Verification method and device, server and terminal

A server and terminal technology, applied in the computer field, can solve problems such as loss of verification and easy cracking of verification codes, and achieve high security and hard-to-crack effects

Active Publication Date: 2018-06-15
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF10 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the verification code composed of letters and data is easy to be cracked. Wh

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and device, server and terminal
  • Verification method and device, server and terminal
  • Verification method and device, server and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0085] The technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention.

[0086] The embodiment of the present invention discloses a verification method, device, server and terminal, which will be described in detail below.

[0087] Such as figure 1 as shown, figure 1 A flowchart of a verification method provided by an embodiment of the present invention includes the following steps:

[0088] Step 101, when the terminal detects a verification instruction, it sends a verification code request message to the server.

[0089] In the implementation, the user can use the network service through the terminal, and when using some network services, authentication will be required. For example, when a user logs in to an email account, an input box for entering the account number and password will be displayed on the login interface, and an option for obtaining a verification code c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a verification method and device, a server and a terminal and belongs to the field of a computer. The method comprises the steps that the server receives a verification code request message sent by the terminal; preset target voice data and an emotion identity corresponding to the target voice data are obtained; the target voice data is sent to the terminal; and the emotion identity input by a user is received, and if the emotion identity corresponding to the target voice data matches the emotion identity input by the user, it is judged that the terminal is verified successfully. Through adoption of the method, the device, the server and the terminal, the security of a verification system can be improved.

Description

technical field [0001] The invention relates to the computer field, in particular to a verification method, device, server and terminal. Background technique [0002] When users use network services, they often need to use verification codes for identity verification. [0003] For example, when logging into an email account, a verification code will be displayed on the login interface. After the user enters the verification code, the server will determine whether the verification code entered by the user is the same as the verification code displayed on the login interface. If they are the same, the verification will pass. After the verification is passed The user can perform subsequent operations. The verification code is mainly used to distinguish whether the user is a machine or a human, so as to avoid malicious use of network services. In the prior art, verification codes usually consist of letters and numbers. Simple verification code composed of letters and numbers ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G10L15/26G10L15/30G10L25/63
CPCG10L15/26G10L15/30G10L25/63H04L63/083H04L63/0861
Inventor 朱俊敏
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products