0120] Example 2

[0121] figure 2 It is a flowchart of a sensitive operation verification method provided by an embodiment of the present invention. see figure 2 , this embodiment includes:

[0122] 201: The two-dimensional code server receives a second verification request sent by the sensitive operation server, where the second verification request carries the verification scene information and the login information of the user who initiated the sensitive operation;

[0123] 202: The two-dimensional code server receives the verification code sent by the verification server, and generates a two-dimensional code according to the verification scene information, the login information of the user who initiated the sensitive operation, and the verification code, and the information in the two-dimensional code is at least used for The sensitive operation and the user who initiated the sensitive operation are uniquely determined.

[0124] Optionally, the login information is ...

Example Embodiment

[0127] Example 3

[0128] image 3 It is a flowchart of a sensitive operation verification method provided by an embodiment of the present invention. see image 3 , this embodiment includes:

[0129] 301 : The first terminal device scans a two-dimensional code used for initiating a sensitive operation to obtain information in the two-dimensional code, where the information in the two-dimensional code is at least used to uniquely determine the sensitive operation and initiate the sensitive operation. operating user;

[0130] 302: The first terminal device sends a first verification request to the verification server, where the first verification request carries the verification information of the first terminal device and the information in the two-dimensional code, so that the verification server can perform the verification according to the first terminal. The verification information of the device and the information in the QR code are verified, and the verification info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a sensitive operation verification method, a terminal device, servers and a verification system and belongs to the field of the network technique. The sensitive operation verification method comprises the steps that a verification server receives a second verification request transmitted by a sensitive operation server; the verification server transmits a verification code to a two-dimensional code server, when receiving a first verification request transmitted by a first terminal device, the verification server performs verification according to verification information of the first terminal device and information in a two-dimensional code, and when identity information of a user initiating sensitive operation is determined, the sensitive operation initiated by the user whose information in the two-dimensional code is determined is released. By means of the technical scheme, terminal device verification, identity verification and a traditional verification mode are combined through the two-dimensional code, user operation is greatly simplified, user's identity is verified further when the user performs operation, security is improved effectively, individual privacy theft and leakage are avoided, and processes of the sensitive operation are simplified.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a sensitive operation verification method, terminal equipment, server and verification system. Background technique [0002] With the development of network applications, such as online shopping, online games, online transactions, etc. are becoming more and more abundant; the value of users' online accounts is also getting higher and higher, and the behavior of stealing user accounts and various virtual properties is becoming more and more rampant. All kinds of account properties of users are severely tested. For this reason, when a user logs in to an online account, pays, or conducts virtual property transactions, it is an indispensable link to verify the user's true identity. [0003] At present, identity verification is mainly performed by users inputting pre-registered static passwords or dynamic passwords on computers or other forms of terminals. Under this verification m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/18H04L63/12
Inventor 胡帅
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products