Supercharge Your Innovation With Domain-Expert AI Agents!

A method and device for information verification

An information verification and to-be-verified technology, applied in the field of information verification methods and devices, can solve problems such as inability to log in other people's devices, loss of account resources, etc.

Active Publication Date: 2022-02-18
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security definition of personal banking is that it can only be used by personal devices, and other people's devices cannot log in
[0003] In the prior art, when logging in or using related clients, it is generally through the login password of the current account and the verification code sent by the background to verify, and when the verification is passed, you can log in and perform related operations; When the information, login password, and verification code are leaked, the login operation can also be performed on other people's devices, which may cause resource loss in the account

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for information verification
  • A method and device for information verification
  • A method and device for information verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the purpose, technical solution and advantages of the application clearer, the application will be further described in detail below in conjunction with the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in the present application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present application.

[0057] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the application described herein can be practiced in sequen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application relates to an information verification method and device, the method comprising: generating a first dynamic token in response to a dynamic token acquisition request sent through a first account; sending the first dynamic token to the second An account; determine the first account basic factor bound to the first account; generate a target dynamic factor based on the first account basic factor and the first dynamic token; receive the information sent by the first account A resource transfer request, wherein the resource transfer request includes the dynamic token to be verified and the device identification of the current device that logs into the first account, and generates a dynamic factor to be verified; based on the target dynamic factor and the dynamic factor to be verified The consistency comparison result of the resource transfer request is verified. This application realizes the unique binding of personal account and personal device, even if the account information and login password are leaked, the account cannot be logged in on another device.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to an information verification method and device. Background technique [0002] As e-banking and e-wallets have been widely used on terminal devices, more and more people complete financial activities such as transactions, transfers, and currency exchanges through their own devices, realizing that personal devices are like personal banks, which can be used anytime, anywhere . The security definition of personal banking is that it can only be used by personal devices, and other people's devices cannot log in. [0003] In the prior art, when logging in or using related clients, it is generally through the login password of the current account and the verification code sent by the background to verify, and when the verification is passed, you can log in and perform related operations; When information, login passwords, and verification codes are leaked, login o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32
CPCH04L63/0807H04L9/3213H04L2463/082H04L63/083H04L63/0876H04L9/3228
Inventor 雷羽平卢仕培
Owner TENCENT TECH (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More