Unlock instant, AI-driven research and patent intelligence for your innovation.

Information verification method, system and device

A technology for information verification and environmental information, applied in the fields of systems and devices, and information verification methods, can solve the problems of information leakage and low security in user application systems

Active Publication Date: 2019-08-27
BEIJING TRUSFORT TECH CO LTD
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Taking the login application system as an example, after the user enters the account password through the human-computer interaction interface provided by the client of the application system and clicks the login button, the client will send the user account and password entered by the user to the server of the application system; After obtaining the user account and password, verify the legitimacy of the user account and password; after confirming that the user account and password are legal, allow the user account to log in to the application system, and conduct a risk assessment of the operating environment of the client; however, since the user account has already logged into the In the application system, if the login is performed by an illegal user using the user account and password, in some cases, such as when the network speed is slow, the illegal user may access the business through other links in the application system, which will cause the user's application to fail. The problem of information leakage in the system, the security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information verification method, system and device
  • Information verification method, system and device
  • Information verification method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0112] This embodiment provides an information verification system, including a user terminal, a reverse proxy server, and a service server, see figure 1 As shown, a schematic diagram of an interaction flow of an information verification system provided by an embodiment of the present application includes the following steps:

[0113] Step 101: The user terminal receives the operation request, and sends the received operation request to the reverse proxy server.

[0114] The operation request may be input by the user through the user terminal.

[0115] Exemplarily, the operation request received by the user terminal may be that the user triggers an operation request button through the user terminal, such as clicking a login button.

[0116] Step 102: The reverse proxy server receives the operation request sent by the user terminal, generates operation indication information based on the operation request, and sends the operation indication information to the user terminal.

[...

Embodiment 2

[0186] This embodiment provides an information verification device, see Figure 4 As shown, a schematic structural diagram of the information verification apparatus 400 provided in this embodiment includes a first receiving module 401, a second receiving module 402, a first sending module 403, a second sending module 404, and a third sending module 405, specific:

[0187] The first receiving module 401 is configured to receive an operation request initiated by a user, and send the operation request to the reverse proxy server;

[0188] A second receiving module 402, configured to receive the operation indication information sent by the reverse proxy server according to the operation request;

[0189] a first sending module 403, configured to send environment information to the reverse proxy server based on the operation instruction information;

[0190] The second sending module 404 is configured to generate and send the secondary authentication information to the reverse pr...

Embodiment 3

[0220] Based on the same technical concept, the embodiment of the present application also provides an electronic device 600, which is applied to a user terminal. Image 6 As shown, a schematic structural diagram of an electronic device 600 provided in an embodiment of the present application includes a processor 601 , a memory 602 , and a bus 603 . Among them, the memory 602 is used to store the execution instructions, including the memory 6021 and the external memory 6022; the memory 6021 here is also called the internal memory, and is used to temporarily store the operation data in the processor 601 and the data exchanged with the external memory 6022 such as the hard disk, The processor 601 exchanges data with the external memory 6022 through the memory 6021. When the electronic device 600 is running, the processor 601 communicates with the memory 602 through the bus 603, so that the processor 601 executes the following instructions:

[0221] Receive an operation request i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an information verification method, system and device, and the method comprises the steps: after receiving an operation request sent by a user terminal, generating operation indication information based on the operation request, and sending the operation indication information to the user terminal; after the environment information sent by the user terminal is received, judging whether secondary authentication needs to be conducted on the user terminal or not based on the environment information; if the judgment result is yes, sending a secondary authentication instruction to the user terminal; receiving secondary authentication information fed back by the user terminal according to the secondary authentication instruction, carrying out security verification based onthe secondary authentication information, and feeding back a first authentication passing instruction to the user terminal after the verification is passed; after request information sent by the reverse proxy server is received, sending operation information contained in the request information to the service server, and the service server judging whether the user terminal is allowed to execute operation corresponding to the operation request or not. Through the method, the security of the service system can be improved.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular, to an information verification method, system and device. Background technique [0002] When a user uses an application system, the client and server of the application system will interact with a large amount of data; there are a large number of sensitive operations in the process of data interaction, such as user login, bank transfer, etc. In order to ensure the security of the interaction process, in many cases, when the user performs these sensitive operations, after verifying the legitimacy of the user's operation, the security of the user's operating environment is also evaluated. When it is detected that the user's operating environment has a high risk, the user is then authenticated twice. [0003] Taking logging in to the application system as an example, after the user enters the account and password through the human-computer interaction inter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0838H04L63/0876H04L63/0884H04L63/107H04L63/108
Inventor 袁春旭赵军李川李超张贺龙崔传友郭晓鹏孙悦
Owner BEIJING TRUSFORT TECH CO LTD