Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Security verification method, device and system

A technology for security verification and identity verification information, applied in user identity/authority verification, location-based services, etc., can solve problems such as insufficient proof of user legitimacy, cracking, and easy leakage of login passwords to improve security. and the effect of convenience

Active Publication Date: 2016-02-03
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the login password is easy to be leaked, and it is easy to be cracked by other users through keyboard interception and screen capture. Therefore, only verifying the password is not enough to prove the legitimacy of the user, and the security of the user to perform sensitive operations is low.
In addition, authentication through the login password requires the user to manually enter the password each time, and the operation is cumbersome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security verification method, device and system
  • Security verification method, device and system
  • Security verification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0027] see Figure 1 to Figure 3 , figure 1 It is a schematic structural diagram of the security verification system provided by the first embodiment of the present invention. Such as figure 1 As shown, the security verification system 10 provided in this embodiment includes: a mobile terminal 100 and a server 200 . The mobile terminal 100 and the server 200 are located in a wired or wireless network, and the mobile terminal 100 and the server 200 perform data interaction through the wired or wireless network.

[0028] The mobile terminal 100 may include: a smart phone with a positioning function, a tablet computer, an e-book reader, an MP3 player (MovingPictureExpertsGroupAudioLayerIII, moving picture expert compression standard audio layer 3), MP4 (MovingPictureExpertsGroupAudioLayerIV, moving picture expert compression standard audio layer 4) Players, Laptops, Vehicle Computers, Wearables, and more.

[0029] In this embodiment, the mobile terminal 100 is configured to s...

no. 2 example

[0052] see Figure 4 , Figure 4 It is a flow chart of the security verification method provided by the second embodiment of the present invention. The following is a detailed description of the security verification method provided by this embodiment from the server side, as Figure 4 As shown, the security verification method provided in this embodiment includes the following steps:

[0053] Step S21, the server receives the service operation request sent by the mobile terminal, and judges whether the service operation requested by the mobile terminal is a sensitive operation;

[0054] Sensitive operations refer to operations performed on related businesses that may involve the user's personal privacy or property security, such as: login, password change, electronic payment, electronic transfer, etc.

[0055] In this embodiment, a verification database may be preset in the server 200, and the verification database is preset with: user accounts, type information of sensiti...

no. 3 example

[0076] see Figure 5 to Figure 9 , Figure 5 It is a flow chart of the security verification method provided by the third embodiment of the present invention. The following is a detailed description of the security verification method provided by this embodiment from the server side, as Figure 5 As shown, the security verification method provided in this embodiment includes the following steps:

[0077] Step S31, the server executes the configuration operation according to the configuration information sent by the mobile terminal and the configuration operation request, and binds the user account, the type of sensitive operation and the preset location information as the verification standard in the configuration information;

[0078] Specifically, see Figure 6 , this step can include:

[0079] Step S311, the server receives the user account, the first identity verification information and the identity verification request sent by the mobile terminal, and matches the fir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security verification method. The security verification method comprises the following steps that: a server receives a service operation request sent by a mobile terminal; whether a service operation requested and executed by the mobile terminal is a sensitive operation or not can be judged; the current position information of the mobile terminal is obtained from the mobile terminal if the service operation requested and executed by the mobile terminal is the sensitive operation; the current position information is compared with pre-set position information; when a deviation value between a current position and a preset position is less than a preset numerical value, the mobile terminal passes first security verification is determined; and the service operation is executed. The invention further provides a security verification device and system. According to the security verification method, device and system disclosed by the invention, the security verification based on the position information is realized; and the security and the convenience for the sensitive operation can be improved.

Description

technical field [0001] The invention relates to computer technology, in particular to a safety verification method, device and system. Background technique [0002] With the development of mobile terminals and mobile Internet technology, users can perform more and more operations through mobile terminals, including sensitive operations involving user property or privacy security, such as electronic payment, electronic transfer and so on. [0003] In the existing technology, in order to protect the user's property or privacy security, the user is generally required to set a login password in advance, and then when the user needs to perform sensitive operations, the user is first authenticated through the login password, and if the authentication is successful, the user is allowed to perform sensitive operations . However, the login password is easy to be disclosed, and it is also easy to be cracked by other users through keyboard interception and screen capture. Therefore, o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04W4/02
Inventor 郭计伟王小叶
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products