Verification method, apparatus, server, user data center and system
A user data and server technology, applied in the network field, can solve the problem that the verification code technology cannot protect the security of network services, and achieve the effect of protecting security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0033] Please refer to figure 1 , which shows a method flowchart of the verification method provided in Embodiment 1 of the present invention. This verification method includes:
[0034] Step 101, acquiring user data according to the user information sent by the terminal;
[0035] The server acquires user data according to the user information sent by the terminal, and the user data is a collection of user network behaviors corresponding to the user information.
[0036] Step 102, generating verification questions and standard answers according to user data;
[0037] The server generates verification questions and standard answers based on user data.
[0038] Step 103, interacting with the terminal according to the verification questions and standard answers to complete the verification process;
[0039] The server interacts with the terminal according to the verification questions and standard answers to complete the verification process.
[0040] To sum up, the verifica...
Embodiment 2
[0042] Please refer to figure 2 , which shows a method flowchart of the verification method provided by Embodiment 2 of the present invention. In the embodiment of the present invention, the verification method is applied to the implementation environment shown in FIG. 3 as an example. The implementation environment includes a server 310, a user data center 320, and a terminal 330. The terminal can be a desktop computer, a notebook, a smart phone, and a tablet. any kind of computer. The verification methods include:
[0043] Step 201, the user data center acquires user data in advance;
[0044] The user data center 320 collects and stores user data of the user in advance under the authorization of the user. Among them, user data is a collection of user network behaviors corresponding to the user information; user network behaviors include but are not limited to the applications used by the user in history, the instant messaging tools used by the user in history, the websit...
Embodiment 3
[0088] Please refer to Figure 4 , which shows a structural block diagram of the verification device provided by Embodiment 3 of the present invention. The verification device can be implemented as all or part of the server or user data center through software, hardware or a combination of the two. The verification device includes:
[0089] An acquisition module 410, configured to acquire user data according to user information sent by the terminal, where the user data is a collection of user network behaviors corresponding to the user information;
[0090] A generation module 420, configured to generate verification questions and standard answers according to the user data obtained by the acquisition module 410;
[0091] The verification module 430 is configured to interact with the terminal according to the verification questions and standard answers generated by the generation module 420 to complete the verification process.
[0092] To sum up, the verification device pr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



