Safety verification method, service server and safety verification system

A security verification and server technology, applied in the field of business servers, security verification systems, and security verification methods, can solve the problems of inconvenient operation, complex security verification process, and time-consuming

Inactive Publication Date: 2015-07-01
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, short text prompts will be fed back to the user to tell the user the approximate reason for intercepting the service request, so as to prompt the user to re-initiate the service request after removing these security risks, but it usually requires the user to spend a lot of time and energy to remove the security risk and The business request needs to be re-initiated, resulting in a complicated security verification process and inconvenient operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety verification method, service server and safety verification system
  • Safety verification method, service server and safety verification system
  • Safety verification method, service server and safety verification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0043] figure 1 is a schematic flowchart of a security verification method in an embodiment of the present invention. in, figure 1 The described security verification method is mainly described from the side of the business server. Such as figure 1 As shown, the security verification method in this embodiment may include the following steps:

[0044] S101. The service server acquires a service request submitted by a user.

[0045] In a specific implementation,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A server with processor (s) and memory receives a transaction request from a first device to perform a transaction with an account and determines a security level for the transaction. When the security level satisfies predetermined criterion, the server: instructs the first device to suspend the transaction and to display a first interface indicating the suspended transaction; and sends a confirmation request, to a second device associated with the account, for voice verification of the transaction. The server receives voice verification information from the second device that includes audio data provided by a user of the second device and determines whether the voice verification information matches stored account verification data corresponding to the account. When there is a match, the server: processes the transaction; and instructs the first device to complete the transaction and to replace display of the first interface with a second interface indicating the completed transaction.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a safety verification method, a business server and a safety verification system. Background technique [0002] At present, when a user sends a business request to the business server, if the business server finds that the business request has a security risk, it will automatically intercept the user's business request to ensure the security of the user's information or funds and avoid security risks. The business request can include Login request, transaction request, payment request, session request, etc. The reason for the interception may be, for example, that the requested transaction order exceeds the allowable transaction limit preset by the user, or there is a security risk in the user's previous login operation to the business server. In the prior art, short text prompts will be fed back to the user to tell the user the approximate reason for intercepting the servi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L29/06G06Q20/40145G06Q20/4016G06Q20/405G06Q20/425G06Q30/06G06Q20/4014G06Q20/12H04L9/40
Inventor 张文鹏弓晨张文静杨翊镛姜嘉维刘国果郭雅琴
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products