Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety verification method and device

A security verification and verification code technology, applied in the field of security verification methods and devices, can solve the problems of low verification security and the like

Inactive Publication Date: 2018-04-17
CHINA MOBILE COMM LTD RES INST +1
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides a security verification method and device to solve the problems existing in the existing verification code technology that are easy to be automatically identified by malicious programs and have low verification security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety verification method and device
  • Safety verification method and device
  • Safety verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] like figure 1 As shown, the flow chart of the security verification method provided by the embodiment of the present application includes the following steps:

[0090] S101: The client sends a security verification request to the verification code platform.

[0091] In practical applications, users mostly use various services provided by merchants through service clients (referred to as clients in the embodiments of this application), and some of the various services provided by merchants require security verification, so , security verification is usually accompanied by the user's business request. Therefore, in the specific implementation process, when the business used by the user requires security verification, the client can first cache the acquired business information locally, and then send it to the verification code platform. Secure authentication request.

[0092] S102: Receive the verification question sent by the verification code platform; wherein, the ve...

Embodiment 2

[0103] like figure 2 As shown, the flowchart of another security verification method provided in the embodiment of the present application includes the following steps:

[0104] S201: The verification code platform receives the security verification request sent by the client.

[0105] Here, when the service requested by the user needs to be verified, the client can directly send a security verification request to the verification code platform, that is, the security verification request initiated by the client does not need to be forwarded by the service server.

[0106] S202: Generate a verification topic for the client, and send the verification topic to the client; wherein the verification topic is used to instruct the user to complete a specified action.

[0107] In the specific implementation process, the verification code platform can store a variety of specified actions in advance, and when a verification topic needs to be generated for the client, a specified action...

Embodiment 3

[0116] like image 3 As shown, the flow chart of another security verification method provided by the embodiment of the present application includes the following steps:

[0117] S301: The service server receives a service request sent by a client, and the service request carries the user's action track information and service information; wherein the action track information is the track information of the specified action completed by the user based on the verification question returned by the verification code platform.

[0118]S302: Send the user's action track information to the verification code platform for verification.

[0119] S303: Receive the verification result returned by the verification code platform.

[0120] S304: Send response information to the client based on the verification result returned by the verification code platform.

[0121] In the specific implementation process, if the verification result is that the verification is successful, the service se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information safety, and especially relates to a safety verification method and device, so as to solve problems that a conventional verification code technology is liable to be automatically recognized by a malicious program and is low in verification safety. According to the embodiment of the invention, the method provided by the invention comprisesthe steps: enabling a client to transmit a safety verification request to a verification code platform; receiving a verification question transmitted by the verification code platform, wherein the verification question is used for indicating a user to complete a specified operation; collecting the motion track information of the user; Transmitting a business request with the motion track information to a business server, so as to enable the business server to transmit the motion track information to the verification code platform for verification; receiving response information returned by thebusiness server based on a verification result of the verification mode platform, wherein the collected information is the motion track information of the user, and the motion track information comprises the behavior information of the user, so the method can effectively protect the verification information of the user from being automatically recognized by the malicious program, and improves theverification safety.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular, to a security verification method and device. Background technique [0002] At present, the verification code technology has been widely used in the Internet field. For example, users usually need to enter the verification code when logging in to the client, and also need to enter the verification code when making payment to the merchant. It can be seen that the verification code technology plays an important role in ensuring the safety of users. very important role. [0003] In the prior art, verification codes are usually composed of numbers and letters. Such verification codes often increase the possibility of being recognized by the program by adding interference, such as shading, lines, etc., but if too many interference factors are added, it will increase. It is difficult for users to identify the verification code, and the verification code compos...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/1441
Inventor 张艳彭华熹
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products