Supercharge Your Innovation With Domain-Expert AI Agents!

Information verification method and device

A technology for information verification and verification, which is applied in the field of information verification methods and devices, and can solve problems such as loss of account resources and inability to log in to other people's devices

Active Publication Date: 2020-05-19
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security definition of personal banking is that it can only be used by personal devices, and other people's devices cannot log in
[0003] In the prior art, when logging in or using related clients, it is generally through the login password of the current account and the verification code sent by the background to verify, and when the verification is passed, you can log in and perform related operations; When the information, login password, and verification code are leaked, the login operation can also be performed on other people's devices, which may cause resource loss in the account

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information verification method and device
  • Information verification method and device
  • Information verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the purpose, technical solution and advantages of the application clearer, the application will be further described in detail below in conjunction with the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in the present application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present application.

[0057] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the application described herein can be practiced in sequen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an information verification method and device. The method comprises the steps of responding to a dynamic token obtaining request transmitted through a first account, and generating a first dynamic token; sending the first dynamic token to the first account; determining a first account basic factor bound with the first account; generating a target dynamic factor based on the first account basic factor and the first dynamic token; receiving a resource transfer request sent by the first account, wherein the resource transfer request comprises a to-be-verified dynamic token and a device identifier of a current device logging in the first account; generating a to-be-verified dynamic factor; and verifying the resource transfer request based on a consistency comparison result of the target dynamic factor and the dynamic factor to be verified. According to the invention, the unique binding of the personal account and the personal device is realized, and even if the account information and the login password are leaked, the account cannot be logged in on another device.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to an information verification method and device. Background technique [0002] As e-banking and e-wallets have been widely used on terminal devices, more and more people complete financial activities such as transactions, transfers, and currency exchanges through their own devices, realizing that personal devices are like personal banks, which can be used anytime, anywhere . The security definition of personal banking is that it can only be used by personal devices, and other people's devices cannot log in. [0003] In the prior art, when logging in or using related clients, it is generally through the login password of the current account and the verification code sent by the background to verify, and when the verification is passed, you can log in and perform related operations; When information, login passwords, and verification codes are leaked, login o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0807H04L9/3213H04L2463/082H04L63/083H04L63/0876H04L9/3228
Inventor 雷羽平卢仕培
Owner TENCENT TECH (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More