Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity verification method, device and system

An identity verification method and identity verification technology, applied in transmission systems, electrical components, etc., can solve problems such as cumbersome operations, reduce verification processing efficiency, and security vulnerabilities, and achieve the goals of improving processing efficiency, simplifying user operations, and improving security Effect

Active Publication Date: 2017-05-24
TENCENT TECH (SHENZHEN) CO LTD
View PDF9 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] During the research and practice of the existing technology, the inventor of the present invention found that although the existence of the verification code can improve the security of the data to a certain extent, at the same time, it also makes the user's operation cumbersome. The processing efficiency of the verification is reduced; moreover, since the traditional verification code is a small character picture plus an input box, therefore, illegal intruders can easily directly pull the picture of the verification code through technical means, and then pass the automaton Therefore, there are certain loopholes in its security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method, device and system
  • Identity verification method, device and system
  • Identity verification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] This embodiment will be described from the perspective of an identity verification device. Specifically, the identity verification device may be integrated in a network device such as a server. The server may be an independent entity or may include multiple entities.

[0049]An identity verification method, including: receiving a security verification request sent by a terminal; obtaining network environment information and user behavior data according to the security verification request; determining whether the current operation is a machine attack according to the network environment information and user behavior data; if so, then Obtain a verification code of a preset type according to a preset policy, and deliver the verification code to the terminal for identity verification; if not, determine that the security verification is passed.

[0050] Such as Figure 1b As shown, the flow chart of the identity verification method can be specifically as follows:

[0051] ...

Embodiment 2

[0085] This embodiment will be described from the perspective of an identity verification triggering device, and the identity verification triggering device may specifically be integrated in a network device such as a terminal. Specifically, the terminal may be a device such as a mobile phone, a tablet computer, or a PC.

[0086] An identity verification method, comprising: sending a security verification request to a server, so that the server can verify whether the current operation is a machine attack according to the security verification request; receiving the verification code returned by the server when the current operation is determined to be a machine attack; according to The verification code generates a verification code input interface; the verification code and the verification code input interface are displayed according to a preset policy.

[0087] Such as figure 2 As shown, the specific process of the authentication method can be as follows:

[0088] 201. S...

Embodiment 3

[0116] According to the methods described in Embodiments 1 and 2, examples will be given below for further detailed description.

[0117] In this embodiment, it will be described by taking that the identity verification device is specifically integrated in the server and the identity verification triggering device is specifically integrated in the terminal.

[0118] Wherein, the server may include a webpage server, a verification code server, and may also include a rule master control server and a material storage server, etc., and the identity verification triggering device may be installed in the terminal in the form of a client or other software, for example, It can be encapsulated in the form of an application programming interface (API, Application Programming Interface), so that the accessed page only needs to add corresponding codes to add this API. The details will be described below.

[0119] Such as Figure 3a As shown, an authentication method, the specific proces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity verification method, device and system. According to the method, when a safety verification request sent by a terminal is received, the network environment information and user behavior data are acquired according to the safety verification request; secondly, whether present operation is machine attack is determined according to the network environment information and the user behavior data, if yes, a preset type verification code is acquired according to a preset strategy, the verification code is further distributed to the terminal to carry out identity verification, if not, safety verification passes. The method is advantaged in that not only can data safety be improved, user operation is simplified, and verification processing efficiency is improved.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an identity verification method, device and system. Background technique [0002] Nowadays, all kinds of data are flooding people's lives, such as online shopping, transfers, and conversations, etc., all of which involve data processing, and the security of data involves the safety of people's lives and properties. [0003] In order to improve the security of the data, after the technology of authenticating the user's identity information, the "verification code" technology is proposed. The main purpose of this technology is to prevent a hacker from using a specific The brute force method of the program makes continuous login attempts (that is, verification attempts), that is, the existence of the verification code is to distinguish whether the input of the authentication information is a human or a machine, so as to improve the security of verification. [0004] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0846
Inventor 唐艳平张彦玲王玉叶龚凌黄嘉祺魏仁佳
Owner TENCENT TECH (SHENZHEN) CO LTD