Unlock instant, AI-driven research and patent intelligence for your innovation.

An information authentication processing method, system and related equipment

A processing method and information database technology, which are applied in the fields of systems and related equipment, and information authentication processing methods, can solve the problem that the personal privacy and personal property of stolen users cannot be guaranteed, and the personal interests of stolen users cannot be well protected, and manual services It is difficult for the center to accurately determine the account number and other issues

Active Publication Date: 2021-02-02
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the manual service center is always based on manual analysis. Therefore, the analysis period may be relatively long, and during this long period of time, illegal users may have obtained the stolen user's private information and property information, which in turn caused the stolen user's Personal privacy and personal property cannot be guaranteed
Moreover, when the illegal user can also obtain relevant information (such as friend account information) of the stolen user, the illegal user can also file a complaint with the artificial service center through the relevant information. At this time, it may be difficult for the artificial service center to accurately determine whether the account is which user it belongs to, and thus cannot better protect the personal interests of the stolen user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information authentication processing method, system and related equipment
  • An information authentication processing method, system and related equipment
  • An information authentication processing method, system and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0038] See figure 1 , is a network architecture provided by an embodiment of the present invention. The network architecture may include a server and multiple clients, and each client may be connected to the server through a network. In a specific application scenario, when figure 1When a user corresponding to any one of the clients finds that his account has been hacked, the user can initiate an account identification and authentication request through the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses an information authentication processing method, system and related equipment, wherein the method includes: the client generates an account identification authentication request, and collects the current image information of the target object according to the account identification authentication request, and detects the target object When it is a living subject, the current image information is sent to the server; when the server finds the user image information that matches the current image information in the user image information database, it determines that the target object is a legitimate user, and generates an account permission opening instruction, and according to The account permission opening instruction is to obtain the target identity information corresponding to the matching user image information in the user image information database, and obtain the target account bound to the target identity information, and open the target object's use authority for the target account. By adopting the invention, the authentication period can be shortened, and the user whose account belongs to can be accurately judged, so that the personal privacy and personal property of the stolen user can be guaranteed.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to an information authentication processing method, system and related equipment. Background technique [0002] Instant messaging (Instant Messaging, IM) is currently the most popular communication method on the Internet, and various instant messaging software emerges in an endless stream; service providers also provide more and more abundant communication service functions, therefore, also more and more Multiple users are using the instant messaging application. Wherein, each user will have one or more unique instant messaging application accounts, and through these accounts, the instant messaging application can be logged in to realize various communication service functions. [0003] However, there are also various viruses in the Internet, and some viruses can have the function of stealing accounts, that is, the passwords corresponding to the account numbers of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/58G06K9/00
CPCH04L51/046H04L63/0815G06V40/166H04L51/23
Inventor 肖沙沙
Owner TENCENT TECH (SHENZHEN) CO LTD