Sensitive operation verification method, terminal device, servers and verification system
A technology for verifying servers and sensitive operations, which is applied in the fields of servers and verification systems, terminal equipment, and sensitive operation verification methods, and can solve problems such as increasing user learning costs and operating costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0106] Example 1
[0107] figure 1 It is a flowchart of a sensitive operation verification method provided by an embodiment of the present invention. see figure 1 , this embodiment includes:
[0108] 101: The verification server receives a second verification request sent by the sensitive operation server, where the second verification request carries verification scene information and login information of the user who initiated the sensitive operation;
[0109] 102: The verification server sends a verification code to the two-dimensional code server, so that the two-dimensional code server generates a two-dimensional code according to the verification scene information, the login information of the user who initiated the sensitive operation, and the verification code. The information in the dimensional code is at least used to uniquely determine the sensitive operation and the user who initiated the sensitive operation;
[0110] 103: When the verification server receives ...
Example Embodiment
[0120] Example 2
[0121] figure 2 It is a flowchart of a sensitive operation verification method provided by an embodiment of the present invention. see figure 2 , this embodiment includes:
[0122] 201: The two-dimensional code server receives a second verification request sent by the sensitive operation server, where the second verification request carries the verification scene information and the login information of the user who initiated the sensitive operation;
[0123] 202: The two-dimensional code server receives the verification code sent by the verification server, and generates a two-dimensional code according to the verification scene information, the login information of the user who initiated the sensitive operation, and the verification code, and the information in the two-dimensional code is at least used for The sensitive operation and the user who initiated the sensitive operation are uniquely determined.
[0124] Optionally, the login information is ...
Example Embodiment
[0127] Example 3
[0128] image 3 It is a flowchart of a sensitive operation verification method provided by an embodiment of the present invention. see image 3 , this embodiment includes:
[0129] 301 : The first terminal device scans a two-dimensional code used for initiating a sensitive operation to obtain information in the two-dimensional code, where the information in the two-dimensional code is at least used to uniquely determine the sensitive operation and initiate the sensitive operation. operating user;
[0130] 302: The first terminal device sends a first verification request to the verification server, where the first verification request carries the verification information of the first terminal device and the information in the two-dimensional code, so that the verification server can perform the verification according to the first terminal. The verification information of the device and the information in the QR code are verified, and the verification info...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap