Verification method, device, server, service data center and system

A technology for business data and verification methods, applied in the network field, can solve the problem that the verification code technology cannot protect the security of network services, and achieve the effect of protecting security

Inactive Publication Date: 2014-12-03
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem that the verification code technology cannot protect the security of network services due to the combination of machines and labor, the embodiment of the present invention provides a verification method, device, server, business data center and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method, device, server, service data center and system
  • Verification method, device, server, service data center and system
  • Verification method, device, server, service data center and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] Please refer to figure 1 , which shows a method flowchart of the verification method provided in Embodiment 1 of the present invention. This verification method includes:

[0037] Step 101, receiving a service application sent by a terminal;

[0038] The server receives the service application sent by the terminal.

[0039] Step 102, obtaining business data according to the service application sent by the terminal;

[0040] The server obtains service data according to the service application sent by the terminal, and the service data is a collection of service characteristics of the service applied for by the terminal.

[0041] Step 103, generating verification questions and standard answers according to business data;

[0042] The server generates verification questions and standard answers based on business data.

[0043] Step 104, interacting with the terminal according to the verification questions and standard answers to complete the verification process;

[...

Embodiment 2

[0047] Please refer to figure 2 , which shows a method flowchart of the verification method provided by Embodiment 2 of the present invention. In the embodiment of the present invention, the verification method is applied to image 3 The illustrated implementation environment is taken as an example for illustration. The implementation environment includes a server 310, a business data center 320, and a terminal 330. The terminal may be any one of a desktop computer, a notebook, a smart phone, and a tablet computer. The verification methods include:

[0048] Step 201, the business data center stores business data in advance;

[0049] The business data center 320 stores business data in advance, and the business data is a collection of business characteristics of services. The business features include at least one of the conditions required for starting the business functions in the service, the limited attributes of the business functions in the service, the unique feature...

Embodiment 3

[0099] Please refer to Figure 4 , which shows a method flowchart of the verification method provided by Embodiment 3 of the present invention. In the embodiment of the present invention, the verification method is applied to Figure 5 The illustrated implementation environment is taken as an example for illustration, and the implementation environment includes a server 510 and a terminal 520, and the terminal may be any one of a desktop computer, a notebook, a smart phone, and a tablet computer. Different from the previous embodiment, in this embodiment, the server generates verification questions and standard answers according to pre-stored business data, and then interacts with the terminal to complete the verification process according to the generated verification questions and standard answers; instead of using business data The center generates verification questions and standard answers, and then sends the verification questions and standard answers to the server, so ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed are a verification method, apparatus, server and system. The method includes: receiving a service request from a terminal; acquiring service data according to the service request received from the terminal; generating a verification question and a standard answer according to the service data; and interacting with the terminal according to the verification question and the standard answer to complete a verification process. The verification question and the standard answer are generated according to the service feature of the service requested by the terminal, and interaction is performed with the terminal according to the verification question and the standard answer to complete the verification process, thereby solving the problem that the network service security cannot be ensured using the verification code technology due to attacks launched by combining the machine and the manpower.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a verification method, device, server, business data center and system. Background technique [0002] With the development of network technology, users use network services to conduct data interaction business more and more widely. But at the same time, hackers use some machine programs to destroy the services provided by the network in large numbers. For example, continuously sending service request responses to the server so that the server function is paralyzed, or violently cracking user account passwords to carry out virtual property theft. The above problems require the network to have the ability to distinguish whether the user is a human or a computer. [0003] Captcha (Completely Automated Public Turing test to tell Computers and Humans Apart, fully automated Turing test to tell computers and humans apart) is a public fully automated program that distinguishes whether...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCG06F21/31H04N21/2393H04N21/25875H04N21/658G06F2221/2133H04L63/08
Inventor 胡帅古开元
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products