Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for user-defined verification mode

A verification method and user technology, applied in the computer field, can solve problems such as information leakage and weak verification methods

Active Publication Date: 2021-04-20
ADVANCED NEW TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, such a verification method is still relatively weak
If the mobile phone or password is stolen, the information is easily leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for user-defined verification mode
  • Method and device for user-defined verification mode
  • Method and device for user-defined verification mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0134] According to an implementation manner, the event information includes at least one of the following: user information, device information, service type, and service serial number.

[0135] In one embodiment, the above-mentioned verification unit 103 is configured to sequentially obtain each verification information provided by the user for each verification method in the at least one verification method, and send each verification information to the verification verification center, so that the verification verification center User identity is verified.

[0136] According to yet another embodiment, a device for security verification is provided at the server. Figure 11 A schematic block diagram of a security verification device according to an embodiment is shown. It needs to be understood that, Figure 11 The verification device 110 is located on the server side and is used to assist the client to perform security verification. Such as Figure 11 As shown, the dev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of this specification provide a method and device for a user-defined verification mode. In the setting stage, the verification method set by the user for a certain business is received, so that the user is allowed to define the verification method required by the business according to his own judgment of the importance of a certain business. When the user uses the service, the client queries the server for the authentication method set by the user for the service for this service request event, and verifies the user based on this authentication method.

Description

technical field [0001] One or more embodiments of this specification relate to the field of computer technology, and in particular to security verification and identity authentication. Background technique [0002] With the development of computer and Internet technology, the types and numbers of various client applications and Apps are increasing day by day, and the daily use scenarios involved are becoming more and more abundant. All aspects of life can be handled through various client applications and Apps. accomplish. As the use scenarios and frequency of these applications and apps increase, more and more unsafe factors are brought about, such as criminals stealing other people's accounts for payment, transfer, and sending messages. Therefore, secure authentication and identity verification is becoming more and more important. [0003] In conventional technologies, general applications or Apps use a single security verification method to verify user identities, such ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06F21/43G06F21/32
CPCG06F21/32G06F21/43H04L9/3215H04L9/3226H04L9/3231
Inventor 吕晨晨管维刚陈文鸿
Owner ADVANCED NEW TECH CO LTD