Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security verification method and device

A security verification and sender technology, applied in the computer field, can solve the problems of repeated development and inconvenient maintenance, and achieve the effect of single responsibility and avoiding interaction

Active Publication Date: 2020-06-05
JINGDONG TECH HLDG CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the existing security verification methods usually cause a lot of repeated development and are not easy to maintain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security verification method and device
  • Security verification method and device
  • Security verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0037] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0038]figure 1 An exemplary system architecture 100 to which embodiments of the security verification method or security verification device of the present application can be applied is shown.

[0039] Such as figure 1 As shown, the system architecture 100 may include a req...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is a security verification method and device. One specific embodiment of the method comprises: receiving a security verification request, wherein the security verification request comprises a user identifier and a class identifier of a sender of the security verification request; forwarding the security verification request to a connected risk control terminal, so that the risk control terminal determines whether to perform information check on a user indicated by the user identifier on the basis of the class identifier; in response to receiving prompt information returned by the risk control terminal for indicating information check, performing information check on the user on the basis of the prompt information to generate an information check result, and obtaining a security verification result on the basis of the information check result. According to the embodiment, security verification of the user is implemented, and interaction between the sender of the security verification request and the risk control terminal is avoided, so that the responsibility of the sender can become single.

Description

technical field [0001] The embodiments of the present application relate to the field of computer technology, and in particular to a security verification method and device. Background technique [0002] Currently, security verification can be applied to different systems, such as shopping systems, credit systems, financial management systems, and so on. These systems usually call the risk control engine to determine whether to trigger the user's information verification. Moreover, information verification logic, verification validity, etc. are usually completed by these systems according to their own needs. Therefore, the existing security verification methods usually cause a lot of repeated development and are not easy to maintain. Contents of the invention [0003] The embodiment of the present application proposes a security verification method and device. [0004] In the first aspect, the embodiment of the present application provides a security verification method...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06Q20/38
CPCG06Q20/382G06Q20/385H04L9/3228
Inventor 彭展季周张晨张燕锋
Owner JINGDONG TECH HLDG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products