Identity authentication method, device and system

An identity verification method and identity verification technology, applied in computer security devices, digital data authentication, instruments, etc., can solve problems such as low security, achieve high privacy, improve security, and improve reliability

Pending Publication Date: 2018-02-27
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of research and practice of the prior art, the inventor of the present invention found that, because the traditional verification code is to randomly generate a small character picture and add an input box, therefore, illegal intruders can easily directly pull the verification code. The picture of the code is then cracked by automaton or machine learning, so its security is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device and system
  • Identity authentication method, device and system
  • Identity authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] This embodiment will be described from the perspective of an identity verification device. The identity verification device may be integrated into a network device, such as a terminal or a server. The terminal may include a mobile phone, a tablet computer, a notebook computer or a personal computer (PC, Personal Computer) and other equipment.

[0032] An identity verification method, comprising: receiving a verification code acquisition request initiated by a user, obtaining user history information of the user according to the verification code acquisition request, generating a verification code according to the user history information, and identifying the user based on the generated verification code verify.

[0033] Such as Figure 1b As shown, the specific process of the authentication method can be as follows:

[0034] 101. Receive a verification code acquisition request initiated by a user.

[0035] For example, a verification code acquisition request triggere...

Embodiment 2

[0068] According to the method described in Embodiment 1, an example will be given below for further detailed description.

[0069] In this embodiment, description will be made by taking the identity verification device integrated in a network device as an example, where the network device may be a terminal or a server.

[0070] Such as figure 2 As shown, an authentication method, the specific process can be as follows:

[0071] 201. The network device receives a verification code acquisition request initiated by a user.

[0072] For example, if the network device is a terminal, at this time, the terminal may receive a verification code acquisition request triggered by a user. Wherein, there may be various ways of triggering, for example, may include clicking, sliding, touching and / or pressing and the like.

[0073] For another example, if the network device is a network-side device such as a server, at this time, the server may receive a verification code acquisition requ...

Embodiment 3

[0106] In order to better implement the above solutions, the embodiment of the present invention also provides an identity verification device, such as Figure 3a As shown, the identity verification device may include a receiving unit 301, an acquiring unit 302, a generating unit 303 and a verifying unit 304, as follows:

[0107] (1) receiving unit 301;

[0108] The receiving unit 301 is configured to receive a verification code acquisition request initiated by a user.

[0109] For example, the receiving unit 301 may be specifically configured to receive a verification code acquisition request triggered by the user by clicking or sliding a preset trigger interface, or may also receive a verification code acquisition request sent by the user through other devices, and so on.

[0110] (2) acquisition unit 302;

[0111] The acquiring unit 302 is configured to acquire the user history information of the user according to the verification code acquisition request.

[0112] For e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an identity authentication method, device and system. The embodiment of the method comprises the following steps that: after an authentication code acquisition request initiated by a user is received, obtaining the user historical information of the user according to the authentication code acquisition request, and generating an authentication code according to the user historical information; and then, on the basis of the generated authentication code, carrying out identity authentication on the user. By use of the scheme, identity authentication reliability and information safety can be improved.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an identity verification method, device and system. Background technique [0002] Nowadays, all kinds of information are flooding people's lives, such as online shopping, online transfers, and conversations, etc., all of which involve the processing of information, and information security involves the safety of people's lives and property. [0003] In order to improve the security of information processing, in addition to verifying the user name and password of the user, a "verification code" verification is also required when processing information; the so-called verification code refers to a character randomly generated by the system Strings or pictures, and require users to input correspondingly according to the displayed strings or pictures. This technology is mainly proposed to prevent a hacker from making continuous login attempts to a specific registered us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31
CPCG06F21/31G06F21/316
Inventor 陈云云郭计伟张小龙
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products