Authentication method and authentication device

An identity verification method and identity verification technology, applied in the field of identity verification methods and devices, can solve the problems of poor flexibility and many human factors, and achieve the effect of less human factors and strong flexibility

Inactive Publication Date: 2015-07-01
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the SMS verification code system, if the mobile phone receiving the SMS verification code is not around, the identity verification wil

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and authentication device
  • Authentication method and authentication device
  • Authentication method and authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0034] figure 1 It is a flow chart of the identity verification method provided by the embodiment of the present invention. see figure 1 , the example includes:

[0035] 101. Receive an identity verification request, where the identity verification request carries a specified user identifier.

[0036] Wherein, the specified user identifier may be a serial number randomly assigned by the server of the application when the user registers for an application, or other information that can identify the specified user, which is not specifically limited in this implementation.

[0037] 102. Acquire a verified user information set according to the user relationship chain of the specified user identifier, where the verified user information ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and a device of identity verification are disclosed. The method includes: receiving by a server, an identity verification request sent from a terminal, where the identity verification request contains a specified user identifier; based on a user relationship chain of the specified user identifier, obtaining a verified user information set which includes user's information on the user relationship chain; providing the verified user information set to the terminal in order to subsequently receive returned selected user's information; determining whether the received selected user's information from the terminal matches the user's information on the user relationship chain; if the selected user's information received matches the user's information on the user relationship chain, confirming that the identity verification being successful. To pass the identity verification, the only requirement is that the selected user's information received from the terminal matches the user's information on the user relationship chain.

Description

technical field [0001] The invention relates to the field of network technology, in particular to an identity verification method and device. Background technique [0002] At present, instant messaging software has become an indispensable communication tool in people's daily life. In order to protect the security of the instant messaging account, when logging in, you need to enter a matching user name and password to pass the login verification. However, due to the serious phenomenon of account theft, the thief can successfully pass the login verification by using the stolen user name and password. In order to avoid the above phenomenon, further authentication is required. [0003] When further verifying the identity information, the SMS verification code system can be used. The short message verification code system means that when the server receives a verification request, the server will send a short message verification code to allow the user to input the short messa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31H04L12/58
CPCG06F21/31G06F21/36G06F2221/2103H04L9/32H04L63/0815H04L63/083H04L63/0876H04L63/102
Inventor 孙骁颜俊鸿吴宇陈文俊龙强
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products