Verification method, device and system

A verification method and identity verification technology, applied in security devices, transmission systems, digital transmission systems, etc., can solve problems such as information leakage and property loss, and achieve the effect of protection and safety

Active Publication Date: 2019-05-28
SHENZHEN TENCENT COMP SYST CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem of information leakage or property loss that may be caused once user information is illegally obtained by hackers, the embodiment of the present invention provides a verification method, device and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method, device and system
  • Verification method, device and system
  • Verification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the object, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0040] Please refer to figure 1 , which shows a method flowchart of a verification method provided by an embodiment of the present invention, the verification method includes:

[0041] Step 101, acquire a user ID and a first geographic location, where the first geographic location is the geographic location of the terminal during this verification process.

[0042] Step 102: Send a verification request to the verification server, the verification request carries the user ID and the first geographic location, so that the verification server can query whether there is a second geographic location bound to the user ID; if there is a second geographic location bound to the user ID; If the first geographic location matches the second geographic loca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a verification method, device and system, belonging to the field of network technology. The method includes: acquiring a user ID and a first geographic location, where the first geographic location is the geographic location of the terminal during the current verification process; sending a verification request to a verification server, so that the verification server can inquire whether there is an ID bound to the user ID; a second geographic location; if the second geographic location exists, then detecting whether the first geographic location matches the second geographic location; if the first geographic location matches the second geographic location, then determining that the identity verification of the user ID is passed. The invention verifies the user ID by checking whether the geographic location of the terminal in the verification process matches the geographic location bound to the user ID by the verification server; it solves the information that may be brought once the user information is illegally obtained by hackers The problem of leakage or property loss; it has achieved the effect of further protecting the security of user information and property.

Description

technical field [0001] The present invention relates to the field of network technology, in particular to a verification method, device and system. Background technique [0002] With the development of network applications, users use network accounts to perform services such as games, transactions and data interaction on terminals more and more widely. The "terminal" mentioned here can be any one of desktop computers, notebooks, smart phones, tablet computers and e-book readers. [0003] In the process of using a network account by a user, identity verification is required for security reasons. An existing verification method includes: first, the user uses a terminal to send user information to the verification server, and the user information is used to identify the user's identity, usually including a user name and password; secondly, the verification server receives the user information sent by the terminal, and then Query the corresponding password according to the use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/08H04W12/63H04L2101/69H04L67/52H04L9/3226H04L63/107H04W12/06H04W4/029H04W4/02
Inventor 胡帅
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products