Supercharge Your Innovation With Domain-Expert AI Agents!

Verification method, apparatus, server, user data center and system

A user data and server technology, applied in the network field, can solve the problem that the verification code technology cannot protect the security of network services, and achieve the effect of protecting security

Active Publication Date: 2014-12-03
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF13 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem that the verification code technology cannot protect the security of network services due to the combination of machines and labor, the embodiment of the present invention provides a verification method, device, server, user data center and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method, apparatus, server, user data center and system
  • Verification method, apparatus, server, user data center and system
  • Verification method, apparatus, server, user data center and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] Please refer to figure 1 , which shows a method flowchart of the verification method provided in Embodiment 1 of the present invention. This verification method includes:

[0034] Step 101, acquiring user data according to the user information sent by the terminal;

[0035] The server acquires user data according to the user information sent by the terminal, and the user data is a collection of user network behaviors corresponding to the user information.

[0036] Step 102, generating verification questions and standard answers according to user data;

[0037] The server generates verification questions and standard answers based on user data.

[0038] Step 103, interacting with the terminal according to the verification questions and standard answers to complete the verification process;

[0039] The server interacts with the terminal according to the verification questions and standard answers to complete the verification process.

[0040] To sum up, the verifica...

Embodiment 2

[0042] Please refer to figure 2 , which shows a method flowchart of the verification method provided by Embodiment 2 of the present invention. In the embodiment of the present invention, the verification method is applied to the implementation environment shown in FIG. 3 as an example. The implementation environment includes a server 310, a user data center 320, and a terminal 330. The terminal can be a desktop computer, a notebook, a smart phone, and a tablet. any kind of computer. The verification methods include:

[0043] Step 201, the user data center acquires user data in advance;

[0044] The user data center 320 collects and stores user data of the user in advance under the authorization of the user. Among them, user data is a collection of user network behaviors corresponding to the user information; user network behaviors include but are not limited to the applications used by the user in history, the instant messaging tools used by the user in history, the websit...

Embodiment 3

[0088] Please refer to Figure 4 , which shows a structural block diagram of the verification device provided by Embodiment 3 of the present invention. The verification device can be implemented as all or part of the server or user data center through software, hardware or a combination of the two. The verification device includes:

[0089] An acquisition module 410, configured to acquire user data according to user information sent by the terminal, where the user data is a collection of user network behaviors corresponding to the user information;

[0090] A generation module 420, configured to generate verification questions and standard answers according to the user data obtained by the acquisition module 410;

[0091] The verification module 430 is configured to interact with the terminal according to the verification questions and standard answers generated by the generation module 420 to complete the verification process.

[0092] To sum up, the verification device pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed are a verification method, apparatus, server and system. The method includes: acquiring user data according to user information sent by a terminal, the user data being a set of user network behaviors corresponding to the user information; generating a verification question and a standard answer according to the user data; and interacting with the terminal according to the verification question and the standard answer to complete a verification process. In this way, the user data is acquired, the verification question and the standard answer are generated according to the user data, and an interactive verification is conducted with the terminal according to the verification question and the standard answer.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a verification method, device, server, user data center and system. Background technique [0002] With the development of network technology, users use network services to conduct data interaction business more and more widely. But at the same time, hackers use some machine programs to destroy the services provided by the network in large numbers. For example, continuously sending service request responses to the server so that the server function is paralyzed, or violently cracking user account passwords to carry out virtual property theft. The above problems require the network to have the ability to distinguish whether the user is a human or a computer. [0003] Captcha (Completely Automated Public Turing test to tell Computers and Humans Apart, fully automated Turing test to tell computers and humans apart) is a public fully automated program that distinguishes whether a u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/08H04L63/1425G06F2221/2133H04W12/68G06F21/316H04L63/102H04L63/123
Inventor 胡帅
Owner TENCENT TECH (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More