User identity authentication method and device and authentication service system

A technology of user identity and verification method, applied in the direction of user identity/authority verification, digital data authentication, etc., can solve problems such as poor anti-cracking ability

Inactive Publication Date: 2015-03-25
SHENZHEN TENCENT COMP SYST CO LTD
View PDF10 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present invention provides a method for verifying user identity, aiming

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity authentication method and device and authentication service system
  • User identity authentication method and device and authentication service system
  • User identity authentication method and device and authentication service system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0039] In the embodiment of the present invention, the user identity of the user is verified by using the verification picture group and the verification label, thereby greatly improving the anti-cracking capability of the verification method.

[0040] In order to illustrate the technical solutions of the present invention, specific examples are used below to illustrate.

[0041] figure 2 It shows the implementation process of the user identity verification method provided by the embodiment of the present invention, which is applicable to the verification service system, and is described in detai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is suitable for the field of computer security, and provides a user identity authentication method and device and an authentication service system. The method comprises the following steps: generating an authentication picture group and an authentication tag, and issuing the authentication picture group and the authentication tag to a client; receiving authentication information transmitted by the client, wherein the authentication information comprises a picture identifier of a picture selected by a user from the authentication picture group according to the authentication tag; and acquiring a tag of a picture corresponding to the picture identifier in the authentication information, and matching the tag of the picture corresponding to the picture identifier in the authentication information with the authentication tag in order to authenticate the identity of the user. The authentication method provided by the invention has high crack resistance and high security.

Description

technical field [0001] The invention belongs to the field of computer security, and in particular relates to a user identity verification method, device and verification service system. Background technique [0002] In order to improve the security of electronic devices such as computers, technologies for verifying user identities (such as user login identities, website access identities, etc.) have become more and more popular. Currently, the most commonly used technology for verifying the user's identity includes a verification code verification technology. Among them, the verification code technology is a fully automated Turing test (Completely Automated Public Turing test to tell Computers and Humans Apart, CAPTCHA), which is a public security automatic program that distinguishes whether a user is a computer or a human. [0003] The existing verification code verification technology is generally an image verification code verification technology, and its verification pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06F21/36
Inventor 秦铭雪王玉叶黄亮古开元
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products