Supercharge Your Innovation With Domain-Expert AI Agents!

Authentication method, device and system

An identity verification method and identity verification technology, applied in the field of devices, systems, and identity verification methods, can solve problems such as insufficient security, poor anti-cracking ability, and difficult recognition by users, so as to enhance security and prevent machine cracking Effect

Active Publication Date: 2015-04-29
SHENZHEN TENCENT COMP SYST CO LTD
View PDF4 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, the setting of the interference factors required for image verification code generation becomes a problem that is difficult to balance
If the interference factor is relatively simple, it is easy to identify with the naked eye, but the scanner used by the hacker is very easy to identify the verification code, the anti-cracking ability is poor, and the security is not high enough
If the interference factors are complicated, it will be difficult for users to recognize them, which will affect the efficiency of identity verification.
Not only that, but professional coding workers (code workers for short) have appeared in the society. Hackers specially invite code workers to identify verification codes, which makes image verification codes lose their original effect.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device and system
  • Authentication method, device and system
  • Authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0034] See figure 2 , is a flow chart of the identity verification method provided in the first embodiment of the present invention; this embodiment is the identity verification method performed by the server, including the following steps:

[0035] Step S11, the server receives the identity verification request sent by the first terminal.

[0036] When the user uses the first terminal to perform sensitive operations that require identity verification, such as initiating a transaction, or the user logs in to an application too many times within a certain period of time, or the user logs in to an application in a different place, or the user enters a wrong password for an application too many times, etc. When the situation occurs, the first terminal can send an identity verification request to the server.

[0037] Step S12, generating verification code information to be verified and preset verification confirmation information according to the identity verification request, a...

no. 2 example

[0052] See image 3 , is a flow chart of an identity verification method provided in the second embodiment of the present invention; this embodiment is an identity verification method performed by a server, and the server in this embodiment may include a WEB server and a verification server. It can be understood that, in this In other specific embodiments of the invention, the WEB server and the verification server can also be integrated into one server. The verification method of this embodiment includes the following steps:

[0053] Step S21, the WEB server receives the identity verification request sent by the first terminal, and the identity verification request carries the account number of the first terminal.

[0054] Step S22, the WEB server obtains the verification code information to be verified and the preset verification confirmation information corresponding to the identity verification request from the verification server according to the identity verification re...

no. 3 example

[0065] See Figure 4 , is a flow chart of an identity verification method provided in the third embodiment of the present invention; this embodiment is an identity verification method executed by mutual interaction between the first terminal, the second terminal and the server; the method may include the following steps:

[0066] Step S31, the first terminal sends an identity verification request to the server.

[0067] Step S32, the server generates verification code information to be verified and preset verification confirmation information according to the identity verification request, sends the verification code information to be verified to the first terminal, and according to the identity The verification request sends a verification confirmation information collection request to the second terminal bound to the account of the first terminal.

[0068] Step S33, the first terminal presents the verification code information to be verified to the user.

[0069]Step S34: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method, device and system. The method comprises the following steps: a server receives an authentication request sent by a first terminal; verification code information to be verified and preset verification confirmation information are generated according to the authentication request, and the verification code information to be verified is sent to the first terminal to be displayed; a verification confirmation information collection request is sent to a second terminal bound to an account of the first terminal according to the authentication request, and the verification confirmation information collection request is ensured to correspond to the authentication request; verification confirmation information collected by the second terminal is received, and the verification confirmation information is verified, so that a verification result is obtained; the verification result is fed back to the first terminal. The method can solve the problems in the existing graphic verification code from multiple angles, and enhances the security for user authentication.

Description

technical field [0001] The present invention relates to the field of Internet technology, in particular to the field of Internet security technology, and in particular to an identity verification method, device and system. Background technique [0002] With the increasing popularity of computers and computer networks, the Internet has penetrated into all areas of people's work, study and life. While the development of the network provides convenience for people, it also brings various challenges. Some people will use robot programs to improperly use network resources in large quantities, such as mass spam, etc., which will greatly reduce server performance. There are also people who use the program to continuously send out service request responses to carry out "saturation attacks" to achieve the purpose of paralyzing the server. Some people even try to maliciously crack passwords by means of profiteering cracking. In order to avoid the above-mentioned malicious behaviors...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32G06F21/30
CPCH04L63/08
Inventor 唐艳平陈梦陈荣陈远斌董梁孙增昕刘飞飞李德春
Owner SHENZHEN TENCENT COMP SYST CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More