Identity verification method, device and system
An identity verification method and identity verification technology, applied in transmission systems, electrical components, etc., can solve problems such as cumbersome operations, reduce verification processing efficiency, and security vulnerabilities, and achieve the goals of improving processing efficiency, simplifying user operations, and improving security Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0048] This embodiment will be described from the perspective of an identity verification device. Specifically, the identity verification device may be integrated in a network device such as a server. The server may be an independent entity or may include multiple entities.
[0049]An identity verification method, including: receiving a security verification request sent by a terminal; obtaining network environment information and user behavior data according to the security verification request; determining whether the current operation is a machine attack according to the network environment information and user behavior data; if so, then Obtain a verification code of a preset type according to a preset policy, and deliver the verification code to the terminal for identity verification; if not, determine that the security verification is passed.
[0050] Such as Figure 1b As shown, the flow chart of the identity verification method can be specifically as follows:
[0051] ...
Embodiment 2
[0085] This embodiment will be described from the perspective of an identity verification triggering device, and the identity verification triggering device may specifically be integrated in a network device such as a terminal. Specifically, the terminal may be a device such as a mobile phone, a tablet computer, or a PC.
[0086] An identity verification method, comprising: sending a security verification request to a server, so that the server can verify whether the current operation is a machine attack according to the security verification request; receiving the verification code returned by the server when the current operation is determined to be a machine attack; according to The verification code generates a verification code input interface; the verification code and the verification code input interface are displayed according to a preset policy.
[0087] Such as figure 2 As shown, the specific process of the authentication method can be as follows:
[0088] 201. S...
Embodiment 3
[0116] According to the methods described in Embodiments 1 and 2, examples will be given below for further detailed description.
[0117] In this embodiment, it will be described by taking that the identity verification device is specifically integrated in the server and the identity verification triggering device is specifically integrated in the terminal.
[0118] Wherein, the server may include a webpage server, a verification code server, and may also include a rule master control server and a material storage server, etc., and the identity verification triggering device may be installed in the terminal in the form of a client or other software, for example, It can be encapsulated in the form of an application programming interface (API, Application Programming Interface), so that the accessed page only needs to add corresponding codes to add this API. The details will be described below.
[0119] Such as Figure 3a As shown, an authentication method, the specific proces...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


