User identity authentication method and device

A technology of user identity and verification method, which is applied in the direction of user identity/authority verification, message/email/notification, etc., can solve the problems that the execution efficiency needs to be further improved, and achieve the effect of improving execution efficiency

Active Publication Date: 2015-07-22
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
4 Cites 4 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0004] Although the above solution can obtain the verification information from the verification message, it still needs to display an identity verification interface to the user. After enteri...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Method used

The present embodiment is by extracting verification information picture from described verification multimedia message, and by denoising, character recognition from described verification information picture identification described verification information, thereby accurately identified from verification multimedia message The verification information further improves the execution efficiency of the user identity verification process.
The present embodiment obtains the data abstract of described verification text message by utilizing hash algorithm, and described data abstract is used as described verification information, thereby realized the purpose of obtaining verification information by verification text message, utilizes hash simultaneously The Greek algorithm compresses the original verification text message, which improves the security of the verification information.
[0042] Further, in order to enhance the security of the user account, a prompt message prompting the user to reset the password and an interface link of the password reset interface can be added to the success...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

An embodiment of the invention discloses a user identity authentication method and device. The method includes: acquiring an authentication message, with a user terminal identified as a destination, sent by an authentication server, wherein the authentication message includes an authentication text message or an authentication multimedia message; acquiring authentication information from the authentication message; sending the authentication information to the authentication server so as to enable the authentication server to authenticate user identity; if receiving an authentication success message sent by the authentication sever, showing a log-in success interface to a user. By the user identity authentication method and device, execution efficiency of identity authentication is improved obviously.

Application Domain

Technology Topic

Image

  • User identity authentication method and device
  • User identity authentication method and device
  • User identity authentication method and device

Examples

  • Experimental program(6)

Example

[0023] First embodiment
[0024] This embodiment provides a technical solution of a user identity verification method. This technical solution can be executed by a user terminal, and the user terminal can be connected to the Internet through 2G, 3G, 4G, WIFI, etc., so as to communicate with the server of the application through the above-mentioned connection method.
[0025] See figure 1 , The user identity verification method includes:
[0026] In S11, a verification message with a user terminal identifier as a destination sent by the verification server is acquired, where the verification message includes a verification text message or a verification multimedia message.
[0027] Many application clients installed on user terminals require users to log in before using them. Generally speaking, users at least need to enter their own password when logging in on the client. Since the user is likely to forget his password, the user often enters the wrong password during the password input operation.
[0028] When the verification server of the application repeatedly receives the wrong password entered by the user within a period of time, the verification server will send a verification message to the user terminal with the user terminal identifier as the destination address. The user terminal identifier may be the user's mobile phone number, which is usually the user terminal identifier bound to the user account when the user of the client registers. The verification message may be a verification text message or a verification multimedia message. Specifically, the number of times of receiving incorrect passwords repeatedly can be set to three.
[0029] The verification text messages include short messages and messages sent in various applications, the content of which contains text. The verified multimedia messages include multimedia messages and messages sent in various applications, and the content includes multimedia content.
[0030] Whether it is to verify a text message or a multimedia message, it contains verification information used to verify the identity of the user, or contains fields from which verification information can be extracted after further processing.
[0031] After the verification server sends the verification message to the user terminal, the client configured in the user terminal can obtain the verification message through monitoring. For example, it is possible to monitor SMS, email or other received notification messages of the user terminal where the client is located.
[0032] In S12, the verification information is obtained from the verification message.
[0033] Since the verification message contains verification information, after obtaining the verification message sent by the verification server, the client can obtain the verification information contained in the verification message.
[0034] Specifically, obtaining the verification information from the verification message may be extracting the verification information from the verification text message, or processing the verification text message to obtain the verification information, or from The verification information is extracted from the verification multimedia message.
[0035] Extracting the verification information from the verification text message may be verification information extraction completed by text analysis of the verification text message. Further, the character type in the verification text message can be recognized, so as to realize the extraction of the verification information from the verification text message. For example, if the verification information contained in the verification text message is Western characters and numbers, and the other content of the verification text message is Chinese characters, the verification information can be extracted by recognizing the character type in the verification text message. Verify the verification information in the text message.
[0036] Processing the verification text message to obtain the verification information may be to use a hash algorithm to calculate a data digest of the verification text message, and use the data digest as the verification information.
[0037] Extracting the verification information from the verification multimedia message may be extracting a verification information picture containing verification information from the received verification multimedia message, and obtaining the verification information by further processing the verification information picture.
[0038] In S13, the verification information is sent to the verification server, so that the verification server verifies the user identity.
[0039] After acquiring the verification information sent by the verification server from the verification message, the client sends the acquired verification information to the verification server. After receiving the verification information sent by the client, the verification server uses the verification information to verify the identity of the user.
[0040] In S14, if a verification success message sent by the verification server is received, a login success interface is displayed to the user.
[0041] After receiving the verification information sent by the client, the verification server performs user identity verification according to the received verification information. If the received verification information is correct, the identity verification of the user is successful, and the verification server sends a verification success message to the user. After receiving the verification success message sent by the verification server, the client displays a login success interface to the user. Specifically, the login success interface may be a dialog box prompting the user that the user has successfully logged in, or may be a display interface after logging in using the user's identity information.
[0042] Further, in order to enhance the security of the user account, a prompt message prompting the user to reset the password and an interface link to the password reset interface can be added to the login success interface. After the user clicks the interface link, the display interface of the client can automatically jump to the password reset interface. In this way, the convenience of the user authentication and password reset process is further improved.
[0043] If the client does not receive the verification success message fed back by the verification server after sending the verification information to the verification server, it may request the verification server to send the verification message again. In addition, the verification information contained in the verification message requested again may be different from the verification information in the previous verification message.
[0044] In this embodiment, by receiving the verification message sent by the verification server with the user terminal identifier as the destination address, the verification information is obtained from the verification message, and the verification information is sent to the verification server, so that the verification server verifies the user identity , And if the verification success message sent by the verification server is received, the login success interface is displayed to the user. Since the verification code input interface is no longer required to be displayed to the user during the identity verification process, the entire process of user identity verification is realized automatically, thereby Significantly improve the execution efficiency of the user authentication process.

Example

[0045] Second embodiment
[0046] This embodiment is based on the foregoing embodiment of the present invention, and further provides a technical solution for obtaining verification information in a user identity verification method. In this technical solution, processing the verification text message to obtain the verification information includes: obtaining a data digest of the verification text message using a hash algorithm, and using the data digest as the verification information.
[0047] Specifically, processing the verification text message to obtain the verification information includes:
[0048] In S20, a hash algorithm is used to obtain a data digest of the verification text message, and the data digest is used as the verification information.
[0049] Specifically, after obtaining the verification text message sent by the verification server, the client uses a hash algorithm to perform a hash transformation on the acquired verification text message, and uses the transformed result as the data digest of the verification text message . After the data digest is obtained, the data digest of the verification text message is used as the verification information.
[0050] In this embodiment, the data digest of the verification text message is obtained by using a hash algorithm, and the data digest is used as the verification information, thereby achieving the purpose of obtaining verification information from the verification text message. At the same time, the hash algorithm is used to The original verification text message has been compressed to improve the security of verification information.

Example

[0051] The third embodiment
[0052] This embodiment is based on the foregoing embodiment of the present invention, and further provides a technical solution for obtaining verification information in a user identity verification method. In this technical solution, extracting the verification information from the verification multimedia message includes: extracting a verification information picture from the verification multimedia message; identifying the verification information from the verification information picture through denoising and character recognition .
[0053] See figure 2 In this embodiment, extracting the verification information from the verification multimedia message includes:
[0054] In S21, a verification information picture is extracted from the verification multimedia message.
[0055] The verification multimedia message includes a verification information picture. The verification information is displayed in the verification information picture. Therefore, to obtain the verification information from the verification multimedia message, it is first necessary to extract the verification information picture from the verification multimedia message.
[0056] Generally, the verification multimedia message only includes the verification information picture. Therefore, only by identifying a picture from the verification multimedia message and extracting the picture, the verification information picture can be extracted.
[0057] If the verification multimedia message contains multiple pictures, the verification information pictures included in the verification multimedia message can be identified from the multiple pictures through feature extraction of the pictures.
[0058] In S22, the verification information is identified from the verification information picture through noise removal and character recognition.
[0059] In order to improve the security of the identity verification process using the verification information picture, the verification information picture included in the verification information picture provided by the server not only displays the characters of the verification information, but also displays some interference items. These interference items can be interference lines or noise points. Therefore, in the process of identifying the verification information from the verification information picture, it is necessary to perform denoising processing on the verification information picture.
[0060] In addition to denoising processing, in order to accurately identify the characters of the verification information in the verification information picture, it is also necessary to perform the operations of grayscale, binarization, character segmentation, and character recognition on the verification information picture. Typically, the process of identifying the verification information from the verification information picture includes from front to back: grayscale, binarization, denoising, character segmentation, and character recognition. Through the sequential execution of the above steps, only the verification information can be identified from the verification information picture.
[0061] The grayscale operation is to convert the color image of the verification information picture into a grayscale image. The binarization operation is to convert a grayscale image into a black and white binary image. The denoising operation is to remove interference lines and noise points from the binarized verification information picture. The character segmentation operation is to determine the image area where different characters in the verification information picture are located. The character recognition operation is to finally determine the verification information characters contained in the verification information picture according to the image area where different characters are located.
[0062] In this embodiment, by extracting the verification information picture from the verification multimedia message, and identifying the verification information from the verification information picture through denoising and character recognition, the verification information is accurately identified from the verification multimedia message. Further improve the execution efficiency of the user identity verification process.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Classification and recommendation of technical efficacy words

Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products