Unlock instant, AI-driven research and patent intelligence for your innovation.

Security verification method and device

A security verification and security protection technology, applied in the field of computer, electromechanical and electronic products, which can solve problems such as the inability of users to verify the system and the injustice of users

Inactive Publication Date: 2015-07-15
NINGBO FREE TRADE ZONE PANDONG INFORMATION TECH
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there is no mechanism for users to verify the security of the system. Only the system can verify the user, but the user cannot verify the system. This is actually unfair to the user, and the user should also be able to play an active role in security. Security measures that go beyond passive acceptance systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] A securities online trading system supporting the user verification system and its usage method

[0058] Renovate an existing securities online trading system to support the user verification system. Users who need this function have a verification password specially used to configure the security verification policy, which is used to make related settings in the system. The user first logs in to the system in a confirmed safe environment and sets the system feedback information. If the user name is correct, the prompt "This is the information passed by the verification system I set up" is returned. When accessing the system, first enter the correct user name to verify the system, and the system will provide the correct user name according to it, and return the prompt "This is the information that the verification system I set passed". The user judges that the verification system has passed based on this information and gives Subsequent authorization of operation behav...

Embodiment 2

[0061] Banking system and method of preventing copying of bank cards

[0062] Transform an existing banking system to support two-way verification of user systems. Users who need this function have a verification password specially used to configure the security verification policy, which is used to make related settings in the system. The user first logs in to the system in a confirmed safe environment and sets the system feedback information. If the user name is correct, it will return the prompt "This is the information passed by the verification system I set up" and set up to receive local operations at the same time. This operation is a There are 10 options in the multi-choice menu, and the user settings to select items 1, 5, and 7 are the correct options. When the card is used normally, if a fake ATM machine with a device that has been copied and installed with stolen bank card information is encountered by a criminal, the user does not know at the beginning, inserts th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security verification method and device. According to the security verification method, a user performs on-line security verification on a system or the system can also verify the user in the same process at the same time, the verification time can be flexibly selected, the security verification can be performed by either a private client or a non-private client, relevant information can or cannot be provided, the user judges whether the verification is passed or not according to feedback information, and the system judges whether the verification is passed or not according to submitted information, the feedback information can be predefined by the user and can also be pre-prepared by the system or dynamically calculated, and self information can be provided in forms of a user name, a password, an attribute, an electronic marker or an entity marker and the like. The invention further provides a related result application and safety protection method and a system adopting the same. According to the security verification method and the device provided by the invention, the active verification of the user on the system can be realized, the loss and the damage possibly caused by user operation under the situations of impersonation, phishing, tampering and the like are prevented, and the user can also be verified so as to be protected from impersonation and phishing.

Description

technical field [0001] The invention belongs to the field of computers and the fields of electromechanical and electronic products, and in particular relates to a safety verification method and device. Background technique [0002] The Internet has penetrated into all aspects of people's lives, and related fraud and theft have also extended to the Internet. Phishing websites such as counterfeit banks and other websites related to fund accounts, payment accounts, and personal information are flooded. Many people are deceived and suffer economic losses. Information leakage. With the rapid development of mobile Internet and mobile payment, online fraud and theft have also expanded to mobile terminals. Malicious or trap links or content have caused many people to be deceived and suffered economic losses and information leakage. Even just looking at it, the money on the associated account was cheated and stolen. The above is just a case of accidentally falling into the trap. As...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 倪龙倪子妍
Owner NINGBO FREE TRADE ZONE PANDONG INFORMATION TECH