Unlock instant, AI-driven research and patent intelligence for your innovation.

Verification method, identification terminal and user terminal

A verification method and client-end technology, applied in the field of mobile payment, to achieve the effect of increasing difficulty, improving account security, and increasing complexity

Active Publication Date: 2019-11-08
TENCENT TECH (SHENZHEN) CO LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Since the method of combining two-dimensional codes with location information affects the normal use of two-dimensional codes by users when preventing the two-dimensional codes from being copied, the embodiment of the present application provides a verification method, an identification terminal and a user terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method, identification terminal and user terminal
  • Verification method, identification terminal and user terminal
  • Verification method, identification terminal and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the objectives, technical solutions and beneficial effects of the present application clearer, the present application will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present application, but not to limit the present application.

[0042] For the convenience of understanding, the terms involved in the embodiments of the present application are explained below.

[0043] Barcode: Also known as one-dimensional code, it is a graphic identifier used to express a set of information by arranging multiple black bars and blanks with different widths according to certain coding rules.

[0044] Two-dimensional code: a black and white graphic distributed on a plane (two-dimensional direction) with a specific geometric figure according to a certain rule, which has been widely used in payment and other scenarios. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a verification method, an identification terminal and a user terminal, and relates to the technical field of mobile payment. The verification method comprisesthe steps that the user terminal generates a QR code and a bar code, and updates the bar code regularly; the identification terminal verifies the user information obtained from the QR code, compares the verification information obtained from the bar codes in different periods, and determines that the user passes the verification when the user information passes the verification and the verification information corresponding to different periods is inconsistent; the user terminal generates the QR code and the bar code for verification, and the bar code is updated regularly, so that the difficulty of copying the QR code is improved; and the identification terminal verifies the user information in the QR code and compares the user information with the verification information in the bar codesin different periods. Therefore, compared with that whether the user is legal or not is determined according to the user information in the QR code of single verification, the verification complexityis improved, and the QR code cannot be directly used after being copied, so that the account safety is improved.

Description

technical field [0001] The embodiments of the present application relate to the technical field of mobile payment, and in particular, to a verification method, an identification terminal, and a user terminal. Background technique [0002] In payment scenarios, QR codes are often used as vouchers for user payment, such as payment codes and bus codes. As a kind of graphic code, QR code is easy to be copied, which leads to the theft of user account and threatens the user's property. At present, the method of combining two-dimensional code with geographic location information is used to avoid the duplication of the two-dimensional code. Specifically, the geographic location information of the user's current location is added to the two-dimensional code, and the identification terminal judges the address and location information in the two-dimensional code and its own location. distance to determine whether the QR code is copied. However, the stability of obtaining the geograph...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K17/00G06Q20/32G06Q20/38
CPCG06K17/0022G06Q20/3274G06Q20/382
Inventor 李存良郭润增耿志军刘杰周儒军
Owner TENCENT TECH (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More