Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and device

An identity verification method and identity technology, applied in the field of computer networks, can solve problems such as insufficient security, affecting the efficiency of identity verification, and increasing the difficulty of machines to crack verification codes, so as to reduce pressure and improve processing efficiency

Active Publication Date: 2017-12-15
SHENZHEN TENCENT COMP SYST CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional image verification codes cannot avoid this problem. Taking character image verification codes as an example, if there are uppercase and lowercase characters and numbers, there are only 62 characters at most.
Therefore, the existing image verification codes have poor anti-cracking ability and insufficient security.
[0005] In order to improve the anti-cracking ability of the verification code, the research and development personnel developed the click verification code. When the click verification code is used, it usually shows the user multiple pictures containing natural objects and prompt information related to the content of these pictures. Select these pictures according to the prompt information, and verify the user's identity according to the user's choice. Since the machine has great difficulties in understanding the prompt information and classifying objects, it can greatly increase the number of machine cracking. Captcha Difficulty
[0006] However, when the verification code is used, multiple pictures need to be sent at a time. During a verification process, the server will receive multiple verification code pull requests from the user terminal, which will put a lot of pressure on the server and affect the identity Validation efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device
  • Authentication method and device
  • Authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0043] see image 3 , shows a flow chart of the identity verification method provided by the first embodiment of the present invention. combine figure 1 , this embodiment describes the processing flow of the server, and the identity verification method provided by this embodiment includes the following steps:

[0044] In step S11, the server receives the verification code pull request sent by the user terminal.

[0045] In this step, the user terminal may send a verification code pull request to a pre-configured server, for example, a webpage address, to obtain the verification code. Specifically, the verification code pull request can carry a page identifier (checkcode). The page identifier is used to identify a unique page. For example, it can be a number. The page identifier will change every time the page is refreshed. It is different from the verification code pull request. have a corresponding relationship.

[0046] Step S12, randomly extract a verification code and ...

no. 2 example

[0053] Figure 4 It is a schematic flowchart of the identity verification method in the second embodiment of the present invention. Please combine figure 1 , this embodiment describes the processing flow of the server, and the identity verification method in this embodiment includes:

[0054] Step S201, the server generates multiple verification codes and one or more passwords corresponding to each of the verification codes, and stores the multiple verification codes and corresponding passwords in a buffer pool, and the verification codes It includes a first verification code picture, the first verification code picture is spliced ​​by multiple sub-pictures, and the password includes preset processing rules corresponding to the multiple sub-pictures.

[0055] There is no limit to the form of splicing multiple sub-pictures into the first verification code picture. For example, all sub-pictures can be arranged in the same row to form a long strip-shaped large picture, or the s...

no. 3 example

[0070] see Figure 5 , shows a flow chart of the identity verification method provided by the third embodiment of the present invention. combine figure 1 , this embodiment describes the processing flow of the server, and the identity verification method in this embodiment includes:

[0071] In step S31, the user terminal sends a verification code pull request to the server.

[0072] Step S32, receiving the verification code issued by the server and the password corresponding to the verification code, the verification code includes a first verification code picture, and the first verification code picture is composed of multiple sub-pictures, so The password includes preset processing rules corresponding to the plurality of sub-pictures.

[0073] Step S33 , according to the preset processing rules in the password, adjust the positions of multiple sub-pictures in the first verification code picture of the verification code to form a second verification code picture and presen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention proposes a more efficient identity verification method and device. The method includes: the server receives a verification code pull request sent by a user terminal; randomly extracts a verification code and a password corresponding to the extracted verification code according to the verification code pull request, the verification code includes a first verification code picture, The first verification code picture is composed of multiple sub-pictures, and the password includes segmentation rules and placement rules corresponding to the multiple sub-pictures; the extracted verification code and password are sent to the user terminal so that the user terminal The segmentation rules and placement rules in the verification code are used to segment and rearrange multiple sub-pictures in the first verification code picture of the verification code to form the second verification code picture and display it to the user; and receive the returned by the user terminal, The identity of the user is verified according to the verification confirmation information input by the user according to the second verification code picture, and the verification result is returned to the user terminal.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to an identity verification method and device. Background technique [0002] With the increasing popularity of computers and computer networks, the Internet has penetrated into all areas of people's work, study and life. While the development of the network provides convenience for people, it also brings various challenges. Some people will use robot programs to improperly use network resources in large quantities, such as mass spam, etc., which will greatly reduce server performance. There are also people who use the program to continuously send out service request responses to carry out "saturation attacks" to achieve the purpose of paralyzing the server. Some people even try to maliciously crack passwords by means of profiteering cracking. In order to avoid the above-mentioned malicious behaviors, it is very important to design a set of tools that can allow the compu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/083H04L63/0846G06F2221/2133G06F21/31G06F3/023G06F3/041G06F3/167G06T11/60H04L2463/082
Inventor 黄亮王玉叶
Owner SHENZHEN TENCENT COMP SYST CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More