Check patentability & draft patents in minutes with Patsnap Eureka AI!

Verification method and device

A verification method and a technology for verifying information, which are applied in the field of verification methods and devices, can solve problems such as user loss, potential safety hazards, and single difficulty in identifying image verification codes, and achieve the effects of increasing difficulty, good experience, and overcoming single verification information

Active Publication Date: 2021-03-02
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. With the development of image recognition technology, traditional image verification codes are often easily recognized by computer programs, making it impossible to isolate computer program requests;
[0005] 2. With the emergence of many decoding platforms, SMS verification codes are easy to be leaked, resulting in greater security risks
In addition, the cost of the voice verification code is relatively high, which may easily cause the loss of users;
[0006] 3. In the existing technology, it is impossible to accurately identify whether the visitor is a person or a computer program, so that it is impossible to provide a differentiated and targeted verification code for the visitor;
[0007] 4. The recognition difficulty of the image verification code in the prior art is relatively simple, and it is impossible to effectively shield the computer program request through the differentiated verification information; if the verification code recognition difficulty is uniformly increased in order to shield the computer program request, it will easily affect the personal user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and device
  • Verification method and device
  • Verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] Exemplary embodiments of the present invention are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0058] The technical solution of the embodiment of the present invention uses the current request to judge the degree of user request aggregation, and then determines the degree of risk of the user as a computer program, and sends verification information that is more difficult to identify for users with a higher risk of computer programs, and less risk for computer program...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method and device, which relate to the computer field. One embodiment of the method includes determining a request aggregation degree of a user sending a current request; the authentication information corresponding to the degree of aggregation of the request is returned to the user. The embodiment can judge the risk degree of the computer program for theuser who sends the request, and return the verification information with different identification difficulty according to the judgment result, so that the computer program request can be intercepted,and the personal user experience can be improved.

Description

technical field [0001] The invention relates to the field of computers, in particular to a verification method and device. Background technique [0002] With the rapid development of computer technology, the problem of network security is becoming more and more serious. In practical applications, some people will use computer programs to perform automatic batch login, batch registration, batch request, brute force password cracking, etc. on the website, which will cause serious network security problems. In order to deal with the above problems, the service provider often uses a verification code to identify whether the visitor is an individual user or a computer program. The visitor needs to input the verification code displayed by the service provider, and the visitor can continue to visit only after the input information is successfully verified. [0003] Currently, commonly used verification codes include image verification codes, SMS verification codes and voice verifi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12G06F21/31
CPCG06F21/121G06F21/31
Inventor 李川
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More