A login verification method and device

A technology for login verification and verification of information, which is applied in the field of network communication and can solve problems such as cumbersome input, difficulty in memory, and low security

Active Publication Date: 2019-12-13
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the above-mentioned login verification method, if the character password set by the user is too complex, it will be difficult to remember and enter cumbersome problems, while the character password is too simple, it is easy to be cracked, low security, visible, easy to remember and safe password high sex can not have both

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A login verification method and device
  • A login verification method and device
  • A login verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0154] As an implementation manner of the embodiment of the present invention, the verification information generation module 520 may include:

[0155] Extraction sequence determination unit ( Figure 5 Not shown in ), used to determine the extraction sequence of the target video frame uniquely corresponding to the target user identifier;

[0156] Video frame extraction unit ( Figure 5 not shown in), for extracting target video frames from the first verification video according to the target video frame extraction sequence;

[0157] Verification information generation unit ( Figure 5 not shown in ), used to generate first verification information according to the target video frame.

[0158] As an implementation manner of an embodiment of the present invention, the extraction order determination unit may include:

[0159] Find subunits ( Figure 5 not shown in ), for searching the target video frame extraction sequence corresponding to the target user identifier from th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to a login verification method applied to a terminal; the method comprises the following steps: obtaining a user provided object subscriber identity and a first verification video; forming rules according to preset verification information, and processing the first verification video so as to form first verification information; sending the first verification information to a server, allowing the server to match the first verification information with preset second verification information matched with the object subscriber identity, forming a verification result according to the matching result, and sending the verification result to the terminal; receiving the server sent verification result. The method needs no character cipher set by the user, only needs the user to provide the first verification video, so the cipher remembering difficulty can be obviously reduced; the method can obtain the first verification information according to the rules formed by preset verification information, so the cipher cannot be easily decoded, thus improving cipher safety.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a login verification method and device. Background technique [0002] With the continuous development of electronic technology, mobile phones, tablet computers, etc. have become indispensable electronic devices in people's lives, and various applications have emerged as the times require. In order to ensure the security of the application program, the user generally needs to perform login verification when logging in to the application program. [0003] Existing login verification methods are generally based on character passwords, that is to say, users need to enter a user name and corresponding character password when logging in to an application program, and the application program sends the user name and character password to the server, and the server can use the user's The user name searches for the pre-stored password corresponding to the user name (the pass...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32G06F21/31
CPCG06F21/31H04L9/32H04L9/3226H04L63/08
Inventor 梁建煌
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products