An identity verification method, device and storage medium

An identity verification method and message technology, applied in the fields of identity verification methods, devices and storage media, can solve problems such as easy loss of various accounts, failure to receive verification codes, poor real-time performance, etc.

Active Publication Date: 2021-02-02
SHENZHEN TENCENT COMP SYST CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, if the user's mobile phone is lost, various accounts associated with the mobile phone number of the mobile phone are easily lost; Poor signal, unable to receive the verification code, which prevents the social networking system from authenticating the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity verification method, device and storage medium
  • An identity verification method, device and storage medium
  • An identity verification method, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0043] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects and not necessarily Describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of practice in sequences other than thos...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an identity verification method, device and storage device, which are applied in the technical field of information processing. When a terminal device in the system based on user login initiates a certain type of request, the server will send a verification message including the first content information to the terminal device to inform the operating user that audio and image data need to be collected, which requires the user to pass through the terminal device Collect audio and image data and send them to the server for verification; if the verification of audio and image data is passed, the identity verification of the operating user of the terminal device is passed. In this way, through the collected audio and image data, it can be verified whether the user operating the terminal device is a legitimate user, and the verification process is relatively safe; and because the collected audio and image data can only pass the verification when it corresponds to the first content information, it can prevent other users from Using pre-recorded audio and image data of legal users for verification, improves the security of terminal equipment operations.

Description

technical field [0001] The present invention relates to the technical field of information processing, in particular to an identity verification method, device and storage medium. Background technique [0002] Today, with the rapid development of the Internet, the account system of social network systems is extremely large, and the number of users of each social network system ranges from tens of millions to hundreds of millions. While various social network systems provide people with an information communication medium, they have also spawned various black industries, namely account hacking industry chains. Account hackers steal user accounts and passwords through Trojan horses and phishing programs. Therefore, it is no longer possible to simply Rely on account passwords to authenticate users. [0003] An existing identity verification method includes: when a user initiates a verification process for an account through a social network client, and the social network syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0861
Inventor 贾祎文
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products