Identity verification method and identity verification device

An identity verification method and verification code technology, applied in the field of identity verification methods and devices, can solve problems such as low security, cracking, and high cost, and achieve the effects of increasing difficulty, improving security, and improving cracking resistance

Active Publication Date: 2016-02-03
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even if the background verification code picture is added, if the background database is not large enough, it will still be cracked by the automatic machine
Therefore, the overall anti-cracking ability of the verification code picture is relatively poor, and the security is relatively low
[0005] In order to improve the anti-cracking ability of the verification code, the research and development personnel developed the click verification code. When the click verification code is used, it usually shows the user multiple pictures containing natural objects and prompt information related to the content of these pictures. Select these pictures according to the prompt information, and verify the user's identity according to the user's choice. Since the machine has great difficulties in understanding the prompt information and classifying objects, it can greatly increase the number of machine cracking. Captcha Difficulty
[0006] However, when the verification code is used, the image resource requirements are very high, and it needs to be manually screened and sorted into the warehouse, and the cost is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method and identity verification device
  • Identity verification method and identity verification device
  • Identity verification method and identity verification device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0058] see Image 6 , shows a flow chart of an identity verification method provided by the first embodiment of the present invention. combine figure 2 , this embodiment describes the processing flow of the server, and the identity verification method provided by this embodiment includes the following steps:

[0059] In step S11, the server receives the verification code pull request sent by the user terminal.

[0060] When the browser in the user terminal 100 or the clients of various applications detects that the user performs sensitive operations that require identity verification, such as initiating transactions, or logs in to an application too many times within a certain period of time, or logs in to an application in a different place, or logs in When an application password is entered incorrectly for too many times, it may be determined that the identity verification request is triggered, and the user terminal 100 may send a verification code pull request to the ser...

no. 2 example

[0098] see Figure 13 , shows a flow chart of an identity verification method provided by the second embodiment of the present invention. combine figure 2 , this embodiment describes the processing flow of the user terminal, and the identity verification method in this embodiment may include the following steps:

[0099] In step S21, the user terminal sends a verification code pull request to the server.

[0100] Step S22, receiving and displaying the verification code background picture sent by the server and spliced ​​with multiple sub-pictures, wherein the multiple sub-pictures are respectively spliced ​​into multiple vacant areas in the verification code background picture.

[0101] The background image of the verification code spliced ​​with multiple sub-images displayed on the user terminal can be as follows: Figure 14 As shown in FIG. 2 , the verification code background picture spliced ​​with multiple sub-pictures can be displayed in the user interaction interface...

no. 3 example

[0112] see Figure 15 , Figure 15 Shown is a flow chart of an identity verification method provided by the third embodiment of the present invention. combine figure 2 , this embodiment describes an interactive processing flow between a user terminal and a server. The authentication methods in this embodiment may include:

[0113] In step S301, the user terminal sends a verification code pull request to the server.

[0114] Step S302, randomly select a verification code background picture, obtain a plurality of sub-pictures corresponding to the verification code background picture, a first mosaic rule, and a second mosaic rule, the verification code background picture includes the sub-pictures respectively Corresponding to a plurality of vacant areas, the first mosaic rule includes: the plurality of sub-pictures, a plurality of randomly generated rotation angles and a configuration relationship between the plurality of vacant areas, and the second mosaic rule includes : a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity verification method and an identity verification device, which are low-cost, highly anti-cracking and highly safe. The method comprises the following steps that: a server receives a verification code pull request transmitted by a user terminal; the server randomly selects one verification code background picture according to the verification code pull request, and obtains a plurality of sub-pictures, a first splicing rule and a second splicing rule corresponding to the verification code background picture; according to a position and a rotation angle corresponding to each sub-picture in the first splicing rule, the server splices the plurality of sub-pictures in a plurality of vacant areas; the server issues the verification code background picture spliced with the plurality of sub-pictures to the user terminal to make the user terminal show the verification code background picture spliced with the plurality of sub-pictures to a user; and the server receives a splicing result of the verification code background picture and the plurality of sub-pictures, spliced again according to instructions of the user, from the user terminal, and performs verification according to the splicing result.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to an identity verification method and device. Background technique [0002] With the increasing popularity of computers and computer networks, the Internet has penetrated into all areas of people's work, study and life. While the development of the network provides convenience for people, it also brings various challenges. Some people will use robot programs to improperly use network resources in large quantities, such as mass spam, etc., which will greatly reduce server performance. There are also people who use the program to continuously send out service request responses to carry out "saturation attacks" to achieve the purpose of paralyzing the server. Some people even try to maliciously crack passwords by means of profiteering cracking. In order to avoid the above-mentioned malicious behaviors, it is very important to design a set of tools that can allow the compu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 宋梁山张东蕊付晓强唐艳平陈远斌陈辉
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products