Security issue generation and identity authentication method and device

A technology for security issues and identity verification, applied in the information field, can solve problems such as low efficiency of identity verification, high cost of identity verification, high generation requirements, etc., to achieve the effects of improving memory, reducing generation costs, and improving ease of use

Active Publication Date: 2017-08-08
ADVANCED NEW TECH CO LTD
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The embodiment of the present application provides a method and device for generating security questions, which are used to solve the existing security questions for identity verification, which have low usability and high generation requirements, resulting in high cost of identity verification and identity verification. The problem of low verification efficiency
[0009] The embodiment of the present application provides a method and device for identity verification, which are used to solve the security problems of using the existing identity verification. The ease of use is low and the generation requirements are high, resulting in high cost of identity verification. The problem of inefficiency
[0010] The embodiment of the present application provides a method and device for managing security issues, which are used to solve the existing security issues for identity verification. The ease of use is low and the generation requirements are high, resulting in high cost of identity verification. The problem of low verification efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security issue generation and identity authentication method and device
  • Security issue generation and identity authentication method and device
  • Security issue generation and identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0066] The technical solutions provided by various embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.

[0067] figure 1 A security question generation process provided by the embodiment of this application specifically includes the following steps:

[0068] S101: Send a generation ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses a security issue generation and identity authentication method and device. During generation of a security issue, firstly, a generation instruction for a security issue is sent to a terminal firstly so as to make the terminal return a reference picture generated under a user operation; secondly, a plurality of confusion pictures corresponding to the reference picture are determined according to the reference picture; and finally, a security issue is generated according to the reference picture and each confusion picture, and identity authentication is performed by using the security issue as needed. Obviously, since the security issue is generated on the basis of the reference picture and the reference picture is generated under the user operation, the degree of participation of a user during generation of the security issue is improved, the memorizing effect of the user on the security issue is improved, and the usability of the security issue is improved; and moreover, behavior data of the user does not need to be collected and analyzed, the generation cost is reduced, and the efficiency of identity authentication is improved.

Description

technical field [0001] The present application relates to the field of information technology, and in particular to a method and device for generating security questions and verifying identity. Background technique [0002] With the development of information technology, due to the advantages of fast execution speed and less resource consumption, more and more services are executed through the network. In order to ensure the security of executing services through the network, it is usually necessary to initiate Therefore, how to conduct identity verification more accurately, more conveniently, and faster has become one of the key issues that people pay attention to. [0003] In the existing identity verification methods, the identity of the user is mainly verified through security questions. Among them, the security questions can be divided into two types according to the different generation methods: one is to guide the user to pre-set the topic of the security question and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/06
CPCH04L63/08H04W12/06G06F21/36G06F21/46H04L63/0876G06F16/55G06F16/90332G06F16/535H04L63/0853
Inventor 董鹂贇孙娜江璇林述民李渊深
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products