Identity verification method and device

An identity verification method and identity technology, which is applied in the field of computer networks, can solve problems such as low security, cracking, and poor anti-cracking ability of verification code pictures, and achieve the effect of high security, increased difficulty, and not easy to be cracked

Active Publication Date: 2015-11-25
TENCENT TECH (SHENZHEN) CO LTD
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even if the background verification code picture is added, if the background database is not large enough, it will still be cracked by the automatic machine
Therefore, the overall anti-cracking ability of the verification code picture is relatively poor, and the security is relatively low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method and device
  • Identity verification method and device
  • Identity verification method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0049] see Figure 5 , shows a flow chart of the identity verification method provided by the first embodiment of the present invention. to combine figure 2 , this embodiment describes the processing flow of the server, and the identity verification method provided by this embodiment includes the following steps:

[0050] Step S11, the server receives a verification code pull request sent by a user terminal, and the verification code pull request carries account information of the user terminal.

[0051] When the user terminal detects that the user uses the terminal to initiate transactions and other sensitive operations that require identity verification, or logs in to an application too many times within a certain period of time, or logs in to an application in a different place, or enters an incorrect password for an application too many times, etc. When it happens, it can be determined that the identity verification request is triggered, and the user terminal can send a...

no. 2 example

[0072] see Figure 7 , shows a flow chart of the identity verification method provided by the second embodiment of the present invention. combine figure 2 , this embodiment describes the processing flow of the user terminal, and the identity verification method in this embodiment includes:

[0073] In step S21, the user terminal sends a verification code pull request to the server, and the verification code pull request carries account information of the user terminal.

[0074] Further, before step S21, the user terminal may also send a preset theme corresponding to the account information to the server for storage, wherein the preset theme is set by the user who created the user terminal account. The user terminal may also receive and display some of the pictures in the picture database that match the preset theme returned by the server, so that the user who sets the preset theme is familiar with these pictures. For a specific method, reference may be made to relevant con...

no. 3 example

[0081] see Figure 8 , shows a flow chart of the identity verification method provided by the third embodiment of the present invention. combine figure 2 , this embodiment describes the interaction processing flow between the user terminal and the server. The authentication methods in this embodiment may include:

[0082] In step S301, the user terminal receives account information input by the user.

[0083] Step S302, the user terminal reports the account information and the basic information of the user terminal to the server.

[0084] Step S303, the server stores the account information as the account information of the user terminal.

[0085] Step S304, the server returns multiple topics to the user terminal.

[0086] Step S305, the user terminal displays multiple themes to the user.

[0087] Step S306, the user terminal receives the theme selected by the user.

[0088] Step S307, the user terminal sends the theme selected by the user as a preset theme correspondi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention proposes an identity verification method and device which are high in safety. The method comprises the steps that a server receives a verification code pull request transmitted by a user terminal, wherein the verification code pull request contains the account information of the user terminal; a preset theme corresponding to the account information is obtained according to the account information; a plurality of to-be-selected pictures are obtained from an image database; each to-be-selected picture is provided with a corresponding theme; the theme of at least one of the plurality of obtained to-be-selected pictures is the same as the preset theme; the plurality of obtained to-be-selected pictures are transmitted to the user terminal for display; the information of a selected picture returned by the user terminal is received, and the identity of a user is verified according to the theme of the selected picture and the preset theme, wherein the selected picture is selected by the user from the plurality of to-be-selected pictures.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to an identity verification method and device. Background technique [0002] With the increasing popularity of computers and computer networks, the Internet has penetrated into all areas of people's work, study and life. While the development of the network provides convenience for people, it also brings various challenges. Some people will use robot programs to improperly use network resources in large quantities, such as mass spam, etc., which will greatly reduce server performance. There are also people who use the program to continuously send out service request responses to carry out "saturation attacks" to achieve the purpose of paralyzing the server. Some people even try to maliciously crack passwords by means of profiteering cracking. In order to avoid the above-mentioned malicious behaviors, it is very important to design a set of tools that can allow the compu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 贺啸
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products