Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sensitive operation verification method, terminal device, servers and verification system

A technology for verifying servers and sensitive operations, which is applied in the fields of servers and verification systems, terminal equipment, and sensitive operation verification methods, and can solve problems such as increasing user learning costs and operating costs

Active Publication Date: 2014-07-16
SHENZHEN TENCENT COMP SYST CO LTD
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Under this verification method, whether it is a static password or a dynamic password, there is a danger that a third party (thief) can deceive the user through a Trojan horse or other means to obtain the password and impersonate the user for authentication. After the user enters the identity credential, the third party can use This credential steals the account; at the same time, this kind of verification method increases the learning cost and operation cost of the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive operation verification method, terminal device, servers and verification system
  • Sensitive operation verification method, terminal device, servers and verification system
  • Sensitive operation verification method, terminal device, servers and verification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0107] figure 1 It is a flowchart of a sensitive operation verification method provided by an embodiment of the present invention. see figure 1 , the example includes:

[0108] 101: The verification server receives a second verification request sent by the sensitive operation server, where the second verification request carries verification scene information and login information of the user who initiates the sensitive operation;

[0109] 102: The verification server sends a verification code to the two-dimensional code server, so that the two-dimensional code server generates a two-dimensional code according to the verification scene information, the login information of the user who initiates the sensitive operation, and the verification code, and the two-dimensional code The information in the QR code is at least used to uniquely identify the sensitive operation and the user who initiated the sensitive operation;

[0110] 103: When the verification server receives a fir...

Embodiment 2

[0121] figure 2 It is a flowchart of a sensitive operation verification method provided by an embodiment of the present invention. see figure 2 , the example includes:

[0122] 201: The two-dimensional code server receives a second verification request sent by the sensitive operation server, where the second verification request carries the verification scene information and the login information of the user who initiates the sensitive operation;

[0123] 202: The two-dimensional code server receives the verification code sent by the verification server, and generates a two-dimensional code according to the verification scene information, the login information of the user who initiates the sensitive operation, and the verification code, and the information in the two-dimensional code is at least used for Uniquely determine the sensitive operation and the user who initiated the sensitive operation.

[0124] Optionally, the login information is account information, or the l...

Embodiment 3

[0128] image 3 It is a flowchart of a sensitive operation verification method provided by an embodiment of the present invention. see image 3 , the example includes:

[0129] 301: The first terminal device scans a two-dimensional code used to initiate a sensitive operation, and obtains information in the two-dimensional code, where the information in the two-dimensional code is at least used to uniquely determine the sensitive operation and initiate the sensitive operation. operating user;

[0130] 302: The first terminal device sends a first verification request to the verification server, and the first verification request carries verification information of the first terminal device and information in the two-dimensional code, so that the verification server uses the verification information of the first terminal device The verification information of the device and the information in the two-dimensional code are verified, and the verification information is used to de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sensitive operation verification method, a terminal device, servers and a verification system and belongs to the field of the network technique. The sensitive operation verification method comprises the steps that a verification server receives a second verification request transmitted by a sensitive operation server; the verification server transmits a verification code to a two-dimensional code server, when receiving a first verification request transmitted by a first terminal device, the verification server performs verification according to verification information of the first terminal device and information in a two-dimensional code, and when identity information of a user initiating sensitive operation is determined, the sensitive operation initiated by the user whose information in the two-dimensional code is determined is released. By means of the technical scheme, terminal device verification, identity verification and a traditional verification mode are combined through the two-dimensional code, user operation is greatly simplified, user's identity is verified further when the user performs operation, security is improved effectively, individual privacy theft and leakage are avoided, and processes of the sensitive operation are simplified.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a sensitive operation verification method, terminal equipment, server and verification system. Background technique [0002] With the development of network applications, such as online shopping, online games, online transactions, etc. are becoming more and more abundant; the value of users' online accounts is also getting higher and higher, and the behavior of stealing user accounts and various virtual properties is becoming more and more rampant. All kinds of account properties of users are severely tested. For this reason, when a user logs in to an online account, pays, or conducts virtual property transactions, it is an indispensable link to verify the user's true identity. [0003] At present, identity verification is mainly performed by users inputting pre-registered static passwords or dynamic passwords on computers or other forms of terminals. Under this verification m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/18H04L63/12
Inventor 胡帅
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products