Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method, device and system

An identity verification method and identity verification technology, applied in user identity/authority verification, transmission system, payment system, etc., can solve problems such as low security, phishing problems, and affecting user data security, so as to improve security and improve Effectiveness, effectiveness of preventive means of phishing

Active Publication Date: 2015-07-08
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although there are currently many identity verification methods to protect the security of user data (such as user identity information and wealth data), criminals will also try their best to bypass such verification, and one of the typical methods is through phishing. To deceive the user to enter the correct verification information, and obtain a certificate that can pass the verification, so as to obtain the user's operation authority to perform illegal operations, such as transferring the user's property, etc., this situation seriously affects the user data safety
[0004] In view of this situation, the existing technology generally adopts methods such as user setting questions, static passwords, dynamic passwords or SMS verification codes to prevent the occurrence of phishing means, but, in the research and practice of the prior art, the present invention The inventor found that these existing methods may also encounter phishing problems, and the security is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device and system
  • Authentication method, device and system
  • Authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] This embodiment will be described from the perspective of an identity verification device, and the identity verification device may specifically be a device such as a verification server.

[0029] An identity verification method, comprising: when receiving an identity verification request sent by a business system, obtaining operation scenario information and operation basic elements, displaying the operation scenario information and operation basic elements for confirmation by a user, and when the user confirms the operation scenario information After receiving the identity verification information sent by the user and verifying the legitimacy of the user's identity according to the identity verification information, and during the verification process, the user is prompted for the operation scene information and the operation basic elements, and the verification result is sent to business system.

[0030] Such as figure 1 As shown, the specific process can be as foll...

Embodiment 2

[0053] According to the method described in Embodiment 1, an example will be given below for further detailed description.

[0054] In this embodiment, description will be made by taking the identity verification device as an authentication server and the business system as a business server as an example.

[0055] Such as figure 2 As shown, an authentication method, the specific process can be as follows:

[0056] 201. The service server sends an identity verification request to the verification server.

[0057] 202. After receiving the identity verification request, the verification server acquires operation scenario information and basic operation elements from the service server according to the identity verification request.

[0058] Among them, the operation scene information is mainly used to inform the user of the current operation status in a timely manner, which may specifically include information such as the operation name and / or operation status in the current ...

Embodiment 3

[0076] Correspondingly, the embodiment of the present invention also provides an identity verification device, such as image 3 As shown, the identity verification device includes an acquisition unit 301, a display unit 302, a receiving unit 303, a verification unit 304 and a sending unit 305;

[0077] The obtaining unit 301 is configured to obtain operation scene information and basic operation elements when receiving an identity verification request sent by the business system;

[0078] Wherein, the service system may specifically be a service server; the operation scene information is mainly used to inform the user of the current operation state in time, which specifically may include information such as the operation name and / or operation state in the current operation scene. The basic elements of operation are mainly used to help users define whether an operation is really an operation initiated by themselves.

[0079] For example, for a transfer operation, the basic ele...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

-30- ABSTRACT A method is provided for user authentication. The method includes receiving an authentication request sent from a business system for authenticating a user, obtaining operation scenario information and operation basic elements, and displaying the operation scenario information and the operation basic elements. The method also includes receiving authentication 5 information and the operation basic elements. Further, the method includes authenticating an identity of the user based on the received authentication information. The method includes obtaining an authentication result and sending the authentication result to the business system.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an identity verification method, device and system. Background technique [0002] With the advancement of science and technology, especially the vigorous development of the Internet, great changes have taken place in the wealth composition of society and people's interactive behavior, including changes in the form of wealth and transaction methods. Today, the boundaries between virtual wealth and traditional wealth are becoming more and more blurred, and people are disposing and trading wealth in more and more non-traditional ways. For example, people can use the Internet to conduct wealth operations such as shopping and transfers. ,etc. In this case, how to improve the security of user authentication has become a particularly important issue. [0003] Although there are currently many identity verification methods to protect the security of user data (such as us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCG06F2221/2105H04L63/0853G06F21/31G06Q20/40G06Q20/425G06F21/84
Inventor 阳荣辉曾星蒋臻甄程谟野郭晓王钊
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products