User identity verification method, server and client

A technology of user identity and verification method, which is applied in the fields of user identity verification method, server and client, can solve problems such as malicious cracking, answers easily cracked by hackers, and high risk of account theft, so as to ensure security and reduce vulnerability The possibility of being leaked and cracked, the effect of improving resource utilization

Active Publication Date: 2016-04-20
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the user does not use it for a long time after setting the password protection question, it is easy to forget the correct answer originally set, and this answer is also easy to be cracked by hackers
For the way of password mobile phone, if the mobile phone is lost, the account also has a high risk of being stolen
[0005] It can be seen that the above three methods of verifying user identities all have the possibility of account theft, verification code leakage or malicious cracking, so the security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity verification method, server and client
  • User identity verification method, server and client
  • User identity verification method, server and client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0040] Embodiment 1: The social intimacy between the user and each friend is determined according to the social records of the user and each friend in the friend relationship chain, and friends whose social intimacy is greater than a preset threshold are determined as trusted friends.

[0041] Specifically, the server may request the social record of the friend from the user database, and then the server determines the social intimacy according to the social record requested from the user database. Or, in addition to saving the social records of each user and each friend in the friend relationship chain, the user database further determines and saves the social intimacy between the user and each friend. At this time, the server can directly request the user database to obtain The social intimacy between the user and each friend, and then the friends whose social intimacy is greater than the preset threshold are determined as trusted friends.

[0042] The social records may inc...

Embodiment approach 2

[0044] Embodiment 2: According to the account security records of each friend in the user's friendship chain within a predetermined period of time, determine the total number of times each friend's account is stolen and / or publish illegal information within the predetermined period of time, and the total A friend whose number of times is less than a preset threshold is determined as a trusted friend.

[0045] The server can request the account security record of each friend from the user database, and judge whether the account is in a safe state for a period of time through the records of each friend's account being stolen and / or publishing illegal information, and determine whether the account is in a safe state As a trusted friend, the predetermined time period can be half a year or one year, and the preset threshold can be the threshold of the number of times the account is stolen and / or illegal information is published, for example, the preset threshold is 1 time within hal...

Embodiment approach 3

[0046] Embodiment 3: Determine the social intimacy between the user and each friend according to the social records of the user and each friend in the friend relationship chain, if the social intimacy is greater than the preset threshold and the account is stolen within a predetermined period of time and / or A friend whose total number of times of posting illegal information is less than a preset threshold is determined as a trusted friend.

[0047] Step 203: Obtain from the second client where the trusted friend is located a question for verifying the user's identity and a verification answer corresponding to the question, and send the question to the first client.

[0048] After receiving the user identity verification request, the server sends a verification question acquisition request to the second client, receives the question and verification answer returned by the second client, and uses them as the question to be sent to the first client and the verification used for ve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user identity verification method, a server and a client. The method is applied to the server, and comprises the steps of receiving a user identity verification request, aiming at a user, sent by a first client; determining a credible friend of the user according to the user identity verification request; obtaining a problem for verifying the user identity and a verification answer corresponding to the problem from a second client where the credible friend is located; sending the problem to the first client; receiving the answer, which is input by the user, sent by the first client; and determining that whether the identity verification of the user is successful according to that whether the answer input by the user is matched with the verification answer. By using the method provided by the invention, the resource utilization rate of the device can be improved, and the security of the user account and the validity of the identity verification can be improved.

Description

technical field [0001] The present application relates to the field of information technology, in particular to a user identity verification method, server and client. Background technique [0002] When a user logs in to the client on the terminal device, the user's identity needs to be verified. At present, the verification methods used include: password, password protection question, password protection mobile phone, etc. [0003] When the password entered by the user is used to verify its identity, the entered password has the risk of being leaked or cracked. For example, when a user uses an instant messaging tool to interact with a friend on the Internet, the password entered is usually a combination of numbers and passwords, which is easily cracked by hackers. In addition, since the length of the password is limited, and usually the user will not change the password for a period of time, the password is easily leaked. [0004] When retrieving the password, you can us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0869H04L63/0876
Inventor 陈云云
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products