Login verification method and device, and login method and device

A technology for authentication and login request, applied in the network field, which can solve the problem of low security of user accounts

Pending Publication Date: 2017-01-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF10 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to provide a login verification method and device for the technical problem that the user account is easy to be stolen and the security is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login verification method and device, and login method and device
  • Login verification method and device, and login method and device
  • Login verification method and device, and login method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0052] Such as figure 1 As shown, it is a diagram of an application environment implemented by a login verification method in an embodiment, and the application environment includes a terminal 102 and a server 104 . Wherein, the terminal 102 may be a mobile phone, a personal notebook, a tablet computer or a desktop computer, etc.; the terminal 102 and the server 104 communicate through a network.

[0053] In one embodiment, the above figure 1 The schematic diagram of the internal structure of the server 104 in figure 2shown. The server includes a processor connected through a system bus, an in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a login verification method and device. The method comprises the following steps: receiving a login request sent by a terminal, wherein the login request contains a user identifier; generating a brand new verification text according to the login request, and returning the brand new verification text to the terminal; receiving to-be-verified voice corresponding to the user identifier and uploaded by the terminal; employing a text-independent voice recognition algorithm to carry out voice verification on the to-be-verified voice; converting the to-be-verified voice into a text after the voice verification is passed; and comparing whether the text converted by the to-be-verified voice is consistent with the verification text, allowing login if the to-be-verified voice is consistent with the verification text, and otherwise, refusing the login. The invention further provides a login method and device. According to the login verification method and device provided by the invention, the personation based on the situation that the voice of users is recorded by phishing sites is well avoided, and thus the login security is effectively improved.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a login verification method and device, and a login method and device. Background technique [0002] With the development of Internet technology, it has become a part of people's life to access various resources through the Internet for entertainment, study and office work. Access to resources is usually through login, and access can only be done after verification of permissions. [0003] When logging in, user information, such as user account number and password, needs to be submitted to the server. No matter how secure the server is and how firmly the communication channel is encrypted, it is still impossible to avoid the occurrence of phishing and account theft. Phishing hacking is to create a phishing website and then spread it to users. When a user logs in through a phishing website, the account number and password will be sent to the mailbox that wrote the phishing webs...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G10L15/26
CPCH04L63/08G10L15/26H04L9/3231
Inventor 冯院华
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products