Method, device and system for identity verification

A technology of identity verification and verification code, which is applied in the field of Internet communication and can solve the problems of reducing the interception rate of automatic machines

Active Publication Date: 2015-04-29
SHENZHEN TENCENT COMP SYST CO LTD
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The verification code provided by the existing technology is a string randomly generated by the server. Malicious actors only need to collect enough samples, learn and train with some technologies to develop an automaton that recognizes this type of verification code, thereby reducing the number of automatic verification codes. machine interception rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for identity verification
  • Method, device and system for identity verification
  • Method, device and system for identity verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] see figure 1 , the embodiment of the present invention provides a method for identity verification, including:

[0047] Step 101: Generate a verification code, the verification code includes at least a reference graphic and a first graphic, the reference graphic includes a plurality of block elements, the first graphic is a graphic obtained by removing at least one block element from the reference graphic, or the second A graphic is a graphic obtained by disturbing the block elements included in the reference graphic;

[0048]Step 102: Send the verification code to the terminal, so that the terminal obtains a second figure obtained by the user's collage of the first figure according to the reference figure, and compares the second figure with the reference figure to obtain a comparison result;

[0049] Step 103: Receive the user ID of the user and the comparison result sent by the terminal, and determine whether the user verification corresponding to the user ID of the...

Embodiment 2

[0066] The embodiment of the present invention provides an identity verification method.

[0067] When the user needs to log in to the server, the server generates a verification code, the verification code includes a reference graphic and a first graphic, the reference graphic includes a plurality of block elements, and the first graphic is obtained by removing at least one block element from the reference graphic Then, the server verifies the identity of the user according to the verification code and executes the following method flow, and if the verification is passed, the user is allowed to log in to the server.

[0068] see diagram 2-1 , the method flow may include:

[0069] Step 201: The server receives the login request message sent by the terminal, the login request message carries the user ID of the user, and then performs step 202;

[0070] For example, the server receives a login request message sent by the terminal, and the login request message carries the use...

Embodiment 3

[0101] The embodiment of the present invention provides an identity verification method.

[0102] When the user needs to log in to the server, the server generates a verification code, the verification code includes a reference graphic and a first graphic, the reference graphic includes a plurality of block elements, and the first graphic is a graphic obtained by disturbing the block elements included in the reference graphic, Then the server verifies the identity of the user according to the verification code and by executing the following method flow, and if the verification is passed, the user is allowed to log in to the server.

[0103] see Figure 3-1 , the method flow may include:

[0104] Step 301: The server receives the login request message sent by the terminal, the login request message carries the user ID of the user, and then executes step 302;

[0105] For example, the server receives a login request message sent by the terminal, and the login request message c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, device and system for identity verification, and belongs to the field of Internet communication. The method comprises the following steps: generating a verification code, wherein the verification code at least comprises a reference diagram and a first diagram; sending the verification code to a terminal, so that the terminal obtains a second diagram obtained by a user carrying out a jigsaw puzzle on the first diagram according to the reference diagram and the second diagram is compared with the reference diagram to obtain a comparative result; receiving the user identification of the user sent by the terminal and the comparative result, and determining whether to pass through user verification corresponding to the user identification of the user according to the comparative result. The device comprises a first generating module, a first sending module and a receiving module. The interception rate of an automata can be improved.

Description

technical field [0001] The invention relates to the field of Internet communication, in particular to a method, device and system for identity verification. Background technique [0002] With the development of Internet technology, malicious actors have developed more and more automatic machines, which can automatically access the server and cause server paralysis. In order to prevent the automatic machine from accessing the server, verification code technology can be used to prevent the automatic machine from automatically accessing the server. [0003] Currently, when a user logs in to the server, the server verifies the user's identity through verification code technology, which may be: a character string randomly generated by the server, and the generated character string is used as a verification code and sent to the client. The client displays the verification code, receives the verification code entered by the user, and sends the verification code entered by the user ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/08
Inventor 秦雷黄移军左海波喻欣
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products