Identity verification method and apparatus

An identity verification method and verification code technology, applied in the field of identity verification methods and devices, can solve the problem of small screen size of mobile phones, and achieve the effects of improving the pass rate, improving user experience, and being easy to input.

Inactive Publication Date: 2015-09-16
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing verification method needs to pull up the keyboard of the mobile phone for input, and sometimes needs to switch the input method, but because the screen size of the mobile phone is relatively small, it is not very simple for the user to use the correct input method to input the correct characters. The data shows that if a user uses a keyboard to enter a verification code for identity verification on a personal computer, the pass rate of normal users is 90%, but on user terminal platforms such as touch-sensitive mobile phones, the pass rate of normal users is only 83%

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method and apparatus
  • Identity verification method and apparatus
  • Identity verification method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0049] see Figure 5 , shows a flow chart of an identity verification method provided by the first embodiment of the present invention. combine figure 2 , this embodiment describes the processing flow of the user terminal, and the identity verification method provided by this embodiment includes the following steps:

[0050] Step S11: the user terminal sends a verification code pull request to the server.

[0051] In this step, the user terminal may send a verification code pull request to a pre-configured server (or called a verification code server), for example, a web page address, to obtain the verification code. The page ID can be carried in the verification code pull request. The page ID is used to identify a unique page, which can be a number, and the page ID will change every time the page is refreshed, corresponding to the verification code pull request.

[0052] Step S12: Receive and display the verification code picture and input interface returned by the serve...

no. 2 example

[0070] Figure 7 It is a schematic flowchart of the identity verification method in the second embodiment of the present invention. Please refer to Figure 7 , this embodiment mainly describes the processing flow of the server, and the identity verification method in this embodiment includes:

[0071] Step S21: Receive the verification code pull request sent by the user terminal.

[0072] In this step, the server receives a verification code pull request sent by the user terminal, and the verification code pull request may carry a page identifier.

[0073] Step S22: Generate a verification code picture and an input interface according to the verification code pull request, the content of the verification code picture includes a plurality of verification objects arranged in a predetermined order, the content of the input interface includes a plurality of candidate objects, The multiple candidate objects include at least all verification objects in the verification code pictu...

no. 3 example

[0085] see Figure 8 , shows a flow chart of an identity verification method provided by the third embodiment of the present invention. combine figure 2 , this embodiment describes the interaction processing flow between the user terminal and the server. The authentication methods in this embodiment may include:

[0086] In step S301, the user terminal sends a verification code pull request to the server.

[0087] Step S302, the server generates a verification code picture and an input interface according to the verification code pull request, the content of the verification code picture includes a plurality of verification objects arranged in a predetermined order, and the content of the input interface includes a plurality of candidate objects , the multiple candidate objects include at least all verification objects in the verification code picture.

[0088] Step S303, the server returns the verification code picture and the input interface to the user terminal.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an identity verification method and apparatus which have the advantages of being high in declassification capability and improving the normal user pass rate. The method comprises the following steps: a user terminal sending a verification code extracting request to a server; receiving and displaying a verification code picture returned by the server according to the verification code extracting request and an input interface, wherein the content of the verification code picture comprises multiple verification objects arranged according to a predetermined sequence, the content of the input interface comprises multiple objected to be selected, and the multiple objects to be selected at least comprises all the verification objects in the verification code picture; detecting touch control operation acting in the input interface, and when the touch control operation is preset touch control operation, obtaining the touch control position and time of the touch control operation; and sending the touch control position and time of the touch control operation to the server, and when the server determines the objects which the touch control operation acts on include and only include all the verification objects in the input interface and a touch control sequence is the same as the predetermined sequence according to the touch control position and time, approving verification.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to an identity verification method and device. Background technique [0002] With the increasing popularity of computers and computer networks, the Internet has penetrated into all areas of people's work, study and life. While the development of the network provides convenience for people, it also brings various challenges. Some people will use robot programs to improperly use network resources in large quantities, such as mass spam, etc., which will greatly reduce server performance. There are also people who use the program to continuously send out service request responses to carry out "saturation attacks" to achieve the purpose of paralyzing the server. Some people even try to maliciously crack passwords by means of profiteering cracking. In order to avoid the above-mentioned malicious behaviors, it is very important to design a set of tools that can allow the compu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 孙淑芹张彦玲王玉叶刘金星
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products