Unlock instant, AI-driven research and patent intelligence for your innovation.

Information authentication method, device and terminal

An authentication method and a technology of an authentication device, which are applied in the field of network security and can solve problems such as inaccurate judgment

Active Publication Date: 2018-12-28
SHENZHEN TENCENT COMP SYST CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problem that the information authentication method provided by the prior art cannot accurately judge whether the authentication operation is completed by a person or by another terminal, the embodiment of the present invention provides an information authentication method, device and terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information authentication method, device and terminal
  • Information authentication method, device and terminal
  • Information authentication method, device and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0069] Please refer to figure 2 , which shows a method flowchart of an information authentication method provided by an embodiment of the present invention, the information authentication method can be used in a communication terminal such as a mobile phone, a tablet computer, a personal digital assistant, a desktop computer or a notebook computer, the Information authentication methods may include:

[0070] Step 201, displaying an infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information authentication method, device and terminal and belongs to the technical field of network safety. The method includes: displaying an information authentication interface which comprises a question graph and at least two candidate answer graphs; receiving a dragging signal for dragging the candidate answer graph to the question graph; detecting whether the dragging operation is correct or not; if so, determining that the authentication is passed. The method has the advantages that the problem that the current authentication operation is completed by a person or other terminals cannot be judged accurately in the prior art is solved, the information authentication interface which cannot be completed by other terminals can be provided, and only the person can pass the authentication.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an information authentication method, device and terminal. Background technique [0002] With the rapid development of communication technology, the Internet has entered thousands of households. In the Internet, in order to avoid attacks from hackers, Trojan horses and malicious software, information authentication has become one of the frequently used technical means to ensure network security. [0003] Please refer to figure 1 , which shows an authentication schematic diagram of an existing information authentication method during information authentication, the information authentication method may include: the authentication server provides an authentication interface including a verification code to the terminal, and the terminal displays the authentication interface including the verification code, And receive the verification code input by the user in the authen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/32G06F3/0486
CPCG06F3/0486G06F21/31G06F21/32
Inventor 唐艳平陈梦陈荣刘飞飞陈远斌孙增昕董梁李德春
Owner SHENZHEN TENCENT COMP SYST CO LTD