Method and system for controlling verification server and method and system for controlling verification

A technology for verifying servers and control methods, applied in the fields of verification server control methods and systems, verification control methods and systems, capable of solving problems such as fraudulently obtaining verification passes and affecting network verification security, and achieving good security effects

Inactive Publication Date: 2016-01-27
TENCENT TECH (SHENZHEN) CO LTD
View PDF8 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the common network verification control method, the verification server verifies the identity of the service provider and the user according to the fixed authentication password of the service provider. Since the authentication password is fixed, the user can move The communication device uses technologies such as keyboard hooks to steal the authentication password of the service provider, and then interacts with the authentication service privately based on the stolen authentication password, defrauding the authentication pass, thereby affecting the security of network authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for controlling verification server and method and system for controlling verification
  • Method and system for controlling verification server and method and system for controlling verification
  • Method and system for controlling verification server and method and system for controlling verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0032] see figure 1 , which is a flowchart of a verification server control method of the present invention.

[0033] The verification server control method includes the following steps:

[0034] S101. Receive a verification request from the requesting terminal, generate a one-time valid dynamic key, generate a two-dimensional code according to the dynamic key, and send the two-dimensional code to the requesting terminal;

[0035] S102. Receive the key information obtained by the mobile terminal after scanning the QR code of the requesting terminal through the mobile application, and check the key information with the dynamic key to determine the legitimacy of the mobile terminal.

[0036] In the verification server control method of the present invention, by g...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for controlling a verification server and a method and a system for controlling verification. According to the invention, a one-time effective dynamic key is generated on the verification server, a two-dimensional code is generated according to the dynamic key, the two-dimensional key is sent to a request terminal, a mobile terminal can acquire corresponding key information through scanning the two-dimensional code of the request terminal through a mobile application, the server carries out verification according to the key information returned by the mobile terminal and the locally stored dynamic key, and the legality of the mobile terminal can be judged. The methods and the systems disclosed by the invention enable the key to be difficult to be forged or stolen in the network verification process, can improve the safety of network verification, and are more convenient.

Description

technical field [0001] The invention relates to the technical field of network verification, in particular to a verification server control method and system thereof, and a verification control method and system thereof. Background technique [0002] With the development of the Internet platform, more and more network interaction behaviors occur, and in some specific network interaction occasions, the interaction can only be carried out after one party verifies the other party. For example, a user can enjoy rewards provided by the service provider by booking a certain service on the spot. This kind of reward requires the user to log in to the verification server through a mobile communication device, open the reward acquisition interface of the service provider, and enter the authentication password of the service provider to verify. After the server verifies that the input authentication password of the service provider is correct, it determines that the identities of the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04W12/06
Inventor 黎伟坚
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products