Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity verification method and identity verification device

An identity verification method and identity verification technology, applied in the field of identity verification methods and devices, can solve problems such as user safety hazards and data leakage, and achieve the effect of ensuring safety and reducing the risk of data leakage

Active Publication Date: 2017-02-22
ADVANCED NEW TECH CO LTD
View PDF2 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When a user logs in or changes a password, the user's identity needs to be verified for legality. In this process, there is a risk of data leakage. For example, hackers can crawl the verification questions and corresponding answer options, and then pass enumeration The attack method obtains the user's login information, which brings huge security risks to the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method and identity verification device
  • Identity verification method and identity verification device
  • Identity verification method and identity verification device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060]Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0061] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity verification method and an identity verification device. The identity verification method comprises the steps of after an identity verification request based on a user account is received, selecting a plurality of first verification problems of which the current states are available in a verification problem database; transmitting the plurality of first verification problems, correct answers and interference answers of the plurality of first verification problems to a user; receiving a plurality of selection results which are returned from the user and correspond with the plurality of first verification problems; and in the plurality of selection results, if the number of correct answers of the corresponding first verification problems in the selection results reach a preset number, confirming a fact that the user identity is valid. The identity verification method and the identity verification device have advantages of reducing data leakage risk, preventing acquisition of user logging-on information by a hacker in manners of crawling verification problems and corresponding answer items and performing enumeration attack.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to an identity verification method and device. Background technique [0002] With the rapid development of Internet technology, security issues are particularly prominent. When people perform various business operations on the Internet, they usually need to log in based on a pre-registered user account, and perform various business operations after successful login. When a user logs in or changes a password, the user's identity needs to be verified for legality. In this process, there is a risk of data leakage. For example, hackers can crawl the verification questions and corresponding answer options, and then pass enumeration The attack method obtains the user's login information, which brings huge security risks to the user. Contents of the invention [0003] In view of this, the present application provides an identity verification method and device. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0815H04L63/0876
Inventor 江璇林述民
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products