Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety verification method and device

A technology for security verification and password verification, applied in the field of security verification methods and devices, can solve problems such as cumbersome operations, slow application program speed, etc., to simplify the operation steps, reduce the number of times of entering passwords, and improve the speed and the efficiency of security verification. Effect

Active Publication Date: 2020-11-06
TENCENT TECH (SHENZHEN) CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, requiring the user to enter the verification password, although it increases the security of the user account and personal privacy to a certain extent, it also makes the user's operation more cumbersome and the speed of starting the application is slower.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety verification method and device
  • Safety verification method and device
  • Safety verification method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0038] see figure 2 , figure 2 It is a flow chart of the security verification method provided by the first embodiment of the present invention. Such as figure 2 As shown, the security verification method provided in this embodiment includes the following steps:

[0039] Step S101, when it is detected that the user has logged into the account of the preset application program, it is judged whether the user has logged into the account by verifying the password;

[0040] In this embodiment, the application program that needs to be detected can be preset by the user, and the mobile terminal 100 can set the type or name of the application program that needs to be detected according to the setting instruction triggered by the interactive interface provided by the user on the mobile terminal 100 at any time. Make presets. Alternatively, the mobile terminal 100 can also set a certain type of application program as an application program that needs to be detected according to t...

no. 2 example

[0065] see image 3 , image 3 It is a flow chart of the security verification method provided by the second embodiment of the present invention. Such as image 3 As shown, the security verification method provided in this embodiment includes the following steps:

[0066] Step S201, the mobile terminal detects whether there is a user logging in to a preset application program account;

[0067] In this embodiment, the application program that needs to be detected can be preset by the user, and the mobile terminal 100 can set the type or name of the application program that needs to be detected according to the setting instruction triggered by the interactive interface provided by the user on the mobile terminal 100 at any time. Make presets. Alternatively, the mobile terminal 100 can also set a certain type of application program as an application program that needs to be detected according to the setting rules issued by the server, for example: payment application programs...

no. 3 example

[0087] see Figure 4 , Figure 4 It is a flow chart of the security verification method provided by the third embodiment of the present invention. Such as Figure 4 As shown, the security verification method provided in this embodiment includes the following steps:

[0088] Step S301, the mobile terminal detects whether there is a user logging in to a preset application program account;

[0089] Step S302, when it is detected that the user has logged into the account, it is judged whether the user has logged into the account by verifying the password;

[0090] If not, execute step S303: display a preset password input box to guide the user to log in to the account by inputting a verification password;

[0091] Step S301 to step S303 are the same as step S201 to step S203 in the second embodiment, and will not be repeated here.

[0092] If so, execute step S304: collect the current location data of the user and the historical location data when the user exited the account la...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a safety authentication method. The method comprises the following steps that: (1) when a condition that a user logins the account of a preset application is detected, a mobile terminal judges whether the user has login the account through an authentication code, (2) if so, the safety authentication data of the user is collected, (3) according to the safety authentication data and a corresponding preset judgment rule, whether the user logins the account continuously or not is judged, and (4) if so, the user is allowed to login the account without inputting the authentication code. In addition, the invention also provides a safety authentication device. According to the safety authentication method and device, the number of times of inputting the password can be reduced under the safety premise, the operation steps of the user is simplified, the speed of starting the application is raised, and the efficiency of safety authentication is improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a safety verification method and device. Background technique [0002] With the development of smart mobile terminal technology, applications based on smart mobile terminals have been continuously developed and widely used, and people use smart mobile terminals to start applications more and more frequently. Personal information security, for example, payment applications involve user account security, and social networking applications involve user privacy security. [0003] In the prior art, in order to protect the security of the user's personal information, an authentication password needs to be input when the application starts. However, requiring the user to input a verification password increases the security of the user account and personal privacy to a certain extent, but also makes the user's operation more complicated and the speed of starting the application progra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06F21/62
Inventor 贺啸
Owner TENCENT TECH (SHENZHEN) CO LTD