Identity authentication method, identity authentication device and identity authentication system

An identity verification method and identity verification technology, applied in user identity/authority verification, transmission systems, digital transmission systems, etc., can solve problems such as insufficient security and easy cracking, and achieve high security and increase the difficulty of cracking Effect

Inactive Publication Date: 2016-02-10
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] During the research and practice of the prior art, the inventors of the present invention have found that in the existing point-and-click scheme, since the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, identity authentication device and identity authentication system
  • Identity authentication method, identity authentication device and identity authentication system
  • Identity authentication method, identity authentication device and identity authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] This embodiment will be described from the perspective of an identity verification device. Specifically, the identity verification device may be integrated into a terminal, a server, or other devices that require identity verification.

[0046] An identity verification method, characterized in that it includes: receiving a user's identity verification request; generating verification information and candidate information according to the identity verification request, and the verification information has a preset corresponding relationship with the candidate information; Display the candidate information at a random position on the preset verification interface, and display the verification information on the preset verification interface; obtain the candidate information selected by the user from the preset input graphical interface to obtain input information; determine whether the input information and the verification information are match; if it matches, it is deter...

Embodiment 2

[0087] If the identity verification device of Embodiment 1 is integrated in the server, when displaying candidate information and verification information, it can be displayed specifically through the terminal, that is, another identity verification method can be provided in the embodiment of the present invention, which will be described below.

[0088] This embodiment will be described from the perspective of an identity verification triggering device. The identity verification triggering device may be integrated in a terminal, for example, installed in the terminal in the form of a client or other software.

[0089] An identity verification method includes: sending an identity verification request to a server; receiving verification information and candidate information returned by the server according to the identity verification request; displaying the candidate information at a random position on a preset input graphical interface, and displaying the candidate information ...

Embodiment 3

[0110] According to the methods described in Embodiments 1 and 2, examples will be given below for further detailed description.

[0111] In this embodiment, it will be described in detail by taking an example in which the identity verification device is integrated in a server and the verification information is a subset of candidate information.

[0112] Such as Figure 3a As shown, an authentication method, the specific process can be as follows:

[0113] 301. The server receives the identity verification request sent by the terminal.

[0114] Wherein, the identity verification request can be sent by the user by triggering the identity verification trigger key, for example, the user can click or slide a trigger key such as "login", "obtain verification code", "unlock" or "verify" to trigger the identity verification request, and so on.

[0115] 302. The server generates verification information and candidate information according to the identity verification request, so t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an identity authentication method, an identity authentication device and an identity authentication system. According to the embodiment, the identity authentication method comprises the steps of when the identity authentication request of a user is received, generating authentication information and candidate information based on an identity authentication request; displaying the candidate information at a random position of a preset input graphical interface; displaying the authentication information in a preset authentication interface, wherein the authentication information and the candidate information have a preset corresponding relationship; then obtaining the candidate information selected by the user from the preset input graphical interface so as to obtain an input message; matching the input information with the authentication information; if the input information matches with the authentication information, determining that the identity authentication is successful; otherwise, if the input information does not match with the authentication information, refusing the identity authentication request. The scheme can improve safety.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an identity verification method, device and system. Background technique [0002] With the advent of the era of big data, the relationship between data and people's lives is getting closer and closer, such as online shopping, transfers, and conversations, etc., all involve data processing. Therefore, how to ensure data security is extremely important one question. [0003] In the existing technology, the security of data is generally improved through identity verification. For example, according to the authentication information provided by the user, such as account number and password, etc., it is compared with the pre-stored verification information. If they are consistent, the verification is passed. , otherwise, it is determined that the verification fails. Among them, in order to effectively prevent a hacker from making continuous login attempts (that is, ve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
CPCH04L9/3218
Inventor 唐艳平张彦玲王玉叶郑小维龚凌侯鑫曾岳锋张小龙张哲
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products